default search action
Dong Hoon Lee 0001
Person information
- affiliation: Korea University, Center for Information Security Technologies, Seoul, South Korea
- affiliation (PhD 1992): University of Oklahoma, Norman, OK, USA
Other persons with the same name
- Donghoon Lee (aka: DongHoon Lee, Dong Hoon Lee, Dong-Hoon Lee) — disambiguation page
- Dong Hoon Lee 0002 — Electronics and Telecommunications Research Institute (ETRI), Network and Communicatons Security Division, Daejeon, Korea (and 1 more)
- Donghoon Lee 0004 — Apple Inc., Cupertino, CA, USA (and 1 more)
- Donghoon Lee 0005 — Samsung Electronics America, San Diego, CA, USA (and 1 more)
- Donghoon Lee 0006 — Icahn School of Medicine at Mount Sinai, New York City, NY, USA (and 1 more)
- Donghoon Lee 0007 — Sungkyunkwan University, Department of Electrical and Computer Engineering, Suwon, Korea
- Dong-Hoon Lee 0008 (aka: Donghoon Lee 0008) — Electronics and Telecommunications Research Institute (ETRI), Photonics/Wireless Devices Research Division, Daejeon, South Korea
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j162]Hee Yeon Kim, Dong Hoon Lee:
CatchFuzz: Reliable active anti-fuzzing techniques against coverage-guided fuzzer. Comput. Secur. 143: 103904 (2024) - [j161]Yeonseon Jeong, Hyunghoon Kim, Seyoung Lee, Wonsuk Choi, Dong Hoon Lee, Hyo Jin Jo:
In-Vehicle Network Intrusion Detection System Using CAN Frame-Aware Features. IEEE Trans. Intell. Transp. Syst. 25(5): 3843-3853 (2024) - 2023
- [j160]Moon Chan Park, Dong Hoon Lee:
BGCFI: Efficient Verification in Fine-Grained Control-Flow Integrity Based on Bipartite Graph. IEEE Access 11: 4291-4305 (2023) - [j159]Sung Bum Park, Hyo Jin Jo, Dong Hoon Lee:
G-IDCS: Graph-Based Intrusion Detection and Classification System for CAN Protocol. IEEE Access 11: 39213-39227 (2023) - [j158]Sunwoo Lee, Wonsuk Choi, Dong Hoon Lee:
The vibration knows who you are! A further analysis on usable authentication for smartwatch users. Comput. Secur. 125: 103040 (2023) - [j157]Sung Bum Park, Hyo Jin Jo, Dong Hoon Lee:
Flooding attack mitigator for in-vehicle CAN using fault confinement in CAN protocol. Comput. Secur. 126: 103091 (2023) - [j156]Na-Young Ahn, Dong Hoon Lee:
IoT security: On-chip secure deletion scheme using ECC modulation in IoT appliances. Comput. Secur. 133: 103422 (2023) - [j155]Sunwoo Lee, Dong Hoon Lee:
From Attack to Identification: MEMS Sensor Fingerprinting Using Acoustic Signals. IEEE Internet Things J. 10(6, March 15): 5447-5460 (2023) - [j154]Seulhui Lee, Wonsuk Choi, Dong Hoon Lee:
Protecting SOME/IP Communication via Authentication Ticket. Sensors 23(14): 6293 (2023) - [j153]Seyoung Lee, Wonsuk Choi, Hyo Jin Jo, Dong Hoon Lee:
ErrIDS: An Enhanced Cumulative Timing Error-Based Automotive Intrusion Detection System. IEEE Trans. Intell. Transp. Syst. 24(11): 12406-12421 (2023) - [c114]Kyungho Joo, Dong Hoon Lee, Yeonseon Jeong, Wonsuk Choi:
Protecting HRP UWB Ranging System Against Distance Reduction Attacks. CCS 2023: 622-635 - [c113]Gyungeun Yun, Kyungho Joo, Wonsuk Choi, Dong Hoon Lee:
Poster: Unveiling the Impact of Patch Placement: Adversarial Patch Attacks on Monocular Depth Estimation. CCS 2023: 3639-3641 - [c112]Sangbin Park, Youngjoon Kim, Dong Hoon Lee:
SCVMON: Data-oriented attack recovery for RVs based on safety-critical variable monitoring. RAID 2023: 547-563 - [c111]Jiwoo Shin, Hyunghoon Kim, Seyoung Lee, Wonsuk Choi, Dong Hoon Lee, Hyo Jin Jo:
RIDAS: Real-time identification of attack sources on controller area networks. USENIX Security Symposium 2023: 6911-6928 - [i36]Na-Young Ahn, Dong Hoon Lee:
IoT Security: On-Chip Secure Deletion Scheme using ECC Modulation in IoT Appliances. CoRR abs/2308.05225 (2023) - 2022
- [j152]Hyunghoon Kim, Yeonseon Jeong, Wonsuk Choi, Dong Hoon Lee, Hyo Jin Jo:
Efficient ECU Analysis Technology Through Structure-Aware CAN Fuzzing. IEEE Access 10: 23259-23271 (2022) - [j151]Seyoung Lee, Hyo Jin Jo, Aram Cho, Dong Hoon Lee, Wonsuk Choi:
TTIDS: Transmission-Resuming Time-Based Intrusion Detection System for Controller Area Network (CAN). IEEE Access 10: 52139-52153 (2022) - [j150]Na-Young Ahn, Dong Hoon Lee:
Security of IoT Device: Perspective Forensic/Anti-Forensic Issues on Invalid Area of NAND Flash Memory. IEEE Access 10: 74207-74219 (2022) - [j149]Hyeran Mun, Minhye Seo, Dong Hoon Lee:
Secure Privacy-Preserving V2V Communication in 5G-V2X Supporting Network Slicing. IEEE Trans. Intell. Transp. Syst. 23(9): 14439-14455 (2022) - [c110]Hyunsu Cho, Sunwoo Lee, Wonsuk Choi, Dong Hoon Lee:
Recovering Yaw Rate from Signal Injection Attack to Protect RV's Direction. WISA 2022: 171-184 - [i35]Na-Young Ahn, Dong Hoon Lee:
Security of IoT Device: Perspective Forensic/Anti-Forensic Issues on Invalid Area of NAND Flash Memory. CoRR abs/2208.06003 (2022) - 2021
- [j148]Dongwook Shim, Dong Hoon Lee:
SOTPM: Software One-Time Programmable Memory to Protect Shared Memory on ARM Trustzone. IEEE Access 9: 4490-4504 (2021) - [j147]Young Bi Lee, Jae Hyuk Suk, Dong Hoon Lee:
Bypassing Anti-Analysis of Commercial Protector Methods Using DBI Tools. IEEE Access 9: 7655-7673 (2021) - [j146]Na-Young Ahn, Dong Hoon Lee:
Forensics and Anti-Forensics of a NAND Flash Memory: From a Copy-Back Program Perspective. IEEE Access 9: 14130-14137 (2021) - [j145]Na-Young Ahn, Dong Hoon Lee:
Forensic Issues and Techniques to Improve Security in SSD With Flex Capacity Feature. IEEE Access 9: 167067-167075 (2021) - [j144]Hyoseung Kim, Kwangsu Lee, Jong Hwan Park, Dong Hoon Lee:
Improving the security of direct anonymous attestation under host corruptions. Int. J. Inf. Sec. 20(4): 475-492 (2021) - [j143]Moon Chan Park, Dong Hoon Lee:
Random CFI (RCFI): Efficient Fine-Grained Control-Flow Integrity Through Random Verification. IEEE Trans. Computers 70(5): 733-745 (2021) - [j142]Wonsuk Choi, Seyoung Lee, Kyungho Joo, Hyo Jin Jo, Dong Hoon Lee:
An Enhanced Method for Reverse Engineering CAN Data Payload. IEEE Trans. Veh. Technol. 70(4): 3371-3381 (2021) - [c109]Sunwoo Lee, Wonsuk Choi, Dong Hoon Lee:
Usable User Authentication on a Smartwatch using Vibration. CCS 2021: 304-319 - [c108]Hyun Sook Rhee, Dong Hoon Lee:
Anonymous IBE from PEKS: A Generic Construction. WISA 2021: 105-118 - [i34]Na-Young Ahn, Dong Hoon Lee:
Forensic Issues and Techniques to Improve Security in SSD with Flex Capacity Feature. CoRR abs/2112.13923 (2021) - 2020
- [j141]Jeongsu Park, Dong Hoon Lee:
Parallelly Running k-Nearest Neighbor Classification Over Semantically Secure Encrypted Data in Outsourced Environments. IEEE Access 8: 64617-64633 (2020) - [j140]Ae Chan Kim, Mohyun Park, Dong Hoon Lee:
AI-IDS: Application of Deep Learning to Real-Time Web Intrusion Detection. IEEE Access 8: 70245-70261 (2020) - [j139]Seungho Lee, Hyo Jin Jo, Wonsuk Choi, Hyoseung Kim, Jong Hwan Park, Dong Hoon Lee:
Fine-Grained Access Control-Enabled Logging Method on ARM TrustZone. IEEE Access 8: 81348-81364 (2020) - [j138]So Hyun Park, Suhri Kim, Dong Hoon Lee, Jong Hwan Park:
Improved Ring LWR-Based Key Encapsulation Mechanism Using Cyclotomic Trinomials. IEEE Access 8: 112585-112597 (2020) - [j137]Yousik Lee, Samuel Woo, Yunkeun Song, Jungho Lee, Dong Hoon Lee:
Practical Vulnerability-Information-Sharing Architecture for Automotive Security-Risk Analysis. IEEE Access 8: 120009-120018 (2020) - [j136]Jae Hyuk Suk, Young Bi Lee, Dong Hoon Lee:
SCORE: Source Code Optimization & REconstruction. IEEE Access 8: 129478-129496 (2020) - [j135]Jae Hyuk Suk, Dong Hoon Lee:
VCF: Virtual Code Folding to Enhance Virtualization Obfuscation. IEEE Access 8: 139161-139175 (2020) - [j134]Na-Young Ahn, Jun Eun Park, Dong Hoon Lee, Paul C. Hong:
Balancing Personal Privacy and Public Safety During COVID-19: The Case of South Korea. IEEE Access 8: 171325-171333 (2020) - [j133]Sumin Chae, Hongjoo Jin, Moon Chan Park, Dong Hoon Lee:
HS-Pilot: Heap Security Evaluation Tool Model Based on Atomic Heap Interaction. IEEE Access 8: 201914-201924 (2020) - [j132]Raphael C.-W. Phan, Masayuki Abe, Lynn Batten, Jung Hee Cheon, Ed Dawson, Steven D. Galbraith, Jian Guo, Lucas C. K. Hui, Kwangjo Kim, Xuejia Lai, Dong Hoon Lee, Mitsuru Matsui, Tsutomu Matsumoto, Shiho Moriai, Phong Q. Nguyen, Dingyi Pei, Duong Hieu Phan, Josef Pieprzyk, Huaxiong Wang, Hank Wolfe, Duncan S. Wong, Tzong-Chen Wu, Bo-Yin Yang, Siu-Ming Yiu, Yu Yu, Jianying Zhou:
Advances in security research in the Asiacrypt region. Commun. ACM 63(4): 76-81 (2020) - [j131]Hyerean Jang, Moon Chan Park, Dong Hoon Lee:
IBV-CFI: Efficient fine-grained control-flow integrity preserving CFG precision. Comput. Secur. 94: 101828 (2020) - [j130]Youngkyung Lee, Dong Hoon Lee, Jong Hwan Park:
Tightly CCA-secure encryption scheme in a multi-user setting with corruptions. Des. Codes Cryptogr. 88(11): 2433-2452 (2020) - [j129]Minhye Seo, Suhri Kim, Dong Hoon Lee, Jong Hwan Park:
EMBLEM: (R)LWE-based key encapsulation with a new multi-bit encoding method. Int. J. Inf. Sec. 19(4): 383-399 (2020) - [j128]Youngkyung Lee, Jong Hwan Park, Kwangsu Lee, Dong Hoon Lee:
Tight security for the generic construction of identity-based signature (in the multi-instance setting). Theor. Comput. Sci. 847: 122-133 (2020) - [j127]Junggab Son, Donghyun Kim, Md. Zakirul Alam Bhuiyan, Rahman Mitchel Tashakkori, Jungtaek Seo, Dong Hoon Lee:
Privacy Enhanced Location Sharing for Mobile Online Social Networks. IEEE Trans. Sustain. Comput. 5(2): 279-290 (2020) - [j126]Hyo Jin Jo, Jin Hyun Kim, Hyon-Young Choi, Wonsuk Choi, Dong Hoon Lee, Insup Lee:
MAuth-CAN: Masquerade-Attack-Proof Authentication for In-Vehicle Networks. IEEE Trans. Veh. Technol. 69(2): 2204-2218 (2020) - [j125]Hyeran Mun, Kyusuk Han, Dong Hoon Lee:
Ensuring Safety and Security in CAN-Based Automotive Embedded Systems: A Combination of Design Optimization and Secure Communication. IEEE Trans. Veh. Technol. 69(7): 7078-7091 (2020) - [c107]Kyungho Joo, Wonsuk Choi, Dong Hoon Lee:
Hold the Door! Fingerprinting Your Car Key to Prevent Keyless Entry Car Theft. NDSS 2020 - [e5]Donghyun Kim, R. N. Uma, Zhipeng Cai, Dong Hoon Lee:
Computing and Combinatorics - 26th International Conference, COCOON 2020, Atlanta, GA, USA, August 29-31, 2020, Proceedings. Lecture Notes in Computer Science 12273, Springer 2020, ISBN 978-3-030-58149-7 [contents] - [i33]Na-Young Ahn, Dong Hoon Lee:
Schemes for Privacy Data Destruction in a NAND Flash Memory. CoRR abs/2001.00522 (2020) - [i32]Kyungho Joo, Wonsuk Choi, Dong Hoon Lee:
Hold the Door! Fingerprinting Your Car Key to Prevent Keyless Entry Car Theft. CoRR abs/2003.13251 (2020) - [i31]Na-Young Ahn, Jun Eun Park, Dong Hoon Lee, Paul C. Hong:
Balancing Personal Privacy and Public Safety in COVID-19: Case of Korea and France. CoRR abs/2004.14495 (2020) - [i30]Na-Young Ahn, Dong Hoon Lee:
Secure Vehicle Communications Using Proof-of-Nonce Blockchain. CoRR abs/2011.07846 (2020)
2010 – 2019
- 2019
- [j124]Seungho Lee, Wonsuk Choi, Hyo Jin Jo, Dong Hoon Lee:
T-Box: A Forensics-Enabled Trusted Automotive Data Recording Method. IEEE Access 7: 49738-49755 (2019) - [j123]Minhye Seo, Jung Yeon Hwang, Dong Hoon Lee, Soohyung Kim, Seung-Hyun Kim, Jong Hwan Park:
Fuzzy Vector Signature and Its Application to Privacy-Preserving Authentication. IEEE Access 7: 69892-69906 (2019) - [j122]Sunwoo Lee, Wonsuk Choi, Dong Hoon Lee:
Securing Ultrasonic Sensors Against Signal Injection Attacks Based on a Mathematical Model. IEEE Access 7: 107716-107729 (2019) - [j121]Hyunjin Sun, Seyoung Lee, Kyungho Joo, Hongjoo Jin, Dong Hoon Lee:
Catch ID if You CAN: Dynamic ID Virtualization Mechanism for the Controller Area Network. IEEE Access 7: 158237-158249 (2019) - [j120]Na-Young Ahn, Dong Hoon Lee:
Schemes for Privacy Data Destruction in a NAND Flash Memory. IEEE Access 7: 181305-181313 (2019) - [j119]Na-Young Ahn, Dong Hoon Lee:
Physical Layer Security of Autonomous Driving: Secure Vehicle-to-Vehicle Communication in A Security Cluster. Ad Hoc Sens. Wirel. Networks 45(3-4): 293-336 (2019) - [j118]Kwangsu Lee, Dong Hoon Lee, Jong Hwan Park, Moti Yung:
CCA Security for Self-Updatable Encryption: Protecting Cloud Data When Clients Read/Write Ciphertexts. Comput. J. 62(4): 545-562 (2019) - [j117]Minhye Seo, Michel Abdalla, Dong Hoon Lee, Jong Hwan Park:
New technique for chosen-ciphertext security based on non-interactive zero-knowledge. Inf. Sci. 490: 18-35 (2019) - [j116]Yousik Lee, Samuel Woo, Jungho Lee, Yunkeun Song, Heeseok Moon, Dong Hoon Lee:
Enhanced Android App-Repackaging Attack on In-Vehicle Network. Wirel. Commun. Mob. Comput. 2019 (2019) - [c106]Seungho Lee, Wonsuk Choi, Hyo Jin Jo, Dong Hoon Lee:
How to Securely Record Logs based on ARM TrustZone. AsiaCCS 2019: 664-666 - [i29]Na-Young Ahn, Dong Hoon Lee:
Vehicle Communication using Hash Chain-based Secure Cluster. CoRR abs/1912.12392 (2019) - 2018
- [j115]Jin Hyung Park, Seok-Man Yoo, In Seok Kim, Dong Hoon Lee:
Security Architecture for a Secure Database on Android. IEEE Access 6: 11482-11501 (2018) - [j114]Jieun Eom, Dong Hoon Lee, Kwangsu Lee:
Multi-Client Order-Revealing Encryption. IEEE Access 6: 45458-45472 (2018) - [j113]Kwangsu Lee, Dong Hoon Lee:
Two-Input Functional Encryption for Inner Products from Bilinear Maps. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(6): 915-928 (2018) - [j112]Wonsuk Choi, Youngkyung Lee, Duhyeong Lee, Hyoseung Kim, Jin Hyung Park, In Seok Kim, Dong Hoon Lee:
Less Communication: Energy-Efficient Key Exchange for Securing Implantable Medical Devices. Secur. Commun. Networks 2018: 1809302:1-1809302:16 (2018) - [j111]Minhye Seo, Jong Hwan Park, Youngsam Kim, Sangrae Cho, Dong Hoon Lee, Jung Yeon Hwang:
Construction of a New Biometric-Based Key Derivation Function and Its Application. Secur. Commun. Networks 2018: 6107912:1-6107912:14 (2018) - [j110]Jae Hyuk Suk, Jae-Yung Lee, Hongjoo Jin, In Seok Kim, Dong Hoon Lee:
UnThemida: Commercial obfuscation technique analysis with a fully obfuscated program. Softw. Pract. Exp. 48(12): 2331-2349 (2018) - [j109]Jin Hyung Park, Dong Hoon Lee:
FACE: Fast AES CTR mode Encryption Techniques based on the Reuse of Repetitive Data. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(3): 469-499 (2018) - [j108]Wonsuk Choi, Kyungho Joo, Hyo Jin Jo, Moon Chan Park, Dong Hoon Lee:
VoltageIDS: Low-Level Communication Characteristics for Automotive Intrusion Detection System. IEEE Trans. Inf. Forensics Secur. 13(8): 2114-2129 (2018) - [j107]Hyo Jin Jo, In Seok Kim, Dong Hoon Lee:
Reliable Cooperative Authentication for Vehicular Networks. IEEE Trans. Intell. Transp. Syst. 19(4): 1065-1079 (2018) - [j106]Wonsuk Choi, Hyo Jin Jo, Samuel Woo, Ji Young Chun, Jooyoung Park, Dong Hoon Lee:
Identifying ECUs Using Inimitable Characteristics of Signals in Controller Area Networks. IEEE Trans. Veh. Technol. 67(6): 4757-4770 (2018) - [c105]Jae-Yung Lee, Jae Hyuk Suk, Dong Hoon Lee:
VODKA: Virtualization Obfuscation Using Dynamic Key Approach. WISA 2018: 131-145 - [i28]Na-Young Ahn, Donghoon Lee, Seong-Jun Oh:
Vehicle Communication using Secrecy Capacity. CoRR abs/1807.09757 (2018) - [i27]Jieun Eom, Dong Hoon Lee, Kwangsu Lee:
Multi-Client Order-Revealing Encryption. CoRR abs/1809.01320 (2018) - [i26]Na-Young Ahn, Dong Hoon Lee:
Countermeasures against a side-channel attack in a kernel memory. IACR Cryptol. ePrint Arch. 2018: 62 (2018) - 2017
- [j105]Kwangsu Lee, Dong Hoon Lee, Jong Hwan Park:
Efficient revocable identity-based encryption via subset difference methods. Des. Codes Cryptogr. 85(1): 39-76 (2017) - [j104]Eun Su Jeong, In-Seok Kim, Dong Hoon Lee:
SafeGuard: a behavior based real-time malware detection scheme for mobile multimedia applications in android platform. Multim. Tools Appl. 76(17): 18153-18173 (2017) - [j103]Kwangsu Lee, Seung Geol Choi, Dong Hoon Lee, Jong Hwan Park, Moti Yung:
Self-updatable encryption: Time constrained access control with hidden attributes and better efficiency. Theor. Comput. Sci. 667: 51-92 (2017) - [j102]Hyo Jin Jo, Wonsuk Choi, Seoung Yeop Na, Samuel Woo, Dong Hoon Lee:
Vulnerabilities of Android OS-Based Telematics System. Wirel. Pers. Commun. 92(4): 1511-1530 (2017) - [j101]Wonsuk Choi, In Seok Kim, Dong Hoon Lee:
E2PKA: An Energy-Efficient and PV-Based Key Agreement Scheme for Body Area Networks. Wirel. Pers. Commun. 97(1): 977-998 (2017) - [c104]Joon Sik Kim, Young Kyung Lee, Jieun Eom, Dong Hoon Lee:
Recipient Revocable Broadcast Encryption with Dealership. ICISC 2017: 214-228 - [c103]Joon Young Park, Jong Pil Yun, Dong Hoon Lee:
WheelLogger: Driver Tracing Using Smart Watch. WISA 2017: 87-100 - [i25]Na-Young Ahn, Dong Hoon Lee:
Countermeasure against Side-Channel Attack in Shared Memory of TrustZone. CoRR abs/1705.08279 (2017) - [i24]Na-Young Ahn, Dong Hoon Lee:
Duty to Delete on Non-Volatile Memory. CoRR abs/1707.02842 (2017) - [i23]Na-Young Ahn, Dong Hoon Lee:
Privacy Protection Cache Policy on Hybrid Main Memory. CoRR abs/1708.00319 (2017) - 2016
- [j100]Jong Hwan Park, Dong Hoon Lee:
An efficient IBE scheme with tight security reduction in the random oracle model. Des. Codes Cryptogr. 79(1): 63-85 (2016) - [j99]Moon Chan Park, Woo Kwon Koo, Dong Geun Suh, In-Seok Kim, Dong Hoon Lee:
Two-stage tamper response in tamper-resistant software. IET Softw. 10(3): 81-88 (2016) - [j98]Jong Hwan Park, Dong Hoon Lee:
A Variant of Park-Lee Identity-Based Encryption System. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 99-A(3): 720-732 (2016) - [j97]Seunghwan Park, Dong Hoon Lee:
Security of Cloud-Based Revocable Identity-Based Proxy Re-Encryption Scheme. IEICE Trans. Inf. Syst. 99-D(7): 1933-1936 (2016) - [j96]Jieun Eom, Dong Hoon Lee, Kwangsu Lee:
Patient-Controlled Attribute-Based Encryption for Secure Electronic Health Records System. J. Medical Syst. 40(12): 253:1-253:16 (2016) - [j95]Ki Tak Kim, Jong Hwan Park, Dong Hoon Lee:
Selectively chosen ciphertext security in threshold public-key encryption. Secur. Commun. Networks 9(3): 189-200 (2016) - [j94]Jungha Paik, Kwantae Cho, Boo Geum Jung, Dong Hoon Lee:
Client cloud Web service: reducing traffic consumption. Secur. Commun. Networks 9(3): 248-261 (2016) - [j93]Samuel Woo, Hyo Jin Jo, In-Seok Kim, Dong Hoon Lee:
A Practical Security Architecture for In-Vehicle CAN-FD. IEEE Trans. Intell. Transp. Syst. 17(8): 2248-2261 (2016) - [j92]Hyo Jin Jo, In-Seok Kim, Dong Hoon Lee:
Efficient and Privacy-Preserving Metering Protocols for Smart Grid Systems. IEEE Trans. Smart Grid 7(3): 1732-1742 (2016) - [c102]Joon Young Park, Hyo Jin Jo, Samuel Woo, Dong Hoon Lee:
BadVoice: Soundless voice-control replay attack on modern smartphones. ICUFN 2016: 882-887 - [i22]Wonsuk Choi, Hyo Jin Jo, Samuel Woo, Ji Young Chun, Jooyoung Park, Dong Hoon Lee:
Identifying ECUs Using Inimitable Characteristics of Signals in Controller Area Networks. CoRR abs/1607.00497 (2016) - [i21]Seunghwan Park, Dong Hoon Lee, Kwangsu Lee:
Revocable Hierarchical Identity-Based Encryption from Multilinear Maps. CoRR abs/1610.07948 (2016) - [i20]Kwangsu Lee, Dong Hoon Lee:
Two-Input Functional Encryption for Inner Products from Bilinear Maps. IACR Cryptol. ePrint Arch. 2016: 432 (2016) - [i19]Jong Hwan Park, Kwangsu Lee, Dong Hoon Lee:
Efficient Identity-Based Encryption and Public-Key Signature from Trapdoor Subgroups. IACR Cryptol. ePrint Arch. 2016: 500 (2016) - 2015
- [j91]Chanying Huang, Hwaseong Lee, Hyoseung Kim, Dong Hoon Lee:
mvSERS: A Secure Emergency Response Solution for Mobile Healthcare in Vehicular Environments. Comput. J. 58(10): 2461-2475 (2015) - [j90]Jungha Paik, Dong Hoon Lee:
Scalable signaling protocol for Web real-time communication based on a distributed hash table. Comput. Commun. 70: 28-39 (2015) - [j89]Kwangsu Lee, Jong Hwan Park, Dong Hoon Lee:
Anonymous HIBE with short ciphertexts: full security in prime order groups. Des. Codes Cryptogr. 74(2): 395-425 (2015) - [j88]Kwangsu Lee, Dong Hoon Lee:
Adaptively secure broadcast encryption under standard assumptions with better efficiency. IET Inf. Secur. 9(3): 149-157 (2015) - [j87]Jong Hwan Park, Kwangsu Lee, Dong Hoon Lee:
New chosen-ciphertext secure identity-based encryption with tight security reduction to the bilinear Diffie-Hellman problem. Inf. Sci. 325: 256-270 (2015) - [j86]Kwangsu Lee, Dong Hoon Lee, Moti Yung:
Sequential aggregate signatures with short public keys without random oracles. Theor. Comput. Sci. 579: 100-125 (2015) - [j85]Seunghwan Park, Kwangsu Lee, Dong Hoon Lee:
New Constructions of Revocable Identity-Based Encryption From Multilinear Maps. IEEE Trans. Inf. Forensics Secur. 10(8): 1564-1577 (2015) - [j84]Samuel Woo, Hyo Jin Jo, Dong Hoon Lee:
A Practical Wireless Attack on the Connected Car and Security Protocol for In-Vehicle CAN. IEEE Trans. Intell. Transp. Syst. 16(2): 993-1006 (2015) - [c101]Song Yi Kim, Hyoseung Kim, Dong Hoon Lee:
An Efficient ID-Based Mutual Authentication Secure against Privileged-Insider Attack. ICITCS 2015: 1-4 - [c100]Young Kyung Lee, Dong Hoon Lee:
Forward Secure Non-Interactive Key Exchange from Indistinguishability Obfuscation. ICITCS 2015: 1-4 - [c99]Jong Pil Yun, Hyoseung Kim, Dong Hoon Lee:
An Improved Fuzzy Attribute-Based Authentication. ICITCS 2015: 1-5 - [c98]Hyun Sook Rhee, Dong Hoon Lee:
Keyword Updatable PEKS. WISA 2015: 96-109 - [c97]Geumsook Ryu, Kwangsu Lee, Seunghwan Park, Dong Hoon Lee:
Unbounded Hierarchical Identity-Based Encryption with Efficient Revocation. WISA 2015: 122-133 - [i18]Kwangsu Lee, Dong Hoon Lee, Moti Yung:
Sequential Aggregate Signatures with Short Public Keys without Random Oracles. CoRR abs/1502.06691 (2015) - [i17]Kwangsu Lee, Jong Hwan Park, Dong Hoon Lee:
Anonymous HIBE with Short Ciphertexts: Full Security in Prime Order Groups. CoRR abs/1502.07812 (2015) - [i16]Geumsook Ryu, Kwangsu Lee, Seunghwan Park, Dong Hoon Lee:
Unbounded Hierarchical Identity-Based Encryption with Efficient Revocation. IACR Cryptol. ePrint Arch. 2015: 827 (2015) - [i15]Kwangsu Lee, Dong Hoon Lee, Jong Hwan Park, Moti Yung:
CCA Security for Self-Updatable Encryption: Protecting Cloud Data When Clients Read/Write Ciphertexts. IACR Cryptol. ePrint Arch. 2015: 1202 (2015) - 2014
- [j83]Mi-Yeon Kim, Dong Hoon Lee:
Data-mining based SQL injection attack detection using internal query trees. Expert Syst. Appl. 41(11): 5416-5430 (2014) - [j82]Jung Yeon Hwang, Hyoung Joong Kim, Dong Hoon Lee, Boyeon Song:
An enhanced (t, n) threshold directed signature scheme. Inf. Sci. 275: 284-292 (2014) - [j81]Kwangsu Lee, Dong Hoon Lee:
Security analysis of an identity-based strongly unforgeable signature scheme. Inf. Sci. 286: 29-34 (2014) - [j80]Ae Chan Kim, Seongkon Kim, Won Hyung Park, Dong Hoon Lee:
Fraud and financial crime detection model using malware forensics. Multim. Tools Appl. 68(2): 479-496 (2014) - [j79]Eun Su Jeong, Bum Han Kim, Dong Hoon Lee:
A generic partial encryption scheme for low-power mobile devices. Multim. Tools Appl. 72(3): 2087-2106 (2014) - [j78]Eun-A Jun, Hyun Sook Rhee, Jeom Goo Kim, Seok Won Jung, Dong Hoon Lee:
Fingerprint-based access control using smart cards in IPTV. Multim. Tools Appl. 73(2): 647-661 (2014) - [j77]Kwantae Cho, Dong Hoon Lee:
Low-priced and efficient replica detection framework for wireless sensor networks. Peer-to-Peer Netw. Appl. 7(4): 743-749 (2014) - [j76]Kwantae Cho, Byung-Gil Lee, Dong Hoon Lee:
Low-Priced and Energy-Efficient Detection of Replicas for Wireless Sensor Networks. IEEE Trans. Dependable Secur. Comput. 11(5): 454-466 (2014) - [j75]Hyo Jin Jo, Jungha Paik, Dong Hoon Lee:
Efficient Privacy-Preserving Authentication in Wireless Mobile Networks. IEEE Trans. Mob. Comput. 13(7): 1469-1481 (2014) - [c96]Kwangsu Lee, Woo Kwon Koo, Dong Hoon Lee, Jong Hwan Park:
Public-Key Revocation and Tracing Schemes with Subset Difference Methods Revisited. ESORICS (2) 2014: 1-18 - [i14]Kwangsu Lee, Dong Hoon Lee:
Security Analysis of the Unrestricted Identity-Based Aggregate Signature Scheme. CoRR abs/1411.4696 (2014) - [i13]Kwangsu Lee, Dong Hoon Lee, Jong Hwan Park:
Efficient Revocable Identity-Based Encryption via Subset Difference Methods. IACR Cryptol. ePrint Arch. 2014: 132 (2014) - [i12]Kwangsu Lee, Dong Hoon Lee:
Security Analysis of an Identity-Based Strongly Unforgeable Signature Scheme. IACR Cryptol. ePrint Arch. 2014: 246 (2014) - 2013
- [j74]Jin Ho Han, Jong Hwan Park, Dong Hoon Lee:
Transmission-Efficient Broadcast Encryption Scheme with Personalized Messages. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(4): 796-806 (2013) - [j73]Kwantae Cho, Byung-Gil Lee, Kyungho Lee, Dong Hoon Lee:
Energy-efficient replica detection for resource-limited mobile devices in the internet of things. IET Commun. 7(18): 2141-2150 (2013) - [j72]Ji Young Chun, Dowon Hong, Ik Rae Jeong, Dong Hoon Lee:
Privacy-preserving disjunctive normal form operations on distributed sets. Inf. Sci. 231: 113-122 (2013) - [j71]Jong Hwan Park, Kwangsu Lee, Willy Susilo, Dong Hoon Lee:
Fully secure hidden vector encryption under standard assumptions. Inf. Sci. 232: 188-207 (2013) - [j70]Kwantae Cho, Minho Jo, Taekyoung Kwon, Hsiao-Hwa Chen, Dong Hoon Lee:
Classification and Experimental Analysis for Clone Detection Approaches in Wireless Sensor Networks. IEEE Syst. J. 7(1): 26-35 (2013) - [j69]Jong Hwan Park, Dong Hoon Lee:
Anonymous HIBE: Compact Construction Over Prime-Order Groups. IEEE Trans. Inf. Theory 59(4): 2531-2541 (2013) - [c95]Kwangsu Lee, Dong Hoon Lee, Moti Yung:
Sequential Aggregate Signatures Made Shorter. ACNS 2013: 202-217 - [c94]Kwangsu Lee, Seung Geol Choi, Dong Hoon Lee, Jong Hwan Park, Moti Yung:
Self-Updatable Encryption: Time Constrained Access Control with Hidden Attributes and Better Efficiency. ASIACRYPT (1) 2013: 235-254 - [c93]Kwangsu Lee, Dong Hoon Lee, Moti Yung:
Aggregating CL-Signatures Revisited: Extended Functionality and Better Efficiency. Financial Cryptography 2013: 171-188 - [c92]Kwangsu Lee, Dong Hoon Lee, Moti Yung:
Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies. Public Key Cryptography 2013: 423-442 - [i11]Jong Hwan Park, Dong Hoon Lee:
A New Practical Identity-Based Encryption System. IACR Cryptol. ePrint Arch. 2013: 23 (2013) - [i10]Kwangsu Lee, Woo Kwon Koo, Dong Hoon Lee, Jong Hwan Park:
Public-Key Revocation and Tracing Schemes with Subset Difference Methods. IACR Cryptol. ePrint Arch. 2013: 228 (2013) - [i9]Kwangsu Lee, Dong Hoon Lee, Moti Yung:
Sequential Aggregate Signatures Made Shorter. IACR Cryptol. ePrint Arch. 2013: 384 (2013) - [i8]Kwangsu Lee, Dong Hoon Lee:
Adaptively Secure Broadcast Encryption under Standard Assumptions with Better Efficiency. IACR Cryptol. ePrint Arch. 2013: 488 (2013) - [i7]Kwangsu Lee, Seung Geol Choi, Dong Hoon Lee, Jong Hwan Park, Moti Yung:
Self-Updatable Encryption: Time Constrained Access Control with Hidden Attributes and Better Efficiency. IACR Cryptol. ePrint Arch. 2013: 762 (2013) - [i6]Seunghwan Park, Kwangsu Lee, Dong Hoon Lee:
New Constructions of Revocable Identity-Based Encryption from Multilinear Maps. IACR Cryptol. ePrint Arch. 2013: 880 (2013) - 2012
- [j68]Kwangsu Lee, Jong Hwan Park, Dong Hoon Lee:
On the Security of Luo et al.'s Fully Secure Hierarchical Identity Based Encryption Scheme. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(9): 1631-1636 (2012) - [j67]Ji Young Chun, Dowon Hong, Dong Hoon Lee, Ik Rae Jeong:
Scalable Privacy-Preserving t-Repetition Protocol with Distributed Medical Data. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(12): 2451-2460 (2012) - [j66]Ji Young Chun, Dong Hoon Lee, Ik Rae Jeong:
Privacy-preserving range set union for rare cases in healthcare data. IET Commun. 6(18): 3288-3293 (2012) - [j65]Hyun Sook Rhee, Jong Hwan Park, Dong Hoon Lee:
Generic construction of designated tester public-key encryption with keyword search. Inf. Sci. 205: 93-109 (2012) - [j64]Hyoung Chun Kim, Young Han Choi, Dong Hoon Lee:
JsSandbox: A Framework for Analyzing the Behavior of Malicious JavaScript Code using Internal Function Hooking. KSII Trans. Internet Inf. Syst. 6(2): 766-783 (2012) - [j63]JuHee Ki, Jung Yeon Hwang, Dong Hoon Lee:
Identity-Based Ring Signature Schemes for Multiple Domains. KSII Trans. Internet Inf. Syst. 6(10): 2692-2707 (2012) - [j62]Chanying Huang, Hwaseong Lee, Dong Hoon Lee:
A Privacy-Strengthened Scheme for E-Healthcare Monitoring System. J. Medical Syst. 36(5): 2959-2971 (2012) - [j61]Hwaseong Lee, Kilho Shin, Dong Hoon Lee:
PACPs: practical access control protocols for wireless sensor networks. IEEE Trans. Consumer Electron. 58(2): 491-499 (2012) - [c91]Ki Tak Kim, Milyoung Kim, Hyoseung Kim, Jong Hwan Park, Dong Hoon Lee:
Threshold Identity-Based Broadcast Encryption from Identity-Based Encryption. FGIT-EL/DTA/UNESST 2012: 99-102 - [c90]Ae Chan Kim, Won Hyung Park, Dong Hoon Lee:
A Framework for Anomaly Pattern Recognition in Electronic Financial Transaction Using Moving Average Method. ICITCS 2012: 93-99 - [c89]Hyoseung Kim, Seunghwan Park, Jong Hwan Park, Dong Hoon Lee:
Attribute-Based Encryption for Commercial Content Distribution. ICITCS 2012: 205-213 - [e4]Dong Hoon Lee, Moti Yung:
Information Security Applications - 13th International Workshop, WISA 2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers. Lecture Notes in Computer Science 7690, Springer 2012, ISBN 978-3-642-35415-1 [contents] - [i5]Kwangsu Lee, Dong Hoon Lee, Moti Yung:
Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies. IACR Cryptol. ePrint Arch. 2012: 518 (2012) - [i4]Kwangsu Lee, Dong Hoon Lee, Moti Yung:
Aggregating CL-Signatures Revisited: Extended Functionality and Better Efficiency. IACR Cryptol. ePrint Arch. 2012: 562 (2012) - 2011
- [j60]Kyu Young Choi, Jong Hwan Park, Dong Hoon Lee:
A new provably secure certificateless short signature scheme. Comput. Math. Appl. 61(7): 1760-1768 (2011) - [j59]Kwangsu Lee, Dong Hoon Lee:
Improved hidden vector encryption with short ciphertexts and tokens. Des. Codes Cryptogr. 58(3): 297-319 (2011) - [j58]Jong Hwan Park, Dong Hoon Lee:
Fully collusion-resistant traitor tracing scheme with shorter ciphertexts. Des. Codes Cryptogr. 60(3): 255-276 (2011) - [j57]Hyun-A Park, Jae Hyun Park, Dong Hoon Lee:
PKIS: practical keyword index search on cloud datacenter. EURASIP J. Wirel. Commun. Netw. 2011: 64 (2011) - [j56]Ji Young Chun, Jung Yeon Hwang, Dong Hoon Lee:
RFID tag search protocol preserving privacy of mobile reader holders. IEICE Electron. Express 8(2): 50-56 (2011) - [j55]Kun Li, Anna Xiu, Fei He, Dong Hoon Lee:
Anonymous authentication with unlinkability for wireless environments. IEICE Electron. Express 8(8): 536-541 (2011) - [j54]Jong Hwan Park, Hyun Sook Rhee, Dong Hoon Lee:
Fully collusion-resistant trace-and-revoke scheme in prime-order groups. J. Commun. Networks 13(5): 428-441 (2011) - [j53]Hyoung Chun Kim, Young Han Choi, Dong Hoon Lee:
Efficient file fuzz testing using automated analysis of binary file format. J. Syst. Archit. 57(3): 259-268 (2011) - [j52]Jin Wook Byun, Dong Hoon Lee:
On a security model of conjunctive keyword search over encrypted relational database. J. Syst. Softw. 84(8): 1364-1372 (2011) - [c88]JuHee Ki, Jung Yeon Hwang, DaeHun Nyang, Dong Hoon Lee, Jongin Lim:
Privacy-Enhanced Deniable Authentication E-Mail Service. DEIS 2011: 16-29 - [c87]Seog Chung Seo, Jungha Paik, Dong Hoon Lee, Seokhie Hong, Hwan Jin Lee, Hyun-Chul Jung:
An Efficient Implementation of KCDSA on Graphic Processing Units. MUE 2011: 167-172 - [c86]Jungha Paik, Seog Chung Seo, Yungyu Kim, Hwan Jin Lee, Hyun-Chul Jung, Dong Hoon Lee:
An Efficient Implementation of Block Cipher in Android Platform. MUE 2011: 173-176 - [c85]Kwantae Cho, Dong Hoon Lee:
Biometric Based Secure Communications without Pre-deployed Key for Biosensor Implanted in Body Sensor Networks. WISA 2011: 203-218 - [e3]Dong Hoon Lee, Xiaoyun Wang:
Advances in Cryptology - ASIACRYPT 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings. Lecture Notes in Computer Science 7073, Springer 2011, ISBN 978-3-642-25384-3 [contents] - 2010
- [j51]Ji-Seon Lee, Jik Hyun Chang, Dong Hoon Lee:
Forgery attacks on Kang et al.'s identity-based strong designated verifier signature scheme and its improvement with security proof. Comput. Electr. Eng. 36(5): 948-954 (2010) - [j50]Jong Hwan Park, Dong Hoon Lee:
Analysis of Hu-Huang-Fan Practical Hierarchical Identity-Based Encryption Scheme. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(6): 1269-1273 (2010) - [j49]Jong Hwan Park, Dong Hoon Lee:
A Hidden Vector Encryption Scheme with Constant-Size Tokens and Pairing Computations. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(9): 1620-1631 (2010) - [j48]Kwangsu Lee, Dong Hoon Lee:
New Techniques for Anonymous HIBE with Short Ciphertexts in Prime Order Groups. KSII Trans. Internet Inf. Syst. 4(5): 968-988 (2010) - [j47]Hyun Sook Rhee, Jong Hwan Park, Willy Susilo, Dong Hoon Lee:
Trapdoor security in a searchable public-key encryption scheme with a designated tester. J. Syst. Softw. 83(5): 763-771 (2010) - [j46]Hyun-A Park, Jong-Wook Hong, Jae Hyun Park, Justin Zhan, Dong Hoon Lee:
Combined Authentication-Based Multilevel Access Control in Mobile Application for DailyLifeService. IEEE Trans. Mob. Comput. 9(6): 824-837 (2010) - [e2]Dong Hoon Lee, Seokhie Hong:
Information, Security and Cryptology - ICISC 2009, 12th International Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers. Lecture Notes in Computer Science 5984, Springer 2010, ISBN 978-3-642-14422-6 [contents]
2000 – 2009
- 2009
- [j45]Ik Rae Jeong, Jeong Ok Kwon, Dowon Hong, Dong Hoon Lee:
Constructing PEKS schemes secure against keyword guessing attacks is possible? Comput. Commun. 32(2): 394-396 (2009) - [j44]Hyun Sook Rhee, Jeong Ok Kwon, Dong Hoon Lee:
A remote user authentication scheme without using smart cards. Comput. Stand. Interfaces 31(1): 6-13 (2009) - [j43]Eun Young Choi, Dong Hoon Lee, Jong In Lim:
Anti-cloning protocol suitable to EPCglobal Class-1 Generation-2 RFID systems. Comput. Stand. Interfaces 31(6): 1124-1130 (2009) - [j42]Ji-Seon Lee, Jik Hyun Chang, Dong Hoon Lee:
Security flaw of authentication scheme with anonymity for wireless communications. IEEE Commun. Lett. 13(5): 292-293 (2009) - [j41]Ik Rae Jeong, Jeong Ok Kwon, Dong Hoon Lee:
Efficient secret broadcast in the broadcasting networks. IEEE Commun. Lett. 13(12): 1001-1003 (2009) - [j40]Ik Rae Jeong, Jeong Ok Kwon, Dong Hoon Lee:
Analysis of Revocable-iff-Linked Ring Signature Scheme. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(1): 322-325 (2009) - [j39]Jong Hwan Park, Dong Hoon Lee:
Security Analysis of a Multi-Receiver Identity-Based Key Encapsulation Mechanism. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(1): 329-331 (2009) - [j38]Ik Rae Jeong, Jeong Ok Kwon, Dong Hoon Lee:
Collusion Attacks to Tanaka's Corrected ID-Based Non-interactive Key Sharing Scheme. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(3): 932-934 (2009) - [j37]Ik Rae Jeong, Jeong Ok Kwon, Dowon Hong, Dong Hoon Lee:
Searchable Encryption with Keyword-Recoverability. IEICE Trans. Inf. Syst. 92-D(5): 1200-1203 (2009) - [j36]Ik Rae Jeong, Jeong Ok Kwon, Dong Hoon Lee:
Stronger Chikazawa-Yamagishi ID-Based Key Distribution. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(5): 1379-1382 (2009) - [j35]Jong Hwan Park, Dong Hoon Lee:
Cryptanalysis of Chatterjee-Sarkar Hierarchical Identity-Based Encryption Scheme at PKC 06. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(7): 1724-1726 (2009) - [j34]Seung Geol Choi, Javier Herranz, Dennis Hofheinz, Jung Yeon Hwang, Eike Kiltz, Dong Hoon Lee, Moti Yung:
The Kurosawa-Desmedt key encapsulation is not chosen-ciphertext secure. Inf. Process. Lett. 109(16): 897-901 (2009) - [j33]Woo Kwon Koo, Jung Yeon Hwang, Dong Hoon Lee:
Security vulnerability in a non-interactive ID-based proxy re-encryption scheme. Inf. Process. Lett. 109(23-24): 1260-1262 (2009) - [j32]Jeong Ok Kwon, Ik Rae Jeong, Dong Hoon Lee:
A forward-secure e-mail protocol without certificated public keys. Inf. Sci. 179(24): 4227-4231 (2009) - [j31]Jeong Ok Kwon, Ik Rae Jeong, Dong Hoon Lee:
Light-Weight Key Exchange with Different Passwords in the Standard Model. J. Univers. Comput. Sci. 15(5): 1042-1064 (2009) - [j30]Jung Yeon Hwang, Ji Young Chun, Dong Hoon Lee:
A note on leakage-resilient authenticated key exchange. IEEE Trans. Wirel. Commun. 8(5): 2274-2279 (2009) - [j29]Jung Yeon Hwang, Ji Young Chun, Dong Hoon Lee:
Weaknesses in the Hur-Shin-Yoon decentralized group key management. Wirel. Commun. Mob. Comput. 9(12): 1565-1571 (2009) - [c84]Ji Young Chun, Yong Ho Kim, Jung Yeon Hwang, Dong Hoon Lee:
Security Enhancing Compiler for Localization Schemes in Pervasive Sensor Networks. ACIS-ICIS 2009: 307-312 - [c83]Jung Yeon Hwang, Dong Hoon Lee, Moti Yung:
Universal forgery of the identity-based sequential aggregate signature scheme. AsiaCCS 2009: 157-160 - [c82]Hyun Sook Rhee, Jong Hwan Park, Willy Susilo, Dong Hoon Lee:
Improved searchable public key encryption with designated tester. AsiaCCS 2009: 376-379 - [c81]Hyung-Soo Park, Hyung-Woo Lee, Seong-Jin Park, Dong Hoon Lee:
Developing a Multi-Protocol Mobility Manager for SIP/SS7 Networks. CISIS 2009: 565-570 - 2008
- [j28]Hyung-Soo Park, Hyung-Woo Lee, Dong Hoon Lee, Hong-Ki Ko:
Multi-protocol authentication for SIP/SS7 mobile network. Comput. Commun. 31(11): 2755-2763 (2008) - [j27]Jung Yeon Hwang, Kyu Young Choi, Dong Hoon Lee:
Security weakness in an authenticated group key agreement protocol in two rounds. Comput. Commun. 31(15): 3719-3724 (2008) - [j26]Yong Ho Kim, Dong Hoon Lee:
An authentication scheme for filtering injected bogus data in sensor networks. Comput. Commun. 31(17): 3929-3932 (2008) - [j25]Seung-Hyun Seo, Jung Yeon Hwang, Kyu Young Choi, Dong Hoon Lee:
Identity-based universal designated multi-verifiers signature schemes. Comput. Stand. Interfaces 30(5): 288-295 (2008) - [j24]Ik Rae Jeong, Jeong Ok Kwon, Dong Hoon Lee:
Strong ID-Based Key Distribution. IEICE Trans. Commun. 91-B(1): 306-308 (2008) - [j23]Kyu Young Choi, Jung Yeon Hwang, Dong Hoon Lee:
ID-Based Authenticated Group Key Agreement Secure against Insider Attacks. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(7): 1828-1830 (2008) - [j22]Jung Yeon Hwang, Jongin Lim, Dong Hoon Lee:
Impersonation Attack on a Strong ID-Based Key Distribution. IEICE Trans. Commun. 91-B(8): 2702-2703 (2008) - [j21]Jeong Ok Kwon, Ik Rae Jeong, Dong Hoon Lee:
Practical Password-Authenticated Three-Party Key Exchange. KSII Trans. Internet Inf. Syst. 2(6): 312-332 (2008) - [j20]Ik Rae Jeong, Dong Hoon Lee:
Parallel Key Exchange. J. Univers. Comput. Sci. 14(3): 377-396 (2008) - [j19]Jong Hwan Park, Hee Jean Kim, H.-M. Sung, Dong Hoon Lee:
Public Key Broadcast Encryption Schemes With Shorter Transmissions. IEEE Trans. Broadcast. 54(3): 401-411 (2008) - [j18]Ik Rae Jeong, Jeong Ok Kwon, Dong Hoon Lee:
Ring Signature with Weak Linkability and Its Applications. IEEE Trans. Knowl. Data Eng. 20(8): 1145-1148 (2008) - [c80]Jong Hwan Park, Ki Tak Kim, Dong Hoon Lee:
Cryptanalysis and improvement of a multi-receiver identity-based key encapsulation at INDOCRYPT 06. AsiaCCS 2008: 373-380 - [c79]Tae Youn Won, Ji Young Chun, Dong Hoon Lee:
Strong Authentication Protocol for Secure RFID Tag Search without Help of Central Database. EUC (2) 2008: 153-158 - [c78]Hyuncheol Kim, Jungha Paik, Bumhan Lee, Dong Hoon Lee:
SARC: A Street-Based Anonymous Vehicular Ad Hoc Routing Protocol for City Environment. EUC (2) 2008: 324-329 - [c77]Hyun-A Park, Dong Hoon Lee, Justin Zhan:
Attribute-based Access Control using Combined Authentication Technologies. GrC 2008: 518-523 - [c76]Yong Ho Kim, Kyu Young Choi, Jongin Lim, Dong Hoon Lee:
An Efficient Key Establishment Scheme for Self-organizing Sensor Networks. ICDCN 2008: 345-349 - [c75]Kwangsu Lee, Jung Yeon Hwang, Dong Hoon Lee:
Non-interactive Identity-Based DNF Signature Scheme and Its Extensions. ICISC 2008: 166-183 - [c74]Seil Kim, Ji Young Chun, Dong Hoon Lee:
Cryptanalysis of Two Improved Remote User Authentication Schemes Preserving User Anonymity. ICYCS 2008: 2235-2239 - [c73]Hyun-A Park, Dong Hoon Lee, Justin Zhan, Gary Blosser:
Efficient keyword index search over encrypted documents of groups. ISI 2008: 225-229 - [c72]Hyun-A Park, Justin Zhan, Dong Hoon Lee:
Privacy-Aware Access Control through Negotiation in Daily Life Service. ISI Workshops 2008: 514-519 - [c71]Jong Hwan Park, Dong Hoon Lee:
A New Public Key Broadcast Encryption Using Boneh-Boyen-Goh's HIBE Scheme. ISPEC 2008: 101-115 - [c70]Yong Ho Kim, Hwaseong Lee, Dong Hoon Lee:
A Key Distribution Scheme for Wireless Sensor Networks. PerCom 2008: 572-577 - 2007
- [j17]Ik Rae Jeong, Dong Hoon Lee:
Key agreement for key hypergraph. Comput. Secur. 26(7-8): 452-458 (2007) - [j16]Jeong Ok Kwon, Ik Rae Jeong, Kouichi Sakurai, Dong Hoon Lee:
Efficient verifier-based password-authenticated key exchange in the three-party setting. Comput. Stand. Interfaces 29(5): 513-520 (2007) - [j15]Ik Rae Jeong, Jeong Ok Kwon, Dong Hoon Lee:
Strong Diffie-Hellman-DSA Key Exchange. IEEE Commun. Lett. 11(5): 432-433 (2007) - [j14]Ik Rae Jeong, Jeong Ok Kwon, Dong Hoon Lee:
On the Strong Forward Secrecy of the Improved Chikazawa-Yamagishi ID-Based Key Sharing. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 90-A(11): 2626-2628 (2007) - [j13]Jeong Ok Kwon, Ik Rae Jeong, Dong Hoon Lee:
Three-Round Smart Card-Based Key Exchange Scheme. IEICE Trans. Commun. 90-B(11): 3255-3258 (2007) - [j12]Jin Wook Byun, Dong Hoon Lee, Jong In Lim:
EC2C-PAKA: An efficient client-to-client password-authenticated key agreement. Inf. Sci. 177(19): 3995-4013 (2007) - [c69]Kyu Young Choi, Jong Hwan Park, Jung Yeon Hwang, Dong Hoon Lee:
Efficient Certificateless Signature Schemes. ACNS 2007: 443-458 - [c68]Jong Hyuk Park, Sangjin Lee, Dong Hoon Lee, Jongin Lim, In-Hwa Hong, Laurence Tianruo Yang:
Design and Implementation of the UsMSS : User-centric secure Multimedia Service System in Intelligent Home. AINA 2007: 311-316 - [c67]Mi-Yeon Kim, Misook Lim, Jin-Soo Sohn, Dong Hoon Lee:
Security and Handover Designs for VoWLAN System. APNOMS 2007: 447-456 - [c66]Hwaseong Lee, Yong Ho Kim, Dong Hoon Lee, Jongin Lim:
Classification of Key Management Schemes for Wireless Sensor Networks. APWeb/WAIM Workshops 2007: 664-673 - [c65]Yong Ho Kim, Hwaseong Lee, Jong Hyuk Park, Laurence Tianruo Yang, Dong Hoon Lee:
Key Establishment Scheme for Sensor Networks with Low Communication Cost. ATC 2007: 441-448 - [c64]Moon Jeong Kim, Dong Hoon Lee, Young Ik Eom:
A Transformation Scheme for Interconnection Networks. Communications in Computing 2007: 36-42 - [c63]Jong Hwan Park, Dong Hoon Lee:
Direct Chosen-Ciphertext Secure Hierarchical ID-Based Encryption Schemes. EuroPKI 2007: 94-109 - [c62]Hyun-A Park, Bum Han Kim, Dong Hoon Lee, Yon Dohn Chung, Justin Zhan:
Secure Similarity Search. GrC 2007: 598- - [c61]Joon Wan Kim, Yong Ho Kim, Hwaseong Lee, Dong Hoon Lee:
A Practical Inter-sensor Broadcast Authentication Scheme. HCI (5) 2007: 399-405 - [c60]Moon Jeong Kim, Dong Hoon Lee, Young Ik Eom:
Enhanced Non-disjoint Multi-path Source Routing Protocol for Wireless Ad-Hoc Networks. ICCSA (3) 2007: 1187-1196 - [c59]Jong Hwan Park, Kyu Young Choi, Jung Yeon Hwang, Dong Hoon Lee:
Certificateless Public Key Encryption in the Selective-ID Security Model (Without Random Oracles). Pairing 2007: 60-82 - [c58]Hyungwoo Kang, Dong Hoon Lee:
Security Assessment for Application Network Services Using Fault Injection. PAISI 2007: 172-183 - [c57]Hyun-A Park, Dong Hoon Lee, Jongin Lim, Sang Hyun Cho:
PPIDS: Privacy Preserving Intrusion Detection System. PAISI 2007: 269-274 - [c56]Yong Ho Kim, Jong Hwan Park, Dong Hoon Lee, Jongin Lim:
Bogus Data Filtering in Sensor Networks. PAKDD Workshops 2007: 629-635 - [c55]Ji Young Chun, Yong Ho Kim, Jongin Lim, Dong Hoon Lee:
Location-aware Random Pair-wise Keys Scheme for Wireless Sensor Networks. SECPerU 2007: 31-36 - [c54]Il-Jung Kim, Eun Young Choi, Dong Hoon Lee:
Secure Mobile RFID system against privacy and security problems. SECPerU 2007: 67-72 - [c53]Hwaseong Lee, Eun Young Choi, Su-Mi Lee, Dong Hoon Lee:
Trapdoor-based Mutual Authentication Scheme without Cryptographic Primitives in RFID Tags. SECPerU 2007: 73-78 - [c52]Yong Ho Kim, Hwaseong Lee, Dong Hoon Lee:
A secure and efficient key management scheme for wireless sensor networks. SecureComm 2007: 162-167 - [c51]Su-Mi Lee, Su Youn Lee, Dong Hoon Lee:
Efficient Group Key Agreement for Dynamic TETRA Networks. SOFSEM (1) 2007: 400-409 - [c50]Eun Young Choi, Su-Mi Lee, Dong Hoon Lee:
Self-updating: Strong Privacy Protection Protocol for RFID-Tagged Banknotes. UIC 2007: 1171-1180 - [i3]Hyun-A Park, Bum Han Kim, Dong Hoon Lee, Yon Dohn Chung, Justin Zhan:
Secure Similarity Search. IACR Cryptol. ePrint Arch. 2007: 312 (2007) - 2006
- [j11]Bum Han Kim, Jae Hyung Koo, Dong Hoon Lee:
Robust E-mail protocols with perfect forward secrecy. IEEE Commun. Lett. 10(6): 510-512 (2006) - [j10]Su-Mi Lee, Dong Hoon Lee:
Analysis of an efficient group key agreement protocol. IEEE Commun. Lett. 10(8): 638-639 (2006) - [j9]Jin Wook Byun, Dong Hoon Lee, Jong In Lim:
Security analysis and improvement of a gateway-oriented password-based authenticated key exchange protocol. IEEE Commun. Lett. 10(9): 683-685 (2006) - [c49]Hak Soo Ju, Dae Youb Kim, Dong Hoon Lee, Haeryong Park, Kilsoo Chun:
Modified ID-Based Threshold Decryption and Its Application to Mediated ID-Based Encryption. APWeb 2006: 720-725 - [c48]Jin Wook Byun, Dong Hoon Lee, Jongin Lim:
Efficient and Provably Secure Client-to-Client Password-Based Key Exchange Protocol. APWeb 2006: 830-836 - [c47]Ik Rae Jeong, Jeong Ok Kwon, Dong Hoon Lee:
A Diffie-Hellman Key Exchange Protocol Without Random Oracles. CANS 2006: 37-54 - [c46]Jeong Ok Kwon, Kouichi Sakurai, Dong Hoon Lee:
One-Round Protocol for Two-Party Verifier-Based Password-Authenticated Key Exchange. Communications and Multimedia Security 2006: 87-96 - [c45]Jin Wook Byun, Dong Hoon Lee, Jongin Lim:
Efficient Conjunctive Keyword Search on Encrypted Data Storage System. EuroPKI 2006: 184-196 - [c44]Jeong Ok Kwon, Kouichi Sakurai, Dong Hoon Lee:
Efficient Password-Authenticated Key Exchange for Three-Party Secure Against Undetectable On-Line Dictionary Attacks. International Conference on Computational Science (1) 2006: 977-980 - [c43]Jeong Su Park, Su-Mi Lee, Eun Young Choi, Dong Hoon Lee:
Self Re-encryption Protocol Providing Strong Privacy for Low Cost RFID System. ICCSA (4) 2006: 316-325 - [c42]Hyungwoo Kang, Kibom Kim, Soon Jwa Hong, Dong Hoon Lee:
A Model for Security Vulnerability Pattern. ICCSA (3) 2006: 385-394 - [c41]Yong Ho Kim, Hwaseong Lee, Dong Hoon Lee, Jongin Lim:
A Key Management Scheme for Large Scale Distributed Sensor Networks. PWC 2006: 437-446 - [c40]Jeong Ok Kwon, Ik Rae Jeong, Dong Hoon Lee:
Provably-Secure Two-Round Password-Authenticated Group Key Exchange in the Standard Model. IWSEC 2006: 322-336 - [c39]Kyoung Hyun Kim, Eun Young Choi, Su-Mi Lee, Dong Hoon Lee:
Secure EPCglobal Class-1 Gen-2 RFID System Against Security and Privacy Problems. OTM Workshops (1) 2006: 362-371 - [c38]Bo Man Kim, Kyu Young Choi, Dong Hoon Lee:
Disaster Coverable PKI Model Utilizing the Existing PKI Structure. OTM Workshops (1) 2006: 537-545 - [c37]Hyun Sook Rhee, Ik Rae Jeong, Jin Wook Byun, Dong Hoon Lee:
Difference Set Attacks on Conjunctive Keyword Search Schemes. Secure Data Management 2006: 64-74 - [c36]Jin Wook Byun, Hyun Suk Rhee, Hyun-A Park, Dong Hoon Lee:
Off-Line Keyword Guessing Attacks on Recent Keyword Search Schemes over Encrypted Data. Secure Data Management 2006: 75-83 - [c35]Jin Wook Byun, Su-Mi Lee, Dong Hoon Lee, Dowon Hong:
Constant-Round Password-Based Group Key Generation for Multi-layer Ad-Hoc Networks. SPC 2006: 3-17 - [i2]Jeong Ok Kwon, Ik Rae Jeong, Kouichi Sakurai, Dong Hoon Lee:
Password-Authenticated Multi-Party Key Exchange with Different Passwords. IACR Cryptol. ePrint Arch. 2006: 476 (2006) - 2005
- [j8]Jeong Ok Kwon, Jung Yeon Hwang, Changwook Kim, Dong Hoon Lee:
Cryptanalysis of Lee-Kim-Yoo password-based key agreement scheme. Appl. Math. Comput. 168(2): 858-865 (2005) - [c34]Kyu Young Choi, Jung Yeon Hwang, Dong Hoon Lee, In Seog Seo:
ID-based Authenticated Key Agreement for Low-Power Mobile Devices. ACISP 2005: 494-505 - [c33]Jin Wook Byun, Dong Hoon Lee:
N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords. ACNS 2005: 75-90 - [c32]Yong Ho Kim, Mu Hyun Kim, Dong Hoon Lee, Changwook Kim:
A Key Management Scheme for Commodity Sensor Networks. ADHOC-NOW 2005: 113-126 - [c31]Jin Wook Byun, Dong Hoon Lee, Jongin Lim:
Password-Based Group Key Exchange Secure Against Insider Guessing Attacks. CIS (2) 2005: 143-148 - [c30]Jung Yeon Hwang, Dong Hoon Lee, Jongin Lim:
Generic Transformation for Scalable Broadcast Encryption Schemes. CRYPTO 2005: 276-292 - [c29]Jae Hyung Koo, Bum Han Kim, Dong Hoon Lee:
Authenticated Public Key Distribution Scheme Without Trusted Third Party. EUC Workshops 2005: 926-935 - [c28]Eun Young Choi, Su-Mi Lee, Dong Hoon Lee:
Efficient RFID Authentication Protocol for Ubiquitous Computing Environment. EUC Workshops 2005: 945-954 - [c27]Nam-Su Jho, Jung Yeon Hwang, Jung Hee Cheon, Myung-Hwan Kim, Dong Hoon Lee, Eun Sun Yoo:
One-Way Chain Based Broadcast Encryption Schemes. EUROCRYPT 2005: 559-574 - [c26]Hak Soo Ju, Dae Youb Kim, Dong Hoon Lee, Jongin Lim, Kilsoo Chun:
Fine Grained Control of Security Capability and Forward Security in a Pairing Based Signature Scheme. ICCSA (2) 2005: 381-390 - [c25]Su-Mi Lee, Young Ju Hwang, Dong Hoon Lee, Jong In Lim:
Efficient Authentication for Low-Cost RFID Systems. ICCSA (1) 2005: 619-627 - [c24]GangShin Lee, Heeran Lim, Manpyo Hong, Dong Hoon Lee:
A Dynamic Path Identification Mechanism to Defend Against DDoS Attacks. ICOIN 2005: 806-813 - [c23]Hak Soo Ju, Dae Youb Kim, Dong Hoon Lee, Jongin Lim, Kilsoo Chun:
Efficient Revocation of Security Capability in Certificateless Public Key Cryptography. KES (2) 2005: 453-459 - [c22]Jae Hyung Koo, Dong Hoon Lee:
Secure Password Pocket for Distributed Web Services. NPC 2005: 327-334 - [c21]Hyun-A Park, Jin Wook Byun, Dong Hoon Lee:
Secure Index Search for Groups. TrustBus 2005: 128-140 - [c20]Eun Young Choi, Hyun-Jeong Kim, Dong Hoon Lee:
Efficient Member Revocation in Group Signature Schemes. TrustBus 2005: 195-205 - [c19]Hyun Sook Rhee, Jin Wook Byun, Dong Hoon Lee, Jongin Lim:
Oblivious Conjunctive Keyword Search. WISA 2005: 318-327 - [i1]Jin Wook Byun, Dong Hoon Lee:
Comments on Weaknesses in Two Group Diffie-Hellman Key Exchange Protocols. IACR Cryptol. ePrint Arch. 2005: 209 (2005) - 2004
- [c18]Ik Rae Jeong, Jonathan Katz, Dong Hoon Lee:
One-Round Protocols for Two-Party Authenticated Key Exchange. ACNS 2004: 220-232 - [c17]Hyun-Jeong Kim, Su-Mi Lee, Dong Hoon Lee:
Constant-Round Authenticated Group Key Exchange for Dynamic Groups. ASIACRYPT 2004: 245-259 - [c16]GangShin Lee, Chaetae Im, TaeJin Lee, HyungJong Kim, Dong Hoon Lee:
SITIS: Scalable Intrusion Tolerance Middleware for Internet Service Survivability. PCM (1) 2004: 564-571 - [c15]Hyungwoo Kang, Soon Jwa Hong, Dong Hoon Lee:
Matching Connection Pairs. PDCAT 2004: 642-649 - [c14]Kyu Young Choi, Jung Yeon Hwang, Dong Hoon Lee:
Efficient ID-based Group Key Agreement with Bilinear Maps. Public Key Cryptography 2004: 130-144 - [c13]Su-Mi Lee, Jung Yeon Hwang, Dong Hoon Lee:
Efficient Password-Based Group Key Exchange. TrustBus 2004: 191-199 - [e1]Jong In Lim, Dong Hoon Lee:
Information Security and Cryptology - ICISC 2003, 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers. Lecture Notes in Computer Science 2971, Springer 2004, ISBN 3-540-21376-7 [contents] - 2003
- [c12]Jung Yeon Hwang, Hyun-Jeong Kim, Dong Hoon Lee, Jong In Lim:
Digital Signature Schemes with Restriction on Signing Capability. ACISP 2003: 324-335 - [c11]Eun Young Choi, Jung Yeon Hwang, Dong Hoon Lee:
An Anonymous Asymmetric Public Key Traitor Tracing Scheme. EC-Web 2003: 104-114 - [c10]Taeshik Shon, Jongsub Moon, Sangjin Lee, Dong Hoon Lee, Jongin Lim:
Covert Channel Detection in the ICMP Payload Using Support Vector Machine. ISCIS 2003: 828-835 - 2002
- [j7]Sung A. Cho, Chae-Bogk Kim, Dong Hoon Lee:
Single machine MAD/Tmax problem with a common due date. Comput. Oper. Res. 29(8): 1099-1113 (2002) - [c9]Dong-Guk Han, Hye-Young Park, Young-Ho Park, Sangjin Lee, Dong Hoon Lee, Hyungjin Yang:
A Practical Approach Defeating Blackmailing. ACISP 2002: 464-481 - [c8]Hyun-Jeong Kim, Dong Hoon Lee, Moti Yung:
Privacy against Piracy: Protecting Two-Level Revocable P-K Traitor Tracing. ACISP 2002: 482-496 - [c7]Jin Wook Byun, Ik Rae Jeong, Dong Hoon Lee, Chang-Seop Park:
Password-Authenticated Key Exchange between Clients with Different Passwords. ICICS 2002: 134-146 - [c6]Ik Rae Jeong, Hee Yun Jeong, Hyun Sook Rhee, Dong Hoon Lee, Jong In Lim:
Provably Secure Encrypt-then-Sign Composition in Hybrid Signcryption. ICISC 2002: 16-34 - [c5]Hak Soo Ju, Hyun-Jeong Kim, Dong Hoon Lee, Jong In Lim:
An Anonymous Buyer-Seller Watermarking Protocol with Anonymity Control. ICISC 2002: 421-432 - [c4]JuHee Ki, Hyun-Jeong Kim, Dong Hoon Lee, Chang-Seop Park:
Efficient Multicast Key Management for Stateless Receivers. ICISC 2002: 497-509 - 2001
- [j6]Jong Hwa Seo, Chae-Bogk Kim, Dong Hoon Lee:
Minimizing mean squared deviation of completion times with maximum tardiness constraint. Eur. J. Oper. Res. 129(1): 95-104 (2001) - [j5]Chang-Seop Park, Dong Hoon Lee:
Secure and Efficient Key Management for Dynamic Multicast Groups. ACM SIGOPS Oper. Syst. Rev. 35(4): 32-38 (2001) - [c3]Ik Rae Jeong, Dong Hoon Lee, Jong In Lim:
Efficient Transferable Cash with Group Signatures. ISC 2001: 462-474 - 2000
- [c2]Hyun-Jeong Kim, Jong In Lim, Dong Hoon Lee:
Efficient and Secure Member Deletion in Group Signature Schemes. ICISC 2000: 150-161 - [c1]Ik Rae Jeong, Dong Hoon Lee:
Anonymity Control in Multi-bank E-Cash System. INDOCRYPT 2000: 104-116
1990 – 1999
- 1999
- [j4]Chae-Bogk Kim, P. Simin Pulat, Bobbie L. Foote, Dong Hoon Lee:
Least cost tolerance allocation and bicriteria extension. Int. J. Comput. Integr. Manuf. 12(5): 418-426 (1999) - 1997
- [j3]Dong Hoon Lee, Daihee Park:
An efficient algorithm for fuzzy weighted average. Fuzzy Sets Syst. 87(1): 39-45 (1997) - 1995
- [j2]Changwook Kim, Dong Hoon Lee:
Node Replacement Graph Languages Squeezed with Chains, Trees, and Forests. Inf. Comput. 117(1): 63-77 (1995) - 1993
- [j1]Changwook Kim, Dong Hoon Lee:
Separating k-Separated eNCE Graph Languages. Theor. Comput. Sci. 120(2): 247-259 (1993)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-28 20:29 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint