Younho Lee
Younho Lee
Verified email at seoultech.ac.kr
Title
Cited by
Cited by
Year
Order-preserving symmetric encryption
A Boldyreva, N Chenette, Y Lee, A O’neill
Advances in Cryptology-EUROCRYPT 2009, 224-241, 2009
11102009
Trust evaluation model for wireless sensor networks
J Hur, Y Lee, H Yoon, D Choi, S Jin
Advanced Communication Technology, 2005, ICACT 2005. The 7th International …, 2005
952005
A new data hiding scheme for binary image authentication with small image distortion
Y Lee, H Kim, Y Park
Information Sciences 179 (22), 3866-3884, 2009
632009
Real-time analysis of intrusion detection alerts via correlation
S Lee, B Chung, H Kim, Y Lee, C Park, H Yoon
Computers & Security 25 (3), 169-183, 2006
632006
Trust management for resilient wireless sensor networks
J Hur, Y Lee, SM Hong, H Yoon
Information Security and Cryptology-ICISC 2005, 56-68, 2005
402005
Improved multi-precision squaring for low-end RISC microcontrollers
Y Lee, IH Kim, Y Park
Journal of Systems and Software 86 (1), 60-71, 2013
262013
Parallelized Scalar Multiplication on Elliptic Curves Defined over Optimal Extension Field.
J Lee, H Kim, Y Lee, SM Hong, H Yoon
IJ Network Security 4 (1), 99-106, 2007
252007
On-demand secure routing protocol for ad hoc network using id based cryptosystem
YH Lee, H Kim, B Chung, J Lee, H Yoon
Parallel and Distributed Computing, Applications and Technologies, 2003 …, 2003
252003
Digital rights management with right delegation for home networks
H Kim, Y Lee, B Chung, H Yoon, J Lee, KI Jung
Information Security and Cryptology–ICISC 2006, 233-245, 2006
242006
A new binary image authentication scheme with small distortion and low false negative rates
LEE Younho, HUR Junbeom, KIM Heeyoul, P Yongsu
IEICE transactions on communications 90 (11), 3259-3262, 2007
202007
A robust and flexible digital rights management system for home networks
H Kim, Y Lee, Y Park
Journal of Systems and Software 83 (12), 2431-2440, 2010
182010
Personalized EigenTrust with the Beta Distribution.
D Choi, S Jin, Y Lee, Y Park
ETRI journal 32 (2), 2010
162010
Efficient machine learning over encrypted data with non-interactive communication
H Park, P Kim, H Kim, KW Park, Y Lee
Computer Standards & Interfaces 58, 87-108, 2018
142018
A new proxy signature scheme providing self-delegation
Y Lee, H Kim, Y Park, H Yoon
ICISC, 328-342, 2006
132006
RLizard: Post-Quantum Key Encapsulation Mechanism for IoT Devices
J Lee, D Kim, H Lee, Y Lee, JH Cheon
IEEE Access 7, 2080-2091, 2019
122019
Eavesdropping One-Time Tokens Over Magnetic Secure Transmission in Samsung Pay
D Choi, Y Lee
10th USENIX Workshop on Offensive Technologies (WOOT 16), 2016
112016
A reliable group key management scheme for broadcast encryption
J Hur, Y Lee
Journal of Communications and Networks 18 (2), 246-260, 2016
92016
A New Privacy-preserving Path Authentication Scheme using RFID for Supply Chain Management
Y Lee, Y Park
Advances in Electrical and Computer Engineering 13 (1), 23-26, 2013
82013
Private attribute inference from Facebook’s public text metadata: a case study of Korean users
D Choi, D Choi, Y Lee, Y Lee, S Kim, S Kim, P Kang, P Kang
Industrial Management & Data Systems 117 (8), 1687-1706, 2017
72017
Secure Ordered Bucketization
Y Lee
IEEE Transactions on Dependable and Secure Computing 11 (3), 292-303, 2014
72014
The system can't perform the operation now. Try again later.
Articles 1–20