Byoungcheon Lee

Orcid: 0000-0002-1741-4192

According to our database1, Byoungcheon Lee authored at least 25 papers between 2000 and 2014.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2014
Hybrid-Style Personal Key Management in Ubiquitous Computing.
Proceedings of the SECRYPT 2014, 2014

2013
Practical Secret Signature Scheme with No Randomness Saving.
Proceedings of the 2013 International Conference on IT Convergence and Security, 2013

2012
Resuscitating privacy-preserving mobile payment with customer in complete control.
Pers. Ubiquitous Comput., 2012

2011
Security Framework for RFID-based Applications in Smart Home Environment.
J. Inf. Process. Syst., 2011

New receipt-free voting scheme using double-trapdoor commitment.
Inf. Sci., 2011

2010
Unified Public Key Infrastructure Supporting Both Certificate-Based and ID-Based Cryptography.
Proceedings of the ARES 2010, 2010

2007
Secret Signatures: How to Achieve Business Privacy Efficiently?
Proceedings of the Information Security Applications, 8th International Workshop, 2007

2005
Two models of efficient Mixnet-based receipt-free voting using (threshold) re-encryption.
Comput. Syst. Sci. Eng., 2005

Ciphertext Comparison, a New Solution to the Millionaire Problem.
Proceedings of the Information and Communications Security, 7th International Conference, 2005

New Key Management Systems for Multilevel Security.
Proceedings of the Computational Science and Its Applications, 2005

2004
An Efficient Mixnet-Based Voting Scheme Providing Receipt-Freeness.
Proceedings of the Trust and Privacy in Digital Business, First International Conference, 2004

Multiplicative Homomorphic E-Voting.
Proceedings of the Progress in Cryptology, 2004

An Efficient and Verifiable Solution to the Millionaire Problem.
Proceedings of the Information Security and Cryptology, 2004

A Secure and Efficient Mix-Network using Extended Binary Mixing Gate.
Proceedings of the Cryptographic Algorithms and their Uses, 2004

Secure Key Issuing in ID-based Cryptography.
Proceedings of the ACSW Frontiers 2004, 2004 ACSW Workshops, 2004

Batch Verification for Equality of Discrete Logarithms and Threshold Decryptions.
Proceedings of the Applied Cryptography and Network Security, 2004

2003
Providing Receipt-Freeness in Mixnet-Based Voting Protocols.
Proceedings of the Information Security and Cryptology, 2003

Receipt-Free Electronic Auction Schemes Using Homomorphic Encryption.
Proceedings of the Information Security and Cryptology, 2003

2002
Design and implementation of an efficient fair off-line e-cash system based on elliptic curve discrete logarithm problem.
J. Commun. Networks, 2002

Self-certified Signatures.
Proceedings of the Progress in Cryptology, 2002

Receipt-Free Electronic Voting Scheme with a Tamper-Resistant Randomizer.
Proceedings of the Information Security and Cryptology, 2002

2001
Efficient Public Auction with One-Time Registration and Public Verifiability.
Proceedings of the Progress in Cryptology, 2001

Secure Mobile Agent Using Strong Non-designated Proxy Signature.
Proceedings of the Information Security and Privacy, 6th Australasian Conference, 2001

2000
Secure Matchmaking Protocol.
Proceedings of the Information Security and Cryptology, 2000

Secure Length-Saving ElGamal Encryption under the Computational Diffie-Hellman Assumption.
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000


  Loading...