default search action
Kyung Hyune Rhee
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j55]Saprunov Vadim, Muhammad Firdaus, Kyung-Hyune Rhee:
Privacy-Preserving Decentralized Biometric Identity Verification in Car-Sharing System. J. Multim. Inf. Syst. 11(1): 17-34 (2024) - 2023
- [j54]Qian Zhuohao, Muhammad Firdaus, Si-Wan Noh, Kyung-Hyune Rhee:
A Blockchain-Based Auditable Semi-Asynchronous Federated Learning for Heterogeneous Clients. IEEE Access 11: 133394-133412 (2023) - 2021
- [j53]Sandi Rahmadika, Kyung-Hyune Rhee:
Unlinkable Collaborative Learning Transactions: Privacy-Awareness in Decentralized Approaches. IEEE Access 9: 65293-65307 (2021) - [j52]Seolah Jang, Sandi Rahmadika, Sang Uk Shin, Kyung-Hyune Rhee:
PDPM: A Patient-Defined Data Privacy Management with Nudge Theory in Decentralized E-Health Environments. IEICE Trans. Inf. Syst. 104-D(11): 1839-1849 (2021) - [j51]Sandi Rahmadika, Kyung-Hyune Rhee:
Enhancing data privacy through a decentralised predictive model with blockchain-based revenue. Int. J. Ad Hoc Ubiquitous Comput. 37(1): 1-15 (2021) - [j50]Sandi Rahmadika, Muhammad Firdaus, Yong-Hwan Lee, Kyung-Hyune Rhee:
An Investigation of Pseudonymization Techniques in Decentralized Transactions. J. Internet Serv. Inf. Secur. 11(4): 1-18 (2021) - [j49]Cho Nwe Zin Latt, Sandi Rahmadika, Kyung-Hyune Rhee:
A Data Provenance System for Myanmar Rice Cycle Based on Ethereum Blockchain. J. Multim. Inf. Syst. 8(1): 35-44 (2021) - [j48]Sandi Rahmadika, Muhammad Firdaus, Seolah Jang, Kyung-Hyune Rhee:
Blockchain-Enabled 5G Edge Networks and Beyond: An Intelligent Cross-Silo Federated Learning Approach. Secur. Commun. Networks 2021: 5550153:1-5550153:14 (2021) - [j47]Muhammad Firdaus, Sandi Rahmadika, Kyung-Hyune Rhee:
Decentralized Trusted Data Sharing Management on Internet of Vehicle Edge Computing (IoVEC) Networks Using Consortium Blockchain. Sensors 21(7): 2410 (2021) - [j46]Si-Wan Noh, Donghyun Kim, Zhipeng Cai, Kyung-Hyune Rhee:
A Novel User Collusion-Resistant Decentralized Multi-Authority Attribute-Based Encryption Scheme Using the Deposit on a Blockchain. Wirel. Commun. Mob. Comput. 2021: 9506796:1-9506796:15 (2021) - 2020
- [j45]Sandi Rahmadika, Si-Wan Noh, Kyeongmo Lee, Bruno Joachim Kweka, Kyung-Hyune Rhee:
The Dilemma of Parameterizing Propagation Time in Blockchain P2P Network. J. Inf. Process. Syst. 16(3): 699-717 (2020) - [j44]Si-Wan Noh, Sang-Uk Shin, Kyung-Hyune Rhee:
PyRos: A State Channel-Based Access Control System for a Public Blockchain Network. Secur. Commun. Networks 2020: 8891183:1-8891183:13 (2020) - 2019
- [j43]Bayu Adhi Tama, Marco Comuzzi, Kyung-Hyune Rhee:
TSE-IDS: A Two-Stage Classifier Ensemble for Intelligent Anomaly-Based Intrusion Detection System. IEEE Access 7: 94497-94507 (2019) - [j42]Bayu Adhi Tama, Kyung-Hyune Rhee:
Tree-based classifier ensembles for early detection method of diabetes: an exploratory study. Artif. Intell. Rev. 51(3): 355-370 (2019) - [j41]Bayu Adhi Tama, Kyung-Hyune Rhee:
An in-depth experimental study of anomaly detection using gradient boosted machine. Neural Comput. Appl. 31(4): 955-965 (2019) - [j40]Sandi Rahmadika, Kyung-Hyune Rhee:
Toward Privacy-Preserving Shared Storage in Untrusted Blockchain P2P Networks. Wirel. Commun. Mob. Comput. 2019: 6219868:1-6219868:13 (2019) - [j39]Taek-Young Youn, Nam-Su Jho, Kyung Hyune Rhee, Sang-Uk Shin:
Authorized Client-Side Deduplication Using CP-ABE in Cloud Storage. Wirel. Commun. Mob. Comput. 2019: 7840917:1-7840917:11 (2019) - 2018
- [j38]Taek-Young Youn, Ku-Young Chang, Kyung-Hyune Rhee, Sang-Uk Shin:
Efficient Client-Side Deduplication of Encrypted Data With Public Auditing in Cloud Storage. IEEE Access 6: 26578-26587 (2018) - [j37]Bayu Adhi Tama, Kyung-Hyune Rhee:
A comparative study of classifier ensembles for detecting inactive learner in university. Int. J. Data Anal. Tech. Strateg. 10(4): 351-368 (2018) - [j36]Bayu Adhi Tama, Kyung-Hyune Rhee:
In-depth analysis of neural network ensembles for early detection method of diabetes disease. Int. J. Medical Eng. Informatics 10(4): 327-341 (2018) - [j35]Bayu Adhi Tama, Kyung-Hyune Rhee:
A Comparative Study of Phishing Websites Classification Based on Classifier Ensembles. J. Multim. Inf. Syst. 5(2): 99-104 (2018) - [j34]Youngho Park, Chul Sur, Kyung-Hyune Rhee:
A Secure Incentive Scheme for Vehicular Delay Tolerant Networks Using Cryptocurrency. Secur. Commun. Networks 2018: 5932183:1-5932183:13 (2018) - [j33]Youngho Park, Chul Sur, Si-Wan Noh, Kyung-Hyune Rhee:
Self-Controllable Secure Location Sharing for Trajectory-Based Message Delivery on Cloud-Assisted VANETs. Sensors 18(7): 2112 (2018) - [j32]Ji-Sun Park, Taek-Young Youn, Hye-Bin Kim, Kyung-Hyune Rhee, Sang-Uk Shin:
Smart Contract-Based Review System for an IoT Data Marketplace. Sensors 18(10): 3577 (2018) - [j31]Lewis Nkenyereye, Youngho Park, Kyung-Hyune Rhee:
Secure vehicle traffic data dissemination and analysis protocol in vehicular cloud computing. J. Supercomput. 74(3): 1024-1044 (2018) - 2017
- [j30]Bayu Adhi Tama, Kyung-Hyune Rhee:
An extensive empirical evaluation of classifier ensembles for intrusion detection task. Comput. Syst. Sci. Eng. 32(2) (2017) - [j29]Bayu Adhi Tama, Kyung Hyune Rhee:
HFSTE: Hybrid Feature Selections and Tree-Based Classifiers Ensemble for Intrusion Detection System. IEICE Trans. Inf. Syst. 100-D(8): 1729-1737 (2017) - [j28]Bayu Adhi Tama, Kyung Hyune Rhee:
Performance evaluation of intrusion detection system using classifier ensembles. Int. J. Internet Protoc. Technol. 10(1): 22-29 (2017) - [j27]Bayu Adhi Tama, Kyung Hyune Rhee:
A Detailed Analysis of Classifier Ensembles for Intrusion Detection in Wireless Network. J. Inf. Process. Syst. 13(5): 1203-1212 (2017) - 2016
- [j26]Lewis Nkenyereye, Youngho Park, Kyung Hyune Rhee:
A secure billing protocol over attribute-based encryption in vehicular cloud computing. EURASIP J. Wirel. Commun. Netw. 2016: 196 (2016) - [j25]Chul Sur, Youngho Park, Kyung Hyune Rhee:
An efficient and secure navigation protocol based on vehicular cloud. Int. J. Comput. Math. 93(2): 325-344 (2016) - [j24]Youngho Park, Chul Sur, Kyung Hyune Rhee:
Pseudonymous authentication for secure V2I services in cloud-based vehicular networks. J. Ambient Intell. Humaniz. Comput. 7(5): 661-671 (2016) - [j23]Vincentius Timothy, Ary Setijadi Prihatmanto, Kyung-Hyune Rhee:
R-to-R Extraction and Preprocessing Procedure for an Automated Diagnosis of Various Diseases from ECG Data. J. Multim. Inf. Syst. 3(2): 1-8 (2016) - [j22]Annisa Istiqomah Arrahmah, Yudi Satria Gondokaryono, Kyung-Hyune Rhee:
Enhancing Accuracy Performance of Fuzzy Vault Non-Random Chaff Point Generator for Mobile Payment Authentication. J. Multim. Inf. Syst. 3(2): 13-20 (2016) - 2015
- [j21]Jeong Hyun Yi, Kyung Hyune Rhee, Gail-Joon Ahn:
Preface - WISA 2014. Comput. Secur. 52: 250 (2015) - [j20]Lewis Nkenyereye, Bayu Adhi Tama, Youngho Park, Kyung Hyune Rhee:
A Fine-Grained Privacy Preserving Protocol over Attribute Based Access Control for VANETs. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 6(2): 98-112 (2015) - 2014
- [j19]Tae Rim Lee, Hyejoo Lee, Kyung Hyune Rhee, Sang-Uk Shin:
The efficient implementation of distributed indexing with Hadoop for digital investigations on Big Data. Comput. Sci. Inf. Syst. 11(3): 1037-1054 (2014) - [j18]Rimba Whidiana Ciptasari, Kyung Hyune Rhee, Kouichi Sakurai:
An enhanced audio ownership protection scheme based on visual cryptography. EURASIP J. Inf. Secur. 2014: 2 (2014) - [j17]Taerim Lee, Hun Kim, Kyung Hyune Rhee, Sang-Uk Shin:
Performance of Distributed Text Processing System Using Hadoop. J. Internet Serv. Inf. Secur. 4(1): 12-24 (2014) - 2013
- [j16]Taerim Lee, Hun Kim, Kyung Hyune Rhee, Sang-Uk Shin:
Design and implementation of E-discovery as a service based on cloud computing. Comput. Sci. Inf. Syst. 10(2): 703-724 (2013) - [j15]Rimba Whidiana Ciptasari, Kyung Hyune Rhee, Kouichi Sakurai:
Exploiting reference images for image splicing verification. Digit. Investig. 10(3): 246-258 (2013) - [j14]Wonjun Cho, Youngho Park, Chul Sur, Kyung Hyune Rhee:
An Improved Privacy-Preserving Navigation Protocol in {VANET}s. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 4(4): 80-92 (2013) - [j13]Youngho Park, Chul Sur, Sang-Uk Shin, Kyung Hyune Rhee, Changho Seo:
A Privacy Preserving Message Delivery Protocol Using Identity-Hidden Index in VDTNs. J. Univers. Comput. Sci. 19(16): 2385-2403 (2013) - 2012
- [j12]Taerim Lee, Hun Kim, Kyung Hyune Rhee, Sang-Uk Shin:
A Study on Design and Implementation of E-Discovery Service based on Cloud Computing. J. Internet Serv. Inf. Secur. 2(3/4): 65-76 (2012) - 2011
- [j11]Youngho Park, Chul Sur, Kyung Hyune Rhee:
A Privacy-Preserving Location Assurance Protocol for Location-Aware Services in VANETs. Wirel. Pers. Commun. 61(4): 779-791 (2011) - 2010
- [j10]Yang Ou, Kyung Hyune Rhee:
A Survey on Image Hashing for Image Authentication. IEICE Trans. Inf. Syst. 93-D(5): 1020-1030 (2010) - [j9]Youngho Park, Chul Sur, Chae Duk Jung, Kyung Hyune Rhee:
An Efficient Anonymous Authentication Protocol for Secure Vehicular Communications. J. Inf. Sci. Eng. 26(3): 785-800 (2010) - 2009
- [j8]Youngho Park, Kyung Hyune Rhee:
An Authenticated On-Demand Routing Protocol with Key Exchange for Secure MANET. IEICE Trans. Inf. Syst. 92-D(5): 810-817 (2009) - [j7]Chae Duk Jung, Chul Sur, Youngho Park, Kyung Hyune Rhee:
A robust and efficient anonymous authentication protocol in VANETs. J. Commun. Networks 11(6): 607-614 (2009) - 2006
- [j6]Jong-Phil Yang, Kyung Hyune Rhee:
A New Design for a Practical Secure Cookies System. J. Inf. Sci. Eng. 22(3): 559-571 (2006) - 2005
- [j5]JaeGwi Choi, Goichiro Hanaoka, Kyung Hyune Rhee, Hideki Imai:
How to Break COT-Based Fingerprinting Schemes and Design New One. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88-A(10): 2800-2807 (2005) - [j4]Kyung Hyune Rhee, Young-Ho Park, Gene Tsudik:
A Group Key Management Architecture for Mobile Ad-hoc Wireless Networks. J. Inf. Sci. Eng. 21(2): 415-428 (2005) - 2004
- [j3]Kyung Hyune Rhee, Youngho Park, Gene Tsudik:
An architecture for key management in hierarchical mobile ad-hoc networks. J. Commun. Networks 6(2): 156-162 (2004) - 2003
- [j2]Yongdae Kim, Fabio Maino, Maithili Narasimha, Kyung Hyune Rhee, Gene Tsudik:
Secure group key management for storage area networks. IEEE Commun. Mag. 41(8): 92-99 (2003) - 2001
- [j1]Sang-Uk Shin, Kyung Hyune Rhee:
A New Design of the Hash Functions With All-or-Nothing Property. J. Inf. Sci. Eng. 17(6): 945-957 (2001)
Conference and Workshop Papers
- 2023
- [c64]Muhammad Firdaus, Kyung-Hyune Rhee:
Towards Trustworthy Collaborative Healthcare Data Sharing. BIBM 2023: 4059-4064 - 2022
- [c63]Muhammad Firdaus, Harashta Tatimma Larasati, Kyung-Hyune Rhee:
A Secure Federated Learning Framework using Blockchain and Differential Privacy. CSCloud/EdgeCom 2022: 18-23 - [c62]Muhammad Firdaus, Kyung-Hyune Rhee:
A Joint Framework to Privacy-Preserving Edge Intelligence in Vehicular Networks. WISA 2022: 156-167 - 2020
- [c61]Sandi Rahmadika, Kyung-Hyune Rhee:
Reliable Collaborative Learning with Commensurate Incentive Schemes. Blockchain 2020: 496-502 - [c60]Si-Wan Noh, Kyung-Hyune Rhee:
Implicit Authentication in Neural Key Exchange Based on the Randomization of the Public Blockchain. Blockchain 2020: 545-549 - 2018
- [c59]Sandi Rahmadika, Bruno Joachim Kweka, Cho Nwe Zin Latt, Kyung-Hyune Rhee:
A Preliminary Approach of Blockchain Technology in Supply Chain System. ICDM Workshops 2018: 156-160 - [c58]Sandi Rahmadika, Kyung-Hyune Rhee:
Preliminary of Selfish Mining Strategy on the Decentralized Model of Personal Health Information. MUE/FutureTech 2018: 679-685 - [c57]Si-Wan Noh, Youngho Park, Kyung-Hyune Rhee:
A Blockchain-Based Access Control with Micropayment Channels. MUE/FutureTech 2018: 687-692 - 2017
- [c56]Bayu Adhi Tama, Akash Suresh Patil, Kyung Hyune Rhee:
An Improved Model of Anomaly Detection Using Two-Level Classifier Ensemble. AsiaJCIS 2017: 1-4 - [c55]Akash Suresh Patil, Bayu Adhi Tama, Youngho Park, Kyung-Hyune Rhee:
A Framework for Blockchain Based Secure Smart Green House Farming. CSA/CUTE 2017: 1162-1167 - [c54]Youngho Park, Chul Sur, Si-Wan Noh, Kyung-Hyune Rhee:
Secure vehicle location-sharing for trajectory-based message delivery on VANETs. ISIE 2017: 1451-1456 - [c53]Bayu Adhi Tama, Kyung-Hyune Rhee:
A Novel Anomaly Detection Method in Wireless Network Using Multi-level Classifier Ensembles. MUE/FutureTech 2017: 452-458 - 2016
- [c52]Bayu Adhi Tama, Kyung Hyune Rhee:
Classifier Ensemble Design with Rotation Forest to Enhance Attack Detection of IDS in Wireless Network. AsiaJCIS 2016: 87-91 - [c51]Aditya Candra, Yusuf Kurniawan, Kyung-Hyune Rhee:
Security analysis testing for secure instant messaging in Android with study case: Telegram. ICSET 2016: 92-96 - [c50]Vincentius Timothy, Ary Setijadi Prihatmanto, Kyung-Hyune Rhee:
Data preparation step for automated diagnosis based on HRV analysis and machine learning. ICSET 2016: 142-148 - [c49]Annisa Istiqomah Arrahmah, Yudi Satria Gondokaryono, Kyung-Hyune Rhee:
Fast non-random chaff point generator for fuzzy vault biometric cryptosystems. ICSET 2016: 199-204 - 2015
- [c48]Bayu Adhi Tama, Kyung Hyune Rhee:
A Combination of PSO-Based Feature Selection and Tree-Based Classifiers Ensemble for Intrusion Detection Systems. CSA/CUTE 2015: 489-495 - [c47]Lewis Nkenyereye, Kyung Hyune Rhee:
Secure Traffic Data Transmission Protocol for Vehicular Cloud. CSA/CUTE 2015: 497-503 - [c46]Bayu Adhi Tama, Kyung Hyune Rhee:
Performance Analysis of Multiple Classifier System in DoS Attack Detection. WISA 2015: 339-347 - 2013
- [c45]Munkhbaatar Doyoddorj, Kyung Hyune Rhee:
Robust Copy-Move Forgery Detection Based on Dual-Transform. ICDF2C 2013: 3-16 - [c44]Youngho Park, Chul Sur, Kyung Hyune Rhee:
A Simplified Privacy Preserving Message Delivery Protocol in VDTNs. ICT-EurAsia 2013: 416-425 - [c43]Huaqing Wen, Kyung Hyune Rhee:
An Improved Greedy Forwarding Routing Protocol for Cooperative VANETs. ICT-EurAsia 2013: 502-506 - [c42]Chul Sur, Youngho Park, Sang-Uk Shin, Kyung Hyune Rhee, Changho Seo:
Certificate-Based Proxy Re-encryption for Public Cloud Storage. IMIS 2013: 159-166 - [c41]Munkhbaatar Doyoddorj, Kyung-Hyune Rhee:
A blind forgery detection scheme using image compatibility metrics. ISIE 2013: 1-6 - 2012
- [c40]Munkhbaatar Doyoddorj, Kyung Hyune Rhee:
Design and Analysis of a Fragile Watermarking Scheme Based on Block-Mapping. CD-ARES 2012: 654-668 - [c39]Rimba Whidiana Ciptasari, Kyung Hyune Rhee, Kouichi Sakurai:
Image Splicing Verification Based on Pixel-Based Alignment Method. IWDW 2012: 198-212 - [c38]Rimba Whidiana Ciptasari, Kyung Hyune Rhee, Kouichi Sakurai:
An Image Splicing Detection Based on Interpolation Analysis. PCM 2012: 390-401 - 2011
- [c37]Chul Sur, Youngho Park, Takashi Nishide, Kouichi Sakurai, Kyung Hyune Rhee:
Securing Location-Aware Services Based on Online/Offline Signatures in VANETs. ARES 2011: 271-285 - [c36]Munkhbaatar Doyoddorj, Kyung Hyune Rhee:
A Novel Secure Image Hashing Based on Reversible Watermarking for Forensic Analysis. ARES 2011: 286-294 - [c35]Liang Zhao, Takashi Nishide, Avishek Adhikari, Kyung Hyune Rhee, Kouichi Sakurai:
Cryptanalysis of Randomized Arithmetic Codes Based on Markov Model. Inscrypt 2011: 341-362 - [c34]Youngho Park, Kyung Hyune Rhee, Chul Sur:
A Secure and Location Assurance Protocol for Location-Aware Services in VANETs. IMIS 2011: 456-461 - 2010
- [c33]Chul Sur, Chae Duk Jung, Youngho Park, Kyung Hyune Rhee:
Chosen-Ciphertext Secure Certificateless Proxy Re-Encryption. Communications and Multimedia Security 2010: 214-232 - [c32]Yang Ou, Chul Sur, Kyung Hyune Rhee:
Discriminative Image Hashing Based on Region of Interest. MMM 2010: 701-706 - 2009
- [c31]Yang Ou, Chul Sur, Kyung Hyune Rhee:
A Fast and Fully Format Compliant Protection of JPEG2000 Code-Streams. MMM 2009: 51-62 - [c30]Youngho Park, Chul Sur, Chae Duk Jung, Kyung Hyune Rhee:
Efficient Anonymous Authentication Protocol Using Key-Insulated Signature Scheme for Secure VANET. MOBILIGHT 2009: 35-44 - [c29]Chae Duk Jung, Chul Sur, Youngho Park, Kyung Hyune Rhee:
A Robust Conditional Privacy-Preserving Authentication Protocol in VANET. MobiSec 2009: 35-45 - 2008
- [c28]Yang Ou, Chae Duk Jung, Chul Sur, Kyung Hyune Rhee:
An Improved Flexible Access Control Scheme for JPEG2000 Codestreams. MUE 2008: 552-557 - 2007
- [c27]Eun Seok Jeong, Chul Sur, Kyung Hyune Rhee:
A New DRM System Based on Graded Contents Sharing and Time-Block Distribution for Home Networks. ACIS-ICIS 2007: 830-833 - [c26]Chul Sur, Chae Duk Jung, Kyung Hyune Rhee:
Multi-receiver Certificate-Based Encryption and Application to Public Key Broadcast Encryption. BLISS 2007: 35-40 - [c25]Youngho Park, Won-Young Lee, Kyung Hyune Rhee:
Authenticated On-Demand Ad Hoc Routing Protocol without Pre-shared Key Distribution. BLISS 2007: 41-46 - [c24]Yang Ou, Chul Sur, Kyung Hyune Rhee:
Region-Based Selective Encryption for Medical Imaging. FAW 2007: 62-73 - 2006
- [c23]Jung-Hwa Shin, Weon Shin, Kyung Hyune Rhee:
Reliable P2P File Sharing Service. AP2PC 2006: 143-150 - [c22]Chul Sur, Kyung Hyune Rhee:
An Efficient Authentication and Simplified Certificate Status Management for Personal Area Networks. APNOMS 2006: 273-282 - [c21]Jong-Phil Yang, Kouichi Sakurai, Kyung Hyune Rhee:
Distributing Security-Mediated PKI Revisited. EuroPKI 2006: 31-44 - [c20]Jong-Phil Yang, Kyung Hyune Rhee, Kouichi Sakurai:
A Proactive Secret Sharing for Server Assisted Threshold Signatures. HPCC 2006: 250-259 - [c19]Hyeran Lee, Kyung Hyune Rhee:
Lossless Data Hiding for High Embedding Capacity. ICDCIT 2006: 424-437 - [c18]HyeRan Lee, KyungHyun Rhee:
Reversible Data Embedding for Tamper-Proof Watermarks. ICICIC (3) 2006: 487-490 - [c17]Hyeran Lee, Kyung Hyune Rhee:
High Capacity Lossless Data Hiding. ICISS 2006: 326-336 - [c16]Chul Sur, Jong-Phil Yang, Kyung Hyune Rhee:
A New Efficient Protocol for Authentication and Certificate Status Management in Personal Area Networks. ISCIS 2006: 952-962 - 2005
- [c15]Youngho Park, Jung-Hwa Shin, Kyung Hyune Rhee:
Design of a Secure Digital Contents Delivery System in P2P Networks. DRMTICS 2005: 311-321 - [c14]Jong-Phil Yang, Kyung Hyune Rhee:
Securing Admission Control in Ubiquitous Computing Environment. ICN (2) 2005: 972-979 - [c13]Jong-Phil Yang, Kyung Hyune Rhee:
Generating authentication data without keeping a private key for Mobility. ICPADS (2) 2005: 230-234 - [c12]Chul Sur, Ji Won Jung, Jong-Phil Yang, Kyung Hyune Rhee:
A Fair and Reliable P2P E-Commerce Model Based on Collaboration with Distributed Peers. IWDC 2005: 380-391 - 2004
- [c11]Jong-Phil Yang, Chul Sur, Hwa-Sik Jang, Kyung Hyune Rhee:
Practical Modification of an Efficient Public-Key Framework. EEE 2004: 556-559 - [c10]Jong-Phil Yang, Sang-Uk Shin, Kyung Hyune Rhee:
A Simplified Approach to User Controllable Threshold Signatures. CEC 2004: 273-280 - 2003
- [c9]Jong-Phil Yang, Chul Sur, Kyung Hyune Rhee:
ROCEM: Robust Certified E-mail System Based on Server-Supported Signature. ICICS 2003: 100-111 - [c8]Jong-Phil Yang, Chul Sur, Kyung Hyune Rhee:
Distributed Certified E-mail System for Mobile Users. IWDC 2003: 194-204 - 2002
- [c7]Jong-Phil Yang, Kyung Hyune Rhee:
The Design and Implementation of Improved Secure Cookies Based on Certificate. INDOCRYPT 2002: 314-325 - 2001
- [c6]Jong-Phil Yang, Weon Shin, Kyung Hyune Rhee:
An End-to-End Authentication Protocol in Wireless Application Protocol. ACISP 2001: 247-259 - 2000
- [c5]Sang-Uk Shin, Weon Shin, Kyung Hyune Rhee:
All-or-Nothing Transform and Remotely Keyed Encription Protocols. Public Key Cryptography 2000: 178-195 - 1999
- [c4]Sang-Uk Shin, Kyeong Seop Sim, Kyung Hyune Rhee:
A Secrecy Scheme for MPEG Video Data Using the Joint of Compression and Encryption. ISW 1999: 191-201 - [c3]Sang-Uk Shin, Kyung Hyune Rhee, Jae Woo Yoon:
Hash Functions and the MAC Using All-or-Nothing Property. Public Key Cryptography 1999: 263-275 - 1998
- [c2]Jae Woo Yoon, Sang-Uk Shin, Kyung Hyune Rhee:
A secure hash function based on cellular automata. ICISC 1998: 93-105 - [c1]Sang-Uk Shin, Kyung Hyune Rhee, DaeHyun Ryu, Sangjin Lee:
A New Hash Function Based on MDx-Family and Its Application to MAC. Public Key Cryptography 1998: 234-246
Editorship
- 2015
- [e2]Kyung Hyune Rhee, Jeong Hyun Yi:
Information Security Applications - 15th International Workshop, WISA 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers. Lecture Notes in Computer Science 8909, Springer 2015, ISBN 978-3-319-15086-4 [contents] - 2011
- [e1]Kyung Hyune Rhee, DaeHun Nyang:
Information Security and Cryptology - ICISC 2010 - 13th International Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers. Lecture Notes in Computer Science 6829, Springer 2011, ISBN 978-3-642-24208-3 [contents]
Informal and Other Publications
- 2024
- [i2]Muhammad Firdaus, Kyung-Hyune Rhee:
Personalized Federated Learning for Statistical Heterogeneity. CoRR abs/2402.10254 (2024) - 2022
- [i1]Muhammad Firdaus, Kyung-Hyune Rhee:
A Joint Framework to Privacy-Preserving Edge Intelligence in Vehicular Networks. CoRR abs/2208.12755 (2022)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-24 21:37 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint