Pil Joong LEE


A Visibility-Based Lower Bound for Android Unlock Patterns
Jinwoo LEE Jae Woo SEO Kookrae CHO Pil Joong LEE Dae Hyun YUM 
Publication:   
Publication Date: 2017/03/01
Vol. E100-D  No. 3  pp. 578-581
Type of Manuscript:  LETTER
Category: Information Network
Keyword: 
user authenticationgraphical passwordAndroid unlock patternslower bound
 Summary | Full Text:PDF(135.1KB)

A Visibility-Based Upper Bound for Android Unlock Patterns
Jinwoo LEE Jae Woo SEO Kookrae CHO Pil Joong LEE Juneyeun KIM Seung Hoon CHOI Dae Hyun YUM 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2016/11/01
Vol. E99-D  No. 11  pp. 2814-2816
Type of Manuscript:  LETTER
Category: Information Network
Keyword: 
user authenticationgraphical passwordAndroid unlock patternsupper bound
 Summary | Full Text:PDF(120.6KB)

Secure and Lightweight Localization Method for Wireless Sensor Networks
Myung-Ho PARK Ki-Gon NAM Jin Seok KIM Dae Hyun YUM Pil Joong LEE 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2013/03/01
Vol. E96-D  No. 3  pp. 723-726
Type of Manuscript:  LETTER
Category: Information Network
Keyword: 
securitywireless sensor networkssecure localizationalgorithms
 Summary | Full Text:PDF(131.1KB)

Unilateral Distance Bounding Protocol with Bidirectional Challenges
Myung-Ho PARK Ki-Gon NAM Jin Seok KIM Dae Hyun YUM Pil Joong LEE 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2013/01/01
Vol. E96-D  No. 1  pp. 134-137
Type of Manuscript:  LETTER
Category: Information Network
Keyword: 
mafia fraud attackdistance boundingauthenticationsecurity
 Summary | Full Text:PDF(82KB)

Security Condition for Exact Localization in Wireless Ad Hoc Networks
Jin Seok KIM Dae Hyun YUM Sung Je HONG Jong KIM Pil Joong LEE 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2012/07/01
Vol. E95-B  No. 7  pp. 2459-2462
Type of Manuscript:  LETTER
Category: Network
Keyword: 
secure localizationwireless ad hoc networks
 Summary | Full Text:PDF(554.2KB)

Lightweight Distance Bounding Protocol against Relay Attacks
Jin Seok KIM Kookrae CHO Dae Hyun YUM Sung Je HONG Pil Joong LEE 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2012/04/01
Vol. E95-D  No. 4  pp. 1155-1158
Type of Manuscript:  LETTER
Category: Information Network
Keyword: 
securityauthenticationrelay attackmafia fraud attackdistance bounding protocol
 Summary | Full Text:PDF(72.6KB)

Lightweight One-Time Signature for Short Messages
Dae Hyun YUM Pil Joong LEE 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/07/01
Vol. E94-A  No. 7  pp. 1567-1575
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
cryptographydigital signatureone-time signature
 Summary | Full Text:PDF(268.3KB)

Energy-Efficient Hash Chain Traversal
Dae Hyun YUM Jae Woo SEO Pil Joong LEE 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/03/01
Vol. E94-A  No. 3  pp. 955-963
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
cryptographyhash chainefficient traversal
 Summary | Full Text:PDF(451.9KB)

Sanitizable Signatures Reconsidered
Dae Hyun YUM Pil Joong LEE 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/02/01
Vol. E94-A  No. 2  pp. 717-724
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
digital signaturesanitizable signatureredactable signaturecontent extraction signature
 Summary | Full Text:PDF(271.2KB)

Fast Verification of Hash Chains with Reduced Storage
Dae Hyun YUM Jin Seok KIM Pil Joong LEE Sung Je HONG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/01/01
Vol. E94-A  No. 1  pp. 383-391
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
hash chainprogressive verificationcheck-bit scheme
 Summary | Full Text:PDF(1.1MB)

Generalized Hash Chain Traversal with Selective Output
Dae Hyun YUM Jae Woo SEO Kookrae CHO Pil Joong LEE 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2010/05/01
Vol. E93-D  No. 5  pp. 1303-1306
Type of Manuscript:  LETTER
Category: Data Engineering, Web Information Systems
Keyword: 
hash chainfractal traversalamortization
 Summary | Full Text:PDF(152.9KB)

Invisibly Sanitizable Signature without Pairings
Dae Hyun YUM Pil Joong LEE 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/06/01
Vol. E92-A  No. 6  pp. 1541-1543
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
sanitizable signaturepublic key cryptographyinformation disclosureprivacy
 Summary | Full Text:PDF(75.6KB)

Generalized Combinatoric Accumulator
Dae Hyun YUM Jae Woo SEO Pil Joong LEE 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2008/05/01
Vol. E91-D  No. 5  pp. 1489-1491
Type of Manuscript:  Special Section LETTER (Special Section on Information and Communication System Security)
Category: Cryptographic Techniques
Keyword: 
one-way accumulatoraccumulated hash function
 Summary | Full Text:PDF(73.1KB)

Security Analysis of Yeh-Tsai Security Mechanism
Dae Hyun YUM Jong Hoon SHIN Pil Joong LEE 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2008/05/01
Vol. E91-D  No. 5  pp. 1477-1480
Type of Manuscript:  Special Section LETTER (Special Section on Information and Communication System Security)
Category: Secure Communication
Keyword: 
security analysissecurity protocolmobile commerceWAPauthentication
 Summary | Full Text:PDF(108.7KB)

Efficient Fair Exchange from Identity-Based Signature
Dae Hyun YUM Pil Joong LEE 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/01/01
Vol. E91-A  No. 1  pp. 119-126
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Protocols
Keyword: 
optimistic fair exchangecontract signingidentity-based signature
 Summary | Full Text:PDF(210.4KB)

Security Analysis of Zhu-Bao's Verifiably Committed Signature
Dae Hyun YUM Pil Joong LEE 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/12/01
Vol. E90-A  No. 12  pp. 2962-2964
Type of Manuscript:  LETTER
Category: Information Security
Keyword: 
fair exchangeverifiably encrypted signaturecryptanalysis
 Summary | Full Text:PDF(63KB)

Cryptanalysis of Yeh-Shen-Hwang's One-Time Password Authentication Scheme
Dae Hyun YUM Pil Joong LEE 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2005/04/01
Vol. E88-B  No. 4  pp. 1647-1648
Type of Manuscript:  LETTER
Category: Fundamental Theories for Communications
Keyword: 
cryptanalysisone-time passwordS/KEYauthentication scheme
 Summary | Full Text:PDF(54.9KB)

Existence Condition for Tail-Biting Convolutional Codes
Young KIM Pil Joong LEE 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2002/11/01
Vol. E85-B  No. 11  pp. 2362-2368
Type of Manuscript:  PAPER
Category: Fundamental Theories
Keyword: 
convolutional codetail-biting codeerror-correcting code
 Summary | Full Text:PDF(197.2KB)