关注
Jae Woo Seo
Jae Woo Seo
Samsung Research
在 samsung.com 的电子邮件经过验证
标题
引用次数
引用次数
年份
Andro-simnet: Android malware family classification using social network analysis
HM Kim, HM Song, JW Seo, HK Kim
2018 16th Annual Conference on Privacy, Security and Trust (PST), 1-8, 2018
392018
Single-layer fractal hash chain traversal with almost optimal complexity
DH Yum, JW Seo, S Eom, PJ Lee
Cryptographers’ Track at the RSA Conference, 325-339, 2009
252009
Trapdoor sanitizable signatures made easy
DH Yum, JW Seo, PJ Lee
Applied Cryptography and Network Security: 8th International Conference …, 2010
242010
User terminal, service providing apparatus, driving method of user terminal, driving method of service providing apparatus, and encryption indexing-based search system
YN Kim, JW Seo, HJ Lee, H Kang, S Ga-Jin, JB Chun, C Gyu-Cheol
US Patent App. 14/962,580, 2016
232016
Method and apparatus for encrypting data
JW Seo, YH Hwang, S Kim
US Patent 10,177,906, 2019
222019
Proxy-invisible CCA-secure type-based proxy re-encryption without random oracles
JW Seo, DH Yum, PJ Lee
Theoretical Computer Science 491, 83-93, 2013
202013
Cybersecurity event detection with new and re-emerging words
H Shin, WC Shim, J Moon, JW Seo, S Lee, YH Hwang
Proceedings of the 15th ACM asia conference on computer and communications …, 2020
192020
검색 가능 암호 기술의 연구 동향
SY Kim, JW Seo, PJ Lee
Review of KIISC 19 (2), 63-73, 2009
192009
Apparatus and method for processing query
JW Seo, YN Kim, HJ Lee, H Kang, S Ga-Jin, JB Chun, C Gyu-Cheol, ...
US Patent 10,482,082, 2019
132019
Encryption apparatus, method for encryption and computer-readable recording medium
JW Seo, JH Cheon, YH Hwang, J Kim
US Patent 10,211,974, 2019
132019
Encrypted keyword search mechanism based on bitmap index for personal storage services
YH Hwang, JW Seo, IJ Kim
2014 IEEE 13th International Conference on Trust, Security and Privacy in …, 2014
122014
Comments on “unidirectional chosen-ciphertext secure proxy re-encryption”
JW Seo, DH Yum, PJ Lee
IEEE Transactions on Information Theory 59 (5), 3256-3256, 2012
112012
Fast order-preserving encryption from uniform distribution sampling
YH Hwang, S Kim, JW Seo
Proceedings of the 2015 ACM Workshop on Cloud Computing Security Workshop, 41-52, 2015
102015
Generalized combinatoric accumulator
DH Yum, JW Seo, PJ Lee
IEICE transactions on information and systems 91 (5), 1489-1491, 2008
92008
Generalized hash chain traversal with selective output
DH Yum, JW Seo, K Cho, PJ Lee
IEICE TRANSACTIONS on Information and Systems 93 (5), 1303-1306, 2010
62010
A visibility-based upper bound for android unlock patterns
J Lee, JW Seo, K Cho, PJ Lee, J Kim, SH Choi, DH Yum
IEICE TRANSACTIONS on Information and Systems 99 (11), 2814-2816, 2016
52016
TARD: Temporary Access Rights Delegation for guest network devices
J Lee, JW Seo, H Ko, H Kim
Journal of Computer and System Sciences 86, 59-69, 2017
42017
Identity-based signcryption from identity-based cryptography
W Lee, JW Seo, PJ Lee
Information Security Applications: 12th International Workshop, WISA 2011 …, 2012
42012
Energy-efficient hash chain traversal
DH Yum, JW Seo, PJ Lee
IEICE transactions on fundamentals of electronics, communications and …, 2011
32011
A visibility-based lower bound for android unlock patterns
J Lee, JW Seo, K Cho, PJ Lee, DH Yum
IEICE TRANSACTIONS on Information and Systems 100 (3), 578-581, 2017
22017
系统目前无法执行此操作,请稍后再试。
文章 1–20