SCI

 
  1. Divyan Munirathnam Konidala, Made Harta. Dwijaksara, Kwangjo Kim, Dongman Lee, Byoungcheon Lee, Daeyoung Kim and Soontae Kim, “Resuscitating privacy-preserving mobile payment with customer in complete control”, Springer Journal – Personal and Ubiquitous Computing (SCIE), 2011/08, DOI:10.1007/s00779-011-0436-7. (Link)
  2. Divyan M. Konidala, Daeyoung Kim, Chan Yeob Yeun and Byoungcheon Lee, “Security Framework for RFID-based Applications in Smart Home Environment“, Journal of Information Processing Systems, Volume 7, Number 1, pages 111-120 (March 2011) ISSN : 1976-913X
  3. Xiaofeng Chen, Qianhong Wu, Fangguo Zhang, Haibo Tian, Baodian Wei, Byoungcheon Lee, Hyunrok Lee, and Kwangjo Kim, “New receipt-free voting scheme using double-trapdoor commitment”, Information Sciences, Vol. 181, No. 8, pp. 1493-1502, 2011, Elsevier.
  4. Byoungcheon Lee, Kim-Kwang Raymond Choo, Jeongmo Yang, and Seungjae Yoo, “Secret Signatures: How to Achieve Business Privacy Efficiently?“, WISA 2007, LNCS 4867, pp. 30-47, 2007.
  5. Riza Aditya, Byoungcheon Lee, Colin Boyd, Ed Dawson, “Two Models of Efficient Mixnet-based Receipt-Free Voting using (Threshold) Re-encryption”, Computer Systems Science and Engineering (CSSE) Journal, Vol 20, No 6, pp. 463-472, November 2005.
  6. Kun Peng, Colin Boyd, Ed Dawson, and Byoungcheon Lee, “Ciphertext Comparison, a New Solution to the Millionaire Problem“, ICICS 2005, LNCS 3783, pp. 84-96, Springer-Verlag, 2005.
  7. Hwankoo Kim, Bongjoo Park, JaeCheol Ha, Byoungcheon Lee, DongGook Park, “New Key Management Systems for Multilevel Security“, International Conference on Computational Science and its Applications (ICCSA2005), LNCS 3481, pp. 245-253, Singapore, 2005.
  8. Kun Peng, Riza Aditya, Colin Boyd, Ed Dawson, and Byoungcheon Lee, “Multiplicative Homomorphic E-Voting“, Indocrypt 2004, LNCS 3348, pp. 61-72, Springer-Verlag, 2004.
  9. Kun Peng, Colin Boyd, Ed Dawson, and Byoungcheon Lee, “An Efficient and Verifiable Solution to the Millionaire Problem“, In proceedings of 7th International Conference on Information Security and Cryptology (ICISC 2004), LNCS 3506, pp. 51-66, Springer-Verlag, 2004.
  10. Riza Aditya, Byoungcheon Lee, Colin Boyd and Ed Dawson, “An Efficient Mixnet-Based Voting Scheme Providing Receipt-Freeness“, In proceedings of First International Conference on Trust and Privacy in Digital Business (Trustbus 2004), LNCS 3184, pp. 152–161. Springer-Verlag, August 2004. ISBN: 3-540-22919-1.
  11. Riza Aditya, Kun Peng, Colin Boyd, Ed Dawson and Byoungcheon Lee, “Batch Verification for Equality of Discrete Logarithms and Threshhold Decryptions“, In proceedings of Applied Cryptography and Network Security (ACNS2004), LNCS 3089, pp. 494–508. Springer-Verlag, June 2004. ISBN: 3-540-22217-0.
  12. Byoungcheon Lee, Colin Boyd, Ed Dawson, Kwangjo Kim, Jeongmo Yang and Seungjae Yoo, “Providing Receipt-Freeness in Mixnet-Based Voting Protocols“, In proceedings of 6th International Conference on Information Security and Cryptology (ICISC 2003), LNCS 2971, pp. 245–258. Springer-Verlag, November 2003. ISBN: 3-540-21376-7.
  13. Xiaofeng Chen, Byoungcheon Lee, and Kwangjo Kim, “Receipt-free Electronic Auction Scheme Using Homomorphic Encryption“, In proceedings of 6th International Conference on Information Security and Cryptology (ICISC 2003), LNCS 2971, pp. 259–273. Springer-Verlag, November 2003. ISBN: 3-540-21376-7.
  14. Byoungcheon Lee and Kwangjo Kim, “Self-Certified Signatures“, Indocrypt2002, LNCS 2551, pp. 199-214, 2002.
  15. Byoungcheon Lee and Kwangjo Kim, “Receipt-free electronic voting scheme with a tamper-resistant randomizer“, ICISC2002, LNCS 2587, pp. 389-406, Springer-Verlag, Nov. 28-29, Seoul, 2002.
  16. Byoungcheon Lee, Kwangjo Kim, and Joong-Soo Ma, “Efficient Public Auction with One-time Registration and Public Verifiability”, Indocrypt2001, LNCS Vol. 2247, pages 162-174, 2001.
  17. Manho Lee, Gookwhan Ahn, Jinho Kim, Jaegwan Park, Byoungcheon Lee, Kwangjo Kim, and Hyuckjae Lee, “Design and Implementation of Efficient Fair Off-line E-Cash System based on Elliptic Curve Discrete Logarithm Problem”, Journal of Communications and Networks (JCN), Vol. 4, No. 2, pp. 81-89, June 2002.
  18. Byoungcheon Lee, Heesun Kim, and Kwangjo Kim, “Secure Mobile Agent using Strong Non-designated Proxy Signature”, Proc. of ACISP2001, LNCS Vol.2119, Springer-Verlag, pages 474-486, 2001.
  19. Byoungcheon Lee and Kwangjo Kim, “Secure Matchmaking Protocol”, Proc. of ICISC’2000, LNCS Vol. 2015, Springer-Verlag, pages 123-134, 2001.
  20. Joonsang Baek, Byoungcheon Lee, and Kwangjo Kim, “Secure Length-saving ElGamal Encryption under the Computational Diffie-Hellman Assumption”, Proc. of ACISP2000, Brisbane, Australia, LNCS Vol.1841, pages 49-58, Springer-Verlag, July, 2000.
  21. Joonsang Baek, Byoungcheon Lee, and Kwangjo Kim, “Provably Secure Length-saving Public Key Encryption Scheme under the Computational Diffie-Hellman Assumption”, ETRI J., Vol.22, No.4, pages 25-31, Dec. 2000.
 Posted by at 6:24 AM