An unsupervised anomaly detection framework for detecting anomalies in real time through network system’s log files analysis V Zeufack, D Kim, D Seo, A Lee High-Confidence Computing 1 (2), 100030, 2021 | 28 | 2021 |
Authentication for single/Multi domain in ubiquitous computing using attribute certification DG Lee, SI Kang, DH Seo, IY Lee Computational Science and Its Applications-ICCSA 2006: International …, 2006 | 25 | 2006 |
A novel transparent and auditable fog-assisted cloud storage with compensation mechanism D Kim, J Son, D Seo, Y Kim, H Kim, JT Seo Tsinghua Science and Technology 25 (1), 28-43, 2019 | 21 | 2019 |
Secure RFID authentication scheme for EPC class Gen2 DH Seo, JM Baek, D Cho Proceedings of the 3rd International Conference on Ubiquitous Information …, 2009 | 20 | 2009 |
Link-privacy preserving graph embedding data publication with adversarial learning K Zhang, Z Tian, Z Cai, D Seo Tsinghua Science and Technology 27 (2), 244-256, 2021 | 17 | 2021 |
On differential privacy-based framework for enhancing user data privacy in mobile edge computing environment J Sharma, D Kim, A Lee, D Seo IEEE Access 9, 38107-38118, 2021 | 16 | 2021 |
Reducing communication overhead for nested NEMO networks: Roaming authentication and access control structure HJ Lim, M Kim, JH Lee, DH Seo, TM Chung IEEE Transactions on Vehicular Technology 60 (7), 3408-3423, 2011 | 14 | 2011 |
A federated framework for fine-grained cloud access control for intelligent big data analytic by service providers G Ra, D Kim, D Seo, I Lee IEEE Access 9, 47084-47095, 2021 | 11 | 2021 |
Single sign-on authentication model using MAS (multiagent system) DH Seo, IY Lee, SY Chae, CS Kim 2003 IEEE Pacific Rim Conference on Communications Computers and Signal …, 2003 | 11 | 2003 |
S3 (secure ship-to-ship) information sharing scheme using ship authentication in the e-navigation S Oh, D Seo, B Lee Int J Secur Appl 9 (2), 97-110, 2015 | 10 | 2015 |
Secure verifiable aggregation for blockchain-based federated averaging S Zhu, R Li, Z Cai, D Kim, D Seo, W Li High-Confidence Computing 2 (1), 100046, 2022 | 9 | 2022 |
Group delegated ID-based proxy reencryption for the enterprise IoT-cloud storage environment WB Kim, D Seo, D Kim, IY Lee Wireless Communications and Mobile Computing 2021, 1-12, 2021 | 9 | 2021 |
An anonymous protocol for member privacy in a consortium blockchain GJ Ra, D Seo, MZA Bhuiyan, IY Lee Security, Privacy, and Anonymity in Computation, Communication, and Storage …, 2019 | 8 | 2019 |
Data distribution for multiple receivers in a connected car environment using 5G communication WB Kim, D Seo, D Kim, IY Lee Security and Communication Networks 2021, 1-14, 2021 | 7 | 2021 |
TMETA: Trust management for the cold start of IoT services with digital-twin-aided blockchain C Wang, Z Cai, D Seo, Y Li IEEE Internet of Things Journal, 2023 | 6 | 2023 |
Secure encapsulation schemes using key recovery system in iomt environments T Kim, W Kim, D Seo, I Lee Sensors 21 (10), 3474, 2021 | 6 | 2021 |
Context-based remote security control for mobile communication device G An, D Seo, J Kim, K Kim, D Seo 2010 10th International Symposium on Communications and Information …, 2010 | 6 | 2010 |
A study on RFID system with secure service availability for ubiquitous computing DH Seo, IY Lee Journal of Information Processing Systems 1 (1), 96-101, 2005 | 6 | 2005 |
Differentially private approximate aggregation based on feature selection Z He, AMVV Sai, Y Huang, D Seo, H Zhang, Q Han Journal of combinatorial optimization 41, 318-327, 2021 | 5 | 2021 |
A Study on Single Sign-On Authentication Model using Multi Agent DH Seo, IY Lee The Journal of Korea Information and Communications Society 29, 997-1006, 2004 | 5 | 2004 |