2008 |
29 | EE | Soo-Young Kang,
Im-Yeong Lee:
A Study on New Low-Cost RFID System with Mutual Authentication Scheme in Ubiquitous.
MUE 2008: 527-530 |
28 | EE | Soo-Young Kang,
Deok-Gyu Lee,
Im-Yeong Lee:
A study on secure RFID mutual authentication scheme in pervasive computing environment.
Computer Communications 31(18): 4248-4254 (2008) |
2007 |
27 | EE | Soo-Young Kang,
Im-Yeong Lee:
A Study on Low-Cost RFID System Management with Mutual Authentication Scheme in Ubiquitous.
APNOMS 2007: 492-502 |
26 | EE | Jong Sik Moon,
Im-Yeong Lee:
A Study on Ticket-Based AAA Mechanism Including Time Synchronization OTP in Ubiquitous Environment.
ICCSA (1) 2007: 666-677 |
25 | EE | Seo-Il Kang,
Deok-Gyu Lee,
Im-Yeong Lee:
A Study on Key Distribution and ID Registration in the AAA System for Ubiquitous Multimedia Environments.
MMM (2) 2007: 487-493 |
24 | EE | Dae-Hee Seo,
Jang-Mi Baek,
Jiang Li,
Soo-Young Kang,
Im-Yeong Lee,
Hyung-Geun Oh:
A Study on Improved RFID Authentication Scheme.
MUE 2007: 567-572 |
23 | EE | Deok-Gyu Lee,
Yun-kyung Lee,
Jong Wook Han,
Jong Hyuk Park,
Im-Yeong Lee:
Intelligent Home Network Authentication: Home Device Authentication Using Device Certification.
OTM Conferences (2) 2007: 1688-1700 |
22 | EE | Soo-Young Kang,
Im-Yeong Lee:
Privacy Protection Scheme of RFID Using Random Number.
PAKDD Workshops 2007: 596-607 |
2006 |
21 | EE | Deok-Gyu Lee,
Jang-Su Park,
Im-Yeong Lee:
Broadcast Encryption Using Efficient Key Distribution and Renewal for Ubiquitous Environments.
EUC Workshops 2006: 721-730 |
20 | EE | Deok-Gyu Lee,
Jong Sik Moon,
Jong Hyuk Park,
Im-Yeong Lee:
Authentication for Ubiquitous Multi Domain in Pervasive Computing Using PMI.
HPCC 2006: 515-524 |
19 | EE | Deok-Gyu Lee,
Seo-Il Kang,
Dae-Hee Seo,
Im-Yeong Lee:
Authentication for Single/Multi Domain in Ubiquitous Computing Using Attribute Certification.
ICCSA (4) 2006: 326-335 |
18 | EE | Deok-Gyu Lee,
Jang-Su Park,
Im-Yeong Lee,
Yong-Seok Park,
Jung-Chul Ahn:
An Efficient Key Distribution for Ubiquitous Environment in Ad-Hoc Network Using Broadcast Encryption.
ICCSA (4) 2006: 370-379 |
17 | EE | Deok-Gyu Lee,
Seo-Il Kang,
Im-Yeong Lee:
An Intelligent and Efficient Traitor Tracing for Ubiquitous Environments.
KES (2) 2006: 793-802 |
2005 |
16 | EE | Dae-Hee Seo,
Deok-Gyu Lee,
Im-Yeong Lee:
A Study on Scalable Bluetooth Piconet for Secure Ubiquitous.
Human.Society@Internet 2005: 45-56 |
15 | EE | Dae-Hee Seo,
Im-Yeong Lee,
Hee-Un Park:
A Study on Secure SDP of RFID Using Bluetooth Communication.
ICCSA (2) 2005: 117-126 |
14 | EE | Seo-Il Kang,
Im-Yeong Lee:
A Study on the E-Cash System with Anonymity and Divisibility.
ICCSA (2) 2005: 177-186 |
2004 |
13 | EE | Deok-Gyu Lee,
Hyung-Geun Oh,
Im-Yeong Lee:
A Study on Contents Distribution Using Electronic Cash System.
EEE 2004: 333-340 |
12 | EE | Dae-Hee Seo,
Im-Yeong Lee,
Hee-Un Park:
A Study on Key Recovery Agent Protection Profile Having Composition Function.
ICCSA (1) 2004: 557-566 |
11 | EE | Dae-Hee Seo,
Im-Yeong Lee:
A Study on Secure and Effcient Sensor Network Management Scheme Using PTD.
ICCSA (3) 2004: 1020-1028 |
10 | EE | Deok-Gyu Lee,
Im-Yeong Lee:
A Study on Efficient Key Distribution and Renewal in Broadcast Encryption.
ICCSA (4) 2004: 66-76 |
2003 |
9 | EE | Hyung-Woo Lee,
Im-Yeong Lee,
Dong-Ik Oh:
Smart Card Based Mobile Payment with Fairness Revocation Mechanism.
EC-Web 2003: 62-71 |
8 | EE | Yong-Ho Lee,
Im-Yeong Lee,
Hyung-Woo Lee:
New WAKE Key Recovery Protocol on M-commerce.
ICWE 2003: 279-280 |
7 | EE | Hyung-Woo Lee,
Im-Yeong Lee:
Designated Verification of Digital Watermark for Network Based Image Distribution.
International Conference on Computational Science 2003: 1069-1078 |
2002 |
6 | EE | Yu-Sug Chang,
Hye-Jung Lee,
Doo-Soon Park,
Im-Yeong Lee:
Interprocedural Transformations for Extracting Maximum Parallelism.
ADVIS 2002: 415-424 |
5 | EE | Hyung-Woo Lee,
Sung-Min Lee,
Im-Yeong Lee:
Secure Electronic Copyright Distribution with Public Key Based Traitor Tracing.
EC-Web 2002: 324-332 |
4 | EE | Dae-Hee Seo,
Im-Yeong Lee,
Dong-Ik Oh,
Doo-Soon Park:
Secure Bluetooth Piconet Using Non-anonymous Group Key.
EurAsia-ICT 2002: 766-777 |
3 | EE | Deok-Gyu Lee,
Im-Yeong Lee,
Jong-Keun Ahn,
Yong-Hae Kong:
The Illegal Copy Protection Using Hidden Agent.
EurAsia-ICT 2002: 832-841 |
2 | EE | Yong-Ho Lee,
Im-Yeong Lee,
Hyung-Woo Lee:
New Identity Escrow Scheme for Anonymity Authentication.
INDOCRYPT 2002: 382-394 |
2001 |
1 | EE | Hee-Un Park,
Im-Yeong Lee:
A Digital Nominative Proxy Signature Scheme for Mobile Communication.
ICICS 2001: 451-455 |