Author pages are created from data sourced from our academic publisher partnerships and public sources.
- Publications
- Influence
EC-RAC (ECDLP Based Randomized Access Control): Provably Secure RFID authentication protocol
- Y. Lee, L. Batina, I. Verbauwhede
- Computer Science
- IEEE International Conference on RFID
- 16 April 2008
TLDR
Elliptic-Curve-Based Security Processor for RFID
- Y. Lee, K. Sakiyama, L. Batina, I. Verbauwhede
- Computer Science
- IEEE Transactions on Computers
- 1 November 2008
TLDR
Untraceable RFID authentication protocols: Revision of EC-RAC
- Y. Lee, L. Batina, Ingrid M. R. Verbauwhede
- Computer Science
- IEEE International Conference on RFID
- 27 April 2009
TLDR
Secure and Low-cost RFID Authentication Protocols
- Y. Lee, I. Verbauwhede
- Computer Science
- 2005
TLDR
- 52
- 9
- PDF
Low-cost untraceable authentication protocols for RFID
- Y. Lee, L. Batina, Dave Singelée, I. Verbauwhede
- Computer Science
- WiSec '10
- 22 March 2010
TLDR
Privacy-Preserving ECC-Based Grouping Proofs for RFID
- L. Batina, Y. Lee, S. Seys, Dave Singelée, I. Verbauwhede
- Computer Science
- ISC
- 25 October 2010
TLDR
Extending ECC-based RFID authentication protocols to privacy-preserving multi-party grouping proofs
- L. Batina, Y. Lee, S. Seys, Dave Singelée, I. Verbauwhede
- Computer Science
- Personal and Ubiquitous Computing
- 1 March 2012
TLDR
Privacy Challenges in RFID Systems
- Y. Lee, L. Batina, I. Verbauwhede, I. Verbauwhede
- Computer Science
- IOT
- 2010
TLDR
Online Video Recommendation through Tag-Cloud Aggregation
- Jonghun Park, S. Lee, S. Lee, Kwanho Kim, Beom-Suk Chung, Y. Lee
- Computer Science
- IEEE MultiMedia
- 2011
TLDR
Iteration Bound Analysis and Throughput Optimum Architecture of SHA-256 (384, 512) for Hardware Implementations
- Y. Lee, H. Chan, I. Verbauwhede
- Computer Science
- WISA
- 27 August 2007
TLDR