Personal information

Activities

Employment (1)

SeoulTech: Seoul, KR

2013-09-01 to present | Professor (Industrial Engineering)
Employment
Source: Self-asserted source
Younho Lee

Works (50 of 59)

Items per page:
Page 1 of 2

Fully Homomorphic Training and Inference on Binary Decision Tree and Random Forest

2024 | Book chapter
Contributors: Hojune Shin; Jina Choi; Dain Lee; Kyoungok Kim; Younho Lee
Source: check_circle
Crossref

HEaaN-NB: Non-Interactive Privacy-Preserving Naive Bayes Using CKKS for Secure Outsourced Cloud Computing

IEEE Access
2024 | Journal article
Contributors: Boyoung Han; Hojune Shin; Yeonghyeon Kim; Jina Choi; Younho Lee
Source: check_circle
Crossref

Privacy-Preserving Rule Induction Using CKKS

IEEE Access
2024 | Journal article
Contributors: Jihyeon Choi; Jina Choi; Younho Lee; Jung-Sik Hong
Source: check_circle
Crossref

HEaaN-STAT: A Privacy-Preserving Statistical Analysis Toolkit for Large-Scale Numerical, Ordinal, and Categorical Data

IEEE Transactions on Dependable and Secure Computing
2024-05 | Journal article
Contributors: Younho Lee; Jinyeong Seo; Yujin Nam; Jiseok Chae; Jung Hee Cheon
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

Key Backup and Recovery for Resilient DID Environment

Mathematics
2024-03-12 | Journal article
Contributors: Jihwan Kim; Pyung Kim; Younho Lee; Daeseon Choi
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

A Study on the Interoperability Technology of Digital Identification Based on WACI Protocol with Multiparty Distributed Signature

Sensors
2023 | Journal article
EID:

2-s2.0-85153947065

Part of ISSN: 14248220
Contributors: Kim, J.; Kim, P.; Choi, D.; Lee, Y.
Source: Self-asserted source
Younho Lee via Scopus - Elsevier

Fully Homomorphic Privacy-Preserving Naive Bayes Machine Learning and Classification

2023-11-26 | Conference paper
Contributors: Boyoung Han; Yeonghyeon Kim; Jina Choi; Hojune Shin; Younho Lee
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

Approximating Max Function in Fully Homomorphic Encryption

Electronics
2023-04-04 | Journal article
Contributors: Hyunjun Lee; Jina Choi; Younho Lee
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

Privacy-Preserving Deep Sequential Model with Matrix Homomorphic Encryption

ASIA CCS 2022 - Proceedings of the 2022 ACM Asia Conference on Computer and Communications Security
2022 | Conference paper
EID:

2-s2.0-85133184586

Contributors: Jang, J.; Lee, Y.; Kim, A.; Na, B.; Yhee, D.; Lee, B.; Cheon, J.H.; Yoon, S.
Source: Self-asserted source
Younho Lee via Scopus - Elsevier

A new smart smudge attack using CNN

International Journal of Information Security
2022-02 | Journal article
Contributors: Hansub Shin; Sungyong Sim; Hyukyoon Kwon; Sangheum Hwang; Younho Lee
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

Efficient Sorting of Homomorphic Encrypted Data With k-Way Sorting Network

IEEE Transactions on Information Forensics and Security
2021 | Journal article
Part of ISSN: 1556-6013
Part of ISSN: 1556-6021
Source: Self-asserted source
Younho Lee
grade
Preferred source (of 3)‎

Over 100x Faster Bootstrapping in Fully Homomorphic Encryption through Memory-centric Optimization with GPUs

IACR Transactions on Cryptographic Hardware and Embedded Systems
2021-08-11 | Journal article
Part of ISSN: 2569-2925
Source: Self-asserted source
Younho Lee
grade
Preferred source (of 2)‎

Design and Implementation of Module-NTRU-based Public-key Encryption with Keyword Search (PEKS)

The Journal of Korean Institute of Information Technology
2021-04-30 | Journal article
Contributors: Inwon Hwang; Yeonghyeon Kim; Younho Lee
Source: check_circle
Crossref

An Efficient Search Algorithm for Large Encrypted Data by Homomorphic Encryption

Electronics
2021-02-18 | Journal article
Contributors: Pyung Kim; Eunji Jo; Younho Lee
Source: check_circle
Crossref
grade
Preferred source (of 3)‎

A Password Meter without Password Exposure

Sensors
2021-01-06 | Journal article
Contributors: Pyung Kim; Younho Lee; Youn-Sik Hong; Taekyoung Kwon
Source: check_circle
Crossref
grade
Preferred source (of 3)‎

Improving the Performance of RLizard on Memory-Constraint IoT Devices with 8-Bit ATmega MCU

Electronics
2020-09-22 | Journal article
Contributors: Jin-Kwan Jeon; In-Won Hwang; Hyun-Jun Lee; Younho Lee
Source: check_circle
Crossref
grade
Preferred source (of 3)‎

A Study on the ISMS-P Accreditation Effect Using the Seven Threats of Security : Focused on Enterprise Size and Career

The Journal of Korean Institute of Information Technology
2020-04-30 | Journal article
Contributors: Dong Hyun Kim; Younho Lee
Source: check_circle
Crossref

An Efficient Encrypted Floating-Point Representation Using HEAAN and TFHE

Security and Communication Networks
2020-03-02 | Journal article
Contributors: Subin Moon; Younho Lee
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

RLizard: Post-Quantum Key Encapsulation Mechanism for IoT Devices

IEEE Access
2019 | Journal article
Contributors: Joohee Lee; Duhyeong Kim; Hyungkyu Lee; Younho Lee; Jung Hee Cheon
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

Eavesdropping of Magnetic Secure Transmission Signals and Its Security Implications for a Mobile Payment Protocol

IEEE Access
2018 | Journal article
Contributors: Daeseon Choi; Younho Lee
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

Efficient approach for mitigating mobile phishing attacks

IEICE Transactions on Communications
2018 | Journal article
EID:

2-s2.0-85053847390

Part of ISSN: 17451345 09168516
Contributors: Lee, H.; Lee, Y.; Seo, C.; Yoon, H.
Source: Self-asserted source
Younho Lee via Scopus - Elsevier

Estimating resident registration numbers of individuals in Korea: Revisited

KSII Transactions on Internet and Information Systems
2018 | Journal article
EID:

2-s2.0-85088591780

Part of ISSN: 22881468 19767277
Contributors: Kim, H.; Park, K.-W.; Choi, D.; Lee, Y.
Source: Self-asserted source
Younho Lee via Scopus - Elsevier

Efficient machine learning over encrypted data with non-interactive communication

Computer Standards & Interfaces
2018-05 | Journal article
Contributors: Heejin Park; Pyung Kim; Heeyoul Kim; Ki-Woong Park; Younho Lee
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

Survey on Privacy-preserving Techniques for Biometric Authentication

The Journal of Korean Institute of Information Technology
2018-04-30 | Journal article
Contributors: Heejin Park; Younho Lee
Source: check_circle
Crossref

Performance Analysis of Fully Homomorphic Encryption Libraries

The Journal of Korean Institute of Information Technology
2018-02-28 | Journal article
Contributors: Eun-Ji Jo; Su-Bin Moon; Younho Lee
Source: check_circle
Crossref

Private attribute inference from Facebook's public text metadata: A case study of Korean users

Industrial Management and Data Systems
2017 | Journal article
EID:

2-s2.0-85028776694

Part of ISSN: 02635577
Contributors: Choi, D.; Lee, Y.; Kim, S.; Kang, P.
Source: Self-asserted source
Younho Lee via Scopus - Elsevier

Energy-Efficient Hosting Rich Content from Mobile Platforms with Relative Proximity Sensing

Sensors
2017-08-08 | Journal article
Contributors: Ki-Woong Park; Younho Lee; Sung Baek
Source: check_circle
Crossref
grade
Preferred source (of 3)‎

A reliable group key management scheme for broadcast encryption

Journal of Communications and Networks
2016 | Journal article
EID:

2-s2.0-84976590160

Part of ISSN: 12292370
Contributors: Hur, J.; Lee, Y.
Source: Self-asserted source
Younho Lee via Scopus - Elsevier

An enhanced rule-based web scanner based on similarity score

Advances in Electrical and Computer Engineering
2016 | Journal article
EID:

2-s2.0-84991070805

Part of ISSN: 18447600 15827445
Contributors: Lee, M.; Lee, Y.; Yoon, H.
Source: Self-asserted source
Younho Lee via Scopus - Elsevier

Eavesdropping one-time tokens over magnetic secure transmission in Samsung Pay

10th USENIX Workshop on Offensive Technologies, WOOT 2016
2016 | Conference paper
EID:

2-s2.0-85084163792

Contributors: Choi, D.; Lee, Y.
Source: Self-asserted source
Younho Lee via Scopus - Elsevier

Secure multi-keyword search with user/owner-side efficiency in the cloud

Advances in Electrical and Computer Engineering
2016 | Journal article
EID:

2-s2.0-84974851886

Part of ISSN: 18447600 15827445
Contributors: Lee, Y.; Kim, P.; Park, Y.
Source: Self-asserted source
Younho Lee via Scopus - Elsevier

Sorting method for fully homomorphic encrypted data using the cryptographic single-instruction multiple-data operation

IEICE Transactions on Communications
2016 | Journal article
EID:

2-s2.0-84970038656

Part of ISSN: 17451345 09168516
Contributors: Kim, P.; Lee, Y.; Yoon, H.
Source: Self-asserted source
Younho Lee via Scopus - Elsevier

Estimating Korean residence registration numbers from public information on SNS

IEICE Transactions on Communications
2015 | Journal article
EID:

2-s2.0-84926474373

Part of ISSN: 17451345 09168516
Contributors: Choi, D.; Lee, Y.; Park, Y.; Kim, S.
Source: Self-asserted source
Younho Lee via Scopus - Elsevier

Secure ordered bucketization

IEEE Transactions on Dependable and Secure Computing
2014 | Journal article
EID:

2-s2.0-84903993573

Part of ISSN: 15455971
Contributors: Lee, Y.
Source: Self-asserted source
Younho Lee via Scopus - Elsevier

A new privacy-preserving path authentication scheme using RFID for supply chain management

Advances in Electrical and Computer Engineering
2013 | Journal article
EID:

2-s2.0-84875336349

Part of ISSN: 15827445 18447600
Contributors: Lee, Y.; Park, Y.
Source: Self-asserted source
Younho Lee via Scopus - Elsevier

Group-ID based RFID mutual authentication

Advances in Electrical and Computer Engineering
2013 | Journal article
EID:

2-s2.0-84890175010

Part of ISSN: 15827445 18447600
Contributors: Park, Y.; Lee, Y.
Source: Self-asserted source
Younho Lee via Scopus - Elsevier

Improved multi-precision squaring for low-end RISC microcontrollers

Journal of Systems and Software
2013 | Journal article
EID:

2-s2.0-84868641501

Part of ISSN: 01641212
Contributors: Lee, Y.; Kim, I.-H.; Park, Y.
Source: Self-asserted source
Younho Lee via Scopus - Elsevier

Address permutation for privacy-preserving searchable symmetric encryption

ETRI Journal
2012 | Journal article
EID:

2-s2.0-84863161970

Part of ISSN: 12256463 22337326
Contributors: Choi, D.; Kim, S.-H.; Lee, Y.
Source: Self-asserted source
Younho Lee via Scopus - Elsevier

Sensor node localization by three mobile anchors in the wireless sensor networks

IEICE Transactions on Information and Systems
2011 | Journal article
EID:

2-s2.0-80053396412

Part of ISSN: 17451361 09168532
Contributors: Lee, S.; Kim, N.; Kim, H.; Lee, Y.; Yoon, H.
Source: Self-asserted source
Younho Lee via Scopus - Elsevier

A robust and flexible digital rights management system for home networks

Journal of Systems and Software
2010 | Journal article
EID:

2-s2.0-78049351434

Part of ISSN: 01641212
Contributors: Kim, H.; Lee, Y.; Park, Y.
Source: Self-asserted source
Younho Lee via Scopus - Elsevier

Personalized EigenTrust with the beta distribution

ETRI Journal
2010 | Journal article
EID:

2-s2.0-77950805316

Part of ISSN: 12256463
Contributors: Choi, D.; Jin, S.; Lee, Y.; Park, Y.
Source: Self-asserted source
Younho Lee via Scopus - Elsevier

A new data hiding scheme for binary image authentication with small image distortion

Information Sciences
2009 | Journal article
EID:

2-s2.0-69549116445

Part of ISSN: 00200255
Contributors: Lee, Y.; Kim, H.; Park, Y.
Source: Self-asserted source
Younho Lee via Scopus - Elsevier

Framework design and performance analysis on pairwise key establishment

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2009 | Conference paper
EID:

2-s2.0-70350469259

Part of ISSN: 03029743 16113349
Contributors: Lee, Y.; Park, Y.
Source: Self-asserted source
Younho Lee via Scopus - Elsevier

Order-preserving symmetric encryption

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2009 | Conference paper
EID:

2-s2.0-67650690965

Part of ISSN: 03029743 16113349
Contributors: Boldyreva, A.; Chenette, N.; Lee, Y.; O'Neill, A.
Source: Self-asserted source
Younho Lee via Scopus - Elsevier

An efficient delegation protocol with delegation traceability in the X.509 proxy certificate environment for computational grids

Information Sciences
2008 | Journal article
EID:

2-s2.0-43849099712

Part of ISSN: 00200255
Contributors: Lee, Y.; Kim, H.; Park, Y.; Yoon, H.
Source: Self-asserted source
Younho Lee via Scopus - Elsevier

Efficient and secure self-organized public key management for mobile ad hoc networks

IEICE Transactions on Communications
2008 | Journal article
EID:

2-s2.0-67651120059

Part of ISSN: 17451345 09168516
Contributors: Choi, D.; Lee, Y.; Park, Y.; Jin, S.-H.; Yoon, H.
Source: Self-asserted source
Younho Lee via Scopus - Elsevier

A new binary image authentication scheme with small distortion and low false negative rates

IEICE Transactions on Communications
2007 | Journal article
EID:

2-s2.0-58449112847

Part of ISSN: 17451345 09168516
Contributors: Lee, Y.; Hur, J.; Kim, H.; Park, Y.; Yoon, H.
Source: Self-asserted source
Younho Lee via Scopus - Elsevier

Parallelized scalar multiplication on elliptic curves defined over optimal extension field

International Journal of Network Security
2007 | Journal article
EID:

2-s2.0-77949401976

Part of ISSN: 1816353X 18163548
Contributors: Lee, J.; Kim, H.; Lee, Y.; Hong, S.-M.; Yoon, H.
Source: Self-asserted source
Younho Lee via Scopus - Elsevier

Reactive key management scheme for access control in group communications

IEICE Transactions on Communications
2007 | Journal article
EID:

2-s2.0-34247113796

Part of ISSN: 17451345 09168516
Contributors: Kim, H.; Lee, Y.; Park, Y.; Yoon, H.
Source: Self-asserted source
Younho Lee via Scopus - Elsevier

Weakness of the synchro-difference LKH scheme for secure multicast

IEEE Communications Letters
2007 | Journal article
EID:

2-s2.0-34548631438

Part of ISSN: 10897798
Contributors: Kim, H.; Chung, B.; Lee, Y.; Park, Y.; Yoon, H.
Source: Self-asserted source
Younho Lee via Scopus - Elsevier
Items per page:
Page 1 of 2