default search action
Jaeil Lee
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j6]Jaeil Lee, Yongjoon Lee, Donghwan Lee, Hyukjin Kwon, Dongkyoo Shin:
Classification of Attack Types and Analysis of Attack Methods for Profiling Phishing Mail Attack Groups. IEEE Access 9: 80866-80872 (2021)
2010 – 2019
- 2019
- [j5]Jaeil Lee, Inkyung Jeon, Hyukjin Kwon, Dongil Shin, Dongkyoo Shin:
Erratum to: Real-time adult authentication scheme for digital contents using X.509 certificate in ubiquitous Web environment. J. Real Time Image Process. 16(5): 1883 (2019) - 2018
- [j4]Jaeil Lee, Inkyung Jeon, Hyukjin Kwon, Dongil Shin, Dongkyoo Shin:
Real-time adult authentication scheme for digital contents using X.509 certificate in ubiquitous Web environment. J. Real Time Image Process. 14(1): 237-244 (2018) - 2014
- [j3]Jaeil Lee, Dongkun Shin:
Adaptive Paired Page Prebackup Scheme for MLC NAND Flash Memory. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 33(7): 1110-1114 (2014)
2000 – 2009
- 2009
- [i7]Sang Hwan Park, Haeryong Park, Yoojae Won, Jaeil Lee, Stephen T. Kent:
Traceable Anonymous Certificate. RFC 5636: 1-31 (2009) - 2008
- [c16]Yong Lee, Jaeil Lee, Goo Yeon Lee:
Wireless Certificate Management Protocol Supporting Mobile Phones. SERVICES I 2008: 353-359 - 2007
- [j2]Yong Lee, Jaeil Lee, JooSeok Song:
Design and implementation of wireless PKI technology suitable for mobile phone in mobile-commerce. Comput. Commun. 30(4): 893-903 (2007) - [j1]Taekyoung Kwon, Hyung-Woo Lee, Jaeil Lee:
A Practical Method for Generating Digital Signatures Using Biometrics. IEICE Trans. Commun. 90-B(6): 1381-1389 (2007) - [c15]Joongman Kim, Seokung Yoon, Yoojae Won, Jaeil Lee:
VoIP Secure Communication Protocol satisfying Backward Compatibility. ICSNC 2007: 43 - [c14]Haeryong Park, Seongan Lim, Ikkwon Yie, Hyun Kim, Kilsoo Chun, Jaeil Lee:
An Information Aggregation Scheme of Multi-node in Ubiquitous Sensor Networks. ISPA Workshops 2007: 60-68 - [c13]Haeryong Park, Hyun Kim, Kilsoo Chun, Jaeil Lee, Seongan Lim, Ikkwon Yie:
Untraceability of Group Signature Schemes based on Bilinear Mapping and Their Improvement. ITNG 2007: 747-753 - 2006
- [c12]Haeryong Park, Hak Soo Ju, Kilsoo Chun, Jaeil Lee, Seungho Ahn, Bongnam Noh:
The Algorithm to Enhance the Security of Multi-Agent in Distributed Computing Environment. ICPADS (2) 2006: 55-60 - [c11]Jaeil Lee, Inkyoung Jeun, Seoklae Lee:
Efficient Attribute Authentication in Wireless Mobile Networks. ISPA Workshops 2006: 1080-1089 - [c10]Jeeyeon Kim, Seungjoo Kim, Kilsoo Chun, Jaeil Lee, Dongho Won:
Group Key Agreement Protocol Among Mobile Devices in Different Cells. ISPA Workshops 2006: 1090-1097 - [c9]Taekyoung Kwon, Jung Hee Cheon, Yongdae Kim, Jaeil Lee:
Privacy Protection in PKIs: A Separation-of-Authority Approach. WISA 2006: 297-311 - [i6]Jongwook Park, Jaeil Lee, Hongsub Lee, Sangjoon Park, Tim Polk:
Internet X.509 Public Key Infrastructure Subject Identification Method (SIM). RFC 4683: 1-20 (2006) - 2005
- [i5]Jongwook Park, Sungjae Lee, Jeeyeon Kim, Jaeil Lee:
The SEED Encryption Algorithm. RFC 4009: 1-17 (2005) - [i4]Jongwook Park, Sungjae Lee, Jeeyeon Kim, Jaeil Lee:
Use of the SEED Encryption Algorithm in Cryptographic Message Syntax (CMS). RFC 4010: 1-13 (2005) - [i3]Hyangjin Lee, Jaeho Yoon, Jaeil Lee:
Addition of SEED Cipher Suites to Transport Layer Security (TLS). RFC 4162: 1-6 (2005) - [i2]Hyangjin Lee, Jaeho Yoon, Seoklae Lee, Jaeil Lee:
The SEED Cipher Algorithm and Its Use with IPsec. RFC 4196: 1-12 (2005) - [i1]Hyangjin Lee, Sung Jae Lee, Jaeho Yoon, Dong Hyeon Cheon, Jaeil Lee:
The SEED Encryption Algorithm. RFC 4269: 1-16 (2005) - 2004
- [c8]Taekyoung Kwon, Jaeil Lee:
Practical Digital Signature Generation Using Biometrics. ICCSA (1) 2004: 728-737 - [c7]InKyung Jeun, Jaeil Lee, Sang Hwan Park:
Asia PKI Interoperability Guideline. ISSE 2004: 309-320 - [c6]Minsoo Lee, Jintaek Kim, Sehyun Park, Jaeil Lee, Seoklae Lee:
A Secure Web Services for Location Based Services in Wireless Networks. NETWORKING 2004: 332-344 - 2003
- [c5]Jabeom Gu, Sehyun Park, Ohyoung Song, Jaeil Lee, Jaehoon Nah, Sung Won Sohn:
Mobile PKI: A PKI-Based Authentication Framework for the Next Generation Mobile Communications. ACISP 2003: 180-191 - [c4]Jabeom Gu, Sehyun Park, Ohyoung Song, Jaeil Lee:
A PKI-Based Authentication Framework for Next Generation Mobile Internet. Human.Society@Internet 2003 2003: 34-43 - [c3]Jaeil Lee, Minsoo Lee, Jabeom Gu, Seoklae Lee, Sehyun Park, JooSeok Song:
New Adaptive Trust Models against DDoS: Back-Up CA and Mesh PKI. Human.Society@Internet 2003 2003: 731-737 - [c2]Jaepil Yoo, Keecheon Kim, Hyunseung Choo, Jaeil Lee, JooSeok Song:
Secure and Scalable Mobile IP Registration Scheme Using PKI. ICCSA (2) 2003: 220-229 - 2002
- [c1]Jaeil Lee, Taekyoung Kwon, Sanghoon Song, JooSeok Song:
A Model for Embedding and Authorizing Digital Signatures in Printed Documents. ICISC 2002: 465-477
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 12:55 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint