Sangrae Cho

According to our database1, Sangrae Cho authored at least 23 papers between 2002 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Insecurity of Chait et al.'s RSA-Based Aggregate Signature Scheme.
IEEE Access, 2024

2022
Deep rank hashing network for cancellable face identification.
Pattern Recognit., 2022

A Key Recovery Protocol for Multiparty Threshold ECDSA Schemes.
IEEE Access, 2022

Lightweight Signature-based Range Proof.
Proceedings of the 13th International Conference on Information and Communication Technology Convergence, 2022

2021
Secure Chaff-less Fuzzy Vault for Face Identification Systems.
ACM Trans. Multim. Comput. Commun. Appl., 2021

Secure Secret Sharing Enabled b-band Mini Vaults Bio-Cryptosystem for Vectorial Biometrics.
IEEE Trans. Dependable Secur. Comput., 2021

2020
Open-set face identification with index-of-max hashing by learning.
Pattern Recognit., 2020

One-Class Learning Method Based on Live Correlation Loss for Face Anti-Spoofing.
IEEE Access, 2020

How to Aggregate Acoustic Delta Features for Deep Speaker Embeddings.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2020

2019
Symmetric keyring encryption scheme for biometric cryptosystem.
Inf. Sci., 2019

End-to-end Korean Digits Speech Recognition.
Proceedings of the 2019 International Conference on Information and Communication Technology Convergence, 2019

Lightweight Deep Embeddings Fusion Methods for Face Verification on Mobile Devices.
Proceedings of the 2019 International Conference on Information and Communication Technology Convergence, 2019

A Performance Comparison of Loss Functions.
Proceedings of the 2019 International Conference on Information and Communication Technology Convergence, 2019

2018
Construction of a New Biometric-Based Key Derivation Function and Its Application.
Secur. Commun. Networks, 2018

A Symmetric Keyring Encryption Scheme for Biometric Cryptosystems.
CoRR, 2018

2017
A Cancellable Ranking Based Hashing Method for Fingerprint Template Protection.
Proceedings of the Mobile Networks and Management - 9th International Conference, 2017

2004
A role-based infrastructure management system: design and implementation.
Concurr. Pract. Exp., 2004

Authentication and Authorization for Network Security Service.
Proceedings of the International Conference on Security and Management, 2004

2003
A Location Privacy Protection Mechanism for Smart Space.
Proceedings of the Information Security Applications, 4th International Workshop, 2003

On modeling system-centric information for role engineering.
Proceedings of the 8th ACM Symposium on Access Control Models and Technologies, 2003

A Role Administration System in Role-based Authorization Infrastructures - Design and Implementation.
Proceedings of the 2003 ACM Symposium on Applied Computing (SAC), 2003

New Security Paradigm for Application Security Infrastructure.
Proceedings of the Information Networking, 2003

2002
Using X.509 Attribute Certificates for Role-Based EAM.
Proceedings of the Research Directions in Data and Applications Security, 2002


  Loading...