A secure index management scheme for providing data sharing in cloud storage SH Lee, IY Lee Journal of Information Processing Systems 9 (2), 287-300, 2013 | 32 | 2013 |
Secure index management scheme on cloud storage environment SH Lee, IY Lee International journal of security and its applications 6 (3), 75-82, 2012 | 13 | 2012 |
Authentication protocol using authorization ticket in mobile network service environment JS Moon, SH Lee, IY Lee, SG Byeon 2010 3rd International Conference on Human-Centric Computing, 1-6, 2010 | 12 | 2010 |
A secure solution for USB flash drives using FAT file system structure SH Lee, KB Yim, IY Lee 2010 13th International Conference on Network-Based Information Systems, 487-492, 2010 | 11 | 2010 |
A study on security solution for USB flash drive SH Lee, IY Lee Journal of Korea Multimedia Society 13 (1), 93-101, 2010 | 10 | 2010 |
The study on the security solutions of USB memory SH Lee, J Kwak, IY Lee Proceedings of the 4th International Conference on Ubiquitous Information …, 2009 | 10 | 2009 |
A study of practical proxy reencryption with a keyword search scheme considering cloud storage structure SH Lee, IY Lee The Scientific World Journal 2014, 2014 | 6 | 2014 |
Effective Searchable Symmetric Encryption System Using Conjunctive Keyword SH Lee, IY Lee Information Technology Convergence: Security, Robotics, Automations and …, 2013 | 2 | 2013 |
보안 USB 동향에 관한 고찰 SH Lee, IY Lee Korea Information Processing Society Review 17 (2), 79-86, 2010 | 2 | 2010 |
A Study on Searchable Encryption System against Chosen-Ciphertext Attack SH Lee, JC Ryou, IY Lee Ubiquitous Information Technologies and Applications: CUTE 2013, 253-259, 2014 | 1 | 2014 |
Secure Data Management Scheme using One-Time Trapdoor on Cloud Storage Environment SH Lee, IY Lee International Journal of Security and Its Applications 8 (1), 257-272, 2014 | 1 | 2014 |
Secure Method for Data Storage and Sharing During Data Outsourcing SH Lee, SJ Go, IY Lee Information Technology Convergence: Security, Robotics, Automations and …, 2013 | 1 | 2013 |
Keyword Searchable Re-encryption Scheme Considering Cloud Storage-Service Environment SH Lee, IY Lee International Information Institute (Tokyo). Information 15 (5), 2135, 2012 | 1 | 2012 |
A Study on Providing Secure Storage and User Authentication Using MTM on Mobile Platform SH Lee, IY Lee The KIPS Transactions: PartC 18 (5), 293-302, 2011 | 1 | 2011 |
보안 USB 시스템 환경에서의 안전한 사용자 인증 방안에 관한 연구 이선호, 윤희성, 강경호, 홍민, 곽진, 이임영 한국통신학회 학술대회논문집, 1661-1662, 2009 | 1 | 2009 |
Admissible Bilinear Map Based Key Management Technology in Heterogeneous Mobile Networks JS Moon, SH Lee, JH Park, DG Lee, IY Lee 2008 International Conference on Security Technology, 242-247, 2008 | 1 | 2008 |
A Study on Searchable Encryption System using One-Time Trapdoor SH Lee, IY Lee Proceedings of the Korea Information Processing Society Conference, 618-620, 2013 | | 2013 |
A secure solution with a password recovery feature for USB flash drives SH Lee, K Yim, IY Lee International Journal of Computer Systems Science & Engineering 27 (6), 405-414, 2012 | | 2012 |
Authentication Scheme for Secure Storage Service on Mobile Platform using Mobile Trusted Module SH Lee, IY Lee INTERNATIONAL CONFERENCE ON FUTURE INFORMATION & COMMUNICATION ENGINEERING 4 …, 2011 | | 2011 |
Public-key Searchable Encryption System: Considering Remote Storage Environment SH Lee, IY Lee INTERNATIONAL CONFERENCE ON FUTURE INFORMATION & COMMUNICATION ENGINEERING 4 …, 2011 | | 2011 |