Andro-simnet: Android malware family classification using social network analysis HM Kim, HM Song, JW Seo, HK Kim 2018 16th Annual Conference on Privacy, Security and Trust (PST), 1-8, 2018 | 39 | 2018 |
Single-layer fractal hash chain traversal with almost optimal complexity DH Yum, JW Seo, S Eom, PJ Lee Cryptographers’ Track at the RSA Conference, 325-339, 2009 | 25 | 2009 |
Trapdoor sanitizable signatures made easy DH Yum, JW Seo, PJ Lee Applied Cryptography and Network Security: 8th International Conference …, 2010 | 24 | 2010 |
User terminal, service providing apparatus, driving method of user terminal, driving method of service providing apparatus, and encryption indexing-based search system YN Kim, JW Seo, HJ Lee, H Kang, S Ga-Jin, JB Chun, C Gyu-Cheol US Patent App. 14/962,580, 2016 | 23 | 2016 |
Method and apparatus for encrypting data JW Seo, YH Hwang, S Kim US Patent 10,177,906, 2019 | 22 | 2019 |
Proxy-invisible CCA-secure type-based proxy re-encryption without random oracles JW Seo, DH Yum, PJ Lee Theoretical Computer Science 491, 83-93, 2013 | 20 | 2013 |
Cybersecurity event detection with new and re-emerging words H Shin, WC Shim, J Moon, JW Seo, S Lee, YH Hwang Proceedings of the 15th ACM asia conference on computer and communications …, 2020 | 19 | 2020 |
검색 가능 암호 기술의 연구 동향 SY Kim, JW Seo, PJ Lee Review of KIISC 19 (2), 63-73, 2009 | 19 | 2009 |
Apparatus and method for processing query JW Seo, YN Kim, HJ Lee, H Kang, S Ga-Jin, JB Chun, C Gyu-Cheol, ... US Patent 10,482,082, 2019 | 13 | 2019 |
Encryption apparatus, method for encryption and computer-readable recording medium JW Seo, JH Cheon, YH Hwang, J Kim US Patent 10,211,974, 2019 | 13 | 2019 |
Encrypted keyword search mechanism based on bitmap index for personal storage services YH Hwang, JW Seo, IJ Kim 2014 IEEE 13th International Conference on Trust, Security and Privacy in …, 2014 | 12 | 2014 |
Comments on “unidirectional chosen-ciphertext secure proxy re-encryption” JW Seo, DH Yum, PJ Lee IEEE Transactions on Information Theory 59 (5), 3256-3256, 2012 | 11 | 2012 |
Fast order-preserving encryption from uniform distribution sampling YH Hwang, S Kim, JW Seo Proceedings of the 2015 ACM Workshop on Cloud Computing Security Workshop, 41-52, 2015 | 10 | 2015 |
Generalized combinatoric accumulator DH Yum, JW Seo, PJ Lee IEICE transactions on information and systems 91 (5), 1489-1491, 2008 | 9 | 2008 |
Generalized hash chain traversal with selective output DH Yum, JW Seo, K Cho, PJ Lee IEICE TRANSACTIONS on Information and Systems 93 (5), 1303-1306, 2010 | 6 | 2010 |
A visibility-based upper bound for android unlock patterns J Lee, JW Seo, K Cho, PJ Lee, J Kim, SH Choi, DH Yum IEICE TRANSACTIONS on Information and Systems 99 (11), 2814-2816, 2016 | 5 | 2016 |
TARD: Temporary Access Rights Delegation for guest network devices J Lee, JW Seo, H Ko, H Kim Journal of Computer and System Sciences 86, 59-69, 2017 | 4 | 2017 |
Identity-based signcryption from identity-based cryptography W Lee, JW Seo, PJ Lee Information Security Applications: 12th International Workshop, WISA 2011 …, 2012 | 4 | 2012 |
Energy-efficient hash chain traversal DH Yum, JW Seo, PJ Lee IEICE transactions on fundamentals of electronics, communications and …, 2011 | 3 | 2011 |
A visibility-based lower bound for android unlock patterns J Lee, JW Seo, K Cho, PJ Lee, DH Yum IEICE TRANSACTIONS on Information and Systems 100 (3), 578-581, 2017 | 2 | 2017 |