Dong Hoon Lee
Orcid: 0000-0003-0692-2543Affiliations:
- Korea University, Center for Information Security Technologies, Seoul, South Korea
- University of Oklahoma, Norman, OK, USA (PhD 1992)
According to our database1,
Dong Hoon Lee
authored at least 290 papers
between 1993 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
IEEE Trans. Intell. Transp. Syst., May, 2024
Comput. Secur., 2024
2023
ErrIDS: An Enhanced Cumulative Timing Error-Based Automotive Intrusion Detection System.
IEEE Trans. Intell. Transp. Syst., November, 2023
Comput. Secur., October, 2023
Flooding attack mitigator for in-vehicle CAN using fault confinement in CAN protocol.
Comput. Secur., March, 2023
IEEE Internet Things J., 2023
The vibration knows who you are! A further analysis on usable authentication for smartwatch users.
Comput. Secur., 2023
BGCFI: Efficient Verification in Fine-Grained Control-Flow Integrity Based on Bipartite Graph.
IEEE Access, 2023
IEEE Access, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
SCVMON: Data-oriented attack recovery for RVs based on safety-critical variable monitoring.
Proceedings of the 26th International Symposium on Research in Attacks, 2023
Poster: Unveiling the Impact of Patch Placement: Adversarial Patch Attacks on Monocular Depth Estimation.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
IEEE Trans. Intell. Transp. Syst., 2022
TTIDS: Transmission-Resuming Time-Based Intrusion Detection System for Controller Area Network (CAN).
IEEE Access, 2022
IEEE Access, 2022
Security of IoT Device: Perspective Forensic/Anti-Forensic Issues on Invalid Area of NAND Flash Memory.
IEEE Access, 2022
Proceedings of the Information Security Applications - 23rd International Conference, 2022
2021
IEEE Trans. Veh. Technol., 2021
Random CFI (RCFI): Efficient Fine-Grained Control-Flow Integrity Through Random Verification.
IEEE Trans. Computers, 2021
Int. J. Inf. Sec., 2021
SOTPM: Software One-Time Programmable Memory to Protect Shared Memory on ARM Trustzone.
IEEE Access, 2021
IEEE Access, 2021
Forensic Issues and Techniques to Improve Security in SSD With Flex Capacity Feature.
IEEE Access, 2021
Forensics and Anti-Forensics of a NAND Flash Memory: From a Copy-Back Program Perspective.
IEEE Access, 2021
Proceedings of the Information Security Applications - 22nd International Conference, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
Ensuring Safety and Security in CAN-Based Automotive Embedded Systems: A Combination of Design Optimization and Secure Communication.
IEEE Trans. Veh. Technol., 2020
IEEE Trans. Veh. Technol., 2020
IEEE Trans. Sustain. Comput., 2020
Tight security for the generic construction of identity-based signature (in the multi-instance setting).
Theor. Comput. Sci., 2020
Int. J. Inf. Sec., 2020
Des. Codes Cryptogr., 2020
CoRR, 2020
Comput. Secur., 2020
Parallelly Running k-Nearest Neighbor Classification Over Semantically Secure Encrypted Data in Outsourced Environments.
IEEE Access, 2020
IEEE Access, 2020
Practical Vulnerability-Information-Sharing Architecture for Automotive Security-Risk Analysis.
IEEE Access, 2020
IEEE Access, 2020
IEEE Access, 2020
IEEE Access, 2020
Balancing Personal Privacy and Public Safety During COVID-19: The Case of South Korea.
IEEE Access, 2020
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
2019
Wirel. Commun. Mob. Comput., 2019
New technique for chosen-ciphertext security based on non-interactive zero-knowledge.
Inf. Sci., 2019
CCA Security for Self-Updatable Encryption: Protecting Cloud Data When Clients Read/Write Ciphertexts.
Comput. J., 2019
Physical Layer Security of Autonomous Driving: Secure Vehicle-to-Vehicle Communication in A Security Cluster.
Ad Hoc Sens. Wirel. Networks, 2019
Catch ID if You CAN: Dynamic ID Virtualization Mechanism for the Controller Area Network.
IEEE Access, 2019
IEEE Access, 2019
Securing Ultrasonic Sensors Against Signal Injection Attacks Based on a Mathematical Model.
IEEE Access, 2019
IEEE Access, 2019
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
2018
Identifying ECUs Using Inimitable Characteristics of Signals in Controller Area Networks.
IEEE Trans. Veh. Technol., 2018
IEEE Trans. Intell. Transp. Syst., 2018
VoltageIDS: Low-Level Communication Characteristics for Automotive Intrusion Detection System.
IEEE Trans. Inf. Forensics Secur., 2018
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018
UnThemida: Commercial obfuscation technique analysis with a fully obfuscated program.
Softw. Pract. Exp., 2018
Secur. Commun. Networks, 2018
Less Communication: Energy-Efficient Key Exchange for Securing Implantable Medical Devices.
Secur. Commun. Networks, 2018
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018
IACR Cryptol. ePrint Arch., 2018
Proceedings of the Information Security Applications - 19th International Conference, 2018
2017
Wirel. Pers. Commun., 2017
Self-updatable encryption: Time constrained access control with hidden attributes and better efficiency.
Theor. Comput. Sci., 2017
SafeGuard: a behavior based real-time malware detection scheme for mobile multimedia applications in android platform.
Multim. Tools Appl., 2017
Des. Codes Cryptogr., 2017
Proceedings of the Information Security Applications - 18th International Conference, 2017
Proceedings of the Information Security and Cryptology - ICISC 2017 - 20th International Conference, Seoul, South Korea, November 29, 2017
2016
IEEE Trans. Smart Grid, 2016
IEEE Trans. Intell. Transp. Syst., 2016
Secur. Commun. Networks, 2016
Secur. Commun. Networks, 2016
Patient-Controlled Attribute-Based Encryption for Secure Electronic Health Records System.
J. Medical Syst., 2016
IEICE Trans. Inf. Syst., 2016
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016
Efficient Identity-Based Encryption and Public-Key Signature from Trapdoor Subgroups.
IACR Cryptol. ePrint Arch., 2016
Des. Codes Cryptogr., 2016
Proceedings of the Eighth International Conference on Ubiquitous and Future Networks, 2016
2015
A Practical Wireless Attack on the Connected Car and Security Protocol for In-Vehicle CAN.
IEEE Trans. Intell. Transp. Syst., 2015
IEEE Trans. Inf. Forensics Secur., 2015
Theor. Comput. Sci., 2015
New chosen-ciphertext secure identity-based encryption with tight security reduction to the bilinear Diffie-Hellman problem.
Inf. Sci., 2015
Adaptively secure broadcast encryption under standard assumptions with better efficiency.
IET Inf. Secur., 2015
IACR Cryptol. ePrint Arch., 2015
Des. Codes Cryptogr., 2015
Scalable signaling protocol for Web real-time communication based on a distributed hash table.
Comput. Commun., 2015
<i>mvSERS</i>: A Secure Emergency Response Solution for Mobile Healthcare in Vehicular Environments.
Comput. J., 2015
Proceedings of the Information Security Applications - 16th International Workshop, 2015
Proceedings of the 5th International Conference on IT Convergence and Security, 2015
Proceedings of the 5th International Conference on IT Convergence and Security, 2015
An Efficient ID-Based Mutual Authentication Secure against Privileged-Insider Attack.
Proceedings of the 5th International Conference on IT Convergence and Security, 2015
2014
IEEE Trans. Mob. Comput., 2014
IEEE Trans. Dependable Secur. Comput., 2014
Peer-to-Peer Netw. Appl., 2014
Multim. Tools Appl., 2014
Multim. Tools Appl., 2014
Multim. Tools Appl., 2014
Inf. Sci., 2014
Expert Syst. Appl., 2014
CoRR, 2014
Proceedings of the Computer Security - ESORICS 2014, 2014
2013
IEEE Trans. Inf. Theory, 2013
Classification and Experimental Analysis for Clone Detection Approaches in Wireless Sensor Networks.
IEEE Syst. J., 2013
Inf. Sci., 2013
Energy-efficient replica detection for resource-limited mobile devices in the internet of things.
IET Commun., 2013
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013
IACR Cryptol. ePrint Arch., 2013
2012
IEEE Trans. Consumer Electron., 2012
J. Medical Syst., 2012
JsSandbox: A Framework for Analyzing the Behavior of Malicious JavaScript Code using Internal Function Hooking.
KSII Trans. Internet Inf. Syst., 2012
KSII Trans. Internet Inf. Syst., 2012
Inf. Sci., 2012
IET Commun., 2012
On the Security of Luo et al.'s Fully Secure Hierarchical Identity Based Encryption Scheme.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
Scalable Privacy-Preserving <i>t</i>-Repetition Protocol with Distributed Medical Data.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
IACR Cryptol. ePrint Arch., 2012
Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies.
IACR Cryptol. ePrint Arch., 2012
Proceedings of the International Conference on IT Convergence and Security, 2012
A Framework for Anomaly Pattern Recognition in Electronic Financial Transaction Using Moving Average Method.
Proceedings of the International Conference on IT Convergence and Security, 2012
Proceedings of the Computer Applications for Database, Education, and Ubiquitous Computing, 2012
2011
On a security model of conjunctive keyword search over encrypted relational database.
J. Syst. Softw., 2011
J. Syst. Archit., 2011
J. Commun. Networks, 2011
IEICE Electron. Express, 2011
IEICE Electron. Express, 2011
EURASIP J. Wirel. Commun. Netw., 2011
Des. Codes Cryptogr., 2011
Des. Codes Cryptogr., 2011
Comput. Math. Appl., 2011
Biometric Based Secure Communications without Pre-deployed Key for Biosensor Implanted in Body Sensor Networks.
Proceedings of the Information Security Applications - 12th International Workshop, 2011
Proceedings of the 5th FTRA International Conference on Multimedia and Ubiquitous Engineering, 2011
Proceedings of the 5th FTRA International Conference on Multimedia and Ubiquitous Engineering, 2011
Proceedings of the Digital Enterprise and Information Systems - International Conference, 2011
2010
Combined Authentication-Based Multilevel Access Control in Mobile Application for DailyLifeService.
IEEE Trans. Mob. Comput., 2010
Trapdoor security in a searchable public-key encryption scheme with a designated tester.
J. Syst. Softw., 2010
KSII Trans. Internet Inf. Syst., 2010
A Hidden Vector Encryption Scheme with Constant-Size Tokens and Pairing Computations.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010
Forgery attacks on Kang et al.'s identity-based strong designated verifier signature scheme and its improvement with security proof.
Comput. Electr. Eng., 2010
2009
Wirel. Commun. Mob. Comput., 2009
IEEE Trans. Wirel. Commun., 2009
J. Univers. Comput. Sci., 2009
Inf. Process. Lett., 2009
Inf. Process. Lett., 2009
Cryptanalysis of Chatterjee-Sarkar Hierarchical Identity-Based Encryption Scheme at PKC 06.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
IEICE Trans. Inf. Syst., 2009
IEEE Commun. Lett., 2009
Comput. Stand. Interfaces, 2009
Comput. Stand. Interfaces, 2009
Comput. Commun., 2009
Proceedings of the 2009 International Conference on Complex, 2009
Proceedings of the 2009 ACM Symposium on Information, 2009
Proceedings of the 2009 ACM Symposium on Information, 2009
Proceedings of the 8th IEEE/ACIS International Conference on Computer and Information Science, 2009
2008
IEEE Trans. Knowl. Data Eng., 2008
IEEE Trans. Broadcast., 2008
KSII Trans. Internet Inf. Syst., 2008
IEICE Trans. Commun., 2008
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
Comput. Stand. Interfaces, 2008
Comput. Commun., 2008
Comput. Commun., 2008
Proceedings of the Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2008), 2008
Proceedings of the Information Security Practice and Experience, 2008
Proceedings of the Intelligence and Security Informatics, 2008
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2008
Cryptanalysis of Two Improved Remote User Authentication Schemes Preserving User Anonymity.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008
Proceedings of the Information Security and Cryptology, 2008
Proceedings of the Distributed Computing and Networking, 9th International Conference, 2008
Proceedings of the 2008 IEEE International Conference on Granular Computing, 2008
Strong Authentication Protocol for Secure RFID Tag Search without Help of Central Database.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008
SARC: A Street-Based Anonymous Vehicular Ad Hoc Routing Protocol for City Environment.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008
Cryptanalysis and improvement of a multi-receiver identity-based key encapsulation at INDOCRYPT 06.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008
2007
Inf. Sci., 2007
On the <i>Strong</i> Forward Secrecy of the Improved Chikazawa-Yamagishi ID-Based Key Sharing.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007
Efficient verifier-based password-authenticated key exchange in the three-party setting.
Comput. Stand. Interfaces, 2007
Proceedings of the Ubiquitous Intelligence and Computing, 4th International Conference, 2007
Proceedings of the SOFSEM 2007: Theory and Practice of Computer Science, 2007
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007
Trapdoor-based Mutual Authentication Scheme without Cryptographic Primitives in RFID Tags.
Proceedings of the Third International Workshop on Security, 2007
Proceedings of the Third International Workshop on Security, 2007
Proceedings of the Third International Workshop on Security, 2007
Proceedings of the Emerging Technologies in Knowledge Discovery and Data Mining, 2007
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2007
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2007
Certificateless Public Key Encryption in the Selective-ID Security Model (Without Random Oracles).
Proceedings of the Pairing-Based Cryptography, 2007
Enhanced Non-disjoint Multi-path Source Routing Protocol for Wireless Ad-Hoc Networks.
Proceedings of the Computational Science and Its Applications, 2007
Proceedings of the Universal Access in Human Computer Interaction. Coping with Diversity, 2007
Proceedings of the Public Key Infrastructure, 2007
A Transformation Scheme for Interconnection Networks.
Proceedings of the 2007 International Conference on Communications in Computing, 2007
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007
Proceedings of the Advances in Web and Network Technologies, and Information Management, 2007
Proceedings of the Managing Next Generation Networks and Services, 2007
Design and Implementation of the UsMSS : User-centric secure Multimedia Service System in Intelligent Home.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007
2006
Security analysis and improvement of a gateway-oriented password-based authenticated key exchange protocol.
IEEE Commun. Lett., 2006
IACR Cryptol. ePrint Arch., 2006
Proceedings of the Security in Pervasive Computing, Third International Conference, 2006
Proceedings of the Secure Data Management, Third VLDB Workshop, SDM 2006, Seoul, Korea, 2006
Off-Line Keyword Guessing Attacks on Recent Keyword Search Schemes over Encrypted Data.
Proceedings of the Secure Data Management, Third VLDB Workshop, SDM 2006, Seoul, Korea, 2006
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006
Provably-Secure Two-Round Password-Authenticated Group Key Exchange in the Standard Model.
Proceedings of the Advances in Information and Computer Security, 2006
Proceedings of the Personal Wireless Communications, 2006
Proceedings of the Computational Science and Its Applications, 2006
Proceedings of the Computational Science and Its Applications, 2006
Efficient Password-Authenticated Key Exchange for Three-Party Secure Against Undetectable On-Line Dictionary Attacks.
Proceedings of the Computational Science, 2006
Proceedings of the Public Key Infrastructure, 2006
Proceedings of the Communications and Multimedia Security, 2006
Proceedings of the Cryptology and Network Security, 5th International Conference, 2006
Modified ID-Based Threshold Decryption and Its Application to Mediated ID-Based Encryption.
Proceedings of the Frontiers of WWW Research and Development, 2006
Proceedings of the Frontiers of WWW Research and Development, 2006
2005
IACR Cryptol. ePrint Arch., 2005
Appl. Math. Comput., 2005
Proceedings of the Information Security Applications, 6th International Workshop, 2005
Proceedings of the Trust, 2005
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2005
Efficient Revocation of Security Capability in Certificateless Public Key Cryptography.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005
Proceedings of the Information Networking, 2005
Proceedings of the Computational Science and Its Applications, 2005
Fine Grained Control of Security Capability and Forward Security in a Pairing Based Signature Scheme.
Proceedings of the Computational Science and Its Applications, 2005
Proceedings of the Advances in Cryptology, 2005
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005
Proceedings of the Advances in Cryptology, 2005
Proceedings of the Computational Intelligence and Security, International Conference, 2005
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks, 4th International Conference, 2005
Proceedings of the Applied Cryptography and Network Security, 2005
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005
2004
Proceedings of the Trust and Privacy in Digital Business, First International Conference, 2004
Proceedings of the Public Key Cryptography, 2004
Proceedings of the Parallel and Distributed Computing: Applications and Technologies, 2004
Proceedings of the Advances in Multimedia Information Processing - PCM 2004, 5th Pacific Rim Conference on Multimedia, Tokyo, Japan, November 30, 2004
Proceedings of the Advances in Cryptology, 2004
Proceedings of the Applied Cryptography and Network Security, 2004
2003
Proceedings of the Computer and Information Sciences, 2003
Proceedings of the E-Commerce and Web Technologies, 4th International Conference, 2003
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003
2002
Comput. Oper. Res., 2002
Proceedings of the Information Security and Cryptology, 2002
Proceedings of the Information Security and Cryptology, 2002
Proceedings of the Information Security and Cryptology, 2002
Proceedings of the Information and Communications Security, 4th International Conference, 2002
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002
2001
ACM SIGOPS Oper. Syst. Rev., 2001
Minimizing mean squared deviation of completion times with maximum tardiness constraint.
Eur. J. Oper. Res., 2001
Proceedings of the Information Security, 4th International Conference, 2001
2000
Proceedings of the Progress in Cryptology, 2000
Proceedings of the Information Security and Cryptology, 2000
1999
Int. J. Comput. Integr. Manuf., 1999
1997
1995
Inf. Comput., February, 1995
1993