저널

저널2024-02-01T17:23:50+00:00

Journal

No. Authors Paper Title Journal Title Date
71 Yong-Woon Hwang
Taehoon Kim
Daehee Seo
Im-Yeong Lee
A study on the traceable attribute-based signature scheme provided with anonymous credentials Connection Science 2024.01.08
70 Taehoon Kim
Yong-Woon Hwang
Daehee Seo
Im-Yeong Lee
Data Access Control for Secure Authentication Using Dual VC Scheme Based on CP-ABE in DID Journal of Circuits, Systems, and Computers 2023.10.31
69 Yong-Woon Hwang
Taehoon Kim
Daehee Seo
Im-Yeong Lee
A Study on Data Sharing Scheme using ECP-ABSC that Provides Data User Traceability in the Cloud Transactions on Internet and Information Systems 2022.11.28
68 Gyeonjin Ra
Su-hyun Kim
Im-Yeong Lee
Identity Access Management via ECC Stateless Derived Key Based Hierarchical Blockchain for the Industrial Internet of Things
10.1587/transinf.2022NGP0003
IEICE Transactions on Information and Systems 2022. 11. 01
67 Huimin Ren
Suhyun Kim
Seo Daehee
Im-Yeong Lee
A Certificateless-based One-Round Authenticated Group Key Agreement Protocol to Prevent Impersonation Attacks
10.3837/tiis.2022.05.015
Transactions on Internet and Information Systems 2022.05.31
66 Won-Bin Kim
Su-Hyun Kim
Daehee Seo
Im-Yeong Lee
Certificateless Group to Many Broadcast Proxy Reencryptions for Data Sharing towards Multiple Parties in IoTs
10.1155/2022/1903197
Hindawi Wireless Communications and Mobile Computing(WCMC) 2022.06.29
65 Yong-Woon Hwang
Im-Yeong Lee
An SKP-ABE Scheme for Secure and Efficient Data Sharing in Cloud Environments
10.1155/2022/138440
Hindawi Wireless Communications and Mobile Computing(WCMC) 2022.06.17
64 Yong-Woon Hwang
Im-Yeong Lee
Current Status and Security Trend of OSINT
10.1155/2022/1290129
Hindawi Wireless Communications and Mobile Computing(WCMC) 2022.02.18
63 L. Ellen Funderburg
Huimin Ren
Daehee Seo
Im-Yeong Lee
Pairing-Free Signatures With Insider-Attack Resistance for Vehicular Ad-Hoc Networks (VANETs)
10.1109/ACCESS.2021.3131189
IEEE Access 2021.11.22
62 Won-Bin Kim
Su-Hyun Kim
Daehee Seo
Im-Yeong Lee
Broadcast Proxy Reencryption Based on Certificateless Public Key Cryptography for Secure Data Sharing
10.1155/2022/1290129
Hindawi Wireless Communications and Mobile Computing(WCMC) 2022.02.18
61 Dae-Hwi Lee
Won-Bin Kim
Daehee Seo
Im-Yeong Lee
An Efficient Public Verifiable Certificateless Multi-Receiver Signcryption Scheme for IoT Environments
10.1587/transinf.2021NGP0012
IEICE Transactions 2021.11.01
60 Gyeongjin Ra
Im-Yeong Lee
A Federated Framework for Fine-Grained Cloud Access Control for Intelligent Big Data Analytic by Service Providers
10.1109/ACCESS.2021.3067958
IEEE Access 2021.05.22
59 Yong-Woon Hwang
Im-Yeong Lee
A Lightweight Certificate-Based Aggregate Signature Scheme Providing Key Insulation
10.32604/cmc.2021.018549
Computer, Materials & Continua 2021.07.21
58 Yong-Woon Hwang
Im-Yeong Lee
A study on data sharing system using ACP-ABE-SE in a cloud environment
10.1504/IJWGS.2021.116535
International Journal of Web and Grid Services 2021.05.21
57 L. Ellen Funderburg
Im-Yeong Lee
Efficient Short Group Signatures for Conditional Privacy in Vehicular Ad Hoc Networks via ID Caching and Timed Revocation
ACCESS.2021.3104861
IEEE Access 2021.08.16
56 Won-Bin Kim
Daehee Seo
Donghyun Kim
Im-Yeong Lee
Group Delegated ID-based Proxy Re-encryption for Enterprise IoT-Cloud Storage Environment
10.1155/2021/7641389
Hindawi Wireless Communications and Mobile Computing(WCMC) 2021.06.15
55 Won-Bin Kim
Daehee Seo
Donghyun Kim
Im-Yeong Lee
Data Distribution for Multiple Receivers in a Connected Car Environment Using 5G Communication
10.1155/2021/5599996
Hindawi Security and Communication Network(SCN) 2021.06.12
54 Gyeongjin Ra
Taehoon Kim
Imyeong Lee
VAIM: Verifiable Anonymous Identity Management for Human-Centric Security and Privacy in the Internet of Things
10.1109/ACCESS.2021.3080329
IEEE Access 2021.05.14
53 Taehoon Kim
Wonbin Kim
Daehee Seo
Imyeong Lee
Secure Encapsulation Schemes Using Key Recovery System in IoMT Environments
10.3390/s2110347
MDPI Sensors 2021.05.17
52 L. Ellen Funderburg
Im-Yeong Lee
A Privacy-Preserving Key Management Scheme with Support for Sybil Attack Detection in VANETs
10.3390/s21041063
MDPI Sensors 2021.02.04
51 Yong-Woon Hwang
Im-Yeong Lee
CP-ABE Access Control that Block Access of Withdrawn Users in Dynamic Cloud
10.3837/tiis.2020.10.012
Transactions on Internet and Information Systems 2020.12.31
50 Dae-Hwi Lee
Im-Yeong Lee
A Lightweight Authentication and Key Agreement Schemes for IoT Environments
doi:10.3390/s20185350
MDPI Sensors 2020.09.18
49 Yong-Woon Hwang
Im-Yeong Lee
A Study on CP-ABE-based Medical Data Sharing System with Key Abuse Prevention and Verifiable Outsourcing in the IoMT Environment
doi:10.3390/s20174934
MDPI Sensors 2020.08.31
48 Gyeong-Jin Ra
Im-Yeong Lee
A Key Recovery System Based on Password-Protected Secret Sharing in a Permissioned Blockchain
doi:10.32604/cmc.2020.011293
MDPI Electronics 2020.07.23
47 Gyeong-Jin Ra
Im-Yeong Lee
An Anonymous Protocol with User Identification and Linking Capabilities for User Privacy in a Permissioned Blockchain
doi:10.3390/electronics9081183
MDPI Electronics 2020.07.22
46 Dae-Hwi Lee
Im-Yeong Lee
A Certificateless Aggregate Arbitrated Signature Scheme for IoT Environments
doi:10.3390/s20143983
MDPI Sensors 2020.07.17
45 Won-Bin Kim
Im-Yeong Lee
Secure and Efficient Storage of Video Data in a CCTV Environment
10.3837/tiis.2019.06.026
Transactions on Internet and Information Systems 2019.06.29
44 Dae-Hwi Lee
Im-Yeong Lee
Dynamic Group Authentication and Key Exchange Scheme Based on Threshold Secret Sharing for IoT Smart Metering Environments
10.3390/s18103534
Sensors 2018.10.19
43 Sung-Wook Park
Im-Yeong Lee
Enhanced signature RTD transaction scheme based on Chebyshev polynomial for mobile payments service in IoT device environment
10.1007/s11227-018-2546-8
Journal of Supercomputing 2018.07.04
42 Su-Hyun Kim
Im-Yeong Lee
Secure Multicast using Proxy Re-Encryption in an IoT Environment
10.3837/tiis.2018.02.025
Transactions on Internet and Information Systems 2018.02.28
41 Gyeong-Jin Ra
Im-Yeong Lee
A Study on KSI-based Authentication Management and Communication for Secure Smart Home Environments
10.3837/tiis.2018.02.021
Transactions on Internet and Information Systems 2018.02.28
40 Su-Hyun Kim
Im-Yeong Lee
IoT Device Security based on Proxy Re-encryption
10.1007/s12652-017-0602-5
Journal of Ambient Intelligence and Humanized Computing 2017.11.30
39 Sung-Wook Park
Im-Yeong Lee
Enhanced Mutual Authentication Scheme based on Chaotic Map for PCM in NFC Service Environment
10.3837/tiis.2017.02.032
Transactions on Internet and Information Systems 2017.02.28
38 Sung-Wook Park
Im-Yeong Lee
Mutual Authentication Scheme Based on Lattice for NFC-PCM Payment Service Environment
10.1177/155014779471539
International Journal of Distributed Sensor Networks 2016.07.22
37 Su-Hyun Kim
Im-Yeong Lee
Study on User Authority Management for Safe Data Protection in Cloud Computing Environments
10.3390/sym7010269
Symmetry 2015.3.19
36 Su-Hyun Kim
Im-Yeong Lee
Block Access Token Renewal Scheme Based on Secret Sharing in Apache Hadoop
10.3390/e16084185
Entropy 2014.7.17
35 Sun-Ho Lee
Im-Yeong Lee
A Study of Practical Proxy Re-encryption with a Keyword Search Scheme Considering Cloud Storage Structure
10.1155/2014/615679
The Scientific World Journal 2013.10.22
34 Sun-Ho Lee
Kang-Bin Yim
Im-Yeong Lee
A Secure Solution with a Password Recovery Feature for USB Flash Drives COMPUTER SYSTEMS SCIENCE AND ENGINEERING 2012.11
33 Sun-Ho Lee
Im-Yeong Lee
Keyword Searchable Re-encryption Scheme Considering Cloud Storage-Service Environment Information-An International Interdisciplinary Journal 2012.05.05
32 Jong-Sik Moon
Im-Yeong Lee
Office Device Authentication and Authorization Protocol in Ubiquitous Office Network Information-An International Interdisciplinary Journal 2011.07.1
31 Jong-Sik Moon
Im-Yeong Lee
Authentication protocol using an identifier in an ad hoc network environment MATHEMATICAL AND COMPUTER MODELLING 2011.02.08
30 Jong-Sik Moon
Im-Yeong Lee
An AAA Scheme using ID-based Ticket with Anonymity in Future MobIle Communication COMPUTER COMMUNICATIONS 2010.06.08
29 Jong-Sik Moon
Jong-Hyuk Park
Im-Yeong Lee
Admissible bIlinear map-based key management protocol for HPCCS in heterogeneous network JOURNAL OF SUPERCOMPUTING 2010.05.26
28 Jong-Sik Moon
Deok Gyu Lee
Jong-Hyuk Park
Im-Yeong Lee
Authentication and ID-Based Key Management Protocol in Pervasive Environment WIRELESS PERSONAL COMMUNICATIONS 2009.08.04
27 Soo-Young Kang
Deok-Gyu Lee
Im-Yeong Lee
A Study on secure RFID mutal authentication scheme in pervasive computing environment COMPUTER COMMUNICATIONS 2008.10.13~ 2008.10.15
24 Deok-Gyu Lee
Seo-Il Kang
Im-Yeong Lee
An Intelligent and Efficient Traitor Tracing for Ubiquitous Environments KES2006 2006.10.11
23 Deok-Gyu Lee
Jong-Sik Moon
Jong-Hyuk Park
Im-Yeong Lee
Authentication for Ubiquitous Multi Domain in Pervasive Computing Using PMI HPCC2006 2006.09.14
22 Deok-Gyu Lee
Jang-Su Park
Im-Yeong Lee
Broadcast Encryption Using Efficient Key Distribution and Renewal for Ubiquitous Environments EUC2006 2006.08.01
21 Deok-Gyu Lee
Seo-Il Kang
Dae-Hee Seo
Im-Yeong Lee
Authentication for Single/Multi domain in Ubiquitous computing Using Attribute Certification ICCSA2006 no 4 2006.05
20 Deok-Gyu Lee
Jang-Su Park
Im-Yeong Lee
Yong-Seok Park
Jung-chul Ahn
An Efficient Key Distribution for Ubiquitous Environment in Ad-Hoc Network Using Broadcast Encryption ICCSA2006 no 4 2006.05
19 Dae-Hee Seo
Deok-Gyu Lee
Im-Yeong Lee
A Study on Scalable Bluetooth Piconet for Secure Ubiquitous HSI2005 2005.07.
18 Deok-Gyu Lee
Bo-Sung Hwang
Im-Yeong Lee
Authentication for Single/Multi Domain in Ubiquitous Computing Using PMI ICCSA2005 2005.05
17 Dae-Hee Seo
Hee-un Park
Im-Yeong Park
A Study on Secure SDP of RFID Using Bluetooth Communication ICCSA2005 2005.05
16 Seo-Il Kang
Im-Yeong Lee
A Study on the E-cash System with Anonymity and DivisibIlity ICCSA2005 2005.05
15 Deok-Gyu Lee
Im-Yeong Lee
A Study on Efficient Key Distribution and Renewal in Broadcast Encryption ICCSA 2004.5
14 Dae-Hee Seo
Im-Yeong Lee
Hee-Un Park
A Study on Key Recovery Agent Protection ProfIle having Composition Function ICCSA 2004.5
13 Dae-Hee Seo
Im-Yeong Lee
A Study on Secure and Efficient Sensor Network Management Scheme Using PTD ICCSA 2004.5
12 Deok-Gyu Lee
Hyung-Geun Oh
Im-Yeong Lee
A Study on Contents Distribution Using Electronic Cash System EEE 2004.3.28-31
11 Deok-Gyu Lee
Im-Yeong Lee
A Study on Encrypted Key exchange using password WSEAS 2004.4.
10 Hyung-Woo Lee
Im-Yeong Lee
Dong-Ik Oh
Smart Card Based MobIle Payment with Fairness Revocation Mechanism EC-Web 2003.9.
9 Kyeung-Soo Lee
Dong-Ik Oh
Im-Young Lee
Yong-Hae Kong
An XML Query Mediator IDEAL 2003.3
8 Yong-ho Lee
Im-Yeong Lee
Hyung-woo Lee
New WAKE Key Recovery Protocol on M-commerce ICWE 2003.7.14-18
7 Hyung-Woo Lee
Im-Yeong Lee
Designated Verification of Digital Watermark for Network Based Image Distribution ICCS 2003.6.2~ 2003.6.4
6 Hyug-Woo Lee
Sung-Min Lee
Im-Yeong Lee
Secure Electronic Copyright Distribution with Public Key Based Traitor Tracing E-Commerce and Web Technologies 2002.09
5 Yu-Sug Chang
Hye-Jung Lee
Doo-Soon Park
Im-Yeong Lee
Interprocedural Transformation for Extracting Maximum Parallelism Advanced in Information Syatem 2002.10
4 Dae-Hee Seo
Im-Yeong Lee
Dong-Ik Oh
Doo-soon Park
Secure Bluetooth Piconet Using Non-anonymous Group Key EurAsia-ICT2002 2002.10
3 Deok-Gyu Lee
Im-Yeong Lee
Jong-keun Ahn
Yong-Hae Kong
The Illegal Copy Protection Using Hidden Agent EurAsia-ICT2002 2002.10
2 Yong-Ho Lee
Im-Yeong Lee
Hyung-Woo Lee
New Identity Escrow Scheme for Anonymity Authentication Indocrypto2002 2002.12
1 Hee-Un Park
Im-Yeong Lee
A Digital Nominative Proxy Signature Scheme for MobIle Communication Information and Communications Security 2001.09
No. Authors Paper Title Journal Title Date
19 Hyo-jin Song
Taehoon Kim
Yong-Woon Hwang
Daehee Seo
Im-Yeong Lee
A Study on Dynamic Group Signature Scheme with Threshold Traceability for Blockchain HCC 2023.09.20
18 Gyeong-Jin Ra
Im-Yeong Lee
Survey of Digital Signature Technology for IoT Environment: Focused on KSI’s Global Timestamping Technique
10.1007/978-981-13-9341-9_89
LNEE 2019.11.30
17 Yong-Woon Hwang
Im-Yeong Lee
A STUDY ON VIDEO DATA ACCESS CONTROL TECHNOLOGY USING CP-ABPRE SCHEMES IN CCTV ENVIRONMENT JATIT 2019.09.15
16 Won-Bin Kim
Im-Yeong Lee
Secure data deduplication scheme using linkage of data blocks in cloud storage environment
10.1007/978-981-13-1328-8_70
LNEE 2018.11.29
15 Dae-Hwi Lee
Im-Yeong Lee
ECDSA-based Broadcast Authentication Scheme for Smart Home Environments JTeC 2018.12.06
14 Gun-Wook Choi
Yong-Woon Hwang
Im-Yeong Lee
Efficient Group Key Distribution Scheme In NVR JATIT 2018.11.30
13 Dae-Hwi Lee
Im-Yeong Lee
Efficient Group Authentication And Key Exchange Scheme For IoT Environment JATIT 2018.11.30
12 Won-Bin Kim
Im-Yeong Lee
A Study on Improving Security and Efficiency using Dynamic Ownership Management in Client-Side Deduplication Environments
10.25046/aj030532
ASTESJ 2018.10.12
11 Yong-Woon Hwang
Im-Yeong Lee
A study on lightweight mutual authentication for radio-frequency identification medical device
10.1177/1847979018765042
SAGE 2018.03.21
10 Gyeong-Jin Ra
Im-Yeong Lee
A Study on Secure and Efficient KSI System based on Multi Path Hash Chain with Universal Hashing Function SERSC-IJGDC(Hindawi) 2017.10.12
9 Yong-Woon Hwang
Im-Yeong Lee
A Study on Lightweight Mutual Authentication Protocol Based on Simple Operation Springer(Lecture Notes in Electrical Engineering) 2017.12.20
8 Won-Bin Kim
Im-Yeong Lee
A Study on Light-Weight and Efficient Proof of Ownership in Client-SideDeduplication Environment Advanced Science Letters 2017.10.01
7 Won-Bin Kim
Im-Yeong Lee
Client-Side Deduplication for Protection of a Private Data in Cloud Storage
10.1166/asl.2016.7854
Advanced Science Letters 2016.09.01
6 Sung-Wook Park
Im-Yeong Lee
Light-weight Authentication Scheme for NFC mCoupon Service in IoT Environments
10.1007/978-3-662-47895-0_36
Springer 2015.07.17
5 Hong-Gi Kim
Im-Yeong Lee
A Study on One-Time Password Authentication Scheme in Smart Work Information 2014.04
4 Sung-Wook Park
Im-Yeong Lee
Mutual Authentication Scheme based on NTRU for Payment Information Protection in NFC Mobile Environment
10.3745/JIPS.2013.9.3.461
Information 2013.09.30
3 Su-Hyun Kim
Im-Yeong Lee
Group Key Renewal and Authentication Scheme Using Bloom Filter for SMART Highway Information 2013.01
2 Sung-Wook Park
Im-Yeong Lee
Anonymous Authentication Scheme based on NTRU for the Protection of Payment Information in NFC Mobile Environment JIPS 2013.06
1 Sun-Ho Lee
Im-Yeong Lee
A Secure Index Management Scheme for Providing Data Sharing in Cloud Storage JIPS 2013.09