default search action
Youngsook Lee
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j15]Sangjin Kook, Keunok Kim, Jihyeon Ryu, Youngsook Lee, Dongho Won:
Lightweight Hash-Based Authentication Protocol for Smart Grids. Sensors 24(10): 3085 (2024) - 2023
- [j14]Keunok Kim, Jihyeon Ryu, Youngsook Lee, Dongho Won:
An Improved Lightweight User Authentication Scheme for the Internet of Medical Things. Sensors 23(3): 1122 (2023) - 2022
- [j13]Jihyeon Ryu, Hakjun Lee, Youngsook Lee, Dongho Won:
SMASG: Secure Mobile Authentication Scheme for Global Mobility Network. IEEE Access 10: 26907-26919 (2022) - [j12]He-Wei Tian, Youngsook Lee:
Factors affecting continuous purchase intention of fashion products on social E-commerce: SOR model and the mediating effect. Entertain. Comput. 41: 100474 (2022) - [c38]Jihyeon Ryu, Dongho Won, Youngsook Lee:
A Study of Split Learning Model. IMCOM 2022: 1-4 - 2021
- [j11]Hakjun Lee, Dongwoo Kang, Youngsook Lee, Dongho Won:
Secure Three-Factor Anonymous User Authentication Scheme for Cloud Computing Environment. Wirel. Commun. Mob. Comput. 2021: 2098530:1-2098530:20 (2021) - [c37]Hakjun Lee, Jihyeon Ryu, Youngsook Lee, Dongho Won:
Security Analysis of Blockchain-based User Authentication for Smart Grid Edge Computing Infrastructure. IMCOM 2021: 1-4 - 2020
- [j10]Hakjun Lee, Dongwoo Kang, Jihyeon Ryu, Dongho Won, Hyoungshick Kim, Youngsook Lee:
A three-factor anonymous user authentication scheme for Internet of Things environments. J. Inf. Secur. Appl. 52: 102494 (2020) - [c36]Sewan Ha, Hakjun Lee, Dongho Won, Youngsook Lee:
Quantum-resistant Lattice-based Authentication for V2X Communication in C-ITS. IMCOM 2020: 1-8 - [c35]Dongwoo Kang, Hakjun Lee, Dongho Won, Youngsook Lee:
Cryptanalysis and Improvement of User Authentication Scheme Based on Rabin Cryptosystem. IMCOM 2020: 1-8 - [c34]Jihyeon Ryu, Hyoungshick Kim, Youngsook Lee, Dongho Won:
Cryptanalysis of Protocol for Heterogeneous Wireless Sensor Networks for the Internet of Things Environment. IMCOM 2020: 1-4
2010 – 2019
- 2018
- [j9]Dongwoo Kang, Jaewook Jung, Hyoungshick Kim, Youngsook Lee, Dongho Won:
Efficient and Secure Biometric-Based User Authenticated Key Agreement Scheme with Anonymity. Secur. Commun. Networks 2018: 9046064:1-9046064:14 (2018) - [c33]Jongho Moon, Youngsook Lee, Hyungkyu Yang, Hakjun Lee, Sewan Ha, Dongho Won:
Improvement on a Biometric-Based Key Agreement and Authentication Scheme for the Multi-server Environments. ICCSA (1) 2018: 541-557 - [c32]Jongho Moon, Youngsook Lee, Hyungkyu Yang, Taeui Song, Dongho Won:
Cryptanalysis of a privacy-preserving and provable user authentication scheme for wireless sensor networks based on Internet of Things security. ICOIN 2018: 432-437 - 2017
- [j8]Jongho Moon, Youngsook Lee, Jiye Kim, Dongho Won:
Improving an Anonymous and Provably Secure Authentication Protocol for a Mobile User. Secur. Commun. Networks 2017: 1378128:1-1378128:13 (2017) - [j7]Jongho Moon, Donghoon Lee, Youngsook Lee, Dongho Won:
Improving Biometric-Based Authentication Schemes with Smart Card Revocation/Reissue for Wireless Sensor Networks. Sensors 17(5): 940 (2017) - [c31]Jongho Moon, Taeui Song, Donghoon Lee, Youngsook Lee, Dongho Won:
Cryptanalysis of Chaos-Based 2-Party Key Agreement Protocol with Provable Security. AHFE (9) 2017: 72-77 - [c30]Jongho Moon, Hyungkyu Yang, Youngsook Lee, Dongho Won:
Improvement of user authentication scheme preserving uniqueness and anonymity for connected health care. IMCOM 2017: 11 - [c29]Hakjun Lee, Jiye Kim, Jaewook Jung, Youngsook Lee, Dongho Won:
An enhanced unlinkable anonymous payment scheme based on near field commnication. IMCOM 2017: 38 - 2016
- [j6]Younsung Choi, Youngsook Lee, Dongho Won:
Security Improvement on Biometric Based Authentication Scheme for Wireless Sensor Networks Using Fuzzy Extraction. Int. J. Distributed Sens. Networks 12(1): 8572410:1-8572410:16 (2016) - [j5]Youngseok Chung, Seokjin Choi, Youngsook Lee, Namje Park, Dongho Won:
An Enhanced Lightweight Anonymous Authentication Scheme for a Scalable Localization Roaming Service in Wireless Sensor Networks. Sensors 16(10): 1653 (2016) - [c28]Jaewook Jung, Donghoon Lee, Jiye Kim, Youngsook Lee, Dongwoo Kang, Dongho Won:
Cryptanalysis and Improvement of Efficient Password-Based User Authentication Scheme using Hash Function. IMCOM 2016: 23:1-23:8 - 2015
- [c27]Younsung Choi, Youngsook Lee, Dongho Won:
Cryptanalysis on Symmetric Key Techniques Based Authentication Scheme for Wireless Sensor Networks. CSA/CUTE 2015: 7-13 - [c26]Hanwook Lee, Jongho Mun, Jiye Kim, Youngsook Lee, Dongho Won:
Secure Deletion for Flash-Based Self-Encrypting Drives. CSA/CUTE 2015: 559-566 - [c25]Jiye Kim, Donghoon Lee, Younsung Choi, Youngsook Lee, Dongho Won:
Security Improvement of Portable Key Management Using a Mobile Phone. ICCSA (4) 2015: 148-159 - 2014
- [j4]Jiye Kim, Donghoon Lee, Woongryul Jeon, Youngsook Lee, Dongho Won:
Security Analysis and Improvements of Two-Factor Mutual Authentication with Key Agreement in Wireless Sensor Networks. Sensors 14(4): 6443-6462 (2014) - [j3]Junghyun Nam, Moonseong Kim, Juryon Paik, Youngsook Lee, Dongho Won:
A Provably-Secure ECC-Based Authentication Scheme for Wireless Sensor Networks. Sensors 14(11): 21023-21044 (2014) - 2013
- [c24]Youngsook Lee, Dongho Won:
On the Use of a Hash Function in a 3-Party Password-Based Authenticated Key Exchange Protocol. GPC 2013: 730-736 - [c23]Youngseok Chung, Youngsook Lee, Dongho Won:
Improved Authentication Scheme with Anonymity for Roaming Service in Global Mobility Networks. GPC 2013: 752-760 - [c22]Hyun-Jung Lee, Youngsook Lee, Dongho Won:
Security Requirement of End Point Security Software. GPC 2013: 788-795 - [c21]Inkyung Jeun, Youngsook Lee, Dongho Won:
Collecting and Filtering Out Phishing Suspicious URLs Using SpamTrap System. GPC 2013: 796-802 - [c20]Hyun-Jung Lee, Youngsook Lee, Dongho Won:
Protection Profile for PoS (Point of Sale) System. MUSIC 2013: 495-500 - [c19]Youngseok Chung, Seokjin Choi, Youngsook Lee, Dongho Won:
Security Enhanced Unlinkable Authentication Scheme with Anonymity for Global Mobility Networks. MUSIC 2013: 535-540 - 2012
- [j2]Woongryul Jeon, Jeeyeon Kim, Junghyun Nam, Youngsook Lee, Dongho Won:
An Enhanced Secure Authentication Scheme with Anonymity for Wireless Environments. IEICE Trans. Commun. 95-B(7): 2505-2508 (2012) - [c18]Woongryul Jeon, Jeeyeon Kim, Youngsook Lee, Dongho Won:
Security Analysis of Authentication Scheme for Wireless Communications with User Anonymity. ITCS 2012: 225-231 - [c17]Youngsook Lee, Jeeyeon Kim, Woongryul Jeon, Dongho Won:
Design of a Simple User Authentication Scheme Using QR-Code for Mobile Device. ITCS 2012: 241-247 - 2011
- [c16]Woongryul Jeon, Jeeyeon Kim, Junghyun Nam, Youngsook Lee, Dongho Won:
Cryptanalysis of the User Authentication Scheme with Anonymity. FGIT 2011: 285-292 - [c15]Sunwoo Park, Changbin Lee, Kwang-Woo Lee, Jeeyeon Kim, Youngsook Lee, Dongho Won:
Security Analysis on Digital Signature Function Implemented in PDF Software. FGIT 2011: 327-334 - [c14]Woongryul Jeon, Jeeyeon Kim, Youngsook Lee, Dongho Won:
A Practical Analysis of Smartphone Security. HCI (11) 2011: 311-320 - [c13]Youngsook Lee, Jeeyeon Kim, Dongho Won:
Cryptanalysis to a Remote User Authentication Scheme Using Smart Cards for Multi-server Environment. HCI (11) 2011: 321-329 - [c12]Junghyun Nam, Juryon Paik, Jeeyeon Kim, Youngsook Lee, Dongho Won:
Server-Aided Password-Authenticated Key Exchange: From 3-Party to Group. HCI (11) 2011: 339-348 - [c11]Woongryul Jeon, Youngsook Lee, Dongho Won:
Analysis of Content Filtering Software. HCI (11) 2011: 548-557 - 2010
- [c10]Youngsook Lee, Hyungkyu Yang, Dongho Won:
Attacking and Improving on Lee and Chiu's Authentication Scheme Using Smart Cards. ISPEC 2010: 377-385
2000 – 2009
- 2009
- [c9]Youngsook Lee, Dongho Won:
Security Vulnerabilities of a Remote User Authentication Scheme Using Smart Cards Suited for a Multi-server Environment. ICCSA (2) 2009: 164-172 - [c8]Youngsook Lee, Dongho Won:
Enhancing of a Password-Based Authentication Scheme Using Smart Cards. OTM Conferences (2) 2009: 879-886 - 2008
- [c7]Youngsook Lee, Dongho Won:
Security Weaknesses in Chang and Wu's Key Agreement Protocol for a Multi-Server Environment. ICEBE 2008: 308-314 - [c6]Youngsook Lee, Junghyun Nam, Dongho Won:
Vulnerabilities in a Remote Agent Authentication Scheme Using Smart Cards. KES-AMSTA 2008: 850-857 - 2007
- [j1]Junghyun Nam, Youngsook Lee, Seungjoo Kim, Dongho Won:
Security weakness in a three-party pairing-based protocol for password authenticated key exchange. Inf. Sci. 177(6): 1364-1375 (2007) - [c5]Junghyun Nam, Juryon Paik, Youngsook Lee, Jin Kwak, Ung-Mo Kim, Dongho Won:
Infringing Key Authentication of an ID-Based Group Key Exchange Protocol Using Binary Key Trees. KES (1) 2007: 672-679 - [c4]Youngsook Lee, Junghyun Nam, Jin Kwak, Dongho Won:
Password-Only Authenticated Key Exchange Between Two Agents in the Four-Party Setting. KES-AMSTA 2007: 616-625 - 2006
- [c3]Youngsook Lee, Junghyun Nam, Dongho Won:
An Inter-domain Key Agreement Protocol Using Weak Passwords. ICCSA (3) 2006: 517-526 - [c2]Youngsook Lee, Junghyun Nam, Seungjoo Kim, Dongho Won:
Two Efficient and Secure Authentication Schemes Using Smart Cards. ICCSA (5) 2006: 858-866 - [c1]Youngsook Lee, Junghyun Nam, Dongho Won:
Security Enhancement of a Remote User Authentication Scheme Using Smart Cards. OTM Workshops (1) 2006: 508-516 - [i1]Junghyun Nam, Youngsook Lee, Dongho Won:
Constant Round Group Key Exchange with Logarithmic Computational Complexity. IACR Cryptol. ePrint Arch. 2006: 284 (2006)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-19 21:47 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint