Journal
No. | Authors | Paper Title | Journal Title | Date |
---|---|---|---|---|
69 | Yong-Woon Hwang Taehoon Kim Daehee Seo Im-Yeong Lee |
A Study on Data Sharing Scheme using ECP-ABSC that Provides Data User Traceability in the Cloud | Transactions on Internet and Information Systems | 2022.11.28 |
68 | Gyeonjin Ra Su-hyun Kim Im-Yeong Lee |
Identity Access Management via ECC Stateless Derived Key Based Hierarchical Blockchain for the Industrial Internet of Things 10.1587/transinf.2022NGP0003 |
IEICE Transactions on Information and Systems | 2022. 11. 01 |
67 | Huimin Ren Suhyun Kim Seo Daehee Im-Yeong Lee |
A Certificateless-based One-Round Authenticated Group Key Agreement Protocol to Prevent Impersonation Attacks 10.3837/tiis.2022.05.015 |
Transactions on Internet and Information Systems | 2022.05.31 |
66 | Won-Bin Kim Su-Hyun Kim Daehee Seo Im-Yeong Lee |
Certificateless Group to Many Broadcast Proxy Reencryptions for Data Sharing towards Multiple Parties in IoTs 10.1155/2022/1903197 |
Hindawi Wireless Communications and Mobile Computing(WCMC) | 2022.06.29 |
65 | Yong-Woon Hwang Im-Yeong Lee |
An SKP-ABE Scheme for Secure and Efficient Data Sharing in Cloud Environments 10.1155/2022/138440 |
Hindawi Wireless Communications and Mobile Computing(WCMC) | 2022.06.17 |
64 | Yong-Woon Hwang Im-Yeong Lee |
Current Status and Security Trend of OSINT 10.1155/2022/1290129 |
Hindawi Wireless Communications and Mobile Computing(WCMC) | 2022.02.18 |
63 | L. Ellen Funderburg Huimin Ren Daehee Seo Im-Yeong Lee |
Pairing-Free Signatures With Insider-Attack Resistance for Vehicular Ad-Hoc Networks (VANETs) 10.1109/ACCESS.2021.3131189 |
IEEE Access | 2021.11.22 |
62 | Won-Bin Kim Su-Hyun Kim Daehee Seo Im-Yeong Lee |
Broadcast Proxy Reencryption Based on Certificateless Public Key Cryptography for Secure Data Sharing 10.1155/2022/1290129 |
Hindawi Wireless Communications and Mobile Computing(WCMC) | 2022.02.18 |
61 | Dae-Hwi Lee Won-Bin Kim Daehee Seo Im-Yeong Lee |
An Efficient Public Verifiable Certificateless Multi-Receiver Signcryption Scheme for IoT Environments 10.1587/transinf.2021NGP0012 |
IEICE Transactions | 2021.11.01 |
60 | Gyeongjin Ra Im-Yeong Lee |
A Federated Framework for Fine-Grained Cloud Access Control for Intelligent Big Data Analytic by Service Providers 10.1109/ACCESS.2021.3067958 |
IEEE Access | 2021.05.22 |
59 | Yong-Woon Hwang Im-Yeong Lee |
A Lightweight Certificate-Based Aggregate Signature Scheme Providing Key Insulation 10.32604/cmc.2021.018549 |
Computer, Materials & Continua | 2021.07.21 |
58 | Yong-Woon Hwang Im-Yeong Lee |
A study on data sharing system using ACP-ABE-SE in a cloud environment 10.1504/IJWGS.2021.116535 |
International Journal of Web and Grid Services | 2021.05.21 |
57 | L. Ellen Funderburg Im-Yeong Lee |
Efficient Short Group Signatures for Conditional Privacy in Vehicular Ad Hoc Networks via ID Caching and Timed Revocation ACCESS.2021.3104861 |
IEEE Access | 2021.08.16 |
56 | Won-Bin Kim Daehee Seo Donghyun Kim Im-Yeong Lee |
Group Delegated ID-based Proxy Re-encryption for Enterprise IoT-Cloud Storage Environment 10.1155/2021/7641389 |
Hindawi Wireless Communications and Mobile Computing(WCMC) | 2021.06.15 |
55 | Won-Bin Kim Daehee Seo Donghyun Kim Im-Yeong Lee |
Data Distribution for Multiple Receivers in a Connected Car Environment Using 5G Communication 10.1155/2021/5599996 |
Hindawi Security and Communication Network(SCN) | 2021.06.12 |
54 | Gyeongjin Ra Taehoon Kim Imyeong Lee |
VAIM: Verifiable Anonymous Identity Management for Human-Centric Security and Privacy in the Internet of Things 10.1109/ACCESS.2021.3080329 |
IEEE Access | 2021.05.14 |
53 | Taehoon Kim Wonbin Kim Daehee Seo Imyeong Lee |
Secure Encapsulation Schemes Using Key Recovery System in IoMT Environments 10.3390/s2110347 |
MDPI Sensors | 2021.05.17 |
52 | L. Ellen Funderburg Im-Yeong Lee |
A Privacy-Preserving Key Management Scheme with Support for Sybil Attack Detection in VANETs 10.3390/s21041063 |
MDPI Sensors | 2021.02.04 |
51 | Yong-Woon Hwang Im-Yeong Lee |
CP-ABE Access Control that Block Access of Withdrawn Users in Dynamic Cloud 10.3837/tiis.2020.10.012 |
Transactions on Internet and Information Systems | 2020.12.31 |
50 | Dae-Hwi Lee Im-Yeong Lee |
A Lightweight Authentication and Key Agreement Schemes for IoT Environments doi:10.3390/s20185350 |
MDPI Sensors | 2020.09.18 |
49 | Yong-Woon Hwang Im-Yeong Lee |
A Study on CP-ABE-based Medical Data Sharing System with Key Abuse Prevention and Verifiable Outsourcing in the IoMT Environment doi:10.3390/s20174934 |
MDPI Sensors | 2020.08.31 |
48 | Gyeong-Jin Ra Im-Yeong Lee |
A Key Recovery System Based on Password-Protected Secret Sharing in a Permissioned Blockchain doi:10.32604/cmc.2020.011293 |
MDPI Electronics | 2020.07.23 |
47 | Gyeong-Jin Ra Im-Yeong Lee |
An Anonymous Protocol with User Identification and Linking Capabilities for User Privacy in a Permissioned Blockchain doi:10.3390/electronics9081183 |
MDPI Electronics | 2020.07.22 |
46 | Dae-Hwi Lee Im-Yeong Lee |
A Certificateless Aggregate Arbitrated Signature Scheme for IoT Environments doi:10.3390/s20143983 |
MDPI Sensors | 2020.07.17 |
45 | Won-Bin Kim Im-Yeong Lee |
Secure and Efficient Storage of Video Data in a CCTV Environment 10.3837/tiis.2019.06.026 |
Transactions on Internet and Information Systems | 2019.06.29 |
44 | Dae-Hwi Lee Im-Yeong Lee |
Dynamic Group Authentication and Key Exchange Scheme Based on Threshold Secret Sharing for IoT Smart Metering Environments 10.3390/s18103534 |
Sensors | 2018.10.19 |
43 | Sung-Wook Park Im-Yeong Lee |
Enhanced signature RTD transaction scheme based on Chebyshev polynomial for mobile payments service in IoT device environment 10.1007/s11227-018-2546-8 |
Journal of Supercomputing | 2018.07.04 |
42 | Su-Hyun Kim Im-Yeong Lee |
Secure Multicast using Proxy Re-Encryption in an IoT Environment 10.3837/tiis.2018.02.025 |
Transactions on Internet and Information Systems | 2018.02.28 |
41 | Gyeong-Jin Ra Im-Yeong Lee |
A Study on KSI-based Authentication Management and Communication for Secure Smart Home Environments 10.3837/tiis.2018.02.021 |
Transactions on Internet and Information Systems | 2018.02.28 |
40 | Su-Hyun Kim Im-Yeong Lee |
IoT Device Security based on Proxy Re-encryption 10.1007/s12652-017-0602-5 |
Journal of Ambient Intelligence and Humanized Computing | 2017.11.30 |
39 | Sung-Wook Park Im-Yeong Lee |
Enhanced Mutual Authentication Scheme based on Chaotic Map for PCM in NFC Service Environment 10.3837/tiis.2017.02.032 |
Transactions on Internet and Information Systems | 2017.02.28 |
38 | Sung-Wook Park Im-Yeong Lee |
Mutual Authentication Scheme Based on Lattice for NFC-PCM Payment Service Environment 10.1177/155014779471539 |
International Journal of Distributed Sensor Networks | 2016.07.22 |
37 | Su-Hyun Kim Im-Yeong Lee |
Study on User Authority Management for Safe Data Protection in Cloud Computing Environments 10.3390/sym7010269 |
Symmetry | 2015.3.19 |
36 | Su-Hyun Kim Im-Yeong Lee |
Block Access Token Renewal Scheme Based on Secret Sharing in Apache Hadoop 10.3390/e16084185 |
Entropy | 2014.7.17 |
35 | Sun-Ho Lee Im-Yeong Lee |
A Study of Practical Proxy Re-encryption with a Keyword Search Scheme Considering Cloud Storage Structure 10.1155/2014/615679 |
The Scientific World Journal | 2013.10.22 |
34 | Sun-Ho Lee Kang-Bin Yim Im-Yeong Lee |
A Secure Solution with a Password Recovery Feature for USB Flash Drives | COMPUTER SYSTEMS SCIENCE AND ENGINEERING | 2012.11 |
33 | Sun-Ho Lee Im-Yeong Lee |
Keyword Searchable Re-encryption Scheme Considering Cloud Storage-Service Environment | Information-An International Interdisciplinary Journal | 2012.05.05 |
32 | Jong-Sik Moon Im-Yeong Lee |
Office Device Authentication and Authorization Protocol in Ubiquitous Office Network | Information-An International Interdisciplinary Journal | 2011.07.1 |
31 | Jong-Sik Moon Im-Yeong Lee |
Authentication protocol using an identifier in an ad hoc network environment | MATHEMATICAL AND COMPUTER MODELLING | 2011.02.08 |
30 | Jong-Sik Moon Im-Yeong Lee |
An AAA Scheme using ID-based Ticket with Anonymity in Future MobIle Communication | COMPUTER COMMUNICATIONS | 2010.06.08 |
29 | Jong-Sik Moon Jong-Hyuk Park Im-Yeong Lee |
Admissible bIlinear map-based key management protocol for HPCCS in heterogeneous network | JOURNAL OF SUPERCOMPUTING | 2010.05.26 |
28 | Jong-Sik Moon Deok Gyu Lee Jong-Hyuk Park Im-Yeong Lee |
Authentication and ID-Based Key Management Protocol in Pervasive Environment | WIRELESS PERSONAL COMMUNICATIONS | 2009.08.04 |
27 | Soo-Young Kang Deok-Gyu Lee Im-Yeong Lee |
A Study on secure RFID mutal authentication scheme in pervasive computing environment | COMPUTER COMMUNICATIONS | 2008.10.13~ 2008.10.15 |
24 | Deok-Gyu Lee Seo-Il Kang Im-Yeong Lee |
An Intelligent and Efficient Traitor Tracing for Ubiquitous Environments | KES2006 | 2006.10.11 |
23 | Deok-Gyu Lee Jong-Sik Moon Jong-Hyuk Park Im-Yeong Lee |
Authentication for Ubiquitous Multi Domain in Pervasive Computing Using PMI | HPCC2006 | 2006.09.14 |
22 | Deok-Gyu Lee Jang-Su Park Im-Yeong Lee |
Broadcast Encryption Using Efficient Key Distribution and Renewal for Ubiquitous Environments | EUC2006 | 2006.08.01 |
21 | Deok-Gyu Lee Seo-Il Kang Dae-Hee Seo Im-Yeong Lee |
Authentication for Single/Multi domain in Ubiquitous computing Using Attribute Certification | ICCSA2006 no 4 | 2006.05 |
20 | Deok-Gyu Lee Jang-Su Park Im-Yeong Lee Yong-Seok Park Jung-chul Ahn |
An Efficient Key Distribution for Ubiquitous Environment in Ad-Hoc Network Using Broadcast Encryption | ICCSA2006 no 4 | 2006.05 |
19 | Dae-Hee Seo Deok-Gyu Lee Im-Yeong Lee |
A Study on Scalable Bluetooth Piconet for Secure Ubiquitous | HSI2005 | 2005.07. |
18 | Deok-Gyu Lee Bo-Sung Hwang Im-Yeong Lee |
Authentication for Single/Multi Domain in Ubiquitous Computing Using PMI | ICCSA2005 | 2005.05 |
17 | Dae-Hee Seo Hee-un Park Im-Yeong Park |
A Study on Secure SDP of RFID Using Bluetooth Communication | ICCSA2005 | 2005.05 |
16 | Seo-Il Kang Im-Yeong Lee |
A Study on the E-cash System with Anonymity and DivisibIlity | ICCSA2005 | 2005.05 |
15 | Deok-Gyu Lee Im-Yeong Lee |
A Study on Efficient Key Distribution and Renewal in Broadcast Encryption | ICCSA | 2004.5 |
14 | Dae-Hee Seo Im-Yeong Lee Hee-Un Park |
A Study on Key Recovery Agent Protection ProfIle having Composition Function | ICCSA | 2004.5 |
13 | Dae-Hee Seo Im-Yeong Lee |
A Study on Secure and Efficient Sensor Network Management Scheme Using PTD | ICCSA | 2004.5 |
12 | Deok-Gyu Lee Hyung-Geun Oh Im-Yeong Lee |
A Study on Contents Distribution Using Electronic Cash System | EEE | 2004.3.28-31 |
11 | Deok-Gyu Lee Im-Yeong Lee |
A Study on Encrypted Key exchange using password | WSEAS | 2004.4. |
10 | Hyung-Woo Lee Im-Yeong Lee Dong-Ik Oh |
Smart Card Based MobIle Payment with Fairness Revocation Mechanism | EC-Web | 2003.9. |
9 | Kyeung-Soo Lee Dong-Ik Oh Im-Young Lee Yong-Hae Kong |
An XML Query Mediator | IDEAL | 2003.3 |
8 | Yong-ho Lee Im-Yeong Lee Hyung-woo Lee |
New WAKE Key Recovery Protocol on M-commerce | ICWE | 2003.7.14-18 |
7 | Hyung-Woo Lee Im-Yeong Lee |
Designated Verification of Digital Watermark for Network Based Image Distribution | ICCS | 2003.6.2~ 2003.6.4 |
6 | Hyug-Woo Lee Sung-Min Lee Im-Yeong Lee |
Secure Electronic Copyright Distribution with Public Key Based Traitor Tracing | E-Commerce and Web Technologies | 2002.09 |
5 | Yu-Sug Chang Hye-Jung Lee Doo-Soon Park Im-Yeong Lee |
Interprocedural Transformation for Extracting Maximum Parallelism | Advanced in Information Syatem | 2002.10 |
4 | Dae-Hee Seo Im-Yeong Lee Dong-Ik Oh Doo-soon Park |
Secure Bluetooth Piconet Using Non-anonymous Group Key | EurAsia-ICT2002 | 2002.10 |
3 | Deok-Gyu Lee Im-Yeong Lee Jong-keun Ahn Yong-Hae Kong |
The Illegal Copy Protection Using Hidden Agent | EurAsia-ICT2002 | 2002.10 |
2 | Yong-Ho Lee Im-Yeong Lee Hyung-Woo Lee |
New Identity Escrow Scheme for Anonymity Authentication | Indocrypto2002 | 2002.12 |
1 | Hee-Un Park Im-Yeong Lee |
A Digital Nominative Proxy Signature Scheme for MobIle Communication | Information and Communications Security | 2001.09 |
No. | Authors | Paper Title | Journal Title | Date |
---|---|---|---|---|
18 | Gyeong-Jin Ra Im-Yeong Lee |
Survey of Digital Signature Technology for IoT Environment: Focused on KSI’s Global Timestamping Technique 10.1007/978-981-13-9341-9_89 |
LNEE | 2019.11.30 |
17 | Yong-Woon Hwang Im-Yeong Lee |
A STUDY ON VIDEO DATA ACCESS CONTROL TECHNOLOGY USING CP-ABPRE SCHEMES IN CCTV ENVIRONMENT | JATIT | 2019.09.15 |
16 | Won-Bin Kim Im-Yeong Lee |
Secure data deduplication scheme using linkage of data blocks in cloud storage environment 10.1007/978-981-13-1328-8_70 |
LNEE | 2018.11.29 |
15 | Dae-Hwi Lee Im-Yeong Lee |
ECDSA-based Broadcast Authentication Scheme for Smart Home Environments | JTeC | 2018.12.06 |
14 | Gun-Wook Choi Yong-Woon Hwang Im-Yeong Lee |
Efficient Group Key Distribution Scheme In NVR | JATIT | 2018.11.30 |
13 | Dae-Hwi Lee Im-Yeong Lee |
Efficient Group Authentication And Key Exchange Scheme For IoT Environment | JATIT | 2018.11.30 |
12 | Won-Bin Kim Im-Yeong Lee |
A Study on Improving Security and Efficiency using Dynamic Ownership Management in Client-Side Deduplication Environments 10.25046/aj030532 |
ASTESJ | 2018.10.12 |
11 | Yong-Woon Hwang Im-Yeong Lee |
A study on lightweight mutual authentication for radio-frequency identification medical device 10.1177/1847979018765042 |
SAGE | 2018.03.21 |
10 | Gyeong-Jin Ra Im-Yeong Lee |
A Study on Secure and Efficient KSI System based on Multi Path Hash Chain with Universal Hashing Function | SERSC-IJGDC(Hindawi) | 2017.10.12 |
9 | Yong-Woon Hwang Im-Yeong Lee |
A Study on Lightweight Mutual Authentication Protocol Based on Simple Operation | Springer(Lecture Notes in Electrical Engineering) | 2017.12.20 |
8 | Won-Bin Kim Im-Yeong Lee |
A Study on Light-Weight and Efficient Proof of Ownership in Client-SideDeduplication Environment | Advanced Science Letters | 2017.10.01 |
7 | Won-Bin Kim Im-Yeong Lee |
Client-Side Deduplication for Protection of a Private Data in Cloud Storage 10.1166/asl.2016.7854 |
Advanced Science Letters | 2016.09.01 |
6 | Sung-Wook Park Im-Yeong Lee |
Light-weight Authentication Scheme for NFC mCoupon Service in IoT Environments 10.1007/978-3-662-47895-0_36 |
Springer | 2015.07.17 |
5 | Hong-Gi Kim Im-Yeong Lee |
A Study on One-Time Password Authentication Scheme in Smart Work | Information | 2014.04 |
4 | Sung-Wook Park Im-Yeong Lee |
Mutual Authentication Scheme based on NTRU for Payment Information Protection in NFC Mobile Environment 10.3745/JIPS.2013.9.3.461 |
Information | 2013.09.30 |
3 | Su-Hyun Kim Im-Yeong Lee |
Group Key Renewal and Authentication Scheme Using Bloom Filter for SMART Highway | Information | 2013.01 |
2 | Sung-Wook Park Im-Yeong Lee |
Anonymous Authentication Scheme based on NTRU for the Protection of Payment Information in NFC Mobile Environment | JIPS | 2013.06 |
1 | Sun-Ho Lee Im-Yeong Lee |
A Secure Index Management Scheme for Providing Data Sharing in Cloud Storage | JIPS | 2013.09 |