International Journals or Proceedings

 

2018


  • Youngho Park, Chul Sur, Si-Wan Noh and Kyung-Hyune Rhee, "Self-Controllable Secure Location Sharing for Trajectory-Based Message Delivery on Cloud-Assisted VANETs," Sensors, Vol.18, No.7, 2018.07

  • Siwan Noh, Sang-Uk Shin, Kyung-Hyune Rhee, "Control Channels: A Blockchain-Based Rapid Access Control Method," 14th International Conference on Multimedia Information Technology and Applications(MITA2018), 2018.06.

  • Kyongmo Lee, Kyung-Hyune Rhee, "Blockchain Based on Identity Modeling in VANETs," 14th International Conference on Multimedia Information Technology and Applications(MITA2018), 2018.06.

  • Mideum Kim , Kyung-Hyune Rhee, "Smart Contract-Based Database for the Bibliographic Information Sharing," 14th International Conference on Multimedia Information Technology and Applications(MITA2018), 2018.06.

  • Ji-Sun Park, Hye-Bin Kim, Jong-Kyu Kim, Kyung-Hyune Rhee, Sang-Uk Shin, "Implementation of Smart Contract-based Review System to Ensure Reliability," 14th International Conference on Multimedia Information Technology and Applications(MITA2018), 2018.06.

  • Siwan Noh, Kyung-Hyune Rhee, "A Scalable Blockchain-Based Access Control for the Personal Health Record Management," The 13th Asia Pacific International Conference on Information Science and Technology(APIC-IST 2018), 2018.06.

  • Sandi Rahmadika, Kyung-Hyune Rhee, "Security Perspectives on the Blockchain for the Decentralized Energy Trading System," The 13th Asia Pacific International Conference on Information Science and Technology(APIC-IST 2018 ), 2018.06.

  • Siwan Noh, Youngho Park, Kyung-Hyune Rhee, "A Blockchain-Based Access Control with Micropayment Channels," The 12th International Conference on Multimedia and Ubiquitous Engineering(MUE2018), 2018.04.

  • Sandi Rahmadika, Kyung-Hyune Rhee, "Preliminary of Selfish Mining Strategy on the Decentralized Model of Personal Health Information," The 12th International Conference on Multimedia and Ubiquitous Engineering(MUE2018 ), 2018.04.
  • Lewis Nkenyereye, Youngho Park,  Kyung-Hyune Rhee, "Secure vehicle traffic data dissemination and analysis protocol in vehicular cloud computing,Journal of Supercomputing, Vol.74, No.3, pp.1024-1044, 2018.03

 

2017


  • Si-Wan Noh, Kyeong Mo Lee, Kyung-Hyune Rhee, "Blockchain-Based Authentication Protocol for Healthcare Monitoring System," The 1st international Conference on ICT for Smart Health(ICT4sHealth), 2017.12

  • Sandi Rahmadika, Kyung-Hyune Rhee, "A Conceptual Model for Managing Decentralized Electronic Medical Record Based on Blockchain Technology," The 1st international Conference on ICT for Smart Health(ICT4sHealth), 2017.12

  • Akash Suresh Patil, Bayu Adhi Tama, Youngho Park, Kyung-Hyune Rhee, "A Framework for Blockchain based Secure Smart Green House Farming," The 12th KIPS International Conference on Ubiquitous Information Technologies and Applications (CUTE 2017), 2017.12

  • Si-Wan Noh, Youngho Park,  Chul Sur, Sang Uk Shin, Kyung-Hyune Rhee, "Blockchain-Based User-Centric Records Management System," International Jounal of Control and Automation, Vol.10, No.11, pp.133~144, 2017.11

  • Bayu Adhi Tama, Kyung-Hyune Rhee, "A Detailed Analysis of Classifier Ensembles for Intrusion Detection in Wireless Network," Journal of Information Processing Systems, Vol.13, No.5, pp.1203~1212, 2017.10.

  • Bayu Adhi Tama, Kyung-Hyune RheeAttack Classification Analysis of IoT Network via Deep Learning Approach ,” The 2nd International Symposium on Mobile Internet Security(Mobisec 2017), 2017.10.

  • Youngho Park, Chul Sur, Hyunwoo Kim, Kyung-Hyune RheeA Reliable Incentive Scheme Using Bitcoin on Cooperative Vehicular Ad Hoc Networks,” The 2nd International Symposium on Mobile Internet Security(Mobisec 2017), 2017.10.

  • Bayu Adhi Tama, Kyung-Hyune RheeAn Integration of PSO-based Featies Selection and Random Forest for Anomaly Detection in IoT Network,” 2nd International Joint Conference on Advanced Engineering and Technology (IJCAET2017), 2017.08.

  • Bayu Adhi Tama, Bruno Joachim Kweka, Youngho Park, Kyung-Hyune RheeA Critical Review of Blockchain and Its Current Applications,” International Conference on Electrical Engineering and Computer Science (ICECOS2017), 2017.08.

  • Bayu Adhi Tama, Kyung-Hyune RheeHFSTE: Hybrid Feature Selections and Tree-based Classifiers Ensemble for Intrusion Detection System,” IEICE TRANSACTIONS on Information and Systems Vol.100, No.8, pp.1729-1737, 2017.08.

  • Bayu Adhi Tama, Akash Suresh Patil, Kyung-Hyune RheeAn Improved Model of Anomaly Detection using Two-level Classifier Ensemble,” 2017 12th Asia Joint Conference on Information Security (AsiaJCIS2017), 2017.08.

  • Jisun Park, Dong-Ee Kim, Kyung-Hyune Rhee, Sang-Uk ShinIntegrity Verification Model of Attached Files on E-mail using KSI,” 13th International Conference on Multimedia Technology and Applications (MITA 2017), 2017.07.

  • Hyunwoo Kim, Kyung-Hyune RheeSecuring Vehicular Ad hoc Networks Using Bitcoin as an Incentive,” 13th International Conference on Multimedia Technology and Applications (MITA 2017), 2017.07.

  • Si-Wan Noh, Youngho Park, Chul Sur, Sang-Uk Shin, Kyung-Hyune RheeScalable Access Control Based on Blockchain for Healthcare Service System,” 13th International Conference on Multimedia Technology and Applications (MITA 2017), 2017.07.

  • Bayu Adhi Tama, Kyung-Hyune RheeAn In-depth Experimental Study of Anomaly Detection using Gradient Boosted Machine,”  Neural Computing and Applications, 2017.07.

  • Youngho Park , Chul Sur, Si-Wan Noh, Kyung-Hyune RheeSecure Vehicle Location-Sharing for Trajectory-Based Message Delivery on VANETs,” 26th International Symposium on Industrial Electronics (ISIE2017), 2017.06.

  • Bayu Adhi Tama, Kyung-Hyune RheeTree-based Classifier Ensembles for Early Detection Method of Diabetes: An Exploratory Study,” Artificial Intelligence Review, 2017.05.

  • Bayu Adhi Tama, Kyung-Hyune RheeA Novel Anomaly Detection Method in Wireless Network Using Multi-level Classifier Ensembles,” The 12th International Conference on Future Information Technology (LNEE Vol. 448), 2017.05.

  • Bayu Adhi Tama, Kyung-Hyune RheePerformance evaluation of intrusion detection system using classifier ensembles,” International Journal of Internet Protocol Technology, Vol.10, No.1, pp.22-29, 2017.03.

  • Bayu Adhi Tama, Kyung-Hyune RheeAn Extensive Empirical Evaluation of Classifier Ensembles for Intrusion Detection Task,” Computer Systems Science and Engineering, Vol.32, No.2, pp.149-158, 2017.03.

  • Youngho Park, Chul Sur, Kyung-Hyune RheeSecure and anonymous health data transmission protocol for remote healthcare monitoring,” Information Journal, pp.1005-1014, 2017.02.

  • Annisa Istiqomah Arrahmah, Yudi Satria Gondokaryono, Kyung-Hyune RheeImplementation of Fingerprint Authentication Based on Fuzzy Vault Biometric Cryptosystems for Multiple Platforms,” 2017 International Workshop on Advanced Image Technology (IWAIT), 2017.01.

 

 

2016


  • Youngho Park, Chul Sur, Kyung-Hyune RheePseudonymous Authentication for Secure V2I Services in Cloud-based Vehicular Networks,” Journal of Ambient Intelligence and Humanized Computing, Vol.7, No.5, Springer, pp.661-671, 2016.10.

  • Aditya Candra, Yusuf Kurniawan, Kyung-Hyune RheeSecurity Analysis Testing for Secure Instant Messaging in Android with Study Case:Telegram,” 2016 6th International Conference on System Enginerring and Technology(ICSET), 2016.10.

  • Vincentius Timothy, Ary Setijadi Prihatmanto, Kyung-Hyune RheeData Preparation Step for Automated Diagnosis based on HRV Analysis and Machine Learning,” 2016 6th International Conference on System Enginerring and Technology(ICSET), 2016.10.

  • Annisa Istiqomah Arrahmah, Yudi Satria Gondokaryono, Kyung-Hyune RheeFast Non-Random Chaff Point Generator for Fuzzy Vault Biometric Cryptosystems,” 2016 6th International Conference on System Enginerring and Technology(ICSET), 2016.10.

  • Vincentius Timothy, Kyung-Hyune RheeR-to-R Extraction and Preprocessing Procedure for an Automated Diagnosis of Various Diseases from ECG Data”, Journal of Multimedia Information System, Vol.3, No.2, pp.1-8, 2016.08.

  • Annisa Istiqomah Arrahmah, Kyung-Hyune RheeEnhancing Accuracy Performance of Fuzzy Vault Non-Random Chaff Point Generator for Mobile Payment Authentication,” Journal of Multimedia Information System, Vol.3, No.2, pp.13-20, 2016.08.

  • Rafinno Aulya, Hilwadi Hindersah, Ary Setijadi Prihatmanto, Kyung Hyune RheeAn Authenticated Passengers based on Dynamic QR Code for Bandung Smart Transportation Systems”, 2016 6th International Annual Engineering Seminar(InAES), 2016.08.

  • Sandi Rahmadika, Pranoto H. Rusmin, Hilwadi Hindersah, Kyung Hyune RheeProviding Data Integrity for Container Dwelling Time in the Seaport”, 2016 6th International Annual Engineering Seminar(InAES), 2016.08.

  • Heri Arum Nugroho, Yoga Priyana, Ary Setijadi Prihatmanto, Kyung Hyune RheePseudonym-based Privacy Protection for Steppy Application”, 2016 6th International Annual Engineering Seminar(InAES), 2016.08.

  • 박영호, 서철, 이경현A Secure Health Data Transmission for Remote Healthcare Monitoring System”, The 2nd International Integrated (Web & Offline) Conference & Concert on Convergence (IICCC), 2016.08.

  • Bayu Adhi Tama, Kyung-Hyune RheeClassifier Ensemble Design with Rotation Forest to Enhance Attack Detection of IDS in Wireless Network”, 11th Asia Joint Conference on Information Security, 2016.08.

  • Nkenyereye Lewis, Youngho Park, Kyung-Hyune RheeA Secure Billing Protocol over Attribute based Encryption in Vehicular Cloud Computing,” EURASIP Journal on Wireless Communications and Networking (2016:196), 2016.08.

  • Lewis Nkenyereye, Kyung Hyune RheeSecure Emergency Services Protocol over Vehicular Cloud Computing”, The 1st International Symposium on Mobile Internet Security, 2016.07.

  • Taek-Young Youn, Ku-Young Chang, Kyung Hyune Rhee, and Sang Uk ShinAuthorized convergent encryption for client-side deduplication”, The 1st International Symposium on Mobile Internet Security, 2016.07.

  • 노시완, 박영호, 이경현, An enhanced anonymous authentication scheme for remote health monitoring system”, 12th International Conference on Multimedia Technology and Applications, 2016.07.

  • Nkenyereye Lewis, Youngho Park, Kyung-Hyune RheeSecure Vehicle Traffic Data Dissemination and Analysis Protocol in Vehicular Cloud Computing,” Journal of Supercomputing, Springer, pp.1-21, 2016.06.

  • Chul Sur, Youngho Park, Kyung-Hyune RheeAn efficient and secure navigation protocol based on vehicular cloud,” International Journal of Computer Mathematics, Vol.93, No.2, pp.325-344, 2016.02.

  • Kaung Myat Sam, Kyung Hyune Rhee, “An Improved Scheme for Pseudonym Change in VANETs,” The 4th Korea-Japan Joint Workshop on Complex Communication Sciences, 2016.01.

 

 

2015


  • Nkenyereye Lewis, Kyung Hyune Rhee, “Secure Traffic Data Transmission Protocol for Vehicular Cloud,” The 10th International Conference of Ubiquitous Information Technologies and Applications(LNEE Vol. 373), 2015.12.

  • Bayu Adhi Tama, Kyung-Hyune Rhee, “A Combination of PSO-Based Feature Selection and Tree-Based Classifiers Ensemble for Intrusion Detection Systems,” The 10th International Conference of Ubiquitous Information Technologies and Applications(LNEE Vol. 373), 2015.12.

  • Nkenyereye Lewis, Bayu Adhi Tama, Youngho Park, Kyung Hyune Rhee, “A Fine-Grained Privacy Preserving Protocol over Attribute Based Access Control for VANETs,”, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, Vol.6, No.2, pp.98-112, 2015.8.

  • Nkenyereye Lewis, Kyung Hyune Rhee, “Secure Taxi Service Scheme in Vehicular Cloud Enviroment,”,INFORMATION, Vol.18, No.8, pp.3495-3505, 2015.8.

  • Bayu Adhi Tama, Kyung-Hyune Rhee, “Performance Analysis of Multiple Classier System in DoS Attack Detection,” The 16th International Workshop on Information Security Applications, 2015.08.

  • Nkenyereye Lewis, Kyung Hyune Rhee, “A Secure Disaster Rescue Service Protocol Based on Vehicular Cloud,” The 11th International Conference on Multimedia Information Technology and Application, 2015.06.

  • Nkenyereye Lewis, Kyung Hyune Rhee, “A Secure Taxi Booking Service Framework Based on Vehicular Cloud,” The 3rd International Conference on Computer Applications and Information Processing Technology(CAIPT 2015), 2015.06.

  • Bayu Adhi Tama, Kyung-Hyune Rhee, “Data Mining Techniques in DoS/DDoS Attack Detection: A Literature Review,” The 3rd International Conference on Computer Applications and Information Processing Technology(CAIPT 2015) , 2015.06.

  • Bayu Adhi Tama, Eko K. Budiardjo, Kyung-Hyune Rhee, “Analysis of Cross-Selling¡'s Product Suggestion: A Case Study of Digital Imaging Company,” The 3rd International Conference on Computer Applications and Information Processing Technology(CAIPT 2015) , 2015.06.

 

 

2014


  • Chul Sur, Youngho park, Kyung-Hyune Rhee, “An Efficient and Secure Navigation Protocol Based on Vehicular Cloud,” International Journal of Computer Mathematics, To appear

  • Nkenyereye Lewis, Kyung-Hyune Rhee, “Secure OBU's Virtual Machine Migration Protocol in Vehicular Cloud Enviroment,” International Journal of Applied Engineering Research, Vol.9, No.24, pp.29831-29840, 2014.12.

  • Taerim Lee, Hun Kim, Heyjoo Lee, Kyung-Hyune Rhee, Sang Uk Shin, “Implementation and Performance Evaluation of Distributed Text Processing System using Hadoop for Digital Investigations on Big Data,” COMPUTER SCIENCE AND INFORMATION SYSTEMS, To appear

  • Chul Sur, Youngho Park, Kyung-Hyune Rhee, “An Improved Secure Message Delivery Protocol Based on Commitment Scheme in VDTNs,” 2014 International Workshop on Networking and Communication, 2014.12.

  • Nkenyereye Lewis, Kyung-Hyune Rhee, “Towards Secure Virtual Machine Migration in Vehicular Cloud Environment,” 2014 International Workshop on Networking and Communication, 2014.12.

  • Nkenyereye Lewis, Kyung-Hyune Rhee, “A Secure Temporary Traffic Light Rescheduling Protocol Based on Vehicular Cloud,” The 6th FTRA International Conference on Computer Science and its Applications (CSA-14), 2014.12.

  • Youngho Park, Chul Sur, Kyung-Hyune Rhee, “A Privacy Preserving V2I Service Access Management System for Vehicular Clouds,” 6th International Workshop on Managing Insider Security Threats (MIST 2014), 2014.11.

  • Hoen-min Lee, Taerim Lee, Kyung Hyune Rhee, Sang Uk Shin, “Query Recommending Scheme : Implementations and Evaluation,” 6th International Workshop on Managing Insider Security Threats (MIST 2014), 2014.11.

  • Rong Huang, Kyung-Hyune Rhee, Eiichi Uchida, “A parallel image encryption method based on compressive sensing,” Multimedia Tools and Applications, Vol.72, No.1, Springer, pp.71-93, 2014.09.

  • Sonia Carole Kouayep, Kyung-Hyune Rhee, “An Enhanced Copy-Move Forgery Detection Based on Radon Binary Pattern,” 2014 International Conference on Future Information & Communication Engineering (ICFICE 2014), 2014.06.

  • Taerim Lee, Hun Kim, Kyung Hyune Rhee, Sang Uk Shin, “Implementation and Performance of Distributed Text Processing,” Journal of Internet Services and Information Security (JISIS), Vol.4, No.1, pp.12-24, 2014.02.

  • Sonia Carole Kouayep, Munkhbaatar Doyoddorj, Kyung-Hyune Rhee, “A Copy-Move Forgery Detection Method based on SIFT-LBP Features,” 2014 International Workshop on Advanced Image Technology, 2014.01.


 

2013


  • Wonjun Cho, Youngho Park, Chul Sur, Kyung-Hyune Rhee, “An improved privacy-preserving navigation protocol in VANETs,” Journal of Wireless Mobile Networks, Ubiquitous Computing and Dependable Applications(JoWUA), Vol. 4, No. 4, pp.80-92, 2013.12.

  • Youngho Park, Chul Sur, Sanguk Shin, Changho Seo, Kyung-Hyune Rhee, “A Privacy Preserving Message Delivery Protocol Using Identity-Hidden Index in VDTNs,” Journal of Universal Computer Science, Vol.19, No.16, pp.2385-2403, 2013.10.

  • Munkhbaatar Doyoddorj, Kyung-Hyune Rhee, “Robust Copy-Move Forgery Detection Based on Dual-Transform,” 5th International Conference on Digital Forensics & Cyber Crime (ICDF2C 2013), 2013.09.

  • Chul Sur, Youngho Park, Sang Uk Shin, Kyung Hyune Rhee, Changho Seo, “Certificate-Based Proxy Re-Encryption for Public Cloud Storage,” 2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013.07.

  • Rimba Whidiana Ciptasari, Kyung Hyune Rhee, Kouichi Sakurai, “Exploiting reference images for image splicing verification,” DIGITAL INVESTIGATION, Vol.10, No.3, Elsevier, pp.246-258, 2013.06.

  • Munkhbaatar Doyoddorj, Kyung-Hyune Rhee, “A Blind Forgery Detection Scheme Using Image Compatibility Metrics,” 2013 IEEE International Symposium on Industrial Electronics (ISIE 2013), 2013.05.

  • Taerim Lee, Hun Kim, Kyung Hyune Rhee, Sang Uk Shin, “Design and Implementation of E-Discovery as a Service based on Cloud Computing,” COMPUTER SCIENCE AND INFORMATION SYSTEMS, Vol.10, No.2, pp.703-724, 2013.04.

  • Munkhbaatar Doyoddorj, Chul Sur, Youngho Park and Kyung-Hyune Rhee, “An Improved Reversible Data Hiding Scheme Using Extra Space Modulation for Color Palette Image,” International Journal of Database Theory and Application, Vol. 6, No. 2, SERSC, pp.97-108, 2013.04.

  • Wen Huaqing, Kyung-Hyune Rhee, “An Improved Greedy Forwarding Routing Protocol for Cooperative VANETs,” The 2013 Asian Conference on Availability, Reliability and Security (AsiaARES 2013), LNCS 7804, 2013.03.

  • Youngho Park, Chul Sur, Kyung-Hyune Rhee, “A Simplified Privacy Preserving Message Delivery Protocol in VDTNs,” The 2013 Asian Conference on Availability, Reliability and Security (AsiaARES 2013), LNCS 7804, 2013.03.


 

2012


  • Rimba Whidiana Ciptasari, Kyung Hyune Rhee, Kouichi Sakurai, “An Image Splicing Detection Based on Interpolation Analysis,” Advances in Multimedia Information Processing – PCM 2012 – 13th Pacific-Rim Conference on Multimedia, LNCS 7674, 2012.12

  • Munkbaatar Doyoddorj, Kyung-Hyune Rhee, “Design and Analysis of a Fragile Watermarking Scheme Based on Block-Mapping,” International Cross-Domain Conference andWorkshop onAvailability, Reliability, and Security, CD-ARES 2012, LNCS 7465, 2012.08.

  • Chul Sur, Youngho park, Kyung-Hyune Rhee, “Providing secure location-aware services for cooperative vehicular ad hoc networks,” Journal of Internet Technology, Vol.13, No.4, pp.631-644, 2012.07.

  • Sur Chul, Youngho Park, Changho Seo, Sang-Uk Shin, Kyung-Hyune Rhee, “An efficient anonymous authentication protocol without certificate management for vehicular communications,” 2012 International Conference Ubiquitous Computing and Multimedia Applications, 2012.06.

  • Munkhbaatar Doyoddorj, Chul Sur, Youngho Park and Kyung-Hyune Rhee, “Reversible Data Hiding with Large Embedding Capacity for Color Palette Images,” 2012 Advanced Signal Processing, 2012.03.

  • Munkhbaatar Doyoddorj, Youngho Park, Kouichi Sakurai, Kyung-Hyune Rhee, “Reversible Data Hiding with Large Capacity Based on the Differences of Center Pixels,” 2012 Symposium on Cryptography and Information Security (SCIS), 2012.01.


 

2011


  • Wen Huaqing, Kouichi Sakurai, Kyung-Hyune Rhee, “An RSU Aided Group-based Authentication Scheme on VANETs for Urban Road Environment,” Proceedings of the 2011 International Symposium on Advanced Engineering (ISAE 2011), 2011.11.

  • Liang Zhao, Takashi Nishide, Avishek Adhikari, Kyung Hyune Rhee, Kouichi Sakurai, “Cryptanalysis of Randomized Arithmetic Codes Based on Markov Model,” The 7th China International Conference on Information Security and Cryptology (InsCrypt2011), LNCS 7537, 2011.11.

  • Youngho Park, Chul Sur, Kyung-Hyune Rhee, “A Privacy-Preserving Location Assurance Protocol for Location-Aware Services in VANETs,” Wireless Personal Communications, Volume 61, Issue 4, Springer, pp.779-791, 2011.10.

  • Doyoddorj Munk baatar, Kyung-Hyune Rhee, “A novel secure image hashing based on reversible watermarking for forensic analysis,” International Cross Domain Conference andWorkshop (ARES 2011), LNCS 6908, 2011.08.

  • Chul Sur, Youngho Park, Takashi Nishide, Kouichi Sakurai, Kyung-Hyune Rhee, “Securing location-aware services based on online/offline signatures in VANETs,” International Cross Domain Conference andWorkshop (ARES 2011), LNCS 6908, 2011.08.

  • Youngho Park, Chul Sur, Kyung-Hyune Rhee, “A secure and location-assurance protocol for location-aware services in VANETs,” 2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011.06.


 

2010


  • Yongho Kim, Young Shin Park, Kyung-Hyune Rhee, “The Technical and Legal Approaches for Privacy Protection of e-ID,” The 2010 International Conference on Multimedia, Information Technology and its Applications (MITA 2010), 2010.08.

  • Young Shin Park, Kyung-Hyune Rhee, “A Novel Incentive Protocol with Multi-hop Communications for Service-Oriented VANETs,” The 2010 International Conference on Multimedia, Information Technology and its Applications (MITA 2010), 2010.08.

  • Chul Sur, Youngho Park, Chae Duk Jung, Kyung-Hyune Rhee, “Chosen-Ciphertext Secure Certificateless Proxy Re-Encryption,” 11th IFIP TC6/TC11 Conference on Communications and Multimedia Security (IFIP CMS 2010), 2010.06.

  • Chul Sur, Youngho Park, Chae Duk Jung, Kyung-Hyune Rhee, “Chosen-Ciphertext Secure Certificateless Proxy Re-Encryption,” Lecture Notes in Computer Science Vol. 6109, pp.214-232, 2010.05.

  • Youngho Park, Chul Sur, Chae Duk Jung, Kyung-Hyune Rhee, “An Efficient Anonymous Authentication Protocol for Secure Vehicular Communications,” Journal of information science and engineering Vol.26 No.2, pp.785-799, 2010.05.   

  • Yang Ou, Kyung Hyune Rhee, “A Survey on Image Hashing for Image Authentication,” IEICE Transactions on Information and Systems Vol.E93-D No.5, pp.1020-1030, 2010.05.

  • Yang Ou, Chul Sur, Kyung Hyune Rhee, “Discriminative Image Hashing Based on Region of Interest,” LNCS Vol.5916, pp.701-706, 2010.01.

  • Yang Ou, Chul Sur, Kyung Hyune Rhee, “Discriminative Image Hashing Based on Region of Interest,” The16th International Multimedia Modeling Conference on Advances in Multimedia Modeling (MMM 2010), LNCS 5916, 2010.01.


 

Before 2010


  • Yang Ou, Kyung Hyun Rhee, “A Key Dependent Secure Image Hashing Scheme By Using Random Transform,” The 2009 International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS 2009), 2009.12.

  • Chae Duk Jung, Chul Sur, Youngho Park, Kyung-Hyune Rhee, “A Robust and Efficient Anonymous Authentication Protocol in VANETs,” Journal of Communications and Networks, Vol.11, No.2, pp.607-614, 2009.12.

  • Young Shin Park, Chae Duk Jung, Youngho Park, Asmita A. Khajanchee, Kyung-Hyune Rhee, “An Efficient Authentication and Vehicle Tracing Protocol for Secure VANETs,” The 2009 International Conference on Multimedia, Information Technology and its Applications (MITA 2009), pp.163-166, 2009. 08.

  • Gwija Park, Kyung-Hyune Rhee, “The Development and Application of a Lesson Model based on Role-play for Privacy Protection Improvement of Elementary of Elementary Students,” The 2009 International Conference on Multimedia, Information Technology and its Applications (MITA 2009), pp.19-22, 2009. 08.

  • Yang Ou, Chul Sur, Kyung Hyune Rhee, “An Improved Histogram-Based Image Hashing Scheme Using K-means Segmentation,” The Fourth Joint Workshop on Information Security (JWIS 2009), 2009.08.

  • Chae Duk Jung, Chul Sur, Youngho Park, Kyung-Hyune Rhee, “A Robust Conditional Privacy-Preserving Authentication Protocol in VANET,” The 1st International ICST Conference on Security and Privacy in Mobile Information and Communication Systems (MobiSec 2009), LNICST Vol.17, pp.35-45, 2009.06.

  • Youngho Park, Kyung-Hyune Rhee, “An Authenticated On-Demand Routing Protocol with Key Exchange for Secure MANET,” IEICE Transactions on Information and Systems Vol.E92-D, No.5, pp.810-817, 2009.05.

  • Yougho Park, Chul Sur, Chae Duk Jung, Kyung-Hyune Rhee, “Efficient Anonymous Authentication Protocol Using Key-Insulated Signature Scheme for Secure VANET,” 1st International Conference on Mobile Lightweight Wireless Systems(MobiLight 2009), LNICST Vol.13, pp.35-44, 2009.05.

  • Eun Seok, jeong, Chae Duk Jung, Chul Sur, Kyung Hyune Rhee, “A New Conditional Privacy Preserving DRM System,” Proceeding of the 2009 International Symposium on Advanced Engineering(ISAE 2009), pp.140-143, 2009.03.

  • Yang Ou, Chul Sur, Kyung Hyune Rhee, “A Fast and Fully Format Compliant Protection of JPEG2000 Code-streams,” The15th International Multimedia Modeling Conference on Advances in Multimedia Modeling(MMM 2009), LNCS Vol.5371, pp.51-62, 2009.01.

  • Youngho Park, Chul Sur, Kyung Hyune Rhee, “A Flexible Escrow System for Secure and Reliable P2P File-Sharing Service,” The 3rd International Conference on Ubiquitous Information Technologies & Applications(3rd ICUT), pp.137-143, 2008.12.

  • Deepak Kafle, Kyung Hyune Rhee, “SNR Scalable Access Control for H-264/AVC Coded Video using Data Partition,” The 3rd Joint Workshop on Information Security(JWIS), pp.307-316, 2008.07.

  • Won Young Lee, Young Jin Hong, Weon Shin, Kyung Hyune Rhee, “Flexible Video Authentication based on Aggregate Signature,” The 4th International Conference on Multimedia, Information Technology and its Applications(MITA 2008), pp.109-112, 2008.07.

  • Jung Hwa Shin, Weon Shin, Kyung Hyune Rhee, “Reliable P2P File Sharing Service,” Agents and Peer-to-Peer Computing: 5th International Workshop(AP2PC 2006), LNCS Vol.4461, pp.143-150, 2008.06.

  • Jung Eun Ann, Kyung Hyune Rhee, “Developing Augmented Reality-based Learning contents to support Computer Education,” The 2008 KSET International Conference, Reconsidering Educational Technology Research Trends, pp.241-245, 2008.04.

  • Yang Ou, Chae Duk Jung, Chul Sur, Kyung Hyune Rhee, “An Improved Flexible Access Control Scheme for JPEG2000 Codestreams,” The 2008 International workshop on Intelligent, Mobile and Internet Services in Ubiquitous computing(IMIS2008), pp.552-557, 2008.04.

  • Chul Sur, Chae Duk Jung, Kyung Hyune Rhee, “Efficient Multi-receiver Certificateless Encryption from Bilinear Pairing,” The 7th International Conference on Applications and Principles of Infromation Science, pp.11-14, 2008.01.

  • Chae Duk Jung, Eun Seok Jeon, In Je Ko, Kyung Hyune Rhee, “A New Home DRM System Based on Indentity-Based Proxy Re-encryption,” The 2nd International Conference on Ubiquitous Information Technologies & Applications(2nd ICUT), pp.157-161, 2007.12.

  • Yang Ou, Won Young Lee, Kyung Hyune Rhee, “A Flexible JPEG2000 Image Encryption based on Arithetic Coding,” The2007 International Symposium on Intelligent Signal Processing and Communications Systems (ISPACS 2007), pp.42-42, 2007.11.

  • Eun Seok, Jeong, Chul Sur, Hwa Sik Jang, Kyung Hyune Rhee, “A New User-Friendly DRM System Based on Identity-based Mediated RSA for Home Network,” The 3rd International Conference on Multimedia, Information Technology and its Applications (MITA 2007), pp.9-12, 2007.08.   

  • Chae Duk Jung, Weon Shin, Young Jin Hong, Kyung Hyune Rhee, “A DRM System for Grading and Partially Usable Contnets Based on Interval Two-Dimensional Hash Chain,” The 3rd International Conference on Multimedia, Information Technology and its Applications (MITA 2007), pp.1-4, 2007.08.

  • Youngho Park, Won Young Lee, Kyung Hyune Rhee, “Authenticated On-demand Ad Hoc Routing Protocol without Pre-shared Key Distribution,” The 2007 ECSIS symposium on Bio-Inspired, Learning, And Intelligent Systems for Security (BLISS 2007), pp.41-46, 2007.08.

  • Chul Sur, Chae Duk Jung, Kyung Hyune Rhee, “Multi-receiver Certificate-Based Encryption and Application to Public Key Broadcast Encryption,” The 2007 ECSIS symposium on Bio-Inspired, Learning, And Intelligent Systems for Security (BLISS 2007), pp.35-40, 2007.08.

  • Yang Ou, Deepak Kafle, Kyung Hyune Rhee, “A New Joint Compression and Encryption Scheme of JEPG2000 Based on Arithmetic Coding,” The 2nd Joint Workshop on Information Security (JWIS 2007), pp.35-48, 2007.08.

  • Yang Ou, Chul Sur, Kyung Hyune Rhee, “Region-Based Selective Encryption for Medical Imaging,” The 2007 International Frontiers of Algorithmics Workshop (FAW2007), pp.62-73, 2007.08.

  • Yang Ou, Chul Sur, Kyung Hyune Rhee, “Region-Based Selective Encryption for Medical Imaging,” Frontiers in Algorithmics, First Annual International Workshop (FAW 2007), LNCS Vol.4613, pp.62-73, 2007.08.

  • Chae Duk Jung, Chul Sur, Kyung Hyune Rhee, “Efficient Authentication Protocol Based on Certificateless Signature in Vehicular Ad-hoc Networks,” Proceeding of International Conference on Ubiquitous Information Technology & Applications, pp.117-126, 2007.02.

  • HyeRan Lee, Kyung Hyune Rhee, “Lossless Data Hiding for High Embedding Capacity,” Distributed Computing and Internet Technology, Third International Conference (ICDCIT 2006), LNCS Vol.4317, pp.424-437, 2006.12.

  • HyeRan Lee, Kyung Hyune Rhee, “High Capacity Lossless Data Hiding,” Information Systems Security, Second International Conference (ICISS 2006), LNCS Vol.4332, pp.326-336, 2006.12.

  • Chul Sur, Jong Phil Yang Kyung Hyune Rhee, “A New Efficient Protocol for Authentication and Certificate Status Management in Personal Area Networks,” Computer and Information Sciences – 21th International Symposium (ISCIS 2006), LNCS Vol.4263, pp.952-962, 2006.11.

  • Jong Phil Yang, Kyung Hyune Rhee, Kouichi Sakurai, “A Proactive Secret Sharing for Server Assisted Threshold Signatures,” High Performance Computing and Communications, Second International Conference (HPCC 2006), LNCS Vol.4208, pp.250-259, 2006.09.

  • Chul Sur, Kyung Hyune Rhee, “An Efficient Authentication and Simplified Certificate Status Management for Personal Area Networks,” Management of Convergence Networks and Services, 9th Asia-Pacific Network Operations and Management Symposium (APNOMS 2006), LNCS Vol.4238, pp.273-282, 2006.09.

  • HyeRan Lee, Kyung Hyune Rhee, “Reversible Data Embedding for Tamper-Proof Watermarks,” First international conference on Innovative computing information and control, pp.487-490, 2006.08.

  • Jung Hwa Shin, Kyung Hyune Rhee, “A Fair Content Sharing Model Based on File Reputation,” The 2006 International Conference on Multimedia, Information Technology and its Applications (MITA 2006), pp.179-182, 2006.07.

  • Chae Duk Jung, Chul Sur, Kyung Hyune Rhee, “Efficient Authentication Protocol Based on Certificateless signature in Vehicular Ad-hoc Networks,” The 2006 International Conference on Multimedia, Information Technology and its Applications (MITA 2006), pp.157-160, 2006.07.

  • Youngho Park, Kyung Hyune Rhee, “A Seure Dynamic Source Routing Protocol Concurrent,” The 2006 International Conference on Multimedia, Information Technology and its Applications (MITA 2006), pp.214-217, 2006.07.

  • Jong Phil Yang, Kouichi Sakurai, Kyung Hyune Rhee, “Distributing Security-Mediated PKI Revisited,” Public Key Infrastructure, Third European PKI Workshop: Theory and Practice, EuroPKI 2006, LNCS Vol.4043, pp.31-44, 2006.06.

  • Jong-Phil Yang, Kyung Hyune Rhee, “A New Design for a Practical Secure Cookies System,” Journal of information Science and Engineering Vol. 22 No.3, pp.559-571, 2006.05.

  • HyeRan Lee, Kyung Hyune Rhee, “Reversible Data Embedding for Lossless Watermark Using Adjustment of DWT frequency Coefficients,” International Symposium on Multimedia Applications in Edutainment (MAEDU 2006), pp.69-74, 2006.02.

  • Deepak Kafle, Kyung Hyune Rhee, Dong Hoon Lee, “A Secure Distribution Model for Digital Contents,” International Symposium on Multimedia Applications in Edutainment (MAEDU 2006), pp.88-93, 2006.02.

  • Jung Hwa Shin, Kyung Hyune Rhee, “Reliable P2P File Sharing Service Using Reputation,” International Symposium on Multimedia Applications in Edutainment (MAEDU 2006), pp.84-87, 2006.02.

  • Chae Duk Jung, Youngho Park, Kyung Hyune Rhee, Agni Pasad Kafle, “A secure key exchange scheme using location-based keys for hierarchical wireless sensor networks,” International Symposium on Multimedia Applications in Edutainment (MAEDU 2006), pp.75-78, 2006.02.

  • Chul Sur, Kyung Hyune Rhee, “Delegation of Signing Capability and Simplified Certificate Status Management in Personal PKI,” The 2005 International Symposium on Advanced Engineering (ISAE2005), pp.34-39, 2005.12.

  • Jung Hwa shin, Deepak Kafle, Weon Shin, Kyung-Hyune Rhee, “On the Spread of High-speed Internet Worms,” The 2005 International Symposium on Advanced Engineering (ISAE2005), pp.54-61, 2005.12.

  • Jung Hwa Shin, Weon Shin, Kyung Hyune Rhee, “Trust Management using Reputation in P2P File Sharing,” The 2005 International Symposium on Advanced Engineering (ISAE2005), pp.47-53, 2005.12.

  • Chul Sur, Ji Won Jung, Jong Phil Yang, Kyung Hyune Rhee, “A Fair and Reliable P2P e-commerce Model Based on Collaboration with Distributed Peers,” Distributed Computing 7th International Workshop (IWDC 2005), LNCS Vol.3741, pp.380-391, 2005.12.

  • JaeGwi CHOI, Goichiro HANAOKA, KyungHyune Rhee, Hideki Imai, “How to Break COT-Based Fingerprinting Schemes and Design New One,” IEICE Vol.E88-A No.10, pp.2800-2807, 2005.10.

  • Jong Phil Yang, Kouichi Sakurai, Kyung Hyune Rhee, “A Modified Distributing Security-Mediated PKI,” Computer Security Symposium 2005, pp.49-54, 2005.10.

  • Youngho Park, Jung Hwa Shin, Kyung Hyune Rhee, “Design of a secure digital contents delivery system in P2P networks,” Digital Rights Management: Technologies, Issues, Challenges and Systems, First International Conference (DRMTICS 2005), LNCS Vol.3919, pp.311-321, 2005.10.

  • Jong Phil Yang, Kyung Hyune Rhee, “Generating authentication data without keeping a private key for mobility,” International Conference on Parallel and Distributed Systems, pp.230-234, 2005.07.

  • Kyung Hyune Rhee, “Building e-Community Centers for Foreign Workers in the Rep- fo Korea,” Managing Sustainable e-Community Centers, pp.123-129, 2005.05.

  • Jong Phil Yang, Kyung Hyune Rhee, “Securing Admission Control in Ubiquitous Computing Environment,” Networking 4th International Conference on Networking, ReunionIsland, France (ICN 2005), LNCS Vol.3421, pp.972-979, 2005.04.

  • Kyung Hyune Rhee, Young-Ho Park, Gene Tsudik, “A Group Key Management Architecture for Mobile Ad-hoc Wireless Networks,” Journal of Information Science and Engineering Vol.21 No.2, pp.415-428, 2005.03.

  • HaeRan Lee, Kyung Hyune Rhee, “Image Authentication Watermarking based on DWT low Frequency Coefficient,” International Symposium on Multimedia Applications in Edutainment (MAEDU 2005), pp.82-85, 2005.02.

  • Jong Phil Yang, Weon Shin, Kyung Hyune Rhee, “A cryptographic approach to defend private information against malicious proxies in Jini,” International Symposium on Multimedia Applications in Edutainment (MAEDU 2005), pp.100-104, 2005.02.

  • Jong Phil Yang, Kyung Hyune Rhee, “Collaborative Admission Control in the Office,” The Third International Workshop for Applied Public Key Infrastructure, pp.49-59, 2004.10.

  • Jong Phil Yang, Kyung Hyune Rhee, “A Modified Public Key Infrastructure,” XIX World Telecommunications Congress, pp.52, 2004.09.

  • Young Ho Park, Kyung Hyune Rhee, “A Distributde OCSP without Responders Certificate,” The 5th International Workshop on Information security Application, pp.367-374, 2004.08.

  • Young Ho Park, Chul Sur, Kyung Hyune Rhee, “A Framework for Efficient Distributed Online Certificate Status Protocol,” A Publication of the International Association for Computer and Information Science, pp.111-116, 2004.08.

  • Mi Sun Shim, Jong Phil Yang, Kyung Hyune Rhee, “Server-Aided Delegation in Ubiquitous Conputing Environment,” The International Conference on Electronics, Informations, and Communications, pp.52-56, 2004.08.

  • Ji Won Jung, Chul Sur, Kyung Hyune Rhee, “Towards Fair and Secure e-Commerce Model In P2P Network,” The International Conference on Electronics, Informations, and Communications, pp.47-51, 2004.08.

  • Jung Hwa Shin, Kyung Hyune Rhee, “An Access Control Using Peer's Reputation in P2P Service,” ISAS CITSA 2004, pp.338-343, 2004.07.

  • Jong Phil Yang, Sang Uk Shin, Kyung Hyune Rhee, “A Simplified Approach to User Controllable Threshold Signatures,” IEEE Conference on E-Commerce Technology, pp.273-280, 2004.07.

  • K. H. Rhee, Y. H. Park, G. Tsudik, “An Architecture for Key Management in Hierarchical Mobile Ad-Hoc Networks,” Journal of Communication Networks Vol.6, No.2, pp.156-162, 2004.06.

  • Jong Phil Yang, Chul Sur, Hwa Sik Jang, Kyung Hyune Rhee, “Practical Modification of An Efficient Public-Key Framework,” 2004 IEEE International Conference on e-Technology, e-Commerce and e-Service, pp.554-557, 2004.03.

  • Jong Phil Yang, Chul Sur, Kyung Hyune Rhee, “Distributed Certified E-mail System for Mobile Users,” Distributed Computing – IWDC 2003 LNCS 2918, pp.194-204, 2003.12.

  • Jung Hwa Shin, Kyung Hyune Rhee, “An Access Control Using Peers Reputation in Peer-to-Peer Service,” The 2003 International Symposium on Advanced Engineering, pp.402-407, 2003.11.

  • Jong Phil Yang, Chul Sur, Kyung Hyune Rhee, “ROCEM: Robust Certified E-mail System Based on Server-Supported Signature,” Information and Communications Security, 5th International Conference(ICICS 2003), LNCS 2836, pp.100-111, 2003.10.

  • Yougdae Kim, Fabio Maino, Maithili Narasimha, Gene Tsudik, Kyung Hyune Rhee, “Secure Group Key management for Storage Area Networks,” IEEE Communications agazine Vol.41, No.8, pp.92-99, 2003.08.

  • Jong Phil Yang, Chul Sur, Kyung Hyune Rhee, “ROCEM : Robust Certified E-mail System Based on Server-Supported Signature,” Information and Communications Security, 5th International Conference(ICICS 2003), LNCS 2836, pp.100-111, 2003.01.

  • Jun Seok Lee, Hyun Ho Cho, Kyung Hyune Rhee, “A Fast Implementation on Modular Operations using Celluar Automata over GF 2,” MTIA 2003, pp.163-169, 2003.01.

  • Jung Hwa Shin, T Mahmood, Kyung Hyune Rhee, “A Proposal of Implementation Stack for Secure Mobile Agent System,” The 2003 International conference on Multimedia Technology and its Applications (MTIA2003), pp.327-330, 2003.01.

  • Jong Phil Yang, Kyung Hyune Rhee, “The design and implementation of improved secure cookies based on certificate,” Progress in Cryptology INDOCRYPT 2002(ICICS 2002), LNCS 2551, pp.314-325, 2002.12.

  • Young Ho Park, Gene Tsudik, Kyung Hyune Rhee, “A Group Key Management in the Hierarchical Ad-hoc Wireless Networks,” WISA2002 Vol 3, pp.209-221, 2002.08.

  • Hyun Ho Cho, Jong Phil Yang, Jun Seok Lee, Kyung Hyune Rhee, “An Integrated RSA-ElGamal Signcryption Scheme,” The 2001 International Symposium on Advanced Engineering, pp.243-246, 2001.10.

  • Hyun Ho Cho, Young Ho Park, Jun Seok Lee, Hwa Sik Jang, Kyung Hyune Rhee, “A Proposal of Secure Efficient Dynamic Hierarchical Key Management Structure,” The 2001 Workshop on Information Security Applications, pp.357-362, 2001.09.

  • Sang Uk Shin, Kyung Hyune Rhee, “A New Design of the Hash Functions With All-or-Nothing Property,” Journal of information science and engineering Vol.17 No.6, pp.945-957, 2001.07.

  • Jong Phil Yang, Weon, Shin, Kyung Hyune Rhee, “An end-to-end authentication protocol in wireless application protocol,” Information Security and Privacy, LNCS Vol.2119, pp.247-259, 2001.07.

  • Weon Shin, Kyung Hyune Rhee, “A WWW Metering Scheme using a Secure Primitive,” The 2nd International Japan-Korea Symposium on Advanced Engineering & Science, pp.104-112, 2000.11.

  • Weon Shin, Kyung Hyune Rhee, “A WWW metering scheme using a secure primitive,” The first Workshop on Information Security Applications, pp.183-192, 2000.11.

  • Jong Phil Yang, Ryuji Kohno, Weon Shin, Kyung Hyune Rhee, “A New Authentication Protocol in CDMA Cellular Network,” 2000 International Conference on East-Asian Language Processing and Internet Information Technology, pp.146-150, 2000.08.

  • Hwa Sik Jang, Kyung Hyune Rhee, “A Multi-password management scheme using Psudopia function,” 2000 International Conference on East-Asian Language Processing and Internet Information technology, pp.253-256, 2000.08.

  • Hwa Sik Jang, Kyung Hyune Rhee, “An efficient multi-password management scheme,” The 2000 International Symposium on Multimedia Web-based Teaching and Learning System, pp.57-60, 2000.08.

  • Sang Uk Shin, Weon Shin, Kyung Hyune Rhee, “All-or-nothing transform and remotely keyed encryption,” Public Key Cryptography LNCS Vol.1751, pp.178-195, 2000.01.

  • Sang Uk Shin, Kyung Seop Sim, Kyung Hyune Rhee, “A secrecy scheme for MPEG video data using the joint of compression and encryption,” Information Security Workshop(ISW '99), LNCS Vol.1729, pp.191-201, 1999.11.

  • Sang Uk Shin, Jae Woo, Yoon, Kyung Hyune Rhee, “Hash functions and the MAC using All-or-nothing property,” Public keyCryptography Second International Workshop on Practice and Theory in Public Key Cryptography(PKC '99), LNCS Vol.1560, pp.263-275, 1999.03.

  • Sang Uk Shin, Sang Jin Lee, Dae Hyun Ryu, Kyung Hyune Rhee, “A New hash function based on MDx-family and its application to MAC,” Public Key Cryptography, First International Workshop on Practice and Theory in Public Key Cryptography (PKC '98), LNCS Vol.1431, pp.234-246, 1998.02.

  • Bong Dae Choi, Kyung Hyune Rhee, “An M/G/1 retrial queue with a threshold in the retrial group,” Kyungpook Mathematical Journal Vol.35, pp.469-479, 1996.07.

  • Bong Dae Choi, Kwang Kyu, Kyung Hyune Rhee, “The M/G/1 retrial queue with retrial rate control policy