A practical wireless attack on the connected car and security protocol for in-vehicle CAN S Woo, HJ Jo, DH Lee IEEE Transactions on intelligent transportation systems 16 (2), 993-1006, 2014 | 578 | 2014 |
Off-line keyword guessing attacks on recent keyword search schemes over encrypted data JW Byun, HS Rhee, HA Park, DH Lee Workshop on secure data management, 75-83, 2006 | 482 | 2006 |
Trapdoor security in a searchable public-key encryption scheme with a designated tester HS Rhee, JH Park, W Susilo, DH Lee Journal of systems and software 83 (5), 763-771, 2010 | 356 | 2010 |
Efficient authentication for low-cost RFID systems SM Lee, YJ Hwang, DH Lee, JI Lim Computational Science and Its Applications–ICCSA 2005: International …, 2005 | 310 | 2005 |
VoltageIDS: Low-level communication characteristics for automotive intrusion detection system W Choi, K Joo, HJ Jo, MC Park, DH Lee IEEE Transactions on Information Forensics and Security 13 (8), 2114-2129, 2018 | 301 | 2018 |
Identifying ecus using inimitable characteristics of signals in controller area networks W Choi, HJ Jo, S Woo, JY Chun, J Park, DH Lee IEEE Transactions on Vehicular Technology 67 (6), 4757-4770, 2018 | 224 | 2018 |
An efficient algorithm for fuzzy weighted average DH Lee, D Park Fuzzy sets and systems 87 (1), 39-45, 1997 | 221 | 1997 |
Efficient ID-based group key agreement with bilinear maps KY Choi, JY Hwang, DH Lee International Workshop on Public Key Cryptography, 130-144, 2004 | 212 | 2004 |
Improved searchable public key encryption with designated tester HS Rhee, JH Park, W Susilo, DH Lee Proceedings of the 4th international symposium on information, computer, and …, 2009 | 199 | 2009 |
AI-IDS: Application of deep learning to real-time Web intrusion detection A Kim, M Park, DH Lee IEEE Access 8, 70245-70261, 2020 | 172 | 2020 |
Constructing PEKS schemes secure against keyword guessing attacks is possible? IR Jeong, JO Kwon, D Hong, DH Lee Computer communications 32 (2), 394-396, 2009 | 166 | 2009 |
Constant-round authenticated group key exchange for dynamic groups HJ Kim, SM Lee, DH Lee International Conference on the Theory and Application of Cryptology and …, 2004 | 162 | 2004 |
Efficient certificateless signature schemes KY Choi, JH Park, JY Hwang, DH Lee Applied Cryptography and Network Security: 5th International Conference …, 2007 | 159 | 2007 |
A practical security architecture for in-vehicle CAN-FD S Woo, HJ Jo, IS Kim, DH Lee IEEE Transactions on Intelligent Transportation Systems 17 (8), 2248-2261, 2016 | 155 | 2016 |
Password-authenticated key exchange between clients with different passwords JW Byun, IR Jeong, DH Lee, CS Park Information and Communications Security: 4th International Conference, ICICS …, 2002 | 137 | 2002 |
One-round protocols for two-party authenticated key exchange IR Jeong, J Katz, DH Lee Applied Cryptography and Network Security: Second International Conference …, 2004 | 136 | 2004 |
Efficient conjunctive keyword search on encrypted data storage system JW Byun, DH Lee, J Lim European Public Key Infrastructure Workshop, 184-196, 2006 | 134 | 2006 |
Efficient RFID authentication protocol for ubiquitous computing environment EY Choi, SM Lee, DH Lee International Conference on Embedded and Ubiquitous Computing, 945-954, 2005 | 123 | 2005 |
Efficient and privacy-preserving metering protocols for smart grid systems HJ Jo, IS Kim, DH Lee IEEE Transactions on Smart Grid 7 (3), 1732-1742, 2015 | 109 | 2015 |
A new provably secure certificateless short signature scheme KY Choi, JH Park, DH Lee Computers & Mathematics with Applications 61 (7), 1760-1768, 2011 | 108 | 2011 |