Παρακολούθηση
Younho Lee
Younho Lee
Professor, IT Management Division, Department of Data Science, SeoulTech
Η διεύθυνση ηλεκτρονικού ταχυδρομείου έχει επαληθευτεί στον τομέα seoultech.ac.kr - Αρχική σελίδα
Τίτλος
Παρατίθεται από
Παρατίθεται από
Έτος
Order-preserving symmetric encryption
A Boldyreva, N Chenette, Y Lee, A O’neill
Advances in Cryptology-EUROCRYPT 2009, 224-241, 2009
12822009
Over 100x faster bootstrapping in fully homomorphic encryption through memory-centric optimization with GPUs
W Jung, S Kim, JH Ahn, JH Cheon, Y Lee
IACR Transactions on Cryptographic Hardware and Embedded Systems, 114-148, 2021
1072021
Trust evaluation model for wireless sensor networks
J Hur, Y Lee, H Yoon, D Choi, S Jin
Advanced Communication Technology, 2005, ICACT 2005. The 7th International …, 2005
1022005
A new data hiding scheme for binary image authentication with small image distortion
Y Lee, H Kim, Y Park
Information Sciences 179 (22), 3866-3884, 2009
662009
Real-time analysis of intrusion detection alerts via correlation
S Lee, B Chung, H Kim, Y Lee, C Park, H Yoon
Computers & Security 25 (3), 169-183, 2006
622006
Trust management for resilient wireless sensor networks
J Hur, Y Lee, SM Hong, H Yoon
Information Security and Cryptology-ICISC 2005, 56-68, 2005
422005
Efficient machine learning over encrypted data with non-interactive communication
H Park, P Kim, H Kim, KW Park, Y Lee
Computer Standards & Interfaces 58, 87-108, 2018
312018
Parallelized Scalar Multiplication on Elliptic Curves Defined over Optimal Extension Field.
J Lee, H Kim, Y Lee, SM Hong, H Yoon
IJ Network Security 4 (1), 99-106, 2007
302007
Improved multi-precision squaring for low-end RISC microcontrollers
Y Lee, IH Kim, Y Park
Journal of Systems and Software 86 (1), 60-71, 2013
292013
RLizard: Post-Quantum Key Encapsulation Mechanism for IoT Devices
J Lee, D Kim, H Lee, Y Lee, JH Cheon
IEEE Access 7, 2080-2091, 2019
282019
On-demand secure routing protocol for ad hoc network using id based cryptosystem
YH Lee, H Kim, B Chung, J Lee, H Yoon
Parallel and Distributed Computing, Applications and Technologies, 2003 …, 2003
252003
A robust and flexible digital rights management system for home networks
H Kim, Y Lee, Y Park
Journal of Systems and Software 83 (12), 2431-2440, 2010
222010
Digital rights management with right delegation for home networks
H Kim, Y Lee, B Chung, H Yoon, J Lee, KI Jung
Information Security and Cryptology–ICISC 2006, 233-245, 2006
222006
Eavesdropping One-Time Tokens Over Magnetic Secure Transmission in Samsung Pay
D Choi, Y Lee
10th USENIX Workshop on Offensive Technologies (WOOT 16), 2016
212016
A new binary image authentication scheme with small distortion and low false negative rates
LEE Younho, HUR Junbeom, KIM Heeyoul, P Yongsu
IEICE transactions on communications 90 (11), 3259-3262, 2007
192007
Efficient Sorting of Homomorphic Encrypted Data With k-Way Sorting Network
S Hong, S Kim, J Choi, Y Lee, JH Cheon
IEEE Transactions on Information Forensics and Security 16, 4389-4404, 2021
182021
Secure Ordered Bucketization
Y Lee
IEEE Transactions on Dependable and Secure Computing 11 (3), 292-303, 2014
182014
Personalized EigenTrust with the Beta Distribution.
D Choi, S Jin, Y Lee, Y Park
ETRI journal 32 (2), 2010
182010
Eavesdropping of Magnetic Secure Transmission Signals and Its Security Implications for a Mobile Payment Protocol
D Choi, Y Lee
IEEE Access 6, 42687-42701, 2018
162018
Privacy-Preserving Deep Sequential Model with Matrix Homomorphic Encryption
J Jang, Y Lee, A Kim, B Na, D Yhee, B Lee, JH Cheon, S Yoon
Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022
152022
Δεν είναι δυνατή η εκτέλεση της ενέργειας από το σύστημα αυτή τη στιγμή. Προσπαθήστε ξανά αργότερα.
Άρθρα 1–20