Jaeil Lee

According to our database1, Jaeil Lee authored at least 29 papers between 2002 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Classification of Attack Types and Analysis of Attack Methods for Profiling Phishing Mail Attack Groups.
IEEE Access, 2021

2019
Erratum to: Real-time adult authentication scheme for digital contents using X.509 certificate in ubiquitous Web environment.
J. Real Time Image Process., 2019

2018
Real-time adult authentication scheme for digital contents using X.509 certificate in ubiquitous Web environment.
J. Real Time Image Process., 2018

2014
Adaptive Paired Page Prebackup Scheme for MLC NAND Flash Memory.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2014

2009
Traceable Anonymous Certificate.
RFC, August, 2009

2008
Wireless Certificate Management Protocol Supporting Mobile Phones.
Proceedings of the 2008 IEEE Congress on Services, Part I, 2008

2007
A Practical Method for Generating Digital Signatures Using Biometrics.
IEICE Trans. Commun., 2007

Design and implementation of wireless PKI technology suitable for mobile phone in mobile-commerce.
Comput. Commun., 2007

Untraceability of Group Signature Schemes based on Bilinear Mapping and Their Improvement.
Proceedings of the Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2007

An Information Aggregation Scheme of Multi-node in Ubiquitous Sensor Networks.
Proceedings of the Frontiers of High Performance Computing and Networking ISPA 2007 Workshops, 2007

VoIP Secure Communication Protocol satisfying Backward Compatibility.
Proceedings of the Second International Conference on Systems and Networks Communications (ICSNC 2007), 2007

2006
Internet X.509 Public Key Infrastructure Subject Identification Method (SIM).
RFC, October, 2006

Privacy Protection in PKIs: A Separation-of-Authority Approach.
Proceedings of the Information Security Applications, 7th International Workshop, 2006

Efficient Attribute Authentication in Wireless Mobile Networks.
Proceedings of the Frontiers of High Performance Computing and Networking, 2006

Group Key Agreement Protocol Among Mobile Devices in Different Cells.
Proceedings of the Frontiers of High Performance Computing and Networking, 2006

The Algorithm to Enhance the Security of Multi-Agent in Distributed Computing Environment.
Proceedings of the 12th International Conference on Parallel and Distributed Systems, 2006

2005
The SEED Encryption Algorithm.
RFC, December, 2005

The SEED Cipher Algorithm and Its Use with IPsec.
RFC, October, 2005

Addition of SEED Cipher Suites to Transport Layer Security (TLS).
RFC, August, 2005

Use of the SEED Encryption Algorithm in Cryptographic Message Syntax (CMS).
RFC, February, 2005

The SEED Encryption Algorithm.
RFC, February, 2005

2004
A Secure Web Services for Location Based Services in Wireless Networks.
Proceedings of the NETWORKING 2004, 2004

Asia PKI Interoperability Guideline.
Proceedings of the ISSE 2004, 2004

Practical Digital Signature Generation Using Biometrics.
Proceedings of the Computational Science and Its Applications, 2004

2003
Secure and Scalable Mobile IP Registration Scheme Using PKI.
Proceedings of the Computational Science and Its Applications, 2003

New Adaptive Trust Models against DDoS: Back-Up CA and Mesh PKI.
Proceedings of the Web Communication Technologies and Internet-Related Social Issues, 2003

A PKI-Based Authentication Framework for Next Generation Mobile Internet.
Proceedings of the Web Communication Technologies and Internet-Related Social Issues, 2003

Mobile PKI: A PKI-Based Authentication Framework for the Next Generation Mobile Communications.
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003

2002
A Model for Embedding and Authorizing Digital Signatures in Printed Documents.
Proceedings of the Information Security and Cryptology, 2002


  Loading...