Filter
Conference contribution

Search results

  • 2019

    Subgraph-based adversarial examples against graph-based IoT malware detection systems

    Abusnaina, A., Alasmary, H., Abuhamad, M., Salem, S., Nyang, D. H. & Mohaisen, A., 2019, Computational Data and Social Networks - 8th International Conference, CSoNet 2019, Proceedings. Tagarelli, A. & Tong, H. (eds.). Springer, p. 268-281 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11917 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    10 Scopus citations
  • 2018

    Authorization based on mobile whitelist in devices for device-to-device communications

    You, S., Yang, D., Doh, I. & Chae, K., 19 Apr 2018, 32nd International Conference on Information Networking, ICOIN 2018. IEEE Computer Society, p. 706-711 6 p. (International Conference on Information Networking; vol. 2018-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • Customized embedded system design for lower limb rehabilitation patients

    Lee, C. E., Yeo, I. C. & Doh, I., 23 Mar 2018, IEEE 20th International Conference on Advanced Communication Technology: Opening New Era of Intelligent Things, ICACT 2018. Institute of Electrical and Electronics Engineers Inc., p. 229-233 5 p. (International Conference on Advanced Communication Technology, ICACT; vol. 2018-February).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Digitalseal: A Transaction Authentication Tool for Online and Offline Transactions

    Jung, C., Kang, J., Mohaisen, A. & Nyang, D., 10 Sep 2018, 2018 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2018 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 6956-6960 5 p. 8462341. (ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings; vol. 2018-April).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • Evolving neural network intrusion detection system for MCPS

    Mowla, N., Doh, I. & Chae, K., 23 Mar 2018, IEEE 20th International Conference on Advanced Communication Technology: Opening New Era of Intelligent Things, ICACT 2018. Institute of Electrical and Electronics Engineers Inc., p. 1040-1045 6 p. (International Conference on Advanced Communication Technology, ICACT; vol. 2018-February).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • Graph-based comparison of IoT and android malware

    Alasmary, H., Anwar, A., Park, J., Choi, J., Nyang, D. & Mohaisen, A., 2018, Computational Data and Social Networks - 7th International Conference, CSoNet 2018, Proceedings. Thai, M. T., Chen, X., Li, W. W. & Sen, A. (eds.). Springer Verlag, p. 259-272 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11280 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    33 Scopus citations
  • Large-scale and language-oblivious code authorship identification

    Abuhamad, M., AbuHmed, T., Mohaisen, A. & Nyang, D. H., 15 Oct 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 101-114 14 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    59 Scopus citations
  • NRIT: Non-redundant indirect trust search algorithm for a cross-domain based CDNi-P2P architecture

    Li, S., Doh, I. & Chae, K., 23 Mar 2018, IEEE 20th International Conference on Advanced Communication Technology: Opening New Era of Intelligent Things, ICACT 2018. Institute of Electrical and Electronics Engineers Inc., p. 992-998 7 p. (International Conference on Advanced Communication Technology, ICACT; vol. 2018-February).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Quantized memory-augmented neural networks

    Park, S., Kim, S., Lee, S., Bae, H. & Yoon, S., 2018, 32nd AAAI Conference on Artificial Intelligence, AAAI 2018. AAAI press, p. 3909-3916 8 p. (32nd AAAI Conference on Artificial Intelligence, AAAI 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    7 Scopus citations
  • RMBC: Randomized mesh blockchain using DBFT consensus algorithm

    Jeon, S., Doh, I. & Chae, K., 19 Apr 2018, 32nd International Conference on Information Networking, ICOIN 2018. IEEE Computer Society, p. 712-717 6 p. (International Conference on Information Networking; vol. 2018-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    15 Scopus citations
  • Secure medical image-sharing mechanism based on visual cryptography in EHR system

    Yang, D., Doh, I. & Chae, K., 23 Mar 2018, IEEE 20th International Conference on Advanced Communication Technology: Opening New Era of Intelligent Things, ICACT 2018. Institute of Electrical and Electronics Engineers Inc., p. 463-467 5 p. (International Conference on Advanced Communication Technology, ICACT; vol. 2018-February).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    6 Scopus citations
  • Selective fuzzy ensemble learner for cognitive detection of bio-identifiable modality spoofing in MCPS

    Mowla, N., Doh, I. & Chae, K., 23 Mar 2018, IEEE 20th International Conference on Advanced Communication Technology: Opening New Era of Intelligent Things, ICACT 2018. Institute of Electrical and Electronics Engineers Inc., p. 63-67 5 p. (International Conference on Advanced Communication Technology, ICACT; vol. 2018-February).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    6 Scopus citations
  • SSD-Insider: Internal defense of solid-state drive against ransomware with perfect data recovery

    Baek, S., Jung, Y., Mohaisen, A., Lee, S. & Nyang, D., 19 Jul 2018, Proceedings - 2018 IEEE 38th International Conference on Distributed Computing Systems, ICDCS 2018. Institute of Electrical and Electronics Engineers Inc., p. 875-884 10 p. (Proceedings - International Conference on Distributed Computing Systems; vol. 2018-July).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    45 Scopus citations
  • Timing is Almost Everything: Realistic Evaluation of the Very Short Intermittent DDoS Attacks

    Park, J., Nyang, D. & Mohaisen, A., 29 Oct 2018, 2018 16th Annual Conference on Privacy, Security and Trust, PST 2018. Deng, R. H., Marsh, S., Nurse, J., Lu, R., Sezer, S., Miller, P., Chen, L., McLaughlin, K. & Ghorbani, A. (eds.). Institute of Electrical and Electronics Engineers Inc., 8514210. (2018 16th Annual Conference on Privacy, Security and Trust, PST 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    7 Scopus citations
  • Understanding the hidden cost of software vulnerabilities: Measurements and predictions

    Anwar, A., Khormali, A., Nyang, D. H. & Mohaisen, A., 2018, Security and Privacy in Communication Networks - 14th International Conference, SecureComm 2018, Proceedings. Li, Y., Chang, B., Zhu, S. & Beyah, R. (eds.). Springer Verlag, p. 377-395 19 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 254).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • 2017

    An efficient KP-ABE with short ciphertexts in prime order groups under standard assumption

    Kim, J., Susilo, W., Guo, F., Au, M. H. & Nepal, S., 2 Apr 2017, ASIA CCS 2017 - Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 823-834 12 p. (ASIA CCS 2017 - Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    9 Scopus citations
  • Automated parking lot management system using embedded robot type smart car based on wireless sensors

    Kang, Y., Jung, D. & Doh, I., 15 Dec 2017, 2017 27th International Telecommunication Networks and Applications Conference, ITNAC 2017. Institute of Electrical and Electronics Engineers Inc., p. 1-6 6 p. (2017 27th International Telecommunication Networks and Applications Conference, ITNAC 2017; vol. 2017-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • Dynamic security-level maximization for stabilized parallel deep learning architectures in surveillance applications

    Kim, J., Mo, Y. J., Lee, W. & Nyang, D., 4 Dec 2017, Proceedings - 2017 IEEE Symposium on Privacy-Aware Computing, PAC 2017. Institute of Electrical and Electronics Engineers Inc., p. 192-193 2 p. (Proceedings - 2017 IEEE Symposium on Privacy-Aware Computing, PAC 2017; vol. 2017-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    11 Scopus citations
  • Enhanced password processing scheme based on visual cryptography and OCR

    Yang, D., Doh, I. & Chae, K., 13 Apr 2017, 31st International Conference on Information Networking, ICOIN 2017. IEEE Computer Society, p. 254-258 5 p. 7899514. (International Conference on Information Networking).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    12 Scopus citations
  • Evolving neural network intrusion detection system for MCPS

    Mowla, N., Doh, I. & Chae, K. J., 29 Mar 2017, 19th International Conference on Advanced Communications Technology: Opening Era of Smart Society, ICACT 2017 - Proceeding. Institute of Electrical and Electronics Engineers Inc., p. 183-187 5 p. 7890080. (International Conference on Advanced Communication Technology, ICACT).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Scopus citations
  • Lightweight authentication for distributed mobile P2P communications

    Lim, J., Doh, I. & Chae, K., 2017, Innovative Mobile and Internet Services in Ubiquitous Computing - Proceedings of the 11th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2017. Enokido, T. & Barolli, L. (eds.). Springer Verlag, p. 580-589 10 p. (Advances in Intelligent Systems and Computing; vol. 612).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Non-redundant indirect trust search algorithm based on a cross-domain trust model in content delivery network

    Li, S., Doh, I. & Chae, K., 29 Mar 2017, 19th International Conference on Advanced Communications Technology: Opening Era of Smart Society, ICACT 2017 - Proceeding. Institute of Electrical and Electronics Engineers Inc., p. 72-77 6 p. 7890059. (International Conference on Advanced Communication Technology, ICACT).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Scopus citations
  • Poster: Highly-accurate rogue access point detection using intentional channel interference

    Jang, R., Kang, J., Mohaisen, A. & Nyang, D., 18 Jul 2017, Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017. Association for Computing Machinery, Inc, p. 277-278 2 p. (Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Poster: Two-level network monitoring and management in WLAN using software-defined networking

    Jang, R., Cho, D., Mohaisen, A., Noh, Y. & Nyang, D., 18 Jul 2017, Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017. Association for Computing Machinery, Inc, p. 279-280 2 p. (Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Quantum security of NMAC and related constructions: PRF domain extension against quantum attacks

    Song, F. & Yun, A., 2017, Advances in Cryptology – CRYPTO 2017 - 37th Annual International Cryptology Conference, Proceedings. Katz, J. & Shacham, H. (eds.). Springer Verlag, p. 283-309 27 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10402 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    22 Scopus citations
  • RFlow+: An SDN-based WLAN monitoring and management framework

    Jang, R., Cho, D., Noh, Y. & Nyang, D., 2 Oct 2017, INFOCOM 2017 - IEEE Conference on Computer Communications. Institute of Electrical and Electronics Engineers Inc., 8056995. (Proceedings - IEEE INFOCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    22 Scopus citations
  • Rogue Access Point Detector Using Characteristics of Channel Overlapping in 802.11n

    Jang, R., Kang, J., Mohaisen, A. & Nyang, D., 13 Jul 2017, Proceedings - IEEE 37th International Conference on Distributed Computing Systems, ICDCS 2017. Lee, K. & Liu, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 2515-2520 6 p. 7980221. (Proceedings - International Conference on Distributed Computing Systems).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    11 Scopus citations
  • Understanding the effectiveness of typosquatting techniques

    Spaulding, J., Nyang, D. & Mohaisen, A., 14 Oct 2017, HotWeb 2017 - Proceedings of the 5th ACM/IEEE Workshop on Hot Topics in Web Systems and Technologies. Association for Computing Machinery, Inc, a9. (HotWeb 2017 - Proceedings of the 5th ACM/IEEE Workshop on Hot Topics in Web Systems and Technologies).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    11 Scopus citations
  • Understanding the Privacy Implications of DNSSEC Look-Aside Validation

    Mohaisen, A., Gu, Z., Ren, K., Njilla, L., Kamhoua, C. & Nyang, D. H., 4 Dec 2017, Proceedings - 2017 IEEE Symposium on Privacy-Aware Computing, PAC 2017. Institute of Electrical and Electronics Engineers Inc., p. 208-209 2 p. (Proceedings - 2017 IEEE Symposium on Privacy-Aware Computing, PAC 2017; vol. 2017-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2016

    A cross-domain trust model for reputation management in hybrid CDNi-P2P network

    Li, S., Doh, I. & Chae, K., 2016, 2016 6th International Workshop on Computer Science and Engineering, WCSE 2016. International Workshop on Computer Science and Engineering (WCSE), p. 180-184 5 p. (2016 6th International Workshop on Computer Science and Engineering, WCSE 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • A group authentication scheme based on lagrange interpolation polynomial

    Li, S., Doh, I. & Chae, K., 21 Dec 2016, Proceedings - 2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2016. Xhafa, F., Barolli, L. & Uchida, N. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 386-391 6 p. 7794496. (Proceedings - 2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    9 Scopus citations
  • An anonymous IP-based privacy protection routing mechanism for CDNi

    Li, S., Doh, I. & Chae, K., 7 Mar 2016, 30th International Conference on Information Networking, ICOIN 2016. IEEE Computer Society, p. 75-80 6 p. 7427091. (International Conference on Information Networking; vol. 2016-March).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • A tag based encoding: An efficient encoding for predicate encryption in prime order groups

    Kim, J., Susilo, W., Guo, F. & Au, M. H., 2016, Security and Cryptography for Networks - 10th International Conference, SCN 2016, Proceedings. De Prisco, R. & Zikas, V. (eds.). Springer Verlag, p. 3-22 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9841 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    6 Scopus citations
  • Authentication for mobile open IPTV service security

    Lim, J., Doh, I. & Chae, K., 21 Dec 2016, Proceedings - 2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2016. Xhafa, F., Barolli, L. & Uchida, N. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 381-385 5 p. 7794495. (Proceedings - 2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Mutual authentication based on visual cryptography and OCR for secure IoT service

    Yang, D., Doh, I. & Chae, K., 2016, 2016 6th International Workshop on Computer Science and Engineering, WCSE 2016. International Workshop on Computer Science and Engineering (WCSE), p. 214-219 6 p. (2016 6th International Workshop on Computer Science and Engineering, WCSE 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Privacy-Preserving Palm Print Authentication Using Homomorphic Encryption

    Im, J. H., Choi, J. C., Nyang, D. H. & Lee, M. K., 11 Oct 2016, Proceedings - 2016 IEEE 14th International Conference on Dependable, Autonomic and Secure Computing, DASC 2016, 2016 IEEE 14th International Conference on Pervasive Intelligence and Computing, PICom 2016, 2016 IEEE 2nd International Conference on Big Data Intelligence and Computing, DataCom 2016 and 2016 IEEE Cyber Science and Technology Congress, CyberSciTech 2016, DASC-PICom-DataCom-CyberSciTech 2016. Wang, K. I-K., Jin, Q., Bhuiyan, M. Z. A., Zhang, Q. & Hsu, C-H. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 878-881 4 p. 7588948. (Proceedings - 2016 IEEE 14th International Conference on Dependable, Autonomic and Secure Computing, DASC 2016, 2016 IEEE 14th International Conference on Pervasive Intelligence and Computing, PICom 2016, 2016 IEEE 2nd International Conference on Big Data Intelligence and Computing, DataCom 2016 and 2016 IEEE Cyber Science and Technology Congress, CyberSciTech 2016, DASC-PICom-DataCom-CyberSciTech 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    14 Scopus citations
  • Securing information flow in content delivery networks with visual and quantum cryptography

    Mowla, N. I., Doh, I. & Chae, K., 7 Mar 2016, 30th International Conference on Information Networking, ICOIN 2016. IEEE Computer Society, p. 463-468 6 p. 7427160. (International Conference on Information Networking; vol. 2016-March).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • 2015

    An efficient defense mechanism for spoofed IP attack in SDN based CDNi

    Mowla, N. I., Doh, I. & Chae, K., 10 Mar 2015, 2015 International Conference on Information Networking, ICOIN 2015. IEEE Computer Society, p. 92-97 6 p. 7057863. (International Conference on Information Networking; vol. 2015-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    16 Scopus citations
  • Generic hardness of the multiple discrete logarithm problem

    Yun, A., 2015, Advances in Cryptology - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2015, Proceedings. Fischlin, M. & Oswald, E. (eds.). Springer Verlag, p. 817-836 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9057).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    10 Scopus citations
  • Key management mechanism in ALTO/SDN based CDNi architecture

    Li, S., Doh, I. & Chae, K., 10 Mar 2015, 2015 International Conference on Information Networking, ICOIN 2015. IEEE Computer Society, p. 110-115 6 p. 7057866. (International Conference on Information Networking; vol. 2015-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • Secure Authentication for Structured Smart Grid System

    Doh, I., Lim, J. & Chae, K., 30 Sep 2015, Proceedings - 2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2015. Palmieri, F., Barolli, L., Dos Santos Silva, H. & Chen, H-C. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 200-204 5 p. 7284948. (Proceedings - 2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    26 Scopus citations
  • 2014

    Homomorphic authenticated encryption secure against chosen-ciphertext attack

    Joo, C. & Yun, A., 2014, Advances in Cryptology - ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings, Part II. Sarkar, P. & Iwata, T. (eds.). Springer Verlag, p. 173-192 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8874).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    20 Scopus citations
  • Multi-defense mechanism against DDoS in SDN based CDNi

    Nishat-I-Mowla, Doh, I. & Chae, K., 2014, Proceedings - 2014 8th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2014. Institute of Electrical and Electronics Engineers Inc., p. 447-451 5 p. 6975504. (Proceedings - 2014 8th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    15 Scopus citations
  • Service security for smart grid system

    Doh, I., Lim, J. & Chae, K., 2014, Proceedings - 2014 8th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2014. Institute of Electrical and Electronics Engineers Inc., p. 427-432 6 p. 6975501. (Proceedings - 2014 8th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • User authentication mechanism based on secure positioning system in RFID communication

    Chen, X., Doh, I. & Chae, K., 2014, Ubiquitous Information Technologies and Applications, CUTE 2013. Springer Verlag, p. 683-690 8 p. (Lecture Notes in Electrical Engineering; vol. 280 LNEE).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2013

    Batch fully homomorphic encryption over the integers

    Cheon, J. H., Coron, J. S., Kim, J., Lee, M. S., Lepoint, T., Tibouchi, M. & Yun, A., 2013, Advances in Cryptology, EUROCRYPT 2013 - 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. p. 315-335 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7881 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    232 Scopus citations
  • Key establishment and management for secure cellular machine-to-machine communication

    Doh, I., Lim, J., Li, S. & Chae, K., 2013, Proceedings - 7th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2013. p. 579-584 6 p. 6603737. (Proceedings - 7th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    8 Scopus citations
  • Secure aggregation and attack detection for smart grid system

    Doh, I., Lim, J. & Chae, K., 2013, Proceedings - 16th International Conference on Network-Based Information Systems, NBiS 2013. IEEE Computer Society, p. 270-275 6 p. 6685408. (Proceedings - 16th International Conference on Network-Based Information Systems, NBiS 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    7 Scopus citations
  • Security based semantic context awareness system for M2M ubiquitous healthcare service

    Choi, Y., Doh, I., Park, S. S. & Chae, K. J., 2013, Ubiquitous Information Technologies and Applications, CUTE 2012. p. 187-196 10 p. (Lecture Notes in Electrical Engineering; vol. 214 LNEE).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • 2012

    An improved security approach based on kerberos for M2M open IPTV system

    Doh, I., Chae, K., Lim, J. & Chung, M. Y., 2012, Proceedings of the 2012 15th International Conference on Network-Based Information Systems, NBIS 2012. p. 754-759 6 p. 6354919. (Proceedings of the 2012 15th International Conference on Network-Based Information Systems, NBIS 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations