2000. 02. KAIST 전산학과 공학사
2002. 02. KAIST 전산학과 공학석사
2006. 08. KAIST 전산학과 공학박사
2007.10 ~ 2009.2 Visiting Postdoctoral Research Associate, GeorgiaTech Information Security Center, GeorgiaTech, GA, USA. (Host: Prof. Alexandra Boldyreva.)
2006.9 ~ 2007.8 Postdoctoral Research Associate, Electronics and Information Research Center, KAIST.
1. Younho Lee, (joint work with Alexandra Boldyreva, Nathan Chenette, and Adam O’Neill), “Order Preserving Encryption”, In Proc. Advances in Cryptography: EUROCRYPT’09, pp. 224-241, 2009. (cited by 545 times in Google Scholar)
2. Younho Lee, “Secure Ordered Bucketization”, IEEE Transactions on Dependable and Secure Computing, May/June, 2014.
3. Daeseon Choi and Younho Lee, "Eavesdropping one-time tokens over magnetic secure transmission in Samsung Pay", In Proc.
10th USENIX Workshop on Offensive Technologies (WOOT'16) in conjunction with 25th USENIX Securtiy Symposium, 2016.
H. Lee, Y. Lee, C. Seo, and H. Yoon, "Efficient Approach for Mitigating Mobile Phishing Attacks", IEICE Transactions on Communications, vol. E101-B, no. 9, Sep. 2018.
H. Kim, K. Park, D. Choi, and Y. Lee, "Estimating the Residence Registration Numbers of People in Korea, Revisited", KSII Transactions on Internet and Information Systems, Vol. 12, No.6, June 2018.
H.Park, P. Kim, H. Kim, K. Park and Y. Lee, "Efficient Machine Learning over Encrypted Data with Non-interactive Communication", Computer Standards & Interfaces 58, pp. 87-108, June 2018.
KW Park, Y Lee, SH Baek, "Energy-Efficient Hosting Rich Content from Mobile Platforms with Relative Proximity Sensing", Sensors, 17(8), 2017.
D Choi, Y Lee, S Kim, P Kang,"Private attribute inference from Facebook’s public text metadata: a case study of Korean users", Industrial Management & Data Systems 117(8), pp. 1687-1706, 2017
KIM Pyung, LEE Younho, Y Hyunsoo, "Sorting Method for Fully Homomorphic Encrypted Data Using the Cryptographic Single-Instruction Multiple-Data Operation", IEICE Transactions on Communications 99 (5), 1070-1086, 2016
J Hur, Y Lee, "A reliable group key management scheme for broadcast encryption", Journal of Communications and Networks 18 (2), 246-260,2016
M Lee, Y Lee, H Yoon, "An Enhanced Rule-Based Web Scanner Based on Similarity Score", ADVANCES IN ELECTRICAL AND COMPUTER ENGINEERING 16 (3), 9-14, 2016
Y Lee, P Kim, Y Park, "Secure Multi-Keyword Search with User/Owner-side Efficiency in the Cloud", ADVANCES IN ELECTRICAL AND COMPUTER ENGINEERING 16 (2), 11-18, 2016
C Daeseon, LEE Younho, P Yongsu, KIM Seokhyun, "Estimating Korean Residence Registration Numbers from Public Information on SNS", IEICE Transactions on Communications 98 (4), 565-574, 2015
S Yongjoo, S Sihu, LEE Yunho, Yoon, Hynsoo, "A Novel Intrusion Tolerant System Using Live Migration", IEICE TRANSACTIONS on Information and Systems 97 (4), 984-988, 2014.
Younho Lee, “Secure Ordered Bucketization”, IEEE Transactions on Dependable and Secure Computing, May/June, 2014.
Yongsu Park, and Younho Lee*, “Group ID-based RFID Mutual Authentication”, Advances in Electrical and Computer Engineering, 13(4), pp. 9-12, 2013. (SCI-E)
Younho Lee, Ill-Hee Kim, and Yongsu Park, “Improved Multi-Precision Squaring for low-end RISC microcontrollers”, Journal of Systems and Software 86(1), pp. 60-71, 2013 (SCI-E)
Younho Lee, and Yongsu Park, “A New Privacy-preserving Path Authentication Scheme using RFID for Supply Chain Management”, Advances in Electrical and Computer Engineering, 13(1), pp. 23-26, 2013. (SCI-E)
Daeseon Choi, Seunghyun Kim, and Younho Lee*, “Address Permutation for Privacy-preserving Searchable Symmetric Encryption”, ETRI Journal 34(1), pp.66-75, 2012. (SCI)
Seunghak Lee, Namgi Kim, Heeyoul Kim, Younho Lee, and Hyunsoo Yoon, “Sensor Node Localization by Three Mobile Anchors in the Wireless Sensor Networks”, IEICE Transactions on Information and Systems, E94-D (10), pp. 1981-1988, 2011. (SCI-E)
Heeyoul Kim, Younho Lee*, and Yongsu Park, “A Robust and Flexible Digital Rights Management System for Home Networks”, Journal of Systems and Software, 83(12), pp. 2431-2440, 2010. (SCI-E)
Daeseon Choi, Seunghun Jin, Younho Lee * and Yongsu Park, “Personalized EigenTrust with the Beta Distribution”, ETRI Journal, 32(2), pp. 348-350, 2010. (SCI)
Younho Lee, Heeyoul Kim, and Yongsu Park, “A new data hiding scheme for binary image authentication with small image distortion”, Information Sciences, Elsevier, 179(22), pp. 3866-3884, 2009. (SCI, IF: 3.643 in 2013)
Younho Lee, Heeyoul Kim, Yongsu Park, and Hyunsoo Yoon, “An Efficient Delegation Protocol with Delegation Traceability in the X.509 Proxy Certificate Environment for Computational Grids”, Information Sciences, Elsevier, 178(14), pp. 2968-2982, 2008. (SCI, IF: 3.643 in 2013)
Daeseon Choi, Younho Lee, Yongsu Park*, Seunghun Jin, and Hyunsoo Yoon, “Efficient and Secure Self-Organized Public Key Management for Moible Ad hoc Networks”, IEICE Transactions on Communications, E91-B(11), pp. 3574-3583, 2008. (SCI)
Younho Lee, Junbeom Hur, Heeyoul Kim, Yongsu Park*, and Hyunsoo Yoon, “A New Binary Image Authentication Schemes with Small Distortion and Low false negative rate”, IEICE Transactions on Communication, E90-B(11), pp. 3259-3262, 2007. (SCI)
Heeyoul Kim, Byungchun Chung, Younho Lee, Yongsu Park*, and Hyunsoo Yoon, “Weakness of the Synchro-Difference LKH scheme for Secure Multicast”, IEEE Communications Letters, 11(9), pp. 765-767, 2007. (SCI)
Heeyoul Kim, Younho Lee, Yongsu Park*, and Hyunsoo Yoon, “Reactive Key Management Scheme for Access Control in Group Communications”, IEICE Transactions on Communication, E90-B(4), pp. 982-986, 2007. (SCI)
Younho Lee, Yongsu Park*, Heeyoul Kim, Seungmin Hong, and Hyunsoo Yoon, “Rogue Public Key Registration Attack and the Importance of “Proof-of-Possession” in PKI Environment”, IEICE Transactions on Information and Systems, E89-D(3), pp. 2452-2455, 2006. (SCI-E)
Sujin Lee, Byungchun Chung, Heeyoul Kim, Younho Lee, Chanil Park, and Hyunsoo Yoon, “Real-time Analysis of Intrusion Detection Alerts via Correlation”, Computers & Security 25(3), pp. 169-183, 2006. (SCI-E)
Jaewon Lee, Heeyoul Kim, Younho Lee, Seungmin Hong, and Hyunsoo Yoon,” Parallelized Scalar Multiplication on Elliptic Curves Defined over Optimal Extension Field”, International Journal of Network Security, 4(1), pp. 99-106, 2007.
Heeyoul Kim, Younho Lee, Seungmin Hong, and Hyunsoo Yoon, “Active Trial-and-error Attack on SASC Protocols”, International Journal of Network Security, 2(2), pp. 103-107, 2006.
Younho Lee, Heeyoul Kim, Seungmin Hong, and Hyunsoo Yoon, “Expansion of Sliding Window Method for Finding Shorter Addition/Subtraction-Chains”, International Journal of Network Security, 2(1), pp. 54-60, 2006.
3. APPARATUS AND METHOD FOR DATABASE QUERY USING ORDERED BUCKET WITH SECURE ENCRYPTION, OPN 1015486540000 (2015.08.25)
2. System and method for management of license, OPN 1020090003705 (2009.01.12).
1. Secure Solution System based on Network. OPN 1020050073702 (2005.0718).
Develop and implement a quantum-resistant lightweight public key cryptosystem suitable for IoT security, Samsung Electronics Future Technology Foundation, 2017~2018 (50000$) (Co-PI)
Research on the application of the fully homomorphic encryption for privacy-preserving data analysis and its applications, Korea Research Foundation, 2016~2019, (210000$)
Core security technology development for Fintech services, Basic Research Labs, Korea Research Foundation, 2016~2019 (150000$) (Co-PI)
Next generation functional encryption technology and it applications for future IT systems, Korea Research Foundation, 2013~2016 (150000$).
Fully Homomorphic encryption of less than 1KB public key size and small ciphertext size, Ministry of Knowledge and Economy, 2013~2015 (50000$)
Inference of private information over SNS and privacy protection mechanism against the inference attack, Electronics and Telecommunication Research Institute, Korea, 2013, (30000$)
Research on Efficient Implementation of Cryptographic algorithms leveraging Multi-core architecture and GPU, Dong-il Industry Foundation, 2013 (10000 $)
Malware Analysis using Pin-tool, Yeungnam University Research Grants, (2013.3-2014.2) (10000$)
Secure Ordered Bucketization, Yeungnam University Research Grants, (2012.8-2013.7) (10000$)
Address Permutation for Privacy-preserving Searchable Symmetric Encryption, Yeungnam University Research Grants (2011.3-2012.2) (10000$)
Cryptographic protocols for personal privacy protection in cloud computing , General Researcher Program: Young Researcher, National Research Foundation, Korea, (2010.5-2012.4) (100000$)
Reliable Secure Group Communication using Hint Messages, New Professor Grants, Yeungnam University (2009.3-2010.2) (15000$)
Basic Research Infrastructure Support Program: Fostering Next-generation Researchers, National Research Foundation (2007.10-2008.9) (23000$)