Conference
No. | Authors | Paper Title | Conference Title | Date |
---|---|---|---|---|
161 | Jae-Jeong Shin Taehoon Kim Im-yeong Lee |
A Study on Secure Aggregate Signature Using CL Signature in DID Environment | ICCCM 2023 | 2023.08.05 |
160 | Seong-Cheol Yoon Yong-Woon Hwang Im-yeong Lee |
A Study on Multi Keyword Rank based Searchable Encryption Providing Access Pattern Privacy in Cloud Environment | ICCCM 2023 | 2023.08.05 |
159 | Seok-Jun Jang Yong-Woon Hwang Im-yeong Lee |
A Study on VPPSS that Provides Leaker Tracking in Permissioned Blockchain | ICCCI 2023 | 2023.06.24 |
158 | Yong-Woon Hwang Seok-Jun Jang Im-yeong Lee |
A Study on ABS Blocking Signatures of Unauthorized Signers | ICCCI 2023 | 2023.06.24 |
157 | Taehoon Kim Im-yeong Lee |
A Study on DID and CP-ABE-based Self-Sovereign Identity of Smart Vehicles | COSIT 2023 | 2023.05.21 |
156 | Hyo-Jin Song Im-yeong Lee |
A Study on Traceable Group Signature Scheme for Blockchain | ICINT 2023 | 2023.05.21 |
155 | Yong-Woon Hwang Taehoon Kim Miok Ryu Im-Yeong Lee |
A Study on ABS Scheme that Provides Key Escrow Problem Solving and Attribute Key Revocation | ICICPE 2022 | 2022.12.26 |
154 | Hui-Min Ren Im-Yeong Lee |
A Study on Certificateless-based AGKA Protocol | MITA 2022 | 2022.07.06 |
153 | Taehoon Kim Im-Yeong Lee |
A Study on Secure Data Access Control using Secret Sharing in DID | MITA 2022 | 2022.07.06 |
152 | Yong-Woon-Hwang Hyo-Jin Song Im-Yeong Lee |
A study on the ABAS scheme supporting efficient verification | MITA 2022 | 2022.07.06 |
151 | Yong-Woon-Hwang Im-Yeong Lee |
A study on CP-ABE based data sharing system that provides signature-based verifiable outsourcing | AES 2021 | 2021.06.19 |
150 | Taehoon Kim Wonbin Kim Daehee Seo Im-Yeong Lee |
A Secure Encapsulation Schemes based on Key Recovery System | Springer CCIS | 2021.04.02 |
149 | Taehoon Kim Im-Yeong Lee |
A Secure Encapsulation Schemes based on Key Recovery System | SVCC 2020 | 2020.12.18 |
148 | Yong-Woon-Hwang Im-Yeong Lee |
A Study on an Efficient Certificate-Based Aggregate Signature Scheme Providing Key Insulated in IIoT Environment | ICONI 2020 | 2020.12.14 |
147 | Yong-Woon-Hwang Im-Yeong Lee |
A study on CP-ABE based data sharing system that provides signature-based verifiable outsourcing | AEIS 2020 | 2020.10.17 |
146 | Tae-Hoon Kim Im-Yeong Lee |
Secure Hierarchical Deterministic Key Generation Scheme in Blockchain-based Medical Environment | IECC 2020 | 2020.07.08 |
145 | Won-Bin Kim Im-Yeong Lee |
Group Delegated ID-based Proxy Re-encryption for PHR | IMIS 2020 | 2020.07.01 |
144 | Dae-Hwi Lee Im-Yeong Lee |
An Efficient Certificateless Arbitrated Signature Scheme for IoT Environments | ICCCI 2020 | 2020.06.27 |
143 | Yong-Woon-Hwang Im-Yeong Lee |
A Study on Access Control Scheme Based on ABE Using Searchable Encryption in Cloud Environment | EIDWT 2020 | 2020.02.25 |
142 | Tae-Hoon Kim Im-Yeong Lee |
High Availability Multi-Agent Key Recovery System Using Signcryption Scheme | ICONI 2019 | 2019.12.16 |
141 | Chang-Hyun Roh Ju-Seong Hwang Im-Yeong Lee |
Secure key recovery system using PPSS in permissioned blockchain | ICONI 2019 | 2019.12.16 |
140 | Chang-Hyun Roh Yong-Woon-Hwang Im-Yeong Lee |
Smart Contract-Based Electronic Voting System That Provides Fairness | ICRMR 2019 | 2019.11.30 |
139 | Yong-Woon-Hwang Im-Yeong Lee |
A Study on Lightweight Anonymous CP-ABE Access Control for Secure Data Protection in Cloud Environment | ITCC 2019 | 2019.08.17 |
138 | Gyeong-Jin Ra Im-Yeong Lee |
An Anonymous Protocol for Member Privacy in a Consortium Blockchain | SpaCCS 2019 | 2019.07.15 |
137 | Won-Bin Kim Im-Yeong Lee |
ID-Based Proxy Re-encryption for Collusion Resistance in Cloud Storage | IFIP SEC 2019 | 2019.06.26 |
136 | Dae-Hwi Lee Im-Yeong Lee |
An Authentication and Key Agreement Scheme using ECQV in IoT Environments | IFIP SEC 2019 | 2019.06.26 |
135 | Gyeong-Jin Ra Im-Yeong Lee |
A Study on Hybrid Blockchain based XGS(XOR Global State) Injection Technology for Efficient Contents Modification and Deletion | IFIP SEC 2019 | 2019.06.11 |
134 | Gyeong-Jin Ra Im-Yeong Lee |
A Study on Identity Authentication and Digital Signature Keyless Signature Infrastructure-based in a Permission Blockchain with Ensure Privacy for a Verifier | BAT 2018 | 2018.12.22 |
133 | Gyeong-Jin Ra Im-Yeong Lee |
Survey of Digital Signature Technology for IoT Environment : Focused on KSI’s Global Timestamping Technique | CUTE 2018 | 2018.12.17 |
132 | Won-Bin Kim Im-Yeong Lee |
Overview of data deduplication technology in a cloud storage environment | CUTE 2018 | 2018.12.17 |
131 | Chang-Hyun Roh Im-Yeong Lee |
A Study on PGP (Pretty Good Privacy) Using Blockchain | CSA 2018 | 2018.12.17 |
130 | Yong-woon Hwang Im-Yeong Lee |
A Study on Secure Data Access Scheme Based on CP-ABE in Cloud Environments | CSA 2018 | 2018.12.17 |
129 | Dae-Hwi Lee Im-Yeong Lee |
OAuth-based Access Control Scheme Against Replay Attacks in IoT Environment | CSA 2018 | 2018.12.17 |
128 | Dae-Hwi Lee Im-Yeong Lee |
Threshold-based group authentication scheme for IoT environment | MITA 2018 | 2018.6.29 |
127 | Chang-Hyun Roh Im-Yeong Lee |
Electronic voting system with blockchain | APIC-IST 2018 | 2018.6.25 |
126 | Gyeong-Jin Ra Im-Yeong Lee |
A Study on KSI-based Authentication Management and Smart Contract for Private Blockchain | APIC-IST 2018 | 2018.6.25 |
125 | Yong-woon Hwang Im-Yeong Lee |
A Study on Key Management Scheme using Proxy Re-Encryption in the CCTV Environment | APIC-IST 2018 | 2018.6.25 |
124 | Won-Bin Kim Im-Yeong Lee |
CCTV data deduplication technology using proxy re-encryption in a cloud storage environment | APIC-IST 2018 | 2018.6.25 |
123 | Gyeong-Jin Ra Im-Yeong Lee |
A Secure and Efficient KSI System for Electronic Document Protection | WITC-2018 | 2018.2.21 |
122 | Won-Bin Kim Im-Yeong Lee |
Data deduplication system in cloud storage environment | WITC-2018 | 2018.2.21 |
121 | Gun-Wook Choi Im-Yeong Lee |
Efficient Group Key Distribution Scheme in IP CCTV Environment | IWCIT 2017 | 2017.12.22 |
120 | Dae-Hwi Lee Im-Yeong Lee |
Efficient Group Authentication and Key Exchange Scheme for IoT Environment | IWCIT 2017 | 2017.12.22 |
119 | Gyeong-Jin Ra Jin Kwak Im-Yeong Lee |
A study on KSI Signature system for Medical Records Protection | ICT4sHealth | 2017.12.29 |
118 | Yong-Woon Hwang Im-Yeong Lee Jung-Taek Seo |
A Study on NTRU-based RFID Mutual Authentication for Medical Environment | ICT4sHealth | 2017.12.29 |
117 | Gun-Wook Choi Im-Yeong Lee |
A Study on Efficient Group Key Management Scheme in CCTV | ICONI 2017 | 2017.12.19 |
116 | Dae-Hwi Lee Im-Yeong Lee |
A Study on Group Authentication and Key Exchange Scheme | ICONI 2017 | 2017.12.19 |
115 | Won-Bin Kim Im-Yeong Lee |
A study on Ownership Management Scheme Using Linkage of Data Blocks in Secure Data Deduplication Environments | CSA 2017 | 2017.12.19 |
114 | Gyeong-Jin Ra Im-Yeong Lee |
A Study on Efficient KSI System based on Multi Path Hash Chain | ICCA-KSB 2017 | 2017.11.24 |
113 | Gun-Wook Choi Im-Yeong Lee |
A key distribution system for user authentication using pairing-based in a WSN | CAIPT 2017 | 2017.8.9 |
112 | Won-Bin Kim Im-Yeong Lee Jae-Cheol Ryou |
Improving dynamic ownership scheme for data deduplication | CAIPT 2017 | 2017.8.9 |
111 | Gyeong-Jin Ra Younh-Ho Park Im-Yeong Lee |
A Study on Secure Home System using KSI | APIC-IST 2017 | 2017.6.25 |
110 | Dae-Hwi Lee Im-Yeong Lee |
ECDSA-based Broadcast Authentication Scheme for Smart Home Environments | APIC-IST 2017 | 2017.6.25 |
109 | Yong-Woon Hwang Im-Yeong Lee |
A Study on Lightweight Mutual Authentication Protocol For Low-cost RFID Tags | MUE 2017 | 2017.5.23 |
108 | Dae-Hwi Lee Im-Yeong Lee |
ECDH-based 3PAKE Protocol for Secure Smart Home Service | WITC 2017 | 2017.2.14 |
107 | Su-Hyun Kim Im-Yeong Lee |
IoT Device Security based on Proxy Re-encryption | WITC 2017 | 2017.2.14 |
106 | Gyeong-Jin Ra Im-Yeong Lee |
A Study on Secure and Improved Keyless-based Digital Signature | PlatCon-17 | 2017.2.14 |
105 | Jang-Su Park Im-Yeong Lee |
A Study on Deriving Checklist About Management Inspection of Internal Data Leakage Prevention Solutions | PlatCon-17 | 2017.2.13 |
104 | Won-Bin Kim Im-Yeong Lee |
Client-Side Deduplication for prevention of leakage and ownership forgery | APIC-IST 2016 | 2016.6.27 |
103 | Sung-Wook Park Im-Yeong Lee |
Authentication Scheme based on Chebyshev Polynomial for Passive Communication Mode in NFC Payment Service Environment | APIC-IST 2016 | 2016.6.27 |
102 | Won-Bin Kim Im-Yeong Lee |
Client-Side Deduplication for Protect of a Private Data in Cloud Storage | WITC 2016 | 2016.2.17 |
101 | Sung-Wook Park Im-Yeong Lee |
Transaction Authentication Scheme based on Enhanced Signature RTD for NFC Payment Service Environments | Plat-Con 16 | 2016.2.16 |
100 | Sung-Wook Park Im-Yeong Lee |
Mutual Authentication Scheme based on GSM for NFC Mobile Payment Environments | CUTE 2015 | 2015.12.15 |
99 | Su-Hyun Kim Im-Yeong Lee |
Group Data Sharing Scheme based on Attribute Encryption in Cloud Computing Environments | UCAWSN 2015 | 2015.7.8 |
98 | Su-Hyun Kim Im-Yeong Lee |
Data Sharing Scheme based on Attribute Encryption in Cloud Computing | CAIPT 2015 | 2015.6.24 |
97 | Sung-Wook Park Im-Yeong Lee |
Light-weight Authentication Scheme for NFC mCoupon Service in IoT Environments | WITC 2015 | 2015.2.24 |
96 | Su-Hyun Kim Im-Yeong Lee |
Handover Authentication Scheme using Bloom Filter for SMART Highway | WITC 2015 | 2015.2.24 |
95 | Hyun-Jin Kim Im-Yeong Lee |
A Study on a Secure Single Sign-On Scheme based on NIZK Proof in Distributed Computing Environment | CSA 2014 | 2014.12.17 |
94 | Su-Hyun Kim Im-Yeong Lee |
A Study on User Authority Management for Safe Data Protection in cloud Computing Environments | CSA 2014 | 2014.12.17 |
93 | Su-Hyun Kim Im-Yeong Lee |
Block Access Token Management Scheme Based on Secret Sharing for User Access Control in Hadoop | CAIPT 2014 | 2014.6.27 |
91 | Sung-Wook Park Im-Yeong Lee |
OTS mCoupon Scheme for NFC Smart Poster Environments | ACSA-14 | 2014.4.23 |
90 | Su-Hyun Kim Im-Yeong Lee |
Secret Sharing based on Block Access Token Renewal Scheme in Apach Hadoop | ACSA-14 | 2014.4.23 |
89 | Su-Hyun Kim Im-Yeong Lee |
Improved Data Block Management Scheme Based on Secret Sharing for Distributed File System in Hadoop | Plat-Con14 | 2014.2.11 |
88 | Sun-Ho Lee Im-Yeong Lee |
Secure Data Management Scheme using One-Time Trapdoor on Cloud Storage Environment | ICCA 2013 2nd | 2013.11.27 |
87 | Su-Hyun Kim Im-Yeong Lee |
A Secure and Efficient Vehicle-to-Vehicle Communication Scheme using Bloom Filter in VANETs | ICCA 2013 2nd | 2013.11.27 |
86 | Sung-Wook Park Im-Yeong Lee |
Efficient mCoupon Authentication Scheme for Smart Poster Environments based on Low-cost NFC | ICCA 2013 | 2013.07.10 |
85 | Su-Hyun Kim Im-Yeong Lee |
A Secure and Efficient Vehicle-to-Vehicle Communication based on Sensor Network | ICCA 2013 | 2013.07.11 |
84 | Sun-Ho Lee Sung jong Go Im-Yeong Lee |
Secure Method for Data Storage and Sharing During Data Outsourcing | STA2013 | 2013.07.09 |
83 | Sun-Ho Lee Im-Yeong Lee |
Effective Searchable Symmetric Encryption System Using Conjunctive Keyword | STA2013 | 2013.07.08 |
81 | Sung-Wook Park Im-Yeong Lee |
mCoupon Scheme based on HORS for NFC Mobile Environments | CAIPT 2013 | 2013.06.28 |
80 | Sung-Wook Park Im-Yeong Lee |
Enhanced Secure mCoupon Scheme in NFC Mobile Environments | CAIPT 2013 | 2013.06.28 |
79 | Su-Hyun Kim Im-Yeong Lee |
Optimized Group Signcryption for Cloud Computing Environments | CUTE2012 | 2012.12.22 |
78 | Sun-Ho Lee Im-Yeong Lee |
Design of Data Store and Share Scheme Based on Distributed File System Architecture | ICONI | 2012.12.13 |
77 | Sun-Ho Lee Im-Yeong Lee |
Secure Index Management Scheme on cloud Storage Environment | APIC-IST | 2012.07.03 |
76 | Sung-Wook Park Kyung-Hyune Rhee Im-Young Lee |
NTRU Based Zero Knowledge Proof Scheme For NFC Mobile Payment Information Protection | MITA2012 | 2012.07.04 ~2012.07.06 |
75 | Su-Hyun Kim Im-Yeong Lee |
Group Key Renewal Scheme using a Bloom Filter in a SMART Highway | ICKIICE2012 | 2012.06.28 ~2012.06.30 |
74 | Sun-Ho Lee Im-Yeong Lee |
A Study of Secure and Efficient Data Sharing Scheme for Cloud Storage Architecture | IST2012 | 2012.04.28 ~2012.04.30 |
73 | Su-Hyun Kim Im-Yeong Lee |
A Study on Message Batch Verification Scheme Using Bloom Filter in VANET | CSA2011 | 2011.12.12 ~2011.12.15 |
72 | Hong-Gi Kim Im-Yeong Lee |
A Study on One-Time Password Authentication Scheme in Mobile Environment | WCC-SSMIT2011 | 2011.12.12 ~2011.12.15 |
71 | Su-Hyun Kim Im-Yeong Lee |
A Study on Message Authentication Scheme Based on Efficient Group Signature in VANET | ITS2011 | 2011.11.24 ~2011.11.25 |
70 | Sun-Ho Lee Jong-Sik Moon Im-Yeong Lee |
Conjunctive Keyword Searchable Encryption Scheme Considering Cloud Storage Service | ICCCT2011 | 2011.10.20 ~2011.10.22 |
69 | Hong-Gi Kim Im-Yeong Lee |
A Study on One-Time Password Authentication Scheme Provide Enhanced Randomness | MITA2011 | 2011.07.06 ~2011.07.09 |
68 | Sun-Ho Lee Im-Yeong Lee |
Authentication Scheme for Secure Storage Service on Mobile Platform using Mobile Trusted Module | ICKim ICS2011 |
2011.06.28 ~2011.06.30 |
67 | Sun-Ho Lee Im-Yeong Lee |
Public-key Searchable Encryption System : Considering Remote Storage Environment | ICKim ICS2011 |
2011.06.28 ~2011.06.29 |
66 | Jong Sik Moon Im-Yeong Lee |
Main and Sub-Device Authentication Protocol in Ubiquitous Office Network | CUTE2010 | 2010.12.16 ~2010.12.18 |
65 | Jong Sik Moon Im-Yeong Lee |
Authentication Protocol using Identifier in Ad-hoc Network Environment | WCC2010 (ACSA2010) | 2010.12.09 ~2010.12.11 |
64 | Sun Ho Lee Kang Bin Yim Im-Yeong Lee |
A Secure Solution for USB Flash Drives Using FAT File System Structure | NBiS2010 (NeoFUSION2010) | 2010.09.14 ~2010.09.16 |
63 | Sun Ho Lee Sang-Gu Byeon Im-Yeong Lee |
Efficient Conjunctive Keyword Searchable Encryption System | MITA2010 | 2010.08.23 ~2010.08.25 |
62 | Jong Sik Moon Sun Ho Lee Sang-Gu Byeon Im-Yeong Lee |
Authentication Protocol using Authorization Ticket in Mobile Network Service Environment | HumanCom2010 | 2010.08.11 ~2010.08.13 |
61 | Jong Sik Moon Kang Bin Yim Sang Gu Byeon Im-Yeong Lee |
An Authentication and Authorization protocol using Ticket in Pervasive Environment | AINA-2010 (SMPE2010) | 2010.04.20 ~2010.4.23 |
60 | Sun-Ho Lee Jin Kwak Im-Yeong Lee , |
The Study on The Security Solution of USB Memory | ICUT2009 | 2009.12.21 |
59 | Jong sik Moon Im-Yeong Lee |
Multicast Key Management in Multimedia Broadcasting Service Enviroment | ICUT2009 | 2009.12.21 |
58 | Jong Sik Moon Im-Yeong Lee Seo-il Kang |
Group Key Management using Device ID in Ad-hoc Network | CSA2009 | 2009.12.10 ~2009.12.12 |
57 | Jong Sik Moon Deok Gyu Lee Im-Yeong Lee |
Device Authentication/Authorization Protocol for Home Network in Next Generation Security | ISA2009 | 2009.06.25 ~2009.06.27 |
56 | Dong-Wan Kang Sung-Ik Jun Im-Yeoung Lee |
A Study on Migration Scheme for a Mobile Trusted Module | ICAT2009 | 2009.02.15 ~ 2009.02.18 |
55 | Seo-Il Kang Im-Yeong Lee |
A Study on Authentication ID using Identifier in Ad-hoc network | APIS2009 | 2009.01.11 ~2009.01.12 |
54 | Seo-Il Kang Dong-Wan Kang Im-Yeong Lee |
A Study on Secure Routing and Authentication in Ad-Hoc Environment | ICUT2008 | 2008.12.18 ~2008.12.20 |
53 | Jong Sik Moon Sun-Ho Lee Jong Hyuk Park Deok-Gyu Lee Im Yeong Lee |
Admissible Bilinear Map based Key Management Technology in Heterogeneous Mobile Networks | SecTech | 2008.12.13 ~2008.12.15 |
52 | Seo-Il Kang Deok-Gyu Lee Im-Yeong Lee |
Mobile Network Service Using Ticket Issuance in the AAA System | UMC2008 | 2008.10.13 ~ 2008.10.15 |
51 | Jong-Sik Moon Im-Yeong Lee Jong- Hyuk Park |
A Study on Authentication/Authorization/Accounting and Roaming Mechanism in Pervasive Environment | SMPE2008 | 2008.07.21 ~2008.07.25 |
50 | Dong-Wan Kang Im-Yeong Lee Jae-Cheol Ryou |
Study on Secure User Authentication Using MTM and USIM on Mobile Environment | MITA2008 | 2008.07.03 ~2008.07.05 |
49 | Soo-Young Kang Im-Yeong Lee |
A Study on New Low-Cost RFID System with Mutal Authentication Scheme | MUE2008 | 2008.04.24 ~2008.04.26 |
48 | Seo-Il Kang Im-Yeong Lee |
A Study on the Use of Personal Information between Heterogeneous Devices in the Ubiquitous Environment and AAA System | ICUT2007 | 2007.12.20- 2007.12.22 |
47 | Soo-Young Kang Hong-Rae Kim Jong-Keun Ahn |
A Study on OTP Authentication using Automatic GeneRa tion Counter |
ICUT2007 | 2007.12.20- 2007.12.22 |
46 | Dong-Wan Kang Hyun-Chang Lee Min Hong |
An OTP Ticket-Based AAA Mechanism in Ubiquitous Environment | ICUT2007 | 2007.12.20- 2007.12.22 |
45 | Jang-su Park Im-Yeong Lee |
A Study on RFID Authentication Protocol for Location Privacy Protection | ICUT2007 | 2007.02.14 |
44 | Soo-Young Kang Jang-Su Park Im-Yeong Lee |
A Study on Authentication Protocol in offering Identification Synchronization and Position Detection in RFID System | IPC2007 | 2007.10.11- 2007.11.13 |
43 | Soo-Young Kang Im-Yeong Lee |
A Study on Low-Cost RFID System Management with Mutual Authentication Scheme in Ubiquitous | APNOMS2007 | 2007.10.10- 2007.10.12 |
42 | Jang-Su Park Soo-Young Kang Im-Yeong Lee |
A Study on Secure RFID Authentication Protocol in Insecure Communication | SMPE2007 | 2007.09.17 |
41 | Jong sik Moon Im-Yeong Lee |
A Study on Ticket-based AAA Mechanism Including Time Synchronization OTP in Ubiquitious Envirnoment | ICCSA2007 | 2007.08.26- 2007.08.29 |
40 | Soo-Young Kang Im-Yeong Lee Doo-Soon Park |
A Study on Improved OTP Authentication Scheme Using Synchronization Scheme | MITA2007 | 2007.08.19- 2007.08.21 |
39 | Soo-Young Kang Im-Yeong Lee |
Privacy Protection Scheme of RFID using Random Number | SSDU2007 | 2007.05.22 |
38 | Dae-Hee Seo Jong-Hyuk Park Jang-Mi Baek Soo-Young Kang Im-Yeong Lee |
A Study on Improved RFID Authentication Scheme | MUE2006 | 2007.04.26 ~2007.04.28 |
37 | Seo-Il Kang Deok-Gyu Lee Im-Yeong Lee |
A Study on Key Distribution and ID RegistRa tion in the AAA System for Ubiquitous Multimedia Environments |
MMM2007 | 2007.01.09 |
36 | Jang-su Park Im-Yeong Lee |
RFID Authentication Protocol Using ID Synchronization in Insecure Communication | ICHIT2006 | 2006.11.09 |
35 | Seo-Il Kang Im-Yeong Lee |
A Study on the electronic Voting System Using Blind Signature for Anonymity | ICHIT2006 | 2006.11.09 |
34 | Jang-Su Park Deok-Gyu Lee Im-Yeong Lee |
A Study on RFID Authentication Protocol for Location Privacy Protection | ICHIT2006 | 2006.11.09 |
33 | Jang-Su Park Yong-Seo Park Dong Hoon Lee Im-Yeong Lee |
A Group Key Management Scheme Using Symmetric Encryption on TRS | apis | 2006 |
32 | Seo-Il Kang Im-Yeong Lee |
A Study on Micropayment System with A New Anonymity and Divisibility | ICACT | 2005.02.21 ~2005.02.23 |
31 | Deok-Gyu Lee Im-Yeong Lee Bo-Sung Hwang |
Authentication for Single/Multi Domain in Ubiquitous Computing Using PMI | ICCSA2005 | 2005.05. |
30 | Deok-Gyu Lee Im-Yeong Lee |
Authentication for Single Domain in Ubiquitous Comuting using PMI | Internation Journal of Computer Science and Network Security-IJCSNS | 2005.08.30 |
29 | Dae-Hee Seo Jang-Su Park Im-Yeong Lee Kee-Hyo Nam |
A Study on RFID System with Secure Service Availability | ALPIT2005 | 2005.06.28 |
28 | Deok-Gyu Lee Im-Yeong Lee Chang-Sup Park |
A Study on Broadcast Encryption Using Efficient Key Distribution and Renewal | ALPIT2005 | 2005.06.28 |
27 | Seo-Il Kang Im-Yeong Lee |
A Studqy on the Authentication using ID Renewal from AAA | ALPIT2005 | 2005.06.28 |
26 | Deok-Gyu Lee Hee-Un Park Im-Yeong Lee |
Authentication for Single Domain in Ubiquitous Comuting Using Attribute Certification | ICCMSE | 2004 |
25 | Dae-Hee Seo Im-Yeong Lee Dong-Ik Oh Kee-Hyo Nam |
The Proposed a Scalable Secure Bluetooth Piconet for Ubiquitous | MoMM2004 | 2004.09.22 ~2004.09.24 |
24 | Jung-Wook Choi Dong-Ik Oh Sang-Jung Park Im-Yeong Lee |
Development of an RFID based Book Retrieval System | MoMM2004 | 2004.09.22 ~2004.09.24 |
23 | Deok-Gyu Lee Im-Yeong Lee Kouichi Sakurai |
PKI Based IMT-2000 Service for Time Conviction | MoMM2004 | 2004.09.22 ~2004.09.24 |
22 | Hee-Un Park Deok-Gyu Lee Dae-Hee Seo Im-Yeong Lee Choon-Soo Kim |
The Magic Sticker Scheme for Anonymous Secure Selection | ICACT | 2003.01 |
21 | Seo-Cheol Jang Dae-Hee Seo Deok-Gyu Lee Im-Yeong Lee Hac-Yun Na |
An Efficient and Secure Billing System for the Mobile Internet or An Efficient and Secure Billing System for the Mobile Network | ICACT | 2003.01 |
20 | Dae-Hee Seo Im-Yeong Lee Soo-Young Chae Choon-Soo Kim |
Single Sign-On Authentication Model using MAS(Multi-Agent System) | PacRim 2003 proceeding | 2003.08 |
19 | Dae-Hee Seo Hee-Un Park Im-Yeong Lee |
A Study on Security of Integration Administration System for the EC | International Conference on East-Asian Language Processing and Internet Information Technology 2002 | 2002.01.08 ~2002.01.11 |
18 | Deok-Gyu Lee Im-Yeong Lee Kyeong-Ho Lee Joong-Bae Kim |
A DRM Model for Illegal Copyright Protection based on Hidden Agent | International Conference on East-Asian Language Processing and Internet Information Technology 2002 | 2002.01.08 ~2002.01.11 |
17 | Dae-Hee Seo Hee-Un Park Kyung-Su Lee Dong-Sik Kim Im-Yeong Lee Yong-Hae Kog |
Information-Gathering Secure Mobile Agent | International Conference on East-Asian Language Processing and Internet Information Technology 2002 | 2002.01.08 ~2002.01.11 |
16 | Hee-Un Park Im-Yeong Lee |
A Proposal of Key Management Structure for Providing a Integrated Multicast Service | International Conference on East-Asian Language Processing and Internet Information Technology 2002 | 2002.01.08 ~2002.01.11 |
15 | Dae-Hee Seo Im-Yeong Lee |
Bluetooth piconet using non-anonymous group key | The 4th International Conference on Advanced Communication Technology | 2002.02.07 ~2002.02.09 |
14 | Deok-Gyu Lee Im-Yeong Lee |
Security Protocol for IMT-2000 Based Contents Service | SAM | 2002.06.24 ~2002.06.27 |
13 | Dae-Hee Seo Im-Yeong Lee |
A Study on Secure Payment System Applying Bluetooth | SAM | 2002.06.24 ~2002.06.27 |
12 | Dae-Hee Seo Im-Yeong Lee |
A Study on Secure Bluetooth Inquiry Process | WISA | 2002.08.28 ~2002.08.30 |
11 | Bo-Sung Hwang Yong-Ho Lee Im-yeong Lee |
The Design Model of the Key Escrow System | The 3rd International Conference on Advanced Communication Technology | 2001.02.08 ~2001.02.10 |
10 | Hee-Un Park Im-Yeong Lee |
An Efficient Key Agreement and Authentication for Mobile Communication | The 3rd International Conference on Advanced Communication Technology | 2001.02.08 ~2001.02.10 |
9 | Seok-Chul Jang Im-Yeong Lee |
An Anonymity Control Electronic Cash System with Divisible using KCDSA | ISIE | 2001.06.12 ~2001.06.16 |
8 | Hee-Un Park Im-Yeong Lee |
The Efficient Secure Key Management Structure for a Scalable Multicast | International Symposium on Information Systems and Engineering | 2001.06.25 ~2001.06.28 |
7 | Hyung-Geun Oh Im-Yeong Lee |
A Revocable Electronic Cash System Using S/Key One-time Password | JW-ISC | 2000.01 |
6 | Hee-Un Park Chang-Goo Kang Im-Yeong Lee |
A Study on Electronic Approval Systems using Digital Multisignature Scheme | JW-ISC | 2000.01 |
5 | Hee-Un Park Im-Yeong Lee |
A Study on Preventing Illegal Acts in Electronic Election Systems | The 2nd International Conference on Advanced Communication Technology | 2000.02.16 ~2000.02.18 |
4 | Hee-Un Park Im-Yeong Lee Doo-Soon Park |
A 2-pass key agreement and authentication for mobile communication | ICEIC | 2000.08.09 ~2000.08.11 |
3 | Hyung-Geun Oh Seok-Cheol Jang Im-Yeong Lee Dong-Ik Oh |
A Traceable Electronic Cash System based on Fair Blinding KCDSA Signature Scheme | ICEIC | 2000.08.09 ~2000.08.11 |
2 | Bo-Sung Hwang Im-yeong Lee |
A study on Secure Key Escrow System | EALPIIT | 2000.08.17 ~2000.08.19 |
1 | Hae-Man Kim Seok-Chul Jang Im-Yeong Lee |
A Study on Efficient Micropayment System with Anonymity | IFIP/SEC | 2000.08.21 ~2000.08.25 |