Byoungcheon Lee
Orcid: 0000-0002-1741-4192
According to our database1,
Byoungcheon Lee
authored at least 25 papers
between 2000 and 2014.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2014
Proceedings of the SECRYPT 2014, 2014
2013
Proceedings of the 2013 International Conference on IT Convergence and Security, 2013
2012
Pers. Ubiquitous Comput., 2012
2011
J. Inf. Process. Syst., 2011
2010
Unified Public Key Infrastructure Supporting Both Certificate-Based and ID-Based Cryptography.
Proceedings of the ARES 2010, 2010
2007
Proceedings of the Information Security Applications, 8th International Workshop, 2007
2005
Two models of efficient Mixnet-based receipt-free voting using (threshold) re-encryption.
Comput. Syst. Sci. Eng., 2005
Proceedings of the Information and Communications Security, 7th International Conference, 2005
Proceedings of the Computational Science and Its Applications, 2005
2004
Proceedings of the Trust and Privacy in Digital Business, First International Conference, 2004
Proceedings of the Information Security and Cryptology, 2004
A Secure and Efficient Mix-Network using Extended Binary Mixing Gate.
Proceedings of the Cryptographic Algorithms and their Uses, 2004
Proceedings of the ACSW Frontiers 2004, 2004 ACSW Workshops, 2004
Proceedings of the Applied Cryptography and Network Security, 2004
2003
Proceedings of the Information Security and Cryptology, 2003
Proceedings of the Information Security and Cryptology, 2003
2002
Design and implementation of an efficient fair off-line e-cash system based on elliptic curve discrete logarithm problem.
J. Commun. Networks, 2002
Proceedings of the Information Security and Cryptology, 2002
2001
Proceedings of the Progress in Cryptology, 2001
Proceedings of the Information Security and Privacy, 6th Australasian Conference, 2001
2000
Proceedings of the Information Security and Cryptology, 2000
Secure Length-Saving ElGamal Encryption under the Computational Diffie-Hellman Assumption.
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000