Younho Lee
Younho Lee
Professor, IT Management Division, Department of Data Science, SeoulTech
Verified email at - Homepage
Cited by
Cited by
Order-preserving symmetric encryption
A Boldyreva, N Chenette, Y Lee, A O’neill
Advances in Cryptology-EUROCRYPT 2009, 224-241, 2009
Trust evaluation model for wireless sensor networks
J Hur, Y Lee, H Yoon, D Choi, S Jin
Advanced Communication Technology, 2005, ICACT 2005. The 7th International …, 2005
Over 100x faster bootstrapping in fully homomorphic encryption through memory-centric optimization with GPUs
W Jung, S Kim, JH Ahn, JH Cheon, Y Lee
IACR Transactions on Cryptographic Hardware and Embedded Systems, 114-148, 2021
A new data hiding scheme for binary image authentication with small image distortion
Y Lee, H Kim, Y Park
Information Sciences 179 (22), 3866-3884, 2009
Real-time analysis of intrusion detection alerts via correlation
S Lee, B Chung, H Kim, Y Lee, C Park, H Yoon
Computers & Security 25 (3), 169-183, 2006
Trust management for resilient wireless sensor networks
J Hur, Y Lee, SM Hong, H Yoon
Information Security and Cryptology-ICISC 2005, 56-68, 2005
Parallelized Scalar Multiplication on Elliptic Curves Defined over Optimal Extension Field.
J Lee, H Kim, Y Lee, SM Hong, H Yoon
IJ Network Security 4 (1), 99-106, 2007
Efficient machine learning over encrypted data with non-interactive communication
H Park, P Kim, H Kim, KW Park, Y Lee
Computer Standards & Interfaces 58, 87-108, 2018
Improved multi-precision squaring for low-end RISC microcontrollers
Y Lee, IH Kim, Y Park
Journal of Systems and Software 86 (1), 60-71, 2013
RLizard: Post-Quantum Key Encapsulation Mechanism for IoT Devices
J Lee, D Kim, H Lee, Y Lee, JH Cheon
IEEE Access 7, 2080-2091, 2019
On-demand secure routing protocol for ad hoc network using id based cryptosystem
YH Lee, H Kim, B Chung, J Lee, H Yoon
Parallel and Distributed Computing, Applications and Technologies, 2003 …, 2003
Digital rights management with right delegation for home networks
H Kim, Y Lee, B Chung, H Yoon, J Lee, KI Jung
Information Security and Cryptology–ICISC 2006, 233-245, 2006
A robust and flexible digital rights management system for home networks
H Kim, Y Lee, Y Park
Journal of Systems and Software 83 (12), 2431-2440, 2010
A new binary image authentication scheme with small distortion and low false negative rates
LEE Younho, HUR Junbeom, KIM Heeyoul, P Yongsu
IEICE transactions on communications 90 (11), 3259-3262, 2007
Eavesdropping One-Time Tokens Over Magnetic Secure Transmission in Samsung Pay
D Choi, Y Lee
10th USENIX Workshop on Offensive Technologies (WOOT 16), 2016
Personalized EigenTrust with the Beta Distribution.
D Choi, S Jin, Y Lee, Y Park
ETRI journal 32 (2), 2010
Private attribute inference from Facebook’s public text metadata: a case study of Korean users
D Choi, D Choi, Y Lee, Y Lee, S Kim, S Kim, P Kang, P Kang
Industrial Management & Data Systems 117 (8), 1687-1706, 2017
Efficient Sorting of Homomorphic Encrypted Data With k-Way Sorting Network
S Hong, S Kim, J Choi, Y Lee, JH Cheon
IEEE Transactions on Information Forensics and Security 16, 4389-4404, 2021
An Efficient Encrypted Floating-Point Representation Using HEAAN and TFHE
S Moon, Y Lee
Security and Communication Networks 2020, 2020
A new proxy signature scheme providing self-delegation
Y Lee, H Kim, Y Park, H Yoon
ICISC, 328-342, 2006
The system can't perform the operation now. Try again later.
Articles 1–20