Im-Yeong Lee

Orcid: 0000-0002-8856-0103

According to our database1, Im-Yeong Lee authored at least 89 papers between 2001 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A study on the traceable attribute-based signature scheme provided with anonymous credentials.
Connect. Sci., December, 2024

A Comprehensive Approach to User Delegation and Anonymity within Decentralized Identifiers for IoT.
Sensors, April, 2024

Data Access Control for Secure Authentication Using Dual VC Scheme Based on CP-ABE in DID.
J. Circuits Syst. Comput., March, 2024

2022
Identity Access Management via ECC Stateless Derived Key Based Hierarchical Blockchain for the Industrial Internet of Things.
IEICE Trans. Inf. Syst., November, 2022

A Certificateless-based One-Round Authenticated Group Key Agreement Protocol to Prevent Impersonation Attacks.
KSII Trans. Internet Inf. Syst., 2022

A Study on Data Sharing Scheme using ECP-ABSC that Provides Data User Traceability in the Cloud.
KSII Trans. Internet Inf. Syst., 2022

2021
Group Delegated ID-Based Proxy Reencryption for the Enterprise IoT-Cloud Storage Environment.
Wirel. Commun. Mob. Comput., 2021

Secure Encapsulation Schemes Using Key Recovery System in IoMT Environments.
Sensors, 2021

A Privacy-Preserving Key Management Scheme with Support for Sybil Attack Detection in VANETs.
Sensors, 2021

Data Distribution for Multiple Receivers in a Connected Car Environment Using 5G Communication.
Secur. Commun. Networks, 2021

Survey on Data Deduplication in Cloud StorageEnvironments.
J. Inf. Process. Syst., 2021

A study on data sharing system using ACP-ABE-SE in a cloud environment.
Int. J. Web Grid Serv., 2021

An Efficient Public Verifiable Certificateless Multi-Receiver Signcryption Scheme for IoT Environments.
IEICE Trans. Inf. Syst., 2021

VAIM: Verifiable Anonymous Identity Management for Human-Centric Security and Privacy in the Internet of Things.
IEEE Access, 2021

A Federated Framework for Fine-Grained Cloud Access Control for Intelligent Big Data Analytic by Service Providers.
IEEE Access, 2021

Pairing-Free Signatures With Insider-Attack Resistance for Vehicular Ad-Hoc Networks (VANETs).
IEEE Access, 2021

Efficient Short Group Signatures for Conditional Privacy in Vehicular Ad Hoc Networks via ID Caching and Timed Revocation.
IEEE Access, 2021

2020
A Certificateless Aggregate Arbitrated Signature Scheme for IoT Environments.
Sensors, 2020

A Lightweight Authentication and Key Agreement Schemes for IoT Environments.
Sensors, 2020

A Study on CP-ABE-Based Medical Data Sharing System with Key Abuse Prevention and Verifiable Outsourcing in the IoMT Environment.
Sensors, 2020

A Study on Electronic Voting System Using Private Blockchain.
J. Inf. Process. Syst., 2020

CP-ABE Access Control that Block Access of Withdrawn Users in Dynamic Cloud.
KSII Trans. Internet Inf. Syst., 2020

A Secure Encapsulation Schemes Based on Key Recovery System.
Proceedings of the Silicon Valley Cybersecurity Conference - First Conference, 2020

Group Delegated ID-Based Proxy Re-encryption for PHR.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2020

Secure Hierarchical Deterministic Key Generation Scheme in Blockchain-based Medical Environment.
Proceedings of the IECC 2020: 2nd International Electronics Communication Conference, 2020

A Study on Access Control Scheme Based on ABE Using Searchable Encryption in Cloud Environment.
Proceedings of the Advances in Internet, 2020

2019
Enhanced signature RTD transaction scheme based on Chebyshev polynomial for mobile payments service in IoT device environment.
J. Supercomput., 2019

Secure and Efficient Storage of Video Data in a CCTV Environment.
KSII Trans. Internet Inf. Syst., 2019

An Anonymous Protocol for Member Privacy in a Consortium Blockchain.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2019

A Study on Hybrid Blockchain-based XGS (XOR Global State) Injection Technology for Efficient Contents Modification and Deletion.
Proceedings of the 6th International Conference on Software Defined Systems, 2019

2018
Dynamic Group Authentication and Key Exchange Scheme Based on Threshold Secret Sharing for IoT Smart Metering Environments.
Sensors, 2018

IoT device security based on proxy re-encryption.
J. Ambient Intell. Humaniz. Comput., 2018

A Study on KSI-based Authentication Management and Communication for Secure Smart Home Environments.
KSII Trans. Internet Inf. Syst., 2018

Secure Data Deduplication Scheme Using Linkage of Data Blocks in Cloud Storage Environment.
Proceedings of the Advanced Multimedia and Ubiquitous Engineering, 2018

2017
Enhanced Mutual Authentication Scheme based on Chaotic Map for PCM in NFC Service Environment.
KSII Trans. Internet Inf. Syst., 2017

A study on a secure single sign-on for user authentication information privacy in distributed computing environment.
Int. J. Commun. Networks Distributed Syst., 2017

Secure Multicast Using Proxy Re-encryption in IoT Environment.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2017

A Study on Lightweight Mutual Authentication Protocol Based on Simple Operation.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2017

2016
Mutual Authentication Scheme Based on Lattice for NFC-PCM Payment Service Environment.
Int. J. Distributed Sens. Networks, 2016

2015
Study on User Authority Management for Safe Data Protection in Cloud Computing Environments.
Symmetry, 2015

Mutual Authentication Scheme Based on GSM for NFC Mobile Payment Environments.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2015

Data Block Management Scheme Based on Secret Sharing for HDFS.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015

2014
Block Access Token Renewal Scheme Based on Secret Sharing in Apache Hadoop.
Entropy, 2014

2013
Anonymous Authentication Scheme based on NTRU for the Protection of Payment Information in NFC Mobile Environment.
J. Inf. Process. Syst., 2013

A Secure Index Management Scheme for Providing Data Sharing in Cloud Storage.
J. Inf. Process. Syst., 2013

Effective Searchable Symmetric Encryption System Using Conjunctive Keyword.
Proceedings of the Information Technology Convergence, 2013

Secure Method for Data Storage and Sharing During Data Outsourcing.
Proceedings of the Information Technology Convergence, 2013

2012
Authentication protocol using an identifier in an ad hoc network environment.
Math. Comput. Model., 2012

2011
Admissible bilinear map-based key management protocol for HPCCS in heterogeneous network.
J. Supercomput., 2011

An AAA scheme using ID-based ticket with anonymity in future mobile communication.
Comput. Commun., 2011

2010
Authentication and ID-Based Key Management Protocol in Pervasive Environment.
Wirel. Pers. Commun., 2010

A Secure Solution for USB Flash Drives Using FAT File System Structure.
Proceedings of the 13th International Conference on Network-Based Information Systems, 2010

An Authentication and Authorization Protocol Using Ticket in Pervasive Environment.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010

2009
Device Authentication/Authorization Protocol for Home Network in Next Generation Security.
Proceedings of the Advances in Information Security and Assurance, 2009

Intelligent Pervasive Network Authentication: S/Key Based Device Authentication.
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009

Group Key Management Using Device ID in Ad-hoc Network.
Proceedings of the 2nd International Conference on Computer Science and its Applications, 2009

2008
A study on secure RFID mutual authentication scheme in pervasive computing environment.
Comput. Commun., 2008

A Study on New Low-Cost RFID System with Mutual Authentication Scheme in Ubiquitous.
Proceedings of the 2008 International Conference on Multimedia and Ubiquitous Engineering (MUE 2008), 2008

A study on authentication/authorization/accounting and roaming mechanism in pervasive environment.
Proceedings of the 5th Annual International Conference on Mobile and Ubiquitous Systems: Computing, 2008

2007
A study on secure RFID authentication protocol in insecure communication.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007

Privacy Protection Scheme of RFID Using Random Number.
Proceedings of the Emerging Technologies in Knowledge Discovery and Data Mining, 2007

Intelligent Home Network Authentication: Home Device Authentication Using Device Certification.
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007

A Study on Improved RFID Authentication Scheme.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

A Study on Key Distribution and ID Registration in the AAA System for Ubiquitous Multimedia Environments.
Proceedings of the Advances in Multimedia Modeling, 2007

A Study on Authentication Protocol in offering Identification Synchronization and Position Detection in RFID System.
Proceedings of the 2007 International Conference on Intelligent Pervasive Computing, 2007

A Study on Ticket-Based AAA Mechanism Including Time Synchronization OTP in Ubiquitous Environment.
Proceedings of the Computational Science and Its Applications, 2007

A Study on Low-Cost RFID System Management with Mutual Authentication Scheme in Ubiquitous.
Proceedings of the Managing Next Generation Networks and Services, 2007

2006
An Intelligent and Efficient Traitor Tracing for Ubiquitous Environments.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2006

An Efficient Key Distribution for Ubiquitous Environment in Ad-Hoc Network Using Broadcast Encryption.
Proceedings of the Computational Science and Its Applications, 2006

Authentication for Single/Multi Domain in Ubiquitous Computing Using Attribute Certification.
Proceedings of the Computational Science and Its Applications, 2006

Authentication for Ubiquitous Multi Domain in Pervasive Computing Using PMI.
Proceedings of the High Performance Computing and Communications, 2006

Broadcast Encryption Using Efficient Key Distribution and Renewal for Ubiquitous Environments.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006

2005
A Study on RFID System with Secure Service Availability for Ubiquitous Computing.
J. Inf. Process. Syst., 2005

A Study on Secure SDP of RFID Using Bluetooth Communication.
Proceedings of the Computational Science and Its Applications, 2005

A Study on the E-Cash System with Anonymity and Divisibility.
Proceedings of the Computational Science and Its Applications, 2005

A Study on Scalable Bluetooth Piconet for Secure Ubiquitous.
Proceedings of the Web and Communication Technologies and Internet-Related Social Issues, 2005

2004
A Study on Key Recovery Agent Protection Profile Having Composition Function.
Proceedings of the Computational Science and Its Applications, 2004

A Study on Secure and Effcient Sensor Network Management Scheme Using PTD.
Proceedings of the Computational Science and Its Applications, 2004

A Study on Efficient Key Distribution and Renewal in Broadcast Encryption.
Proceedings of the Computational Science and Its Applications, 2004

A Study on Contents Distribution Using Electronic Cash System.
Proceedings of the 2004 IEEE International Conference on e-Technology, 2004

2003
New WAKE Key Recovery Protocol on M-commerce.
Proceedings of the Web Engineering, International Conference, 2003

Designated Verification of Digital Watermark for Network Based Image Distribution.
Proceedings of the Computational Science - ICCS 2003, 2003

Smart Card Based Mobile Payment with Fairness Revocation Mechanism.
Proceedings of the E-Commerce and Web Technologies, 4th International Conference, 2003

2002
New Identity Escrow Scheme for Anonymity Authentication.
Proceedings of the Progress in Cryptology, 2002

Secure Bluetooth Piconet Using Non-anonymous Group Key.
Proceedings of the EurAsia-ICT 2002: Information and Communication Technology, 2002

The Illegal Copy Protection Using Hidden Agent.
Proceedings of the EurAsia-ICT 2002: Information and Communication Technology, 2002

Secure Electronic Copyright Distribution with Public Key Based Traitor Tracing.
Proceedings of the E-Commerce and Web Technologies, Third International Conference, 2002

Interprocedural Transformations for Extracting Maximum Parallelism.
Proceedings of the Advances in Information Systems, Second International Conference, 2002

2001
A Digital Nominative Proxy Signature Scheme for Mobile Communication.
Proceedings of the Information and Communications Security, Third International Conference, 2001


  Loading...