Ik Rae Jeong

Orcid: 0000-0002-4120-2165

According to our database1, Ik Rae Jeong authored at least 55 papers between 2000 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Identity-Based Multiproxy Signature With Proxy Signing Key for Internet of Drones.
IEEE Internet Things J., February, 2024

2023
Effect of Smaller Fingerprint Sensors on the Security of Fingerprint Authentication.
IEEE Access, 2023

Cost-Effectively Searchable Blackbox Data With Unlinkability Based on Public Blockchain.
IEEE Access, 2023

2022
Securing a Local Training Dataset Size in Federated Learning.
IEEE Access, 2022

Key Agreement Between User and Drone With Forward Unlinkability in Internet of Drones.
IEEE Access, 2022

2021
Improved Fingerprint Indexing Based on Extended Triangulation.
IEEE Access, 2021

2020
On the Unlinkability of Fingerprint Shell.
Secur. Commun. Networks, 2020

2019
Comments on Physically Unclonable Function Based Two-Factor Authentication Protocols.
Wirel. Pers. Commun., 2019

A Cancelable Template for the Low-Quality Fingerprints from Wearable Devices.
Secur. Commun. Networks, 2019

Efficient Cancelable Iris Template Generation for Wearable Sensors.
Secur. Commun. Networks, 2019

Transitive Signature Schemes for Undirected Graphs from Lattices.
KSII Trans. Internet Inf. Syst., 2019

2017
Certificateless Public Auditing Protocol with<i> Constant</i> Verification Time.
Secur. Commun. Networks, 2017

Provably-Secure Public Auditing with Deduplication.
KSII Trans. Internet Inf. Syst., 2017

2016
Strong designated verifier signature scheme from lattices in the standard model.
Secur. Commun. Networks, 2016

Collusion-resistant unidirectional proxy re-encryption scheme from lattices.
J. Commun. Networks, 2016

2015
Efficient verifiable data streaming.
Secur. Commun. Networks, 2015

A new certificateless signature scheme under enhanced security models.
Secur. Commun. Networks, 2015

A New Generic Construction of Proxy Signatures under Enhanced Security Models.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015

2014
Sharing Privacy Protected and Statistically Sound Clinical Research Data Using Outsourced Data Storage.
J. Appl. Math., 2014

Strongly Unforgeable Ring Signature Scheme from Lattices in the Standard Model.
J. Appl. Math., 2014

Efficient verifiably encrypted signatures from lattices.
Int. J. Inf. Sec., 2014

2013
Identity-based proxy signature from lattices.
J. Commun. Networks, 2013

Scalable Hierarchical Identity-based Signature Scheme from Lattices.
KSII Trans. Internet Inf. Syst., 2013

Privacy-preserving disjunctive normal form operations on distributed sets.
Inf. Sci., 2013

2012
Privacy-preserving range set union for rare cases in healthcare data.
IET Commun., 2012

Scalable Privacy-Preserving <i>t</i>-Repetition Protocol with Distributed Medical Data.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012

A Strong Binding Encryption Scheme from Lattices for Secret Broadcast.
IEEE Commun. Lett., 2012

2009
Light-Weight Key Exchange with Different Passwords in the Standard Model.
J. Univers. Comput. Sci., 2009

A forward-secure e-mail protocol without certificated public keys.
Inf. Sci., 2009

Stronger Chikazawa-Yamagishi ID-Based Key Distribution.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

Collusion Attacks to Tanaka's Corrected ID-Based Non-interactive Key Sharing Scheme.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

Analysis of Revocable-iff-Linked Ring Signature Scheme.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

Searchable Encryption with <i>Keyword-Recoverability</i>.
IEICE Trans. Inf. Syst., 2009

Efficient secret broadcast in the broadcasting networks.
IEEE Commun. Lett., 2009

Constructing PEKS schemes secure against keyword guessing attacks is possible?
Comput. Commun., 2009

2008
Ring Signature with Weak Linkability and Its Applications.
IEEE Trans. Knowl. Data Eng., 2008

Parallel Key Exchange.
J. Univers. Comput. Sci., 2008

Practical Password-Authenticated Three-Party Key Exchange.
KSII Trans. Internet Inf. Syst., 2008

Strong ID-Based Key Distribution.
IEICE Trans. Commun., 2008

Analysis of Some Keyword Search Schemes in Encrypted Data.
IEEE Commun. Lett., 2008

Data Randomization for Lightweight Secure Data Aggregation in Sensor Network.
Proceedings of the Ubiquitous Intelligence and Computing, 5th International Conference, 2008

2007
Three-Round Smart Card-Based Key Exchange Scheme.
IEICE Trans. Commun., 2007

On the <i>Strong</i> Forward Secrecy of the Improved Chikazawa-Yamagishi ID-Based Key Sharing.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007

Strong Diffie-Hellman-DSA Key Exchange.
IEEE Commun. Lett., 2007

Efficient verifier-based password-authenticated key exchange in the three-party setting.
Comput. Stand. Interfaces, 2007

Key agreement for key hypergraph.
Comput. Secur., 2007

2006
Password-Authenticated Multi-Party Key Exchange with Different Passwords.
IACR Cryptol. ePrint Arch., 2006

Difference Set Attacks on Conjunctive Keyword Search Schemes.
Proceedings of the Secure Data Management, Third VLDB Workshop, SDM 2006, Seoul, Korea, 2006

Provably-Secure Two-Round Password-Authenticated Group Key Exchange in the Standard Model.
Proceedings of the Advances in Information and Computer Security, 2006

A Diffie-Hellman Key Exchange Protocol Without Random Oracles.
Proceedings of the Cryptology and Network Security, 5th International Conference, 2006

2004
One-Round Protocols for Two-Party Authenticated Key Exchange.
Proceedings of the Applied Cryptography and Network Security, 2004

2002
Provably Secure Encrypt-then-Sign Composition in Hybrid Signcryption.
Proceedings of the Information Security and Cryptology, 2002

Password-Authenticated Key Exchange between Clients with Different Passwords.
Proceedings of the Information and Communications Security, 4th International Conference, 2002

2001
Efficient Transferable Cash with Group Signatures.
Proceedings of the Information Security, 4th International Conference, 2001

2000
Anonymity Control in Multi-bank E-Cash System.
Proceedings of the Progress in Cryptology, 2000


  Loading...