default search action
Im-Yeong Lee
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j40]Yong-Woon Hwang, Taehoon Kim, Daehee Seo, Im-Yeong Lee:
A study on the traceable attribute-based signature scheme provided with anonymous credentials. Connect. Sci. 36(1) (2024) - [j39]Taehoon Kim, Yong-Woon Hwang, Daehee Seo, Im-Yeong Lee:
Data Access Control for Secure Authentication Using Dual VC Scheme Based on CP-ABE in DID. J. Circuits Syst. Comput. 33(5): 2450094:1-2450094:29 (2024) - [j38]Taehoon Kim, Daehee Seo, Su-Hyun Kim, Im-Yeong Lee:
A Comprehensive Approach to User Delegation and Anonymity within Decentralized Identifiers for IoT. Sensors 24(7): 2215 (2024) - 2022
- [j37]Gyeongjin Ra, Su-Hyun Kim, Imyeong Lee:
Identity Access Management via ECC Stateless Derived Key Based Hierarchical Blockchain for the Industrial Internet of Things. IEICE Trans. Inf. Syst. 105-D(11): 1857-1871 (2022) - [j36]Huimin Ren, Suhyun Kim, Daehee Seo, Imyeong Lee:
A Certificateless-based One-Round Authenticated Group Key Agreement Protocol to Prevent Impersonation Attacks. KSII Trans. Internet Inf. Syst. 16(5): 1687-1707 (2022) - [j35]Yong-Woon Hwang, Taehoon Kim, Daehee Seo, Im-Yeong Lee:
A Study on Data Sharing Scheme using ECP-ABSC that Provides Data User Traceability in the Cloud. KSII Trans. Internet Inf. Syst. 16(12): 4042-4061 (2022) - 2021
- [j34]Gyeong-Jin Ra, Donghyun Kim, Daehee Seo, Im-Yeong Lee:
A Federated Framework for Fine-Grained Cloud Access Control for Intelligent Big Data Analytic by Service Providers. IEEE Access 9: 47084-47095 (2021) - [j33]Gyeong-Jin Ra, Taehoon Kim, Im-Yeong Lee:
VAIM: Verifiable Anonymous Identity Management for Human-Centric Security and Privacy in the Internet of Things. IEEE Access 9: 75945-75960 (2021) - [j32]L. Ellen Funderburg, Im-Yeong Lee:
Efficient Short Group Signatures for Conditional Privacy in Vehicular Ad Hoc Networks via ID Caching and Timed Revocation. IEEE Access 9: 118065-118076 (2021) - [j31]L. Ellen Funderburg, Huimin Ren, Im-Yeong Lee:
Pairing-Free Signatures With Insider-Attack Resistance for Vehicular Ad-Hoc Networks (VANETs). IEEE Access 9: 159587-159597 (2021) - [j30]Dae-Hwi Lee, Won-Bin Kim, Deahee Seo, Im-Yeong Lee:
An Efficient Public Verifiable Certificateless Multi-Receiver Signcryption Scheme for IoT Environments. IEICE Trans. Inf. Syst. 104-D(11): 1869-1879 (2021) - [j29]Yong-Woon Hwang, Im-Yeong Lee:
A study on data sharing system using ACP-ABE-SE in a cloud environment. Int. J. Web Grid Serv. 17(3): 201-220 (2021) - [j28]Won-Bin Kim, Im-Yeong Lee:
Survey on Data Deduplication in Cloud StorageEnvironments. J. Inf. Process. Syst. 17(3): 658-673 (2021) - [j27]Won-Bin Kim, Daehee Seo, Donghyun Kim, Im-Yeong Lee:
Data Distribution for Multiple Receivers in a Connected Car Environment Using 5G Communication. Secur. Commun. Networks 2021: 5599996:1-5599996:14 (2021) - [j26]L. Ellen Funderburg, Im-Yeong Lee:
A Privacy-Preserving Key Management Scheme with Support for Sybil Attack Detection in VANETs. Sensors 21(4): 1063 (2021) - [j25]Taehoon Kim, Wonbin Kim, Daehee Seo, Im-Yeong Lee:
Secure Encapsulation Schemes Using Key Recovery System in IoMT Environments. Sensors 21(10): 3474 (2021) - [j24]Won-Bin Kim, Daehee Seo, Donghyun Kim, Im-Yeong Lee:
Group Delegated ID-Based Proxy Reencryption for the Enterprise IoT-Cloud Storage Environment. Wirel. Commun. Mob. Comput. 2021: 7641389:1-7641389:12 (2021) - 2020
- [j23]Yong-Woon Hwang, Im-Yeong Lee:
CP-ABE Access Control that Block Access of Withdrawn Users in Dynamic Cloud. KSII Trans. Internet Inf. Syst. 14(10): 4136-4156 (2020) - [j22]Chang-Hyun Roh, Im-Yeong Lee:
A Study on Electronic Voting System Using Private Blockchain. J. Inf. Process. Syst. 16(2): 421-434 (2020) - [j21]Dae-Hwi Lee, Kangbin Yim, Im-Yeong Lee:
A Certificateless Aggregate Arbitrated Signature Scheme for IoT Environments. Sensors 20(14): 3983 (2020) - [j20]Yong-Woon Hwang, Im-Yeong Lee:
A Study on CP-ABE-Based Medical Data Sharing System with Key Abuse Prevention and Verifiable Outsourcing in the IoMT Environment. Sensors 20(17): 4934 (2020) - [j19]Dae-Hwi Lee, Im-Yeong Lee:
A Lightweight Authentication and Key Agreement Schemes for IoT Environments. Sensors 20(18): 5350 (2020) - [c49]Yong-Woon Hwang, Im-Yeong Lee, Kangbin Yim:
A Study on Access Control Scheme Based on ABE Using Searchable Encryption in Cloud Environment. EIDWT 2020: 215-221 - [c48]Tae-Hoon Kim, Im-Yeong Lee:
Secure Hierarchical Deterministic Key Generation Scheme in Blockchain-based Medical Environment. IECC 2020: 108-114 - [c47]Won-Bin Kim, Im-Yeong Lee, Kangbin Yim:
Group Delegated ID-Based Proxy Re-encryption for PHR. IMIS 2020: 447-456 - [c46]Tae-Hoon Kim, Won-Bin Kim, Daehee Seo, Im-Yeong Lee:
A Secure Encapsulation Schemes Based on Key Recovery System. SVCC 2020: 25-37
2010 – 2019
- 2019
- [j18]Won-Bin Kim, Im-Yeong Lee:
Secure and Efficient Storage of Video Data in a CCTV Environment. KSII Trans. Internet Inf. Syst. 13(6): 3238-3257 (2019) - [j17]Sung-Wook Park, Im-Yeong Lee:
Enhanced signature RTD transaction scheme based on Chebyshev polynomial for mobile payments service in IoT device environment. J. Supercomput. 75(8): 4617-4637 (2019) - [c45]Gyeong-Jin Ra, Im-Yeong Lee:
A Study on Hybrid Blockchain-based XGS (XOR Global State) Injection Technology for Efficient Contents Modification and Deletion. SDS 2019: 300-305 - [c44]Gyeong-Jin Ra, Dae-Hee Seo, Md. Zakirul Alam Bhuiyan, Im-Yeong Lee:
An Anonymous Protocol for Member Privacy in a Consortium Blockchain. SpaCCS 2019: 456-464 - 2018
- [j16]Gyeong-Jin Ra, Im-Yeong Lee:
A Study on KSI-based Authentication Management and Communication for Secure Smart Home Environments. KSII Trans. Internet Inf. Syst. 12(2): 892-905 (2018) - [j15]Su-Hyun Kim, Im-Yeong Lee:
IoT device security based on proxy re-encryption. J. Ambient Intell. Humaniz. Comput. 9(4): 1267-1273 (2018) - [j14]Dae-Hwi Lee, Im-Yeong Lee:
Dynamic Group Authentication and Key Exchange Scheme Based on Threshold Secret Sharing for IoT Smart Metering Environments. Sensors 18(10): 3534 (2018) - [c43]Won-Bin Kim, Im-Yeong Lee:
Secure Data Deduplication Scheme Using Linkage of Data Blocks in Cloud Storage Environment. MUE/FutureTech 2018: 539-545 - 2017
- [j13]Hyun-Jin Kim, Im-Yeong Lee:
A study on a secure single sign-on for user authentication information privacy in distributed computing environment. Int. J. Commun. Networks Distributed Syst. 19(1): 28-45 (2017) - [j12]Sung-Wook Park, Im-Yeong Lee:
Enhanced Mutual Authentication Scheme based on Chaotic Map for PCM in NFC Service Environment. KSII Trans. Internet Inf. Syst. 11(2): 1180-1200 (2017) - [c42]Yong-Woon Hwang, Im-Yeong Lee:
A Study on Lightweight Mutual Authentication Protocol Based on Simple Operation. CSA/CUTE 2017: 41-46 - [c41]Suhyun Kim, Imyeong Lee:
Secure Multicast Using Proxy Re-encryption in IoT Environment. CSA/CUTE 2017: 66-70 - 2016
- [j11]Sung-Wook Park, Im-Yeong Lee:
Mutual Authentication Scheme Based on Lattice for NFC-PCM Payment Service Environment. Int. J. Distributed Sens. Networks 12(9): 9471539 (2016) - 2015
- [j10]Su-Hyun Kim, Im-Yeong Lee:
Study on User Authority Management for Safe Data Protection in Cloud Computing Environments. Symmetry 7(1): 269-283 (2015) - [c40]Su-Hyun Kim, Im-Yeong Lee:
Data Block Management Scheme Based on Secret Sharing for HDFS. BWCCA 2015: 51-56 - [c39]Sung-Wook Park, Im-Yeong Lee:
Mutual Authentication Scheme Based on GSM for NFC Mobile Payment Environments. CSA/CUTE 2015: 391-395 - 2014
- [j9]Su-Hyun Kim, Im-Yeong Lee:
Block Access Token Renewal Scheme Based on Secret Sharing in Apache Hadoop. Entropy 16(8): 4185-4198 (2014) - 2013
- [j8]Sun-Ho Lee, Im-Yeong Lee:
A Secure Index Management Scheme for Providing Data Sharing in Cloud Storage. J. Inf. Process. Syst. 9(2): 287-300 (2013) - [j7]Sung-Wook Park, Im-Yeong Lee:
Anonymous Authentication Scheme based on NTRU for the Protection of Payment Information in NFC Mobile Environment. J. Inf. Process. Syst. 9(3): 461-476 (2013) - [c38]Sun-Ho Lee, Im-Yeong Lee:
Effective Searchable Symmetric Encryption System Using Conjunctive Keyword. ITCS 2013: 477-483 - [c37]Sun-Ho Lee, Sung Jong Go, Im-Yeong Lee:
Secure Method for Data Storage and Sharing During Data Outsourcing. ITCS 2013: 485-493 - 2012
- [j6]Jong Sik Moon, Im-Yeong Lee:
Authentication protocol using an identifier in an ad hoc network environment. Math. Comput. Model. 55(1-2): 134-141 (2012) - 2011
- [j5]Jong Sik Moon, Im-Yeong Lee:
An AAA scheme using ID-based ticket with anonymity in future mobile communication. Comput. Commun. 34(3): 295-304 (2011) - [j4]Jong Sik Moon, Jong Hyuk Park, Im-Yeong Lee:
Admissible bilinear map-based key management protocol for HPCCS in heterogeneous network. J. Supercomput. 55(2): 155-172 (2011) - 2010
- [j3]Jong Sik Moon, Jong Hyuk Park, Deok-Gyu Lee, Im-Yeong Lee:
Authentication and ID-Based Key Management Protocol in Pervasive Environment. Wirel. Pers. Commun. 55(1): 91-103 (2010) - [c36]Jong Sik Moon, Im-Yeong Lee, Kang Bin Yim, Sang-Gu Byeon:
An Authentication and Authorization Protocol Using Ticket in Pervasive Environment. AINA Workshops 2010: 822-826 - [c35]Sun-Ho Lee, Kang Bin Yim, Im-Yeong Lee:
A Secure Solution for USB Flash Drives Using FAT File System Structure. NBiS 2010: 487-492
2000 – 2009
- 2009
- [c34]Jong Sik Moon, Im-Yeong Lee, Seo-Il Kang:
Group Key Management Using Device ID in Ad-hoc Network. CSA 2009: 1-6 - [c33]Deok-Gyu Lee, Jong Wook Han, Doo-Soon Park, Im-Yeong Lee:
Intelligent Pervasive Network Authentication: S/Key Based Device Authentication. CCNC 2009: 1-5 - [c32]Jong Sik Moon, Deok-Gyu Lee, Im-Yeong Lee:
Device Authentication/Authorization Protocol for Home Network in Next Generation Security. ISA 2009: 760-768 - 2008
- [j2]Soo-Young Kang, Deok-Gyu Lee, Im-Yeong Lee:
A study on secure RFID mutual authentication scheme in pervasive computing environment. Comput. Commun. 31(18): 4248-4254 (2008) - [c31]Jong Sik Moon, Jong Hyuk Park, Im-Yeong Lee:
A study on authentication/authorization/accounting and roaming mechanism in pervasive environment. MobiQuitous 2008 - [c30]Soo-Young Kang, Im-Yeong Lee:
A Study on New Low-Cost RFID System with Mutual Authentication Scheme in Ubiquitous. MUE 2008: 527-530 - 2007
- [c29]Soo-Young Kang, Im-Yeong Lee:
A Study on Low-Cost RFID System Management with Mutual Authentication Scheme in Ubiquitous. APNOMS 2007: 492-502 - [c28]Jong Sik Moon, Im-Yeong Lee:
A Study on Ticket-Based AAA Mechanism Including Time Synchronization OTP in Ubiquitous Environment. ICCSA (1) 2007: 666-677 - [c27]Soo-Young Kang, Jang-Su Park, Im-Yeong Lee:
A Study on Authentication Protocol in offering Identification Synchronization and Position Detection in RFID System. IPC 2007: 150-154 - [c26]Seo-Il Kang, Deok-Gyu Lee, Im-Yeong Lee:
A Study on Key Distribution and ID Registration in the AAA System for Ubiquitous Multimedia Environments. MMM (2) 2007: 487-493 - [c25]Dae-Hee Seo, Jang-Mi Baek, Jiang Li, Soo-Young Kang, Im-Yeong Lee, Hyung-Geun Oh:
A Study on Improved RFID Authentication Scheme. MUE 2007: 567-572 - [c24]Deok-Gyu Lee, Yun-kyung Lee, Jong Wook Han, Jong Hyuk Park, Im-Yeong Lee:
Intelligent Home Network Authentication: Home Device Authentication Using Device Certification. OTM Conferences (2) 2007: 1688-1700 - [c23]Soo-Young Kang, Im-Yeong Lee:
Privacy Protection Scheme of RFID Using Random Number. PAKDD Workshops 2007: 596-607 - [c22]Jang-Su Park, Soo-Young Kang, Im-Yeong Lee:
A study on secure RFID authentication protocol in insecure communication. SecureComm 2007: 133-143 - 2006
- [c21]Deok-Gyu Lee, Jang-Su Park, Im-Yeong Lee:
Broadcast Encryption Using Efficient Key Distribution and Renewal for Ubiquitous Environments. EUC Workshops 2006: 721-730 - [c20]Deok-Gyu Lee, Jong Sik Moon, Jong Hyuk Park, Im-Yeong Lee:
Authentication for Ubiquitous Multi Domain in Pervasive Computing Using PMI. HPCC 2006: 515-524 - [c19]Deok-Gyu Lee, Seo-Il Kang, Dae-Hee Seo, Im-Yeong Lee:
Authentication for Single/Multi Domain in Ubiquitous Computing Using Attribute Certification. ICCSA (4) 2006: 326-335 - [c18]Deok-Gyu Lee, Jang-Su Park, Im-Yeong Lee, Yong-Seok Park, Jung-Chul Ahn:
An Efficient Key Distribution for Ubiquitous Environment in Ad-Hoc Network Using Broadcast Encryption. ICCSA (4) 2006: 370-379 - [c17]Deok-Gyu Lee, Seo-Il Kang, Im-Yeong Lee:
An Intelligent and Efficient Traitor Tracing for Ubiquitous Environments. KES (2) 2006: 793-802 - 2005
- [j1]Dae-Hee Seo, Im-Yeong Lee:
A Study on RFID System with Secure Service Availability for Ubiquitous Computing. J. Inf. Process. Syst. 1(1): 96-101 (2005) - [c16]Dae-Hee Seo, Deok-Gyu Lee, Im-Yeong Lee:
A Study on Scalable Bluetooth Piconet for Secure Ubiquitous. Human.Society@Internet 2005: 45-56 - [c15]Dae-Hee Seo, Im-Yeong Lee, Hee-Un Park:
A Study on Secure SDP of RFID Using Bluetooth Communication. ICCSA (2) 2005: 117-126 - [c14]Seo-Il Kang, Im-Yeong Lee:
A Study on the E-Cash System with Anonymity and Divisibility. ICCSA (2) 2005: 177-186 - 2004
- [c13]Deok-Gyu Lee, Hyung-Geun Oh, Im-Yeong Lee:
A Study on Contents Distribution Using Electronic Cash System. EEE 2004: 333-340 - [c12]Deok-Gyu Lee, Im-Yeong Lee:
A Study on Efficient Key Distribution and Renewal in Broadcast Encryption. ICCSA (4) 2004: 66-76 - [c11]Dae-Hee Seo, Im-Yeong Lee, Hee-Un Park:
A Study on Key Recovery Agent Protection Profile Having Composition Function. ICCSA (1) 2004: 557-566 - [c10]Dae-Hee Seo, Im-Yeong Lee:
A Study on Secure and Effcient Sensor Network Management Scheme Using PTD. ICCSA (3) 2004: 1020-1028 - 2003
- [c9]Hyung-Woo Lee, Im-Yeong Lee, Dong-Ik Oh:
Smart Card Based Mobile Payment with Fairness Revocation Mechanism. EC-Web 2003: 62-71 - [c8]Hyung-Woo Lee, Im-Yeong Lee:
Designated Verification of Digital Watermark for Network Based Image Distribution. International Conference on Computational Science 2003: 1069-1078 - [c7]Yong-Ho Lee, Im-Yeong Lee, Hyung-Woo Lee:
New WAKE Key Recovery Protocol on M-commerce. ICWE 2003: 279-280 - 2002
- [c6]Yu-Sug Chang, Hye-Jung Lee, Doo-Soon Park, Im-Yeong Lee:
Interprocedural Transformations for Extracting Maximum Parallelism. ADVIS 2002: 415-424 - [c5]Hyung-Woo Lee, Sung-Min Lee, Im-Yeong Lee:
Secure Electronic Copyright Distribution with Public Key Based Traitor Tracing. EC-Web 2002: 324-332 - [c4]Dae-Hee Seo, Im-Yeong Lee, Dong-Ik Oh, Doo-Soon Park:
Secure Bluetooth Piconet Using Non-anonymous Group Key. EurAsia-ICT 2002: 766-777 - [c3]Deok-Gyu Lee, Im-Yeong Lee, Jong-Keun Ahn, Yong-Hae Kong:
The Illegal Copy Protection Using Hidden Agent. EurAsia-ICT 2002: 832-841 - [c2]Yong-Ho Lee, Im-Yeong Lee, Hyung-Woo Lee:
New Identity Escrow Scheme for Anonymity Authentication. INDOCRYPT 2002: 382-394 - 2001
- [c1]Hee-Un Park, Im-Yeong Lee:
A Digital Nominative Proxy Signature Scheme for Mobile Communication. ICICS 2001: 451-455
Coauthor Index
aka: Daehee Seo
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-19 00:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint