default search action
Byoungcheon Lee
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2014
- [c20]Byoungcheon Lee:
Hybrid-Style Personal Key Management in Ubiquitous Computing. SECRYPT 2014: 238-243 - 2013
- [c19]Byoungcheon Lee:
Practical Secret Signature Scheme with No Randomness Saving. ICITCS 2013: 1-3 - 2012
- [j5]Divyan Munirathnam Konidala, Made Harta Dwijaksara, Kwangjo Kim, Dongman Lee, Byoungcheon Lee, Daeyoung Kim, Soontae Kim:
Resuscitating privacy-preserving mobile payment with customer in complete control. Pers. Ubiquitous Comput. 16(6): 643-654 (2012) - 2011
- [j4]Xiaofeng Chen, Qianhong Wu, Fangguo Zhang, Haibo Tian, Baodian Wei, Byoungcheon Lee, Hyunrok Lee, Kwangjo Kim:
New receipt-free voting scheme using double-trapdoor commitment. Inf. Sci. 181(8): 1493-1502 (2011) - [j3]Divyan M. Konidala, Daeyoung Kim, Chan Yeob Yeun, Byoungcheon Lee:
Security Framework for RFID-based Applications in Smart Home Environment. J. Inf. Process. Syst. 7(1): 111-120 (2011) - 2010
- [c18]Byoungcheon Lee:
Unified Public Key Infrastructure Supporting Both Certificate-Based and ID-Based Cryptography. ARES 2010: 54-61
2000 – 2009
- 2007
- [c17]Byoungcheon Lee, Kim-Kwang Raymond Choo, Jeongmo Yang, Seungjae Yoo:
Secret Signatures: How to Achieve Business Privacy Efficiently? WISA 2007: 30-47 - 2006
- [e1]Min Surp Rhee, Byoungcheon Lee:
Information Security and Cryptology - ICISC 2006, 9th International Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings. Lecture Notes in Computer Science 4296, Springer 2006, ISBN 3-540-49112-0 [contents] - 2005
- [j2]Riza Aditya, Byoungcheon Lee, Colin Boyd, Ed Dawson:
Two models of efficient Mixnet-based receipt-free voting using (threshold) re-encryption. Comput. Syst. Sci. Eng. 20(6) (2005) - [c16]Hwankoo Kim, Bongjoo Park, JaeCheol Ha, Byoungcheon Lee, DongGook Park:
New Key Management Systems for Multilevel Security. ICCSA (2) 2005: 245-253 - [c15]Kun Peng, Colin Boyd, Ed Dawson, Byoungcheon Lee:
Ciphertext Comparison, a New Solution to the Millionaire Problem. ICICS 2005: 84-96 - 2004
- [c14]Riza Aditya, Kun Peng, Colin Boyd, Ed Dawson, Byoungcheon Lee:
Batch Verification for Equality of Discrete Logarithms and Threshold Decryptions. ACNS 2004: 494-508 - [c13]Byoungcheon Lee, Colin Boyd, Ed Dawson, Kwangjo Kim, Jeongmo Yang, Seungjae Yoo:
Secure Key Issuing in ID-based Cryptography. ACSW 2004: 69-74 - [c12]Kun Peng, Riza Aditya, Colin Boyd, Ed Dawson, Byoungcheon Lee:
A Secure and Efficient Mix-Network using Extended Binary Mixing Gate. Cryptographic Algorithms and their Uses 2004: 57-71 - [c11]Kun Peng, Colin Boyd, Ed Dawson, Byoungcheon Lee:
An Efficient and Verifiable Solution to the Millionaire Problem. ICISC 2004: 51-66 - [c10]Kun Peng, Riza Aditya, Colin Boyd, Ed Dawson, Byoungcheon Lee:
Multiplicative Homomorphic E-Voting. INDOCRYPT 2004: 61-72 - [c9]Riza Aditya, Byoungcheon Lee, Colin Boyd, Ed Dawson:
An Efficient Mixnet-Based Voting Scheme Providing Receipt-Freeness. TrustBus 2004: 152-161 - 2003
- [c8]Byoungcheon Lee, Colin Boyd, Ed Dawson, Kwangjo Kim, Jeongmo Yang, Seungjae Yoo:
Providing Receipt-Freeness in Mixnet-Based Voting Protocols. ICISC 2003: 245-258 - [c7]Xiaofeng Chen, Byoungcheon Lee, Kwangjo Kim:
Receipt-Free Electronic Auction Schemes Using Homomorphic Encryption. ICISC 2003: 259-273 - 2002
- [j1]Manho Lee, Gookwhan Ahn, Jinho Kim, Jaegwan Park, Byoungcheon Lee, Kwangjo Kim, Hyuckjae Lee:
Design and implementation of an efficient fair off-line e-cash system based on elliptic curve discrete logarithm problem. J. Commun. Networks 4(2): 81-89 (2002) - [c6]Byoungcheon Lee, Kwangjo Kim:
Receipt-Free Electronic Voting Scheme with a Tamper-Resistant Randomizer. ICISC 2002: 389-406 - [c5]Byoungcheon Lee, Kwangjo Kim:
Self-certified Signatures. INDOCRYPT 2002: 199-214 - 2001
- [c4]Byoungcheon Lee, Heesun Kim, Kwangjo Kim:
Secure Mobile Agent Using Strong Non-designated Proxy Signature. ACISP 2001: 474 - [c3]Byoungcheon Lee, Kwangjo Kim, Joongsoo Ma:
Efficient Public Auction with One-Time Registration and Public Verifiability. INDOCRYPT 2001: 162-174 - 2000
- [c2]Joonsang Baek, Byoungcheon Lee, Kwangjo Kim:
Secure Length-Saving ElGamal Encryption under the Computational Diffie-Hellman Assumption. ACISP 2000: 49-58 - [c1]Byoungcheon Lee, Kwangjo Kim:
Secure Matchmaking Protocol. ICISC 2000: 123-134
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 12:47 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint