Public key encryption with conjunctive keyword search and its extension to a multi-user system YH Hwang, PJ Lee International conference on pairing-based cryptography, 2-22, 2007 | 596 | 2007 |
Iot security & privacy: threats and challenges YH Hwang Proceedings of the 1st ACM workshop on IoT privacy, trust, and security, 1-1, 2015 | 195 | 2015 |
Certificateless public key encryption secure against malicious KGC attacks in the standard model YH Hwang, JK Liu, SSM Chow Cryptology ePrint Archive, 2007 | 69 | 2007 |
Timed-release encryption with pre-open capability and its application to certified e-mail system YH Hwang, DH Yum, PJ Lee International Conference on Information Security, 344-358, 2005 | 66 | 2005 |
An efficient public key trace and revoke scheme secure against adaptive chosen ciphertext attack CH Kim, YH Hwang, PJ Lee Advances in Cryptology-ASIACRYPT 2003: 9th International Conference on the …, 2003 | 42 | 2003 |
Method and apparatus for managing user devices and contents by using quick response codes Y Hwang, CH Lee, S Choi, JM Kim US Patent 9,449,294, 2016 | 39 | 2016 |
EPA: An efficient password-based protocol for authenticated key exchange YH Hwang, DH Yum, PJ Lee Australasian Conference on Information Security and Privacy, 452-463, 2003 | 30 | 2003 |
상태기반 RFID 인증 프로토콜 유성호, 김기현, 황용호, 이필중 정보보호학회논문지 14 (6), 57-68, 2004 | 28 | 2004 |
Efficient public key broadcast encryption using identifier of receivers JW Lee, YH Hwang, PJ Lee Information Security Practice and Experience: Second International …, 2006 | 20 | 2006 |
Method and apparatus for authorizing host to access portable storage device S Mo, S Suh, SM Lee, B Jeong, Y Hwang US Patent 9,164,925, 2015 | 19 | 2015 |
Method and apparatus for managing content to be shared among devices Y Hwang, CH Lee, S Choi, JM Kim US Patent App. 13/349,214, 2012 | 19 | 2012 |
Method and apparatus for encrypting data JW Seo, YH Hwang, S Kim US Patent 10,177,906, 2019 | 18 | 2019 |
# twiti: Social listening for threat intelligence H Shin, WC Shim, S Kim, S Lee, YG Kang, YH Hwang Proceedings of the Web Conference 2021, 92-104, 2021 | 17 | 2021 |
Cybersecurity event detection with new and re-emerging words H Shin, WC Shim, J Moon, JW Seo, S Lee, YH Hwang Proceedings of the 15th ACM asia conference on computer and communications …, 2020 | 16 | 2020 |
Practical pay-TV scheme using traitor tracing scheme for multiple channels CH Kim, YH Hwang, PJ Lee International Workshop on Information Security Applications, 264-277, 2004 | 16 | 2004 |
Status-based RFID authentication protocol YS Ho, HY Ho, LP Joong Journal of the Korea Institute of Information Security & Cryptology 14 (6 …, 2004 | 15 | 2004 |
Encryption apparatus, method for encryption and computer-readable recording medium JW Seo, JH Cheon, YH Hwang, J Kim US Patent 10,211,974, 2019 | 14 | 2019 |
Encrypted keyword search mechanism based on bitmap index for personal storage services YH Hwang, JW Seo, IJ Kim 2014 IEEE 13th International Conference on Trust, Security and Privacy in …, 2014 | 12 | 2014 |
Method and apparatus for authorizing host to access portable storage device S Mo, S Suh, SM Lee, B Jeong, Y Hwang US Patent 8,464,047, 2013 | 12 | 2013 |
Efficient broadcast encryption scheme with log-key storage YH Hwang, PJ Lee International Conference on Financial Cryptography and Data Security, 281-295, 2006 | 12 | 2006 |