What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Dong Hoon Lee
Google Scholar
53
publications in security and cryptology related venues
Year
Venue
Title
2024
journals/compsec
CatchFuzz: Reliable active anti-fuzzing techniques against coverage-guided fuzzer.
Hee Yeon Kim
Dong Hoon Lee
2024
conf/wisa
ChatDEOB: An Effective Deobfuscation Method Based on Large Language Model.
Byunggeon Choi
Hongjoo Jin
Dong Hoon Lee
Wonsuk Choi
2024
conf/acsac
Leveraging Intensity as a New Feature to Detect Physical Adversarial Attacks Against LiDARs.
Yeji Park
Hyunsu Cho
Dong Hoon Lee
Wonsuk Choi
2023
journals/compsec
The vibration knows who you are! A further analysis on usable authentication for smartwatch users.
Sunwoo Lee
Wonsuk Choi
Dong Hoon Lee
2023
journals/compsec
Flooding attack mitigator for in-vehicle CAN using fault confinement in CAN protocol.
Sung Bum Park
Hyo Jin Jo
Dong Hoon Lee
2023
journals/compsec
IoT security: On-chip secure deletion scheme using ECC modulation in IoT appliances.
Na-Young Ahn
Dong Hoon Lee
2023
conf/ccs
Poster: Unveiling the Impact of Patch Placement: Adversarial Patch Attacks on Monocular Depth Estimation.
Gyungeun Yun
Kyungho Joo
Wonsuk Choi
Dong Hoon Lee
2023
conf/ccs
Protecting HRP UWB Ranging System Against Distance Reduction Attacks.
Kyungho Joo
Dong Hoon Lee
Yeonseon Jeong
Wonsuk Choi
2023
conf/uss
RIDAS: Real-time identification of attack sources on controller area networks.
Jiwoo Shin
Hyunghoon Kim
Seyoung Lee
Wonsuk Choi
Dong Hoon Lee
Hyo Jin Jo
2022
conf/wisa
Recovering Yaw Rate from Signal Injection Attack to Protect RV's Direction.
Hyunsu Cho
Sunwoo Lee
Wonsuk Choi
Dong Hoon Lee
2021
conf/ccs
Usable User Authentication on a Smartwatch using Vibration.
Sunwoo Lee
Wonsuk Choi
Dong Hoon Lee
2021
conf/wisa
Anonymous IBE from PEKS: A Generic Construction.
Hyun Sook Rhee
Dong Hoon Lee
2020
journals/compsec
IBV-CFI: Efficient fine-grained control-flow integrity preserving CFG precision.
Hyerean Jang
Moon Chan Park
Dong Hoon Lee
2020
conf/ndss
Hold the Door! Fingerprinting Your Car Key to Prevent Keyless Entry Car Theft.
Kyungho Joo
Wonsuk Choi
Dong Hoon Lee
2019
conf/ccs
How to Securely Record Logs based on ARM TrustZone.
Seungho Lee
Wonsuk Choi
Hyo Jin Jo
Dong Hoon Lee
2018
journals/tches
FACE: Fast AES CTR mode Encryption Techniques based on the Reuse of Repetitive Data.
Jin Hyung Park
Dong Hoon Lee
2018
journals/tifs
VoltageIDS: Low-Level Communication Characteristics for Automotive Intrusion Detection System.
Wonsuk Choi
Kyungho Joo
Hyo Jin Jo
Moon Chan Park
Dong Hoon Lee
2018
conf/wisa
VODKA: Virtualization Obfuscation Using Dynamic Key Approach.
Jae-Yung Lee
Jae Hyuk Suk
Dong Hoon Lee
2017
conf/icisc
Recipient Revocable Broadcast Encryption with Dealership.
Joon Sik Kim
Young Kyung Lee
Jieun Eom
Dong Hoon Lee
2017
conf/wisa
WheelLogger: Driver Tracing Using Smart Watch.
Joon Young Park
Jong Pil Yun
Dong Hoon Lee
2015
journals/tifs
New Constructions of Revocable Identity-Based Encryption From Multilinear Maps.
Seunghwan Park
Kwangsu Lee
Dong Hoon Lee
2015
conf/wisa
Keyword Updatable PEKS.
Hyun Sook Rhee
Dong Hoon Lee
2015
conf/wisa
Unbounded Hierarchical Identity-Based Encryption with Efficient Revocation.
Geumsook Ryu
Kwangsu Lee
Seunghwan Park
Dong Hoon Lee
2014
conf/esorics
Public-Key Revocation and Tracing Schemes with Subset Difference Methods Revisited.
Kwangsu Lee
Woo Kwon Koo
Dong Hoon Lee
Jong Hwan Park
2013
conf/fc
Aggregating CL-Signatures Revisited: Extended Functionality and Better Efficiency.
Kwangsu Lee
Dong Hoon Lee
Moti Yung
2013
conf/acns
Sequential Aggregate Signatures Made Shorter.
Kwangsu Lee
Dong Hoon Lee
Moti Yung
2013
conf/pkc
Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies.
Kwangsu Lee
Dong Hoon Lee
Moti Yung
2013
conf/asiacrypt
Self-Updatable Encryption: Time Constrained Access Control with Hidden Attributes and Better Efficiency.
Kwangsu Lee
Seung Geol Choi
Dong Hoon Lee
Jong Hwan Park
Moti Yung
2011
conf/wisa
Biometric Based Secure Communications without Pre-deployed Key for Biosensor Implanted in Body Sensor Networks.
Kwantae Cho
Dong Hoon Lee
2009
conf/ccs
Universal forgery of the identity-based sequential aggregate signature scheme.
Jung Yeon Hwang
Dong Hoon Lee
Moti Yung
2009
conf/ccs
Improved searchable public key encryption with designated tester.
Hyun Sook Rhee
Jong Hwan Park
Willy Susilo
Dong Hoon Lee
2008
conf/ccs
Cryptanalysis and improvement of a multi-receiver identity-based key encapsulation at INDOCRYPT 06.
Jong Hwan Park
Ki Tak Kim
Dong Hoon Lee
2008
conf/icisc
Non-interactive Identity-Based DNF Signature Scheme and Its Extensions.
Kwangsu Lee
Jung Yeon Hwang
Dong Hoon Lee
2007
journals/compsec
Key agreement for key hypergraph.
Ik Rae Jeong
Dong Hoon Lee
2007
conf/acns
Efficient Certificateless Signature Schemes.
Kyu Young Choi
Jong Hwan Park
Jung Yeon Hwang
Dong Hoon Lee
2006
conf/iwsec
Provably-Secure Two-Round Password-Authenticated Group Key Exchange in the Standard Model.
Jeong Ok Kwon
Ik Rae Jeong
Dong Hoon Lee
2006
conf/cans
A Diffie-Hellman Key Exchange Protocol Without Random Oracles.
Ik Rae Jeong
Jeong Ok Kwon
Dong Hoon Lee
2005
conf/acisp
ID-based Authenticated Key Agreement for Low-Power Mobile Devices.
Kyu Young Choi
Jung Yeon Hwang
Dong Hoon Lee
In Seog Seo
2005
conf/crypto
Generic Transformation for Scalable Broadcast Encryption Schemes.
Jung Yeon Hwang
Dong Hoon Lee
Jongin Lim
2005
conf/acns
N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords.
Jin Wook Byun
Dong Hoon Lee
2005
conf/wisa
Oblivious Conjunctive Keyword Search.
Hyun Sook Rhee
Jin Wook Byun
Dong Hoon Lee
Jongin Lim
2005
conf/eurocrypt
One-Way Chain Based Broadcast Encryption Schemes.
Nam-Su Jho
Jung Yeon Hwang
Jung Hee Cheon
Myung-Hwan Kim
Dong Hoon Lee
Eun Sun Yoo
2004
conf/acns
One-Round Protocols for Two-Party Authenticated Key Exchange.
Ik Rae Jeong
Jonathan Katz
Dong Hoon Lee
2004
conf/pkc
Efficient ID-based Group Key Agreement with Bilinear Maps.
Kyu Young Choi
Jung Yeon Hwang
Dong Hoon Lee
2004
conf/asiacrypt
Constant-Round Authenticated Group Key Exchange for Dynamic Groups.
Hyun-Jeong Kim
Su-Mi Lee
Dong Hoon Lee
2003
conf/acisp
Digital Signature Schemes with Restriction on Signing Capability.
Jung Yeon Hwang
Hyun-Jeong Kim
Dong Hoon Lee
Jong In Lim
2002
conf/acisp
Privacy against Piracy: Protecting Two-Level Revocable P-K Traitor Tracing.
Hyun-Jeong Kim
Dong Hoon Lee
Moti Yung
2002
conf/acisp
A Practical Approach Defeating Blackmailing.
Dong-Guk Han
Hye-Young Park
Young-Ho Park
Sangjin Lee
Dong Hoon Lee
Hyungjin Yang
2002
conf/icisc
Provably Secure Encrypt-then-Sign Composition in Hybrid Signcryption.
Ik Rae Jeong
Hee Yun Jeong
Hyun Sook Rhee
Dong Hoon Lee
Jong In Lim
2002
conf/icisc
An Anonymous Buyer-Seller Watermarking Protocol with Anonymity Control.
Hak Soo Ju
Hyun-Jeong Kim
Dong Hoon Lee
Jong In Lim
2002
conf/icisc
Efficient Multicast Key Management for Stateless Receivers.
JuHee Ki
Hyun-Jeong Kim
Dong Hoon Lee
Chang-Seop Park
2002
conf/icics
Password-Authenticated Key Exchange between Clients with Different Passwords.
Jin Wook Byun
Ik Rae Jeong
Dong Hoon Lee
Chang-Seop Park
2000
conf/icisc
Efficient and Secure Member Deletion in Group Signature Schemes.
Hyun-Jeong Kim
Jong In Lim
Dong Hoon Lee
Coauthors
Byunggeon Choi
(1)
Chang-Seop Park
(2)
Dong Hoon Lee
(53)
Dong-Guk Han
(1)
Eun Sun Yoo
(1)
Geumsook Ryu
(1)
Gyungeun Yun
(1)
Hak Soo Ju
(1)
Hee Yeon Kim
(1)
Hee Yun Jeong
(1)
Hongjoo Jin
(1)
Hye-Young Park
(1)
Hyerean Jang
(1)
Hyo Jin Jo
(4)
Hyun Sook Rhee
(5)
Hyun-Jeong Kim
(6)
Hyunghoon Kim
(1)
Hyungjin Yang
(1)
Hyunsu Cho
(2)
Ik Rae Jeong
(6)
In Seog Seo
(1)
Jae Hyuk Suk
(1)
Jae-Yung Lee
(1)
Jeong Ok Kwon
(2)
Jieun Eom
(1)
Jin Hyung Park
(1)
Jin Wook Byun
(3)
Jiwoo Shin
(1)
Jonathan Katz
(1)
Jong Hwan Park
(5)
Jong In Lim
(4)
Jong Pil Yun
(1)
Jongin Lim
(2)
Joon Sik Kim
(1)
Joon Young Park
(1)
JuHee Ki
(1)
Jung Hee Cheon
(1)
Jung Yeon Hwang
(8)
Ki Tak Kim
(1)
Kwangsu Lee
(8)
Kwantae Cho
(1)
Kyu Young Choi
(3)
Kyungho Joo
(4)
Moon Chan Park
(2)
Moti Yung
(6)
Myung-Hwan Kim
(1)
Na-Young Ahn
(1)
Nam-Su Jho
(1)
Sangjin Lee
(1)
Seung Geol Choi
(1)
Seungho Lee
(1)
Seunghwan Park
(2)
Seyoung Lee
(1)
Su-Mi Lee
(1)
Sung Bum Park
(1)
Sunwoo Lee
(3)
Willy Susilo
(1)
Wonsuk Choi
(11)
Woo Kwon Koo
(1)
Yeji Park
(1)
Yeonseon Jeong
(1)
Young Kyung Lee
(1)
Young-Ho Park
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to