2009 |
28 | EE | Yang Ou,
Chul Sur,
Kyung Hyune Rhee:
A Fast and Fully Format Compliant Protection of JPEG2000 Code-Streams.
MMM 2009: 51-62 |
2008 |
27 | EE | Yang Ou,
Chae Duk Jung,
Chul Sur,
Kyung Hyune Rhee:
An Improved Flexible Access Control Scheme for JPEG2000 Codestreams.
MUE 2008: 552-557 |
2007 |
26 | EE | Eun Seok Jeong,
Chul Sur,
Kyung Hyune Rhee:
A New DRM System Based on Graded Contents Sharing and Time-Block Distribution for Home Networks.
ACIS-ICIS 2007: 830-833 |
25 | EE | Yang Ou,
Chul Sur,
Kyung Hyune Rhee:
Region-Based Selective Encryption for Medical Imaging.
FAW 2007: 62-73 |
2006 |
24 | EE | Chul Sur,
Kyung Hyune Rhee:
An Efficient Authentication and Simplified Certificate Status Management for Personal Area Networks.
APNOMS 2006: 273-282 |
23 | EE | Jong-Phil Yang,
Kouichi Sakurai,
Kyung Hyune Rhee:
Distributing Security-Mediated PKI Revisited.
EuroPKI 2006: 31-44 |
22 | EE | Jong-Phil Yang,
Kyung Hyune Rhee,
Kouichi Sakurai:
A Proactive Secret Sharing for Server Assisted Threshold Signatures.
HPCC 2006: 250-259 |
21 | EE | Hyeran Lee,
Kyung Hyune Rhee:
Lossless Data Hiding for High Embedding Capacity.
ICDCIT 2006: 424-437 |
20 | EE | Hyeran Lee,
Kyung Hyune Rhee:
High Capacity Lossless Data Hiding.
ICISS 2006: 326-336 |
19 | EE | Chul Sur,
Jong-Phil Yang,
Kyung Hyune Rhee:
A New Efficient Protocol for Authentication and Certificate Status Management in Personal Area Networks.
ISCIS 2006: 952-962 |
18 | EE | Jong-Phil Yang,
Kyung Hyune Rhee:
A New Design for a Practical Secure Cookies System.
J. Inf. Sci. Eng. 22(3): 559-571 (2006) |
2005 |
17 | EE | Youngho Park,
Jung-Hwa Shin,
Kyung Hyune Rhee:
Design of a Secure Digital Contents Delivery System in P2P Networks.
DRMTICS 2005: 311-321 |
16 | EE | Jong-Phil Yang,
Kyung Hyune Rhee:
Securing Admission Control in Ubiquitous Computing Environment.
ICN (2) 2005: 972-979 |
15 | EE | Jong-Phil Yang,
Kyung Hyune Rhee:
Generating authentication data without keeping a private key for Mobility.
ICPADS (2) 2005: 230-234 |
14 | EE | Chul Sur,
Ji Won Jung,
Jong-Phil Yang,
Kyung Hyune Rhee:
A Fair and Reliable P2P E-Commerce Model Based on Collaboration with Distributed Peers.
IWDC 2005: 380-391 |
13 | EE | Kyung Hyune Rhee,
Young-Ho Park,
Gene Tsudik:
A Group Key Management Architecture for Mobile Ad-hoc Wireless Networks.
J. Inf. Sci. Eng. 21(2): 415-428 (2005) |
2004 |
12 | EE | Jong-Phil Yang,
Sang Uk Shin,
Kyung Hyune Rhee:
A Simplified Approach to User Controllable Threshold Signatures.
CEC 2004: 273-280 |
11 | EE | Jong-Phil Yang,
Chul Sur,
Hwa-Sik Jang,
Kyung Hyune Rhee:
Practical Modification of an Efficient Public-Key Framework.
EEE 2004: 556-559 |
2003 |
10 | EE | Jong-Phil Yang,
Chul Sur,
Kyung Hyune Rhee:
ROCEM: Robust Certified E-mail System Based on Server-Supported Signature.
ICICS 2003: 100-111 |
9 | EE | Jong-Phil Yang,
Chul Sur,
Kyung Hyune Rhee:
Distributed Certified E-mail System for Mobile Users.
IWDC 2003: 194-204 |
2002 |
8 | EE | Jong-Phil Yang,
Kyung Hyune Rhee:
The Design and Implementation of Improved Secure Cookies Based on Certificate.
INDOCRYPT 2002: 314-325 |
2001 |
7 | EE | Jong-Phil Yang,
Weon Shin,
Kyung Hyune Rhee:
An End-to-End Authentication Protocol in Wireless Application Protocol.
ACISP 2001: 247-259 |
6 | EE | Sang Uk Shin,
Kyung Hyune Rhee:
A New Design of the Hash Functions With All-or-Nothing Property.
J. Inf. Sci. Eng. 17(6): 945-957 (2001) |
2000 |
5 | | Sang Uk Shin,
Weon Shin,
Kyung Hyune Rhee:
All-or-Nothing Transform and Remotely Keyed Encription Protocols.
Public Key Cryptography 2000: 178-195 |
1999 |
4 | EE | Sang Uk Shin,
Kyeong Seop Sim,
Kyung Hyune Rhee:
A Secrecy Scheme for MPEG Video Data Using the Joint of Compression and Encryption.
ISW 1999: 191-201 |
3 | EE | Sang Uk Shin,
Kyung Hyune Rhee,
Jae Woo Yoon:
Hash Functions and the MAC Using All-or-Nothing Property.
Public Key Cryptography 1999: 263-275 |
1998 |
2 | | Jae Woo Yoon,
Sang Uk Shin,
Kyung Hyune Rhee:
A secure hash function based on cellular automata.
ICISC 1998: 93-105 |
1 | EE | Sang Uk Shin,
Kyung Hyune Rhee,
DaeHyun Ryu,
Sangjin Lee:
A New Hash Function Based on MDx-Family and Its Application to MAC.
Public Key Cryptography 1998: 234-246 |