Im-Yeong Lee
Orcid: 0000-0002-8856-0103
According to our database1,
Im-Yeong Lee
authored at least 89 papers
between 2001 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
A study on the traceable attribute-based signature scheme provided with anonymous credentials.
Connect. Sci., December, 2024
A Comprehensive Approach to User Delegation and Anonymity within Decentralized Identifiers for IoT.
Sensors, April, 2024
Data Access Control for Secure Authentication Using Dual VC Scheme Based on CP-ABE in DID.
J. Circuits Syst. Comput., March, 2024
2022
Identity Access Management via ECC Stateless Derived Key Based Hierarchical Blockchain for the Industrial Internet of Things.
IEICE Trans. Inf. Syst., November, 2022
A Certificateless-based One-Round Authenticated Group Key Agreement Protocol to Prevent Impersonation Attacks.
KSII Trans. Internet Inf. Syst., 2022
A Study on Data Sharing Scheme using ECP-ABSC that Provides Data User Traceability in the Cloud.
KSII Trans. Internet Inf. Syst., 2022
2021
Group Delegated ID-Based Proxy Reencryption for the Enterprise IoT-Cloud Storage Environment.
Wirel. Commun. Mob. Comput., 2021
Sensors, 2021
A Privacy-Preserving Key Management Scheme with Support for Sybil Attack Detection in VANETs.
Sensors, 2021
Data Distribution for Multiple Receivers in a Connected Car Environment Using 5G Communication.
Secur. Commun. Networks, 2021
J. Inf. Process. Syst., 2021
Int. J. Web Grid Serv., 2021
An Efficient Public Verifiable Certificateless Multi-Receiver Signcryption Scheme for IoT Environments.
IEICE Trans. Inf. Syst., 2021
VAIM: Verifiable Anonymous Identity Management for Human-Centric Security and Privacy in the Internet of Things.
IEEE Access, 2021
A Federated Framework for Fine-Grained Cloud Access Control for Intelligent Big Data Analytic by Service Providers.
IEEE Access, 2021
Pairing-Free Signatures With Insider-Attack Resistance for Vehicular Ad-Hoc Networks (VANETs).
IEEE Access, 2021
Efficient Short Group Signatures for Conditional Privacy in Vehicular Ad Hoc Networks via ID Caching and Timed Revocation.
IEEE Access, 2021
2020
Sensors, 2020
Sensors, 2020
A Study on CP-ABE-Based Medical Data Sharing System with Key Abuse Prevention and Verifiable Outsourcing in the IoMT Environment.
Sensors, 2020
J. Inf. Process. Syst., 2020
KSII Trans. Internet Inf. Syst., 2020
Proceedings of the Silicon Valley Cybersecurity Conference - First Conference, 2020
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2020
Secure Hierarchical Deterministic Key Generation Scheme in Blockchain-based Medical Environment.
Proceedings of the IECC 2020: 2nd International Electronics Communication Conference, 2020
A Study on Access Control Scheme Based on ABE Using Searchable Encryption in Cloud Environment.
Proceedings of the Advances in Internet, 2020
2019
Enhanced signature RTD transaction scheme based on Chebyshev polynomial for mobile payments service in IoT device environment.
J. Supercomput., 2019
KSII Trans. Internet Inf. Syst., 2019
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2019
A Study on Hybrid Blockchain-based XGS (XOR Global State) Injection Technology for Efficient Contents Modification and Deletion.
Proceedings of the 6th International Conference on Software Defined Systems, 2019
2018
Dynamic Group Authentication and Key Exchange Scheme Based on Threshold Secret Sharing for IoT Smart Metering Environments.
Sensors, 2018
J. Ambient Intell. Humaniz. Comput., 2018
A Study on KSI-based Authentication Management and Communication for Secure Smart Home Environments.
KSII Trans. Internet Inf. Syst., 2018
Secure Data Deduplication Scheme Using Linkage of Data Blocks in Cloud Storage Environment.
Proceedings of the Advanced Multimedia and Ubiquitous Engineering, 2018
2017
Enhanced Mutual Authentication Scheme based on Chaotic Map for PCM in NFC Service Environment.
KSII Trans. Internet Inf. Syst., 2017
A study on a secure single sign-on for user authentication information privacy in distributed computing environment.
Int. J. Commun. Networks Distributed Syst., 2017
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2017
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2017
2016
Mutual Authentication Scheme Based on Lattice for NFC-PCM Payment Service Environment.
Int. J. Distributed Sens. Networks, 2016
2015
Study on User Authority Management for Safe Data Protection in Cloud Computing Environments.
Symmetry, 2015
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2015
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015
2014
Entropy, 2014
2013
Anonymous Authentication Scheme based on NTRU for the Protection of Payment Information in NFC Mobile Environment.
J. Inf. Process. Syst., 2013
J. Inf. Process. Syst., 2013
Proceedings of the Information Technology Convergence, 2013
Proceedings of the Information Technology Convergence, 2013
2012
Math. Comput. Model., 2012
2011
Admissible bilinear map-based key management protocol for HPCCS in heterogeneous network.
J. Supercomput., 2011
Comput. Commun., 2011
2010
Wirel. Pers. Commun., 2010
Proceedings of the 13th International Conference on Network-Based Information Systems, 2010
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010
2009
Device Authentication/Authorization Protocol for Home Network in Next Generation Security.
Proceedings of the Advances in Information Security and Assurance, 2009
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009
Proceedings of the 2nd International Conference on Computer Science and its Applications, 2009
2008
A study on secure RFID mutual authentication scheme in pervasive computing environment.
Comput. Commun., 2008
Proceedings of the 2008 International Conference on Multimedia and Ubiquitous Engineering (MUE 2008), 2008
A study on authentication/authorization/accounting and roaming mechanism in pervasive environment.
Proceedings of the 5th Annual International Conference on Mobile and Ubiquitous Systems: Computing, 2008
2007
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007
Proceedings of the Emerging Technologies in Knowledge Discovery and Data Mining, 2007
Intelligent Home Network Authentication: Home Device Authentication Using Device Certification.
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007
A Study on Key Distribution and ID Registration in the AAA System for Ubiquitous Multimedia Environments.
Proceedings of the Advances in Multimedia Modeling, 2007
A Study on Authentication Protocol in offering Identification Synchronization and Position Detection in RFID System.
Proceedings of the 2007 International Conference on Intelligent Pervasive Computing, 2007
A Study on Ticket-Based AAA Mechanism Including Time Synchronization OTP in Ubiquitous Environment.
Proceedings of the Computational Science and Its Applications, 2007
A Study on Low-Cost RFID System Management with Mutual Authentication Scheme in Ubiquitous.
Proceedings of the Managing Next Generation Networks and Services, 2007
2006
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2006
An Efficient Key Distribution for Ubiquitous Environment in Ad-Hoc Network Using Broadcast Encryption.
Proceedings of the Computational Science and Its Applications, 2006
Authentication for Single/Multi Domain in Ubiquitous Computing Using Attribute Certification.
Proceedings of the Computational Science and Its Applications, 2006
Proceedings of the High Performance Computing and Communications, 2006
Broadcast Encryption Using Efficient Key Distribution and Renewal for Ubiquitous Environments.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006
2005
J. Inf. Process. Syst., 2005
Proceedings of the Computational Science and Its Applications, 2005
Proceedings of the Computational Science and Its Applications, 2005
Proceedings of the Web and Communication Technologies and Internet-Related Social Issues, 2005
2004
Proceedings of the Computational Science and Its Applications, 2004
Proceedings of the Computational Science and Its Applications, 2004
Proceedings of the Computational Science and Its Applications, 2004
Proceedings of the 2004 IEEE International Conference on e-Technology, 2004
2003
Proceedings of the Web Engineering, International Conference, 2003
Proceedings of the Computational Science - ICCS 2003, 2003
Proceedings of the E-Commerce and Web Technologies, 4th International Conference, 2003
2002
Proceedings of the Progress in Cryptology, 2002
Proceedings of the EurAsia-ICT 2002: Information and Communication Technology, 2002
Proceedings of the EurAsia-ICT 2002: Information and Communication Technology, 2002
Proceedings of the E-Commerce and Web Technologies, Third International Conference, 2002
Proceedings of the Advances in Information Systems, Second International Conference, 2002
2001
Proceedings of the Information and Communications Security, Third International Conference, 2001