default search action
Kyung Hyune Rhee
Kyung-Hyune Rhee – KyungHyun Rhee
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j55]Saprunov Vadim, Muhammad Firdaus, Kyung-Hyune Rhee:
Privacy-Preserving Decentralized Biometric Identity Verification in Car-Sharing System. J. Multim. Inf. Syst. 11(1): 17-34 (2024) - [i2]Muhammad Firdaus, Kyung-Hyune Rhee:
Personalized Federated Learning for Statistical Heterogeneity. CoRR abs/2402.10254 (2024) - 2023
- [j54]Qian Zhuohao, Muhammad Firdaus, Si-Wan Noh, Kyung-Hyune Rhee:
A Blockchain-Based Auditable Semi-Asynchronous Federated Learning for Heterogeneous Clients. IEEE Access 11: 133394-133412 (2023) - [c64]Muhammad Firdaus, Kyung-Hyune Rhee:
Towards Trustworthy Collaborative Healthcare Data Sharing. BIBM 2023: 4059-4064 - 2022
- [c63]Muhammad Firdaus, Harashta Tatimma Larasati, Kyung-Hyune Rhee:
A Secure Federated Learning Framework using Blockchain and Differential Privacy. CSCloud/EdgeCom 2022: 18-23 - [c62]Muhammad Firdaus, Kyung-Hyune Rhee:
A Joint Framework to Privacy-Preserving Edge Intelligence in Vehicular Networks. WISA 2022: 156-167 - [i1]Muhammad Firdaus, Kyung-Hyune Rhee:
A Joint Framework to Privacy-Preserving Edge Intelligence in Vehicular Networks. CoRR abs/2208.12755 (2022) - 2021
- [j53]Sandi Rahmadika, Kyung-Hyune Rhee:
Unlinkable Collaborative Learning Transactions: Privacy-Awareness in Decentralized Approaches. IEEE Access 9: 65293-65307 (2021) - [j52]Seolah Jang, Sandi Rahmadika, Sang Uk Shin, Kyung-Hyune Rhee:
PDPM: A Patient-Defined Data Privacy Management with Nudge Theory in Decentralized E-Health Environments. IEICE Trans. Inf. Syst. 104-D(11): 1839-1849 (2021) - [j51]Sandi Rahmadika, Kyung-Hyune Rhee:
Enhancing data privacy through a decentralised predictive model with blockchain-based revenue. Int. J. Ad Hoc Ubiquitous Comput. 37(1): 1-15 (2021) - [j50]Sandi Rahmadika, Muhammad Firdaus, Yong-Hwan Lee, Kyung-Hyune Rhee:
An Investigation of Pseudonymization Techniques in Decentralized Transactions. J. Internet Serv. Inf. Secur. 11(4): 1-18 (2021) - [j49]Cho Nwe Zin Latt, Sandi Rahmadika, Kyung-Hyune Rhee:
A Data Provenance System for Myanmar Rice Cycle Based on Ethereum Blockchain. J. Multim. Inf. Syst. 8(1): 35-44 (2021) - [j48]Sandi Rahmadika, Muhammad Firdaus, Seolah Jang, Kyung-Hyune Rhee:
Blockchain-Enabled 5G Edge Networks and Beyond: An Intelligent Cross-Silo Federated Learning Approach. Secur. Commun. Networks 2021: 5550153:1-5550153:14 (2021) - [j47]Muhammad Firdaus, Sandi Rahmadika, Kyung-Hyune Rhee:
Decentralized Trusted Data Sharing Management on Internet of Vehicle Edge Computing (IoVEC) Networks Using Consortium Blockchain. Sensors 21(7): 2410 (2021) - [j46]Si-Wan Noh, Donghyun Kim, Zhipeng Cai, Kyung-Hyune Rhee:
A Novel User Collusion-Resistant Decentralized Multi-Authority Attribute-Based Encryption Scheme Using the Deposit on a Blockchain. Wirel. Commun. Mob. Comput. 2021: 9506796:1-9506796:15 (2021) - 2020
- [j45]Sandi Rahmadika, Si-Wan Noh, Kyeongmo Lee, Bruno Joachim Kweka, Kyung-Hyune Rhee:
The Dilemma of Parameterizing Propagation Time in Blockchain P2P Network. J. Inf. Process. Syst. 16(3): 699-717 (2020) - [j44]Si-Wan Noh, Sang-Uk Shin, Kyung-Hyune Rhee:
PyRos: A State Channel-Based Access Control System for a Public Blockchain Network. Secur. Commun. Networks 2020: 8891183:1-8891183:13 (2020) - [c61]Sandi Rahmadika, Kyung-Hyune Rhee:
Reliable Collaborative Learning with Commensurate Incentive Schemes. Blockchain 2020: 496-502 - [c60]Si-Wan Noh, Kyung-Hyune Rhee:
Implicit Authentication in Neural Key Exchange Based on the Randomization of the Public Blockchain. Blockchain 2020: 545-549
2010 – 2019
- 2019
- [j43]Bayu Adhi Tama, Marco Comuzzi, Kyung-Hyune Rhee:
TSE-IDS: A Two-Stage Classifier Ensemble for Intelligent Anomaly-Based Intrusion Detection System. IEEE Access 7: 94497-94507 (2019) - [j42]Bayu Adhi Tama, Kyung-Hyune Rhee:
Tree-based classifier ensembles for early detection method of diabetes: an exploratory study. Artif. Intell. Rev. 51(3): 355-370 (2019) - [j41]Bayu Adhi Tama, Kyung-Hyune Rhee:
An in-depth experimental study of anomaly detection using gradient boosted machine. Neural Comput. Appl. 31(4): 955-965 (2019) - [j40]Sandi Rahmadika, Kyung-Hyune Rhee:
Toward Privacy-Preserving Shared Storage in Untrusted Blockchain P2P Networks. Wirel. Commun. Mob. Comput. 2019: 6219868:1-6219868:13 (2019) - [j39]Taek-Young Youn, Nam-Su Jho, Kyung Hyune Rhee, Sang-Uk Shin:
Authorized Client-Side Deduplication Using CP-ABE in Cloud Storage. Wirel. Commun. Mob. Comput. 2019: 7840917:1-7840917:11 (2019) - 2018
- [j38]Taek-Young Youn, Ku-Young Chang, Kyung-Hyune Rhee, Sang-Uk Shin:
Efficient Client-Side Deduplication of Encrypted Data With Public Auditing in Cloud Storage. IEEE Access 6: 26578-26587 (2018) - [j37]Bayu Adhi Tama, Kyung-Hyune Rhee:
A comparative study of classifier ensembles for detecting inactive learner in university. Int. J. Data Anal. Tech. Strateg. 10(4): 351-368 (2018) - [j36]Bayu Adhi Tama, Kyung-Hyune Rhee:
In-depth analysis of neural network ensembles for early detection method of diabetes disease. Int. J. Medical Eng. Informatics 10(4): 327-341 (2018) - [j35]Bayu Adhi Tama, Kyung-Hyune Rhee:
A Comparative Study of Phishing Websites Classification Based on Classifier Ensembles. J. Multim. Inf. Syst. 5(2): 99-104 (2018) - [j34]Youngho Park, Chul Sur, Kyung-Hyune Rhee:
A Secure Incentive Scheme for Vehicular Delay Tolerant Networks Using Cryptocurrency. Secur. Commun. Networks 2018: 5932183:1-5932183:13 (2018) - [j33]Youngho Park, Chul Sur, Si-Wan Noh, Kyung-Hyune Rhee:
Self-Controllable Secure Location Sharing for Trajectory-Based Message Delivery on Cloud-Assisted VANETs. Sensors 18(7): 2112 (2018) - [j32]Ji-Sun Park, Taek-Young Youn, Hye-Bin Kim, Kyung-Hyune Rhee, Sang-Uk Shin:
Smart Contract-Based Review System for an IoT Data Marketplace. Sensors 18(10): 3577 (2018) - [j31]Lewis Nkenyereye, Youngho Park, Kyung-Hyune Rhee:
Secure vehicle traffic data dissemination and analysis protocol in vehicular cloud computing. J. Supercomput. 74(3): 1024-1044 (2018) - [c59]Sandi Rahmadika, Bruno Joachim Kweka, Cho Nwe Zin Latt, Kyung-Hyune Rhee:
A Preliminary Approach of Blockchain Technology in Supply Chain System. ICDM Workshops 2018: 156-160 - [c58]Sandi Rahmadika, Kyung-Hyune Rhee:
Preliminary of Selfish Mining Strategy on the Decentralized Model of Personal Health Information. MUE/FutureTech 2018: 679-685 - [c57]Si-Wan Noh, Youngho Park, Kyung-Hyune Rhee:
A Blockchain-Based Access Control with Micropayment Channels. MUE/FutureTech 2018: 687-692 - 2017
- [j30]Bayu Adhi Tama, Kyung-Hyune Rhee:
An extensive empirical evaluation of classifier ensembles for intrusion detection task. Comput. Syst. Sci. Eng. 32(2) (2017) - [j29]Bayu Adhi Tama, Kyung Hyune Rhee:
HFSTE: Hybrid Feature Selections and Tree-Based Classifiers Ensemble for Intrusion Detection System. IEICE Trans. Inf. Syst. 100-D(8): 1729-1737 (2017) - [j28]Bayu Adhi Tama, Kyung Hyune Rhee:
Performance evaluation of intrusion detection system using classifier ensembles. Int. J. Internet Protoc. Technol. 10(1): 22-29 (2017) - [j27]Bayu Adhi Tama, Kyung Hyune Rhee:
A Detailed Analysis of Classifier Ensembles for Intrusion Detection in Wireless Network. J. Inf. Process. Syst. 13(5): 1203-1212 (2017) - [c56]Bayu Adhi Tama, Akash Suresh Patil, Kyung Hyune Rhee:
An Improved Model of Anomaly Detection Using Two-Level Classifier Ensemble. AsiaJCIS 2017: 1-4 - [c55]Akash Suresh Patil, Bayu Adhi Tama, Youngho Park, Kyung-Hyune Rhee:
A Framework for Blockchain Based Secure Smart Green House Farming. CSA/CUTE 2017: 1162-1167 - [c54]Youngho Park, Chul Sur, Si-Wan Noh, Kyung-Hyune Rhee:
Secure vehicle location-sharing for trajectory-based message delivery on VANETs. ISIE 2017: 1451-1456 - [c53]Bayu Adhi Tama, Kyung-Hyune Rhee:
A Novel Anomaly Detection Method in Wireless Network Using Multi-level Classifier Ensembles. MUE/FutureTech 2017: 452-458 - 2016
- [j26]Lewis Nkenyereye, Youngho Park, Kyung Hyune Rhee:
A secure billing protocol over attribute-based encryption in vehicular cloud computing. EURASIP J. Wirel. Commun. Netw. 2016: 196 (2016) - [j25]Chul Sur, Youngho Park, Kyung Hyune Rhee:
An efficient and secure navigation protocol based on vehicular cloud. Int. J. Comput. Math. 93(2): 325-344 (2016) - [j24]Youngho Park, Chul Sur, Kyung Hyune Rhee:
Pseudonymous authentication for secure V2I services in cloud-based vehicular networks. J. Ambient Intell. Humaniz. Comput. 7(5): 661-671 (2016) - [j23]Vincentius Timothy, Ary Setijadi Prihatmanto, Kyung-Hyune Rhee:
R-to-R Extraction and Preprocessing Procedure for an Automated Diagnosis of Various Diseases from ECG Data. J. Multim. Inf. Syst. 3(2): 1-8 (2016) - [j22]Annisa Istiqomah Arrahmah, Yudi Satria Gondokaryono, Kyung-Hyune Rhee:
Enhancing Accuracy Performance of Fuzzy Vault Non-Random Chaff Point Generator for Mobile Payment Authentication. J. Multim. Inf. Syst. 3(2): 13-20 (2016) - [c52]Bayu Adhi Tama, Kyung Hyune Rhee:
Classifier Ensemble Design with Rotation Forest to Enhance Attack Detection of IDS in Wireless Network. AsiaJCIS 2016: 87-91 - [c51]Aditya Candra, Yusuf Kurniawan, Kyung-Hyune Rhee:
Security analysis testing for secure instant messaging in Android with study case: Telegram. ICSET 2016: 92-96 - [c50]Vincentius Timothy, Ary Setijadi Prihatmanto, Kyung-Hyune Rhee:
Data preparation step for automated diagnosis based on HRV analysis and machine learning. ICSET 2016: 142-148 - [c49]Annisa Istiqomah Arrahmah, Yudi Satria Gondokaryono, Kyung-Hyune Rhee:
Fast non-random chaff point generator for fuzzy vault biometric cryptosystems. ICSET 2016: 199-204 - 2015
- [j21]Jeong Hyun Yi, Kyung Hyune Rhee, Gail-Joon Ahn:
Preface - WISA 2014. Comput. Secur. 52: 250 (2015) - [j20]Lewis Nkenyereye, Bayu Adhi Tama, Youngho Park, Kyung Hyune Rhee:
A Fine-Grained Privacy Preserving Protocol over Attribute Based Access Control for VANETs. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 6(2): 98-112 (2015) - [c48]Bayu Adhi Tama, Kyung Hyune Rhee:
A Combination of PSO-Based Feature Selection and Tree-Based Classifiers Ensemble for Intrusion Detection Systems. CSA/CUTE 2015: 489-495 - [c47]Lewis Nkenyereye, Kyung Hyune Rhee:
Secure Traffic Data Transmission Protocol for Vehicular Cloud. CSA/CUTE 2015: 497-503 - [c46]Bayu Adhi Tama, Kyung Hyune Rhee:
Performance Analysis of Multiple Classifier System in DoS Attack Detection. WISA 2015: 339-347 - [e2]Kyung Hyune Rhee, Jeong Hyun Yi:
Information Security Applications - 15th International Workshop, WISA 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers. Lecture Notes in Computer Science 8909, Springer 2015, ISBN 978-3-319-15086-4 [contents] - 2014
- [j19]Tae Rim Lee, Hyejoo Lee, Kyung Hyune Rhee, Sang-Uk Shin:
The efficient implementation of distributed indexing with Hadoop for digital investigations on Big Data. Comput. Sci. Inf. Syst. 11(3): 1037-1054 (2014) - [j18]Rimba Whidiana Ciptasari, Kyung Hyune Rhee, Kouichi Sakurai:
An enhanced audio ownership protection scheme based on visual cryptography. EURASIP J. Inf. Secur. 2014: 2 (2014) - [j17]Taerim Lee, Hun Kim, Kyung Hyune Rhee, Sang-Uk Shin:
Performance of Distributed Text Processing System Using Hadoop. J. Internet Serv. Inf. Secur. 4(1): 12-24 (2014) - 2013
- [j16]Taerim Lee, Hun Kim, Kyung Hyune Rhee, Sang-Uk Shin:
Design and implementation of E-discovery as a service based on cloud computing. Comput. Sci. Inf. Syst. 10(2): 703-724 (2013) - [j15]Rimba Whidiana Ciptasari, Kyung Hyune Rhee, Kouichi Sakurai:
Exploiting reference images for image splicing verification. Digit. Investig. 10(3): 246-258 (2013) - [j14]Wonjun Cho, Youngho Park, Chul Sur, Kyung Hyune Rhee:
An Improved Privacy-Preserving Navigation Protocol in {VANET}s. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 4(4): 80-92 (2013) - [j13]Youngho Park, Chul Sur, Sang-Uk Shin, Kyung Hyune Rhee, Changho Seo:
A Privacy Preserving Message Delivery Protocol Using Identity-Hidden Index in VDTNs. J. Univers. Comput. Sci. 19(16): 2385-2403 (2013) - [c45]Munkhbaatar Doyoddorj, Kyung Hyune Rhee:
Robust Copy-Move Forgery Detection Based on Dual-Transform. ICDF2C 2013: 3-16 - [c44]Youngho Park, Chul Sur, Kyung Hyune Rhee:
A Simplified Privacy Preserving Message Delivery Protocol in VDTNs. ICT-EurAsia 2013: 416-425 - [c43]Huaqing Wen, Kyung Hyune Rhee:
An Improved Greedy Forwarding Routing Protocol for Cooperative VANETs. ICT-EurAsia 2013: 502-506 - [c42]Chul Sur, Youngho Park, Sang-Uk Shin, Kyung Hyune Rhee, Changho Seo:
Certificate-Based Proxy Re-encryption for Public Cloud Storage. IMIS 2013: 159-166 - [c41]Munkhbaatar Doyoddorj, Kyung-Hyune Rhee:
A blind forgery detection scheme using image compatibility metrics. ISIE 2013: 1-6 - 2012
- [j12]Taerim Lee, Hun Kim, Kyung Hyune Rhee, Sang-Uk Shin:
A Study on Design and Implementation of E-Discovery Service based on Cloud Computing. J. Internet Serv. Inf. Secur. 2(3/4): 65-76 (2012) - [c40]Munkhbaatar Doyoddorj, Kyung Hyune Rhee:
Design and Analysis of a Fragile Watermarking Scheme Based on Block-Mapping. CD-ARES 2012: 654-668 - [c39]Rimba Whidiana Ciptasari, Kyung Hyune Rhee, Kouichi Sakurai:
Image Splicing Verification Based on Pixel-Based Alignment Method. IWDW 2012: 198-212 - [c38]Rimba Whidiana Ciptasari, Kyung Hyune Rhee, Kouichi Sakurai:
An Image Splicing Detection Based on Interpolation Analysis. PCM 2012: 390-401 - 2011
- [j11]Youngho Park, Chul Sur, Kyung Hyune Rhee:
A Privacy-Preserving Location Assurance Protocol for Location-Aware Services in VANETs. Wirel. Pers. Commun. 61(4): 779-791 (2011) - [c37]Chul Sur, Youngho Park, Takashi Nishide, Kouichi Sakurai, Kyung Hyune Rhee:
Securing Location-Aware Services Based on Online/Offline Signatures in VANETs. ARES 2011: 271-285 - [c36]Munkhbaatar Doyoddorj, Kyung Hyune Rhee:
A Novel Secure Image Hashing Based on Reversible Watermarking for Forensic Analysis. ARES 2011: 286-294 - [c35]Liang Zhao, Takashi Nishide, Avishek Adhikari, Kyung Hyune Rhee, Kouichi Sakurai:
Cryptanalysis of Randomized Arithmetic Codes Based on Markov Model. Inscrypt 2011: 341-362 - [c34]Youngho Park, Kyung Hyune Rhee, Chul Sur:
A Secure and Location Assurance Protocol for Location-Aware Services in VANETs. IMIS 2011: 456-461 - [e1]Kyung Hyune Rhee, DaeHun Nyang:
Information Security and Cryptology - ICISC 2010 - 13th International Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers. Lecture Notes in Computer Science 6829, Springer 2011, ISBN 978-3-642-24208-3 [contents] - 2010
- [j10]Yang Ou, Kyung Hyune Rhee:
A Survey on Image Hashing for Image Authentication. IEICE Trans. Inf. Syst. 93-D(5): 1020-1030 (2010) - [j9]Youngho Park, Chul Sur, Chae Duk Jung, Kyung Hyune Rhee:
An Efficient Anonymous Authentication Protocol for Secure Vehicular Communications. J. Inf. Sci. Eng. 26(3): 785-800 (2010) - [c33]Chul Sur, Chae Duk Jung, Youngho Park, Kyung Hyune Rhee:
Chosen-Ciphertext Secure Certificateless Proxy Re-Encryption. Communications and Multimedia Security 2010: 214-232 - [c32]Yang Ou, Chul Sur, Kyung Hyune Rhee:
Discriminative Image Hashing Based on Region of Interest. MMM 2010: 701-706
2000 – 2009
- 2009
- [j8]Youngho Park, Kyung Hyune Rhee:
An Authenticated On-Demand Routing Protocol with Key Exchange for Secure MANET. IEICE Trans. Inf. Syst. 92-D(5): 810-817 (2009) - [j7]Chae Duk Jung, Chul Sur, Youngho Park, Kyung Hyune Rhee:
A robust and efficient anonymous authentication protocol in VANETs. J. Commun. Networks 11(6): 607-614 (2009) - [c31]Yang Ou, Chul Sur, Kyung Hyune Rhee:
A Fast and Fully Format Compliant Protection of JPEG2000 Code-Streams. MMM 2009: 51-62 - [c30]Youngho Park, Chul Sur, Chae Duk Jung, Kyung Hyune Rhee:
Efficient Anonymous Authentication Protocol Using Key-Insulated Signature Scheme for Secure VANET. MOBILIGHT 2009: 35-44 - [c29]Chae Duk Jung, Chul Sur, Youngho Park, Kyung Hyune Rhee:
A Robust Conditional Privacy-Preserving Authentication Protocol in VANET. MobiSec 2009: 35-45 - 2008
- [c28]Yang Ou, Chae Duk Jung, Chul Sur, Kyung Hyune Rhee:
An Improved Flexible Access Control Scheme for JPEG2000 Codestreams. MUE 2008: 552-557 - 2007
- [c27]Eun Seok Jeong, Chul Sur, Kyung Hyune Rhee:
A New DRM System Based on Graded Contents Sharing and Time-Block Distribution for Home Networks. ACIS-ICIS 2007: 830-833 - [c26]Chul Sur, Chae Duk Jung, Kyung Hyune Rhee:
Multi-receiver Certificate-Based Encryption and Application to Public Key Broadcast Encryption. BLISS 2007: 35-40 - [c25]Youngho Park, Won-Young Lee, Kyung Hyune Rhee:
Authenticated On-Demand Ad Hoc Routing Protocol without Pre-shared Key Distribution. BLISS 2007: 41-46 - [c24]Yang Ou, Chul Sur, Kyung Hyune Rhee:
Region-Based Selective Encryption for Medical Imaging. FAW 2007: 62-73 - 2006
- [j6]Jong-Phil Yang, Kyung Hyune Rhee:
A New Design for a Practical Secure Cookies System. J. Inf. Sci. Eng. 22(3): 559-571 (2006) - [c23]Jung-Hwa Shin, Weon Shin, Kyung Hyune Rhee:
Reliable P2P File Sharing Service. AP2PC 2006: 143-150 - [c22]Chul Sur, Kyung Hyune Rhee:
An Efficient Authentication and Simplified Certificate Status Management for Personal Area Networks. APNOMS 2006: 273-282 - [c21]Jong-Phil Yang, Kouichi Sakurai, Kyung Hyune Rhee:
Distributing Security-Mediated PKI Revisited. EuroPKI 2006: 31-44 - [c20]Jong-Phil Yang, Kyung Hyune Rhee, Kouichi Sakurai:
A Proactive Secret Sharing for Server Assisted Threshold Signatures. HPCC 2006: 250-259 - [c19]Hyeran Lee, Kyung Hyune Rhee:
Lossless Data Hiding for High Embedding Capacity. ICDCIT 2006: 424-437 - [c18]HyeRan Lee, KyungHyun Rhee:
Reversible Data Embedding for Tamper-Proof Watermarks. ICICIC (3) 2006: 487-490 - [c17]Hyeran Lee, Kyung Hyune Rhee:
High Capacity Lossless Data Hiding. ICISS 2006: 326-336 - [c16]Chul Sur, Jong-Phil Yang, Kyung Hyune Rhee:
A New Efficient Protocol for Authentication and Certificate Status Management in Personal Area Networks. ISCIS 2006: 952-962 - 2005
- [j5]JaeGwi Choi, Goichiro Hanaoka, Kyung Hyune Rhee, Hideki Imai:
How to Break COT-Based Fingerprinting Schemes and Design New One. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88-A(10): 2800-2807 (2005) - [j4]Kyung Hyune Rhee, Young-Ho Park, Gene Tsudik:
A Group Key Management Architecture for Mobile Ad-hoc Wireless Networks. J. Inf. Sci. Eng. 21(2): 415-428 (2005) - [c15]Youngho Park, Jung-Hwa Shin, Kyung Hyune Rhee:
Design of a Secure Digital Contents Delivery System in P2P Networks. DRMTICS 2005: 311-321 - [c14]Jong-Phil Yang, Kyung Hyune Rhee:
Securing Admission Control in Ubiquitous Computing Environment. ICN (2) 2005: 972-979 - [c13]Jong-Phil Yang, Kyung Hyune Rhee:
Generating authentication data without keeping a private key for Mobility. ICPADS (2) 2005: 230-234 - [c12]Chul Sur, Ji Won Jung, Jong-Phil Yang, Kyung Hyune Rhee:
A Fair and Reliable P2P E-Commerce Model Based on Collaboration with Distributed Peers. IWDC 2005: 380-391 - 2004
- [j3]Kyung Hyune Rhee, Youngho Park, Gene Tsudik:
An architecture for key management in hierarchical mobile ad-hoc networks. J. Commun. Networks 6(2): 156-162 (2004) - [c11]Jong-Phil Yang, Chul Sur, Hwa-Sik Jang, Kyung Hyune Rhee:
Practical Modification of an Efficient Public-Key Framework. EEE 2004: 556-559 - [c10]Jong-Phil Yang, Sang-Uk Shin, Kyung Hyune Rhee:
A Simplified Approach to User Controllable Threshold Signatures. CEC 2004: 273-280 - 2003
- [j2]Yongdae Kim, Fabio Maino, Maithili Narasimha, Kyung Hyune Rhee, Gene Tsudik:
Secure group key management for storage area networks. IEEE Commun. Mag. 41(8): 92-99 (2003) - [c9]Jong-Phil Yang, Chul Sur, Kyung Hyune Rhee:
ROCEM: Robust Certified E-mail System Based on Server-Supported Signature. ICICS 2003: 100-111 - [c8]Jong-Phil Yang, Chul Sur, Kyung Hyune Rhee:
Distributed Certified E-mail System for Mobile Users. IWDC 2003: 194-204 - 2002
- [c7]