Younho Lee
Younho Lee
Verified email at seoultech.ac.kr
Title
Cited by
Cited by
Year
Order-preserving symmetric encryption
A Boldyreva, N Chenette, Y Lee, A O’neill
Advances in Cryptology-EUROCRYPT 2009, 224-241, 2009
9772009
Trust evaluation model for wireless sensor networks
J Hur, Y Lee, H Yoon, D Choi, S Jin
Advanced Communication Technology, 2005, ICACT 2005. The 7th International …, 2005
882005
A new data hiding scheme for binary image authentication with small image distortion
Y Lee, H Kim, Y Park
Information Sciences 179 (22), 3866-3884, 2009
622009
Real-time analysis of intrusion detection alerts via correlation
S Lee, B Chung, H Kim, Y Lee, C Park, H Yoon
Computers & Security 25 (3), 169-183, 2006
582006
Trust management for resilient wireless sensor networks
J Hur, Y Lee, SM Hong, H Yoon
Information Security and Cryptology-ICISC 2005, 56-68, 2005
382005
Improved multi-precision squaring for low-end RISC microcontrollers
Y Lee, IH Kim, Y Park
Journal of Systems and Software 86 (1), 60-71, 2013
262013
Parallelized Scalar Multiplication on Elliptic Curves Defined over Optimal Extension Field.
J Lee, H Kim, Y Lee, SM Hong, H Yoon
IJ Network Security 4 (1), 99-106, 2007
252007
Digital rights management with right delegation for home networks
H Kim, Y Lee, B Chung, H Yoon, J Lee, KI Jung
Information Security and Cryptology–ICISC 2006, 233-245, 2006
232006
On-demand secure routing protocol for ad hoc network using id based cryptosystem
YH Lee, H Kim, B Chung, J Lee, H Yoon
Parallel and Distributed Computing, Applications and Technologies, 2003 …, 2003
232003
A new binary image authentication scheme with small distortion and low false negative rates
LEE Younho, HUR Junbeom, KIM Heeyoul, P Yongsu
IEICE transactions on communications 90 (11), 3259-3262, 2007
212007
A robust and flexible digital rights management system for home networks
H Kim, Y Lee, Y Park
Journal of Systems and Software 83 (12), 2431-2440, 2010
152010
Personalized EigenTrust with the Beta Distribution.
D Choi, S Jin, Y Lee, Y Park
ETRI journal 32 (2), 2010
142010
A new proxy signature scheme providing self-delegation
Y Lee, H Kim, Y Park, H Yoon
ICISC, 328-342, 2006
132006
RLizard: Post-Quantum Key Encapsulation Mechanism for IoT Devices
J Lee, D Kim, H Lee, Y Lee, JH Cheon
IEEE Access 7, 2080-2091, 2019
82019
Eavesdropping One-Time Tokens Over Magnetic Secure Transmission in Samsung Pay
D Choi, Y Lee
10th USENIX Workshop on Offensive Technologies (WOOT 16), 2016
82016
A New Privacy-preserving Path Authentication Scheme using RFID for Supply Chain Management
Y Lee, Y Park
Advances in Electrical and Computer Engineering 13 (1), 23-26, 2013
82013
Expansion of Sliding Window Method for Finding Shorter Addition/Subtraction-Chains.
Y Lee, H Kim, SM Hong, H Yoon
IJ Network Security 2 (1), 34-40, 2006
72006
Efficient machine learning over encrypted data with non-interactive communication
H Park, P Kim, H Kim, KW Park, Y Lee
Computer Standards & Interfaces 58, 87-108, 2018
62018
A reliable group key management scheme for broadcast encryption
J Hur, Y Lee
Journal of Communications and Networks 18 (2), 246-260, 2016
62016
Secure Ordered Bucketization
Y Lee
IEEE Transactions on Dependable and Secure Computing 11 (3), 292-303, 2014
62014
The system can't perform the operation now. Try again later.
Articles 1–20