Follow
Dong Hoon Lee
Title
Cited by
Cited by
Year
A practical wireless attack on the connected car and security protocol for in-vehicle CAN
S Woo, HJ Jo, DH Lee
IEEE Transactions on intelligent transportation systems 16 (2), 993-1006, 2014
5652014
Off-line keyword guessing attacks on recent keyword search schemes over encrypted data
JW Byun, HS Rhee, HA Park, DH Lee
Workshop on secure data management, 75-83, 2006
4762006
Trapdoor security in a searchable public-key encryption scheme with a designated tester
HS Rhee, JH Park, W Susilo, DH Lee
Journal of systems and software 83 (5), 763-771, 2010
3482010
Efficient authentication for low-cost RFID systems
SM Lee, YJ Hwang, DH Lee, JI Lim
Computational Science and Its Applications–ICCSA 2005: International …, 2005
3062005
VoltageIDS: Low-level communication characteristics for automotive intrusion detection system
W Choi, K Joo, HJ Jo, MC Park, DH Lee
IEEE Transactions on Information Forensics and Security 13 (8), 2114-2129, 2018
2922018
Identifying ecus using inimitable characteristics of signals in controller area networks
W Choi, HJ Jo, S Woo, JY Chun, J Park, DH Lee
IEEE Transactions on Vehicular Technology 67 (6), 4757-4770, 2018
2222018
An efficient algorithm for fuzzy weighted average
DH Lee, D Park
Fuzzy sets and systems 87 (1), 39-45, 1997
2201997
Efficient ID-based group key agreement with bilinear maps
KY Choi, JY Hwang, DH Lee
International Workshop on Public Key Cryptography, 130-144, 2004
2122004
Improved searchable public key encryption with designated tester
HS Rhee, JH Park, W Susilo, DH Lee
Proceedings of the 4th international symposium on information, computer, and …, 2009
1982009
Constructing PEKS schemes secure against keyword guessing attacks is possible?
IR Jeong, JO Kwon, D Hong, DH Lee
Computer communications 32 (2), 394-396, 2009
1672009
AI-IDS: Application of deep learning to real-time Web intrusion detection
A Kim, M Park, DH Lee
IEEE Access 8, 70245-70261, 2020
1612020
Constant-round authenticated group key exchange for dynamic groups
HJ Kim, SM Lee, DH Lee
International Conference on the Theory and Application of Cryptology and …, 2004
1612004
Efficient certificateless signature schemes
KY Choi, JH Park, JY Hwang, DH Lee
Applied Cryptography and Network Security: 5th International Conference …, 2007
1602007
A practical security architecture for in-vehicle CAN-FD
S Woo, HJ Jo, IS Kim, DH Lee
IEEE Transactions on Intelligent Transportation Systems 17 (8), 2248-2261, 2016
1522016
Password-authenticated key exchange between clients with different passwords
JW Byun, IR Jeong, DH Lee, CS Park
Information and Communications Security: 4th International Conference, ICICS …, 2002
1382002
One-round protocols for two-party authenticated key exchange
IR Jeong, J Katz, DH Lee
Applied Cryptography and Network Security: Second International Conference …, 2004
1362004
Efficient conjunctive keyword search on encrypted data storage system
JW Byun, DH Lee, J Lim
European Public Key Infrastructure Workshop, 184-196, 2006
1332006
Efficient RFID authentication protocol for ubiquitous computing environment
EY Choi, SM Lee, DH Lee
International Conference on Embedded and Ubiquitous Computing, 945-954, 2005
1242005
Efficient and privacy-preserving metering protocols for smart grid systems
HJ Jo, IS Kim, DH Lee
IEEE Transactions on Smart Grid 7 (3), 1732-1742, 2015
1082015
A new provably secure certificateless short signature scheme
KY Choi, JH Park, DH Lee
Computers & Mathematics with Applications 61 (7), 1760-1768, 2011
1082011
The system can't perform the operation now. Try again later.
Articles 1–20