저널2018-09-13T18:53:50+00:00

Journal

No. Authors Paper Title Journal Title Date
41 Gyeong-Jin Ra
Im-Yeong Lee
A Study on KSI-based Authentication Management and Communication for Secure Smart Home Environments Transactions on Internet and Information Systems 2017.02.28
40 Su-Hyun Kim
Im-Yeong Lee
IoT Device Security based on Proxy Re-encryption Journal of Ambient Intelligence and Humanized Computing 2017.11.30
39 Sung-Wook Park
Im-Yeong Lee
Enhanced Mutual Authentication Scheme based on Chaotic Map for PCM in NFC Service Environment Transactions on Internet and Information Systems 2017.02.28
38 Sung-Wook Park
Im-Yeong Lee
Mutual Authentication Scheme Based on Lattice for NFC-PCM Payment Service Environment International Journal of Distributed Sensor Networks 2016.07.22
37 Su-Hyun Kim
Im-Yeong Lee
Study on User Authority Management for Safe Data Protection in Cloud Computing Environments Symmetry 2015.3.19
36 Su-Hyun Kim
Im-Yeong Lee
Block Access Token Renewal Scheme Based on Secret Sharing in Apache Hadoop Entropy 2014.7.17
35 Sun-Ho Lee
Im-Yeong Lee
A Study of Practical Proxy Re-encryption with a Keyword Search Scheme Considering Cloud Storage Structure The Scientific World Journal 2013.10.22
34 Sun-Ho Lee
Kang-Bin Yim
Im-Yeong Lee
A Secure Solution with a Password Recovery Feature for USB Flash Drives COMPUTER SYSTEMS SCIENCE AND ENGINEERING 2012.11
33 Sun-Ho Lee
Im-Yeong Lee
Keyword Searchable Re-encryption Scheme Considering Cloud Storage-Service Environment Information-An International Interdisciplinary Journal 2012.05.05
32 Jong-Sik Moon
Im-Yeong Lee
Office Device Authentication and Authorization Protocol in Ubiquitous Office Network Information-An International Interdisciplinary Journal 2011.07.1
31 Jong-Sik Moon
Im-Yeong Lee
Authentication protocol using an identifier in an ad hoc network environment MATHEMATICAL AND COMPUTER MODELLING 2011.02.08
30 Jong-Sik Moon
Im-Yeong Lee
An AAA Scheme using ID-based Ticket with Anonymity in Future MobIle Communication COMPUTER COMMUNICATIONS 2010.06.08
29 Jong-Sik Moon
Jong-Hyuk Park
Im-Yeong Lee
Admissible bIlinear map-based key management protocol for HPCCS in heterogeneous network JOURNAL OF SUPERCOMPUTING 2010.05.26
28 Jong-Sik Moon
Deok Gyu Lee
Jong-Hyuk Park
Im-Yeong Lee
Authentication and ID-Based Key Management Protocol in Pervasive Environment WIRELESS PERSONAL COMMUNICATIONS 2009.08.04
27 Soo-Young Kang
Deok-Gyu Lee
Im-Yeong Lee
A Study on secure RFID mutal authentication scheme in pervasive computing environment COMPUTER COMMUNICATIONS 2008.10.13~ 2008.10.15
24 Deok-Gyu Lee
Seo-Il Kang
Im-Yeong Lee
An Intelligent and Efficient Traitor Tracing for Ubiquitous Environments KES2006 2006.10.11
23 Deok-Gyu Lee
Jong-Sik Moon
Jong-Hyuk Park
Im-Yeong Lee
Authentication for Ubiquitous Multi Domain in Pervasive Computing Using PMI HPCC2006 2006.09.14
22 Deok-Gyu Lee
Jang-Su Park
Im-Yeong Lee
Broadcast Encryption Using Efficient Key Distribution and Renewal for Ubiquitous Environments EUC2006 2006.08.01
21 Deok-Gyu Lee
Seo-Il Kang
Dae-Hee Seo
Im-Yeong Lee
Authentication for Single/Multi domain in Ubiquitous computing Using Attribute Certification ICCSA2006 no 4 2006.05
20 Deok-Gyu Lee
Jang-Su Park
Im-Yeong Lee
Yong-Seok Park
Jung-chul Ahn
An Efficient Key Distribution for Ubiquitous Environment in Ad-Hoc Network Using Broadcast Encryption ICCSA2006 no 4 2006.05
19 Dae-Hee Seo
Deok-Gyu Lee
Im-Yeong Lee
A Study on Scalable Bluetooth Piconet for Secure Ubiquitous HSI2005 2005.07.
18 Deok-Gyu Lee
Bo-Sung Hwang
Im-Yeong Lee
Authentication for Single/Multi Domain in Ubiquitous Computing Using PMI ICCSA2005 2005.05
17 Dae-Hee Seo
Hee-un Park
Im-Yeong Park
A Study on Secure SDP of RFID Using Bluetooth Communication ICCSA2005 2005.05
16 Seo-Il Kang
Im-Yeong Lee
A Study on the E-cash System with Anonymity and DivisibIlity ICCSA2005 2005.05
15 Deok-Gyu Lee
Im-Yeong Lee
A Study on Efficient Key Distribution and Renewal in Broadcast Encryption ICCSA 2004.5
14 Dae-Hee Seo
Im-Yeong Lee
Hee-Un Park
A Study on Key Recovery Agent Protection ProfIle having Composition Function ICCSA 2004.5
13 Dae-Hee Seo
Im-Yeong Lee
A Study on Secure and Efficient Sensor Network Management Scheme Using PTD ICCSA 2004.5
12 Deok-Gyu Lee
Hyung-Geun Oh
Im-Yeong Lee
A Study on Contents Distribution Using Electronic Cash System EEE 2004.3.28-31
11 Deok-Gyu Lee
Im-Yeong Lee
A Study on Encrypted Key exchange using password WSEAS 2004.4.
10 Hyung-Woo Lee
Im-Yeong Lee
Dong-Ik Oh
Smart Card Based MobIle Payment with Fairness Revocation Mechanism EC-Web 2003.9.
9 Kyeung-Soo Lee
Dong-Ik Oh
Im-Young Lee
Yong-Hae Kong
An XML Query Mediator IDEAL 2003.3
8 Yong-ho Lee
Im-Yeong Lee
Hyung-woo Lee
New WAKE Key Recovery Protocol on M-commerce ICWE 2003.7.14-18
7 Hyung-Woo Lee
Im-Yeong Lee
Designated Verification of Digital Watermark for Network Based Image Distribution ICCS 2003.6.2~ 2003.6.4
6 Hyug-Woo Lee
Sung-Min Lee
Im-Yeong Lee
Secure Electronic Copyright Distribution with Public Key Based Traitor Tracing E-Commerce and Web Technologies 2002.09
5 Yu-Sug Chang
Hye-Jung Lee
Doo-Soon Park
Im-Yeong Lee
Interprocedural Transformation for Extracting Maximum Parallelism Advanced in Information Syatem 2002.10
4 Dae-Hee Seo
Im-Yeong Lee
Dong-Ik Oh
Doo-soon Park
Secure Bluetooth Piconet Using Non-anonymous Group Key EurAsia-ICT2002 2002.10
3 Deok-Gyu Lee
Im-Yeong Lee
Jong-keun Ahn
Yong-Hae Kong
The Illegal Copy Protection Using Hidden Agent EurAsia-ICT2002 2002.10
2 Yong-Ho Lee
Im-Yeong Lee
Hyung-Woo Lee
New Identity Escrow Scheme for Anonymity Authentication Indocrypto2002 2002.12
1 Hee-Un Park
Im-Yeong Lee
A Digital Nominative Proxy Signature Scheme for MobIle Communication Information and Communications Security 2001.09
No. Authors Paper Title Journal Title Date
18 Yong-Woon Hwang
Im-Yeong Lee
A study on lightweight mutual authentication for radio-frequency identification medical device SAGE 2018.03.21
17 Dae-Hwi Lee
Im-Yeong Lee
ECDH-Based 3PAKE Protocol for Secure Smart Home Service Advanced Science Letters 2017.12
16 Gun-Wook Choi
Im-Young Lee
A Study on Pairing-based User Authentication for Key Distribution System in WSN Information
15 Gyeong-Jin Ra
Im-Yeong Lee
A Study on Secure and Efficient KSI System based on Multi Path Hash Chain with Universal Hashing Function SERSC-IJGDC(Hindawi) 2017.10.12
14 Yong-Woon Hwang
Im-Yeong Lee
A Study on Lightweight Mutual Authentication Protocol Based on Simple Operation Springer(Lecture Notes in Electrical Engineering)
13 Gun-Wook Choi
Im-Young Lee
A Key Agreement Protocol Providing User Anonymity in Wireless Sensor Networks Advanced Science Letters 2010.05.26
12 Won-Bin Kim
Im-Yeong Lee
A Study on Light-Weight and Efficient Proof of Ownership in Client-SideDeduplication Environment Advanced Science Letters 2010.06.08
11 Won-Bin Kim
Im-Yeong Lee
Client-Side Deduplication for Protection of a Private Data in Cloud Storage Advanced Science Letters 2011.02.08
10 Sung-Wook Park
Im-Yeong Lee
Light-weight Authentication Scheme for NFC mCoupon Service in IoT Environments Springer
9 Hong-Gi Kim
Im-Yeong Lee
A Study on One-Time Password Authentication Scheme in Smart Work Information 2012.05.05
8 Sung-Wook Park
Im-Yeong Lee
Mutual Authentication Scheme based on NTRU for Payment Information Protection in NFC Mobile Environment Information 2012.11
7 Su-Hyun Kim
Im-Yeong Lee
Group Key Renewal and Authentication Scheme Using Bloom Filter for SMART Highway Information 2013.10.22
6 Sung-Wook Park
Im-Yeong Lee
Anonymous Authentication Scheme based on NTRU for the Protection of Payment Information in NFC Mobile Environment JIPS 2013
5 Sun-Ho Lee
Im-Yeong Lee
A Secure Index Management Scheme for Providing Data Sharing in Cloud Storage JIPS 2013
4 Dae-Hee Seo
Im-Yeong Lee
A Study on RFID System with Secure Service Availability for Ubiquitous Computing International Journal of Information Processing Systems Volume.1, Number.1 2005 2005.11
3 Dae-Hee Seo
Hee-Un Park
Im-Yeong Lee
A Study on Scalable Protection Profile for Secure Key Recovery Agent GESTS Vol 17 No. 1 2005.09
2 Seo-Il Kang
Lee Im-yeong
E-cash system with Anonymity, Divisibility and Tracing GESTS vol16 No.1 2005.08
1 Dae-Hee Seo
Oh Hyung-geun
Lee Im-yeong
Study on Secure Bluethooth Service Discovery Protocol based on Active RF Tag GESTS vol12 No.1 2005.06