{"id":139,"date":"2010-07-20T03:07:04","date_gmt":"2010-07-20T03:07:04","guid":{"rendered":"http:\/\/lbcsultan.wordpress.com\/"},"modified":"2010-07-20T03:07:04","modified_gmt":"2010-07-20T03:07:04","slug":"sci","status":"publish","type":"page","link":"https:\/\/cris.joongbu.ac.kr\/?page_id=139","title":{"rendered":"SCI"},"content":{"rendered":"<ol>\n<li>Byoungcheon Lee, \u201c<a href=\"http:\/\/cris.joongbu.ac.kr\/publication\/electronics-10-00215.pdf\">Stateless Re-Association in WPA3 Using Paired Token<\/a>\u201c,\u00a0<em>Electronics<\/em>\u00a0<b>2021<\/b>,\u00a0<em>10<\/em>(2), 215; https:\/\/doi.org\/10.3390\/electronics10020215. (<a href=\"https:\/\/www.mdpi.com\/2079-9292\/10\/2\/215\/htm\">Link<\/a>)<\/li>\n<li>Divyan Munirathnam Konidala, Made Harta. Dwijaksara, Kwangjo Kim, Dongman Lee, Byoungcheon Lee, Daeyoung Kim and Soontae Kim, \u201c<a href=\"http:\/\/cris.joongbu.ac.kr\/publication\/Divyan_2012_PUC.pdf\">Resuscitating privacy-preserving mobile payment with customer in complete control<\/a>\u201d, Springer Journal \u2013 Personal and Ubiquitous Computing (SCIE), 2011\/08, DOI:10.1007\/s00779-011-0436-7. (<a href=\"https:\/\/link.springer.com\/article\/10.1007\/s00779-011-0436-7\">Link<\/a>)<\/li>\n<li>Divyan M. Konidala, Daeyoung Kim, Chan Yeob Yeun and Byoungcheon Lee, \u201c<a href=\"http:\/\/cris.joongbu.ac.kr\/publication\/JIPS_v07_no1_paper11.pdf\">Security Framework for RFID-based Applications in Smart Home Environment<\/a>\u201c, Journal of Information Processing Systems, Volume 7, Number 1, pages 111-120 (March 2011) ISSN : 1976-913X<\/li>\n<li>Xiaofeng Chen, Qianhong Wu, Fangguo Zhang, Haibo Tian, Baodian Wei, Byoungcheon Lee, Hyunrok Lee, and Kwangjo Kim, \u201c<a href=\"http:\/\/cris.joongbu.ac.kr\/publication\/rfv-dtc.pdf\" target=\"_blank\" rel=\"noopener\">New receipt-free voting scheme using double-trapdoor commitment<\/a>\u201d, Information Sciences, Vol. 181, No. 8, pp. 1493-1502, 2011, Elsevier.<\/li>\n<li>Byoungcheon Lee, Kim-Kwang Raymond Choo, Jeongmo Yang, and Seungjae Yoo, \u201c<a href=\"http:\/\/cris.joongbu.ac.kr\/publication\/SS-WISA2007.pdf\">Secret Signatures: How to Achieve Business Privacy Efficiently?<\/a>\u201c, WISA 2007, LNCS 4867, pp. 30-47, 2007.<\/li>\n<li>Riza Aditya, Byoungcheon Lee, Colin Boyd, Ed Dawson, \u201cTwo Models of Efficient Mixnet-based Receipt-Free Voting using (Threshold) Re-encryption\u201d, Computer Systems Science and Engineering (CSSE) Journal, Vol 20, No 6, pp. 463-472, November 2005.<\/li>\n<li>Kun Peng, Colin Boyd, Ed Dawson, and Byoungcheon Lee, \u201c<a href=\"http:\/\/cris.joongbu.ac.kr\/publication\/Ciphertext%20Comparison-ICICS2005.pdf\">Ciphertext Comparison, a New Solution to the Millionaire Problem<\/a>\u201c, ICICS 2005, LNCS 3783, pp. 84-96, Springer-Verlag, 2005.<\/li>\n<li>Hwankoo Kim, Bongjoo Park, JaeCheol Ha, Byoungcheon Lee, DongGook Park, \u201c<a href=\"http:\/\/cris.joongbu.ac.kr\/publication\/Multilevel%20Security-ICCSA2005.pdf\">New Key Management Systems for Multilevel Security<\/a>\u201c, International Conference on Computational Science and its Applications (ICCSA2005), LNCS 3481, pp. 245-253, Singapore, 2005.<\/li>\n<li>Kun Peng, Riza Aditya, Colin Boyd, Ed Dawson, and Byoungcheon Lee, \u201c<a href=\"http:\/\/cris.joongbu.ac.kr\/publication\/MHEV-Indocrypt2004.pdf\">Multiplicative Homomorphic E-Voting<\/a>\u201c, Indocrypt 2004, LNCS 3348, pp. 61-72, Springer-Verlag, 2004.<\/li>\n<li>Kun Peng, Colin Boyd, Ed Dawson, and Byoungcheon Lee, \u201c<a href=\"http:\/\/cris.joongbu.ac.kr\/publication\/Millionaire%20Problem-ICISC2004.pdf\">An Efficient and Verifiable Solution to the Millionaire Problem<\/a>\u201c, In proceedings of 7th International Conference on Information Security and Cryptology (ICISC 2004), LNCS 3506, pp. 51-66, Springer-Verlag, 2004.<\/li>\n<li>Riza Aditya, Byoungcheon Lee, Colin Boyd and Ed Dawson, \u201c<a href=\"http:\/\/cris.joongbu.ac.kr\/publication\/mnvoting-TrustBus2004.pdf\">An Efficient Mixnet-Based Voting Scheme Providing Receipt-Freeness<\/a>\u201c, In proceedings of First International Conference on Trust and Privacy in Digital Business (Trustbus 2004), LNCS 3184, pp. 152\u2013161. Springer-Verlag, August 2004. ISBN: 3-540-22919-1.<\/li>\n<li>Riza Aditya, Kun Peng, Colin Boyd, Ed Dawson and Byoungcheon Lee, \u201c<a href=\"http:\/\/cris.joongbu.ac.kr\/publication\/BatchVer-ACNS2004.pdf\">Batch Verification for Equality of Discrete Logarithms and Threshhold Decryptions<\/a>\u201c, In proceedings of Applied Cryptography and Network Security (ACNS2004), LNCS 3089, pp. 494\u2013508. Springer-Verlag, June 2004. ISBN: 3-540-22217-0.<\/li>\n<li>Byoungcheon Lee, Colin Boyd, Ed Dawson, Kwangjo Kim, Jeongmo Yang and Seungjae Yoo, \u201c<a href=\"http:\/\/cris.joongbu.ac.kr\/publication\/mnvoting-ICISC2003.pdf\">Providing Receipt-Freeness in Mixnet-Based Voting Protocols<\/a>\u201c, In proceedings of 6th International Conference on Information Security and Cryptology (ICISC 2003), LNCS 2971, pp. 245\u2013258. Springer-Verlag, November 2003. ISBN: 3-540-21376-7.<\/li>\n<li>Xiaofeng Chen, Byoungcheon Lee, and Kwangjo Kim, \u201c<a href=\"http:\/\/cris.joongbu.ac.kr\/publication\/rfauction-ICISC2003.pdf\">Receipt-free Electronic Auction Scheme Using Homomorphic Encryption<\/a>\u201c, In proceedings of 6th International Conference on Information Security and Cryptology (ICISC 2003), LNCS 2971, pp. 259\u2013273. Springer-Verlag, November 2003. ISBN: 3-540-21376-7.<\/li>\n<li>Byoungcheon Lee and Kwangjo Kim, \u201c<a href=\"http:\/\/cris.joongbu.ac.kr\/publication\/SCS-Indocrypt2002.pdf\">Self-Certified Signatures<\/a>\u201c, Indocrypt2002, LNCS 2551, pp. 199-214, 2002.<\/li>\n<li>Byoungcheon Lee and Kwangjo Kim, \u201c<a href=\"http:\/\/cris.joongbu.ac.kr\/publication\/voting-ICISC2002.pdf\">Receipt-free electronic voting scheme with a tamper-resistant randomizer<\/a>\u201c, ICISC2002, LNCS 2587, pp. 389-406, Springer-Verlag, Nov. 28-29, Seoul, 2002.<\/li>\n<li>Byoungcheon Lee, Kwangjo Kim, and Joong-Soo Ma, \u201c<a href=\"http:\/\/cris.joongbu.ac.kr\/publication\/Public%20Auction-Indocrypt2001.pdf\">Efficient Public Auction with One-time Registration and Public Verifiability<\/a>\u201d, Indocrypt2001, LNCS Vol. 2247, pages 162-174, 2001.<\/li>\n<li>Manho Lee, Gookwhan Ahn, Jinho Kim, Jaegwan Park, Byoungcheon Lee, Kwangjo Kim, and Hyuckjae Lee, \u201c<a href=\"http:\/\/cris.joongbu.ac.kr\/publication\/ecash-JCN.pdf\">Design and Implementation of Efficient Fair Off-line E-Cash System based on Elliptic Curve Discrete Logarithm Problem<\/a>\u201d, Journal of Communications and Networks (JCN), Vol. 4, No. 2, pp. 81-89, June 2002.<\/li>\n<li>Byoungcheon Lee, Heesun Kim, and Kwangjo Kim, \u201c<a href=\"http:\/\/cris.joongbu.ac.kr\/publication\/SMA-ACISP2001.pdf\">Secure Mobile Agent using Strong Non-designated Proxy Signature<\/a>\u201d, Proc. of ACISP2001, LNCS Vol.2119, Springer-Verlag, pages 474-486, 2001.<\/li>\n<li>Byoungcheon Lee and Kwangjo Kim, \u201c<a href=\"http:\/\/cris.joongbu.ac.kr\/publication\/smp-ICISC2000.pdf\">Secure Matchmaking Protocol<\/a>\u201d, Proc. of ICISC\u20192000, LNCS Vol. 2015, Springer-Verlag, pages 123-134, 2001.<\/li>\n<li>Joonsang Baek, Byoungcheon Lee, and Kwangjo Kim, \u201c<a href=\"http:\/\/cris.joongbu.ac.kr\/publication\/secure-length-saving-ACISP2000.pdf\">Secure Length-saving ElGamal Encryption under the Computational Diffie-Hellman Assumption<\/a>\u201d, Proc. of ACISP2000, Brisbane, Australia, LNCS Vol.1841, pages 49-58, Springer-Verlag, July, 2000.<\/li>\n<li>Joonsang Baek, Byoungcheon Lee, and Kwangjo Kim, \u201c<a href=\"http:\/\/cris.joongbu.ac.kr\/publication\/ETRI-Journal.pdf\">Provably Secure Length-saving Public Key Encryption Scheme under the Computational Diffie-Hellman Assumption<\/a>\u201d, ETRI J., Vol.22, No.4, pages 25-31, Dec. 2000.<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Byoungcheon Lee, \u201cStateless Re-Association in WPA3 Using Paired Token\u201c,\u00a0Electronics\u00a02021,\u00a010(2), 215; https:\/\/doi.org\/10.3390\/electronics10020215. (Link) Divyan Munirathnam Konidala, Made Harta. Dwijaksara, Kwangjo Kim, Dongman Lee, Byoungcheon Lee, Daeyoung Kim and Soontae Kim, \u201cResuscitating privacy-preserving mobile payment with customer in complete control\u201d, Springer Journal \u2013 Personal and Ubiquitous Computing (SCIE), 2011\/08, DOI:10.1007\/s00779-011-0436-7. (Link) Divyan M. Konidala, Daeyoung Kim, Chan &hellip; <a href=\"https:\/\/cris.joongbu.ac.kr\/?page_id=139\" class=\"more-link\">\ub354 \ubcf4\uae30<span class=\"screen-reader-text\"> &#8220;SCI&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"open","ping_status":"open","template":"","meta":{"footnotes":""},"class_list":["post-139","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/cris.joongbu.ac.kr\/index.php?rest_route=\/wp\/v2\/pages\/139","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cris.joongbu.ac.kr\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cris.joongbu.ac.kr\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cris.joongbu.ac.kr\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cris.joongbu.ac.kr\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=139"}],"version-history":[{"count":0,"href":"https:\/\/cris.joongbu.ac.kr\/index.php?rest_route=\/wp\/v2\/pages\/139\/revisions"}],"wp:attachment":[{"href":"https:\/\/cris.joongbu.ac.kr\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=139"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}