Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Hoonjae Lee 0001
@inproceedings{DBLP:conf/ihci/KodirovLL23a, author = {Khusanboy Kodirov and Hoon{-}Jae Lee and Young Sil Lee}, editor = {Bong Jun Choi and Dhananjay Singh and Uma Shanker Tiwary and Wan{-}Young Chung}, title = {A Closer Look at Attacks on Lightweight Cryptosystems: Threats and Countermeasures}, booktitle = {Intelligent Human Computer Interaction - 15th International Conference, {IHCI} 2023, Daegu, South Korea, November 8-10, 2023, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14532}, pages = {171--176}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-53830-8\_17}, doi = {10.1007/978-3-031-53830-8\_17}, timestamp = {Mon, 11 Mar 2024 15:20:48 +0100}, biburl = {https://dblp.org/rec/conf/ihci/KodirovLL23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icact/HongLL22, author = {Seoung{-}Pyo Hong and Chae{-}Ho Lim and Hoon{-}Jae Lee}, title = {{APT} attack response system through {AM-HIDS}}, booktitle = {24th International Conference on Advanced Communication Technology, {ICACT} 2022, Pyeongchang, Korea, February 13-16, 2022}, pages = {271--274}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.23919/ICACT53585.2022.9728789}, doi = {10.23919/ICACT53585.2022.9728789}, timestamp = {Thu, 13 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icact/HongLL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/FuAKLAL21, author = {Rui Fu and Mohammed Abdulhakim Al{-}Absi and Ki{-}Hwan Kim and Young Sil Lee and Ahmed Abdulhakim Al{-}Absi and Hoon{-}Jae Lee}, title = {Deep Learning-Based Drone Classification Using Radar Cross Section Signatures at mmWave Frequencies}, journal = {{IEEE} Access}, volume = {9}, pages = {161431--161444}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3115805}, doi = {10.1109/ACCESS.2021.3115805}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/FuAKLAL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/Al-AbsiASL21, author = {Ahmed Abdulhakim Al{-}Absi and Mohammed Abdulhakim Al{-}Absi and Mangal Sain and Hoon{-}Jae Lee}, title = {Channel Allocation for Connected Vehicles in Internet of Things Services}, journal = {Sensors}, volume = {21}, number = {11}, pages = {3646}, year = {2021}, url = {https://doi.org/10.3390/s21113646}, doi = {10.3390/S21113646}, timestamp = {Thu, 13 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/Al-AbsiASL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/Al-AbsiAFKLLLL21, author = {Mohammed Abdulhakim Al{-}Absi and Ahmed Abdulhakim Al{-}Absi and Rui Fu and Ki{-}Hwan Kim and Young{-}Sil Lee and Byung{-}Gook Lee and Sang{-}Gon Lee and Hoon{-}Jae Lee}, title = {Secure and Efficient High Throughput Medium Access Control for Vehicular Ad-Hoc Network}, journal = {Sensors}, volume = {21}, number = {14}, pages = {4935}, year = {2021}, url = {https://doi.org/10.3390/s21144935}, doi = {10.3390/S21144935}, timestamp = {Thu, 13 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/Al-AbsiAFKLLLL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icact/HongLL21, author = {Seoung{-}Pyo Hong and Chae{-}Ho Lim and Hoon{-}Jae Lee}, title = {{APT} attack response system through {AM-HIDS}}, booktitle = {23rd International Conference on Advanced Communication Technology, {ICACT} 2021, Pyeongchang, South Korea, February 7-10, 2021}, pages = {271--274}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.23919/ICACT51234.2021.9370749}, doi = {10.23919/ICACT51234.2021.9370749}, timestamp = {Thu, 13 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icact/HongLL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsnet/Al-AbsiAL20, author = {Mohammed Abdulhakim Al{-}Absi and Ahmed Abdulhakim Al{-}Absi and Hoon{-}Jae Lee}, title = {Varied density of vehicles under city, highway and rural environments in {V2V} communication}, journal = {Int. J. Sens. Networks}, volume = {33}, number = {3}, pages = {148--158}, year = {2020}, url = {https://doi.org/10.1504/IJSNET.2020.108560}, doi = {10.1504/IJSNET.2020.108560}, timestamp = {Thu, 13 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsnet/Al-AbsiAL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/Al-AbsiAL20, author = {Mohammed Abdulhakim Al{-}Absi and Ahmed Abdulhakim Al{-}Absi and Hoon{-}Jae Lee}, title = {A Secure Enhanced Non-Cooperative Cognitive Division Multiple Access for Vehicle-to-Vehicle Communication}, journal = {Sensors}, volume = {20}, number = {4}, pages = {1000}, year = {2020}, url = {https://doi.org/10.3390/s20041000}, doi = {10.3390/S20041000}, timestamp = {Thu, 13 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/Al-AbsiAL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icact/Al-AbsiAL20, author = {Mohammed Abdulhakim Al{-}Absi and Ahmed Abdulhakim Al{-}Absi and Hoon{-}Jae Lee}, title = {Comparison between {DSRC} and other Short Range Wireless Communication Technologies}, booktitle = {22nd International Conference on Advanced Communication Technology, {ICACT} 2020, Phoenix Park, PyeongChang, Korea (South), February 16-19, 2020}, pages = {1--5}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.23919/ICACT48636.2020.9061543}, doi = {10.23919/ICACT48636.2020.9061543}, timestamp = {Thu, 13 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icact/Al-AbsiAL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icact/JinquanAAL20, author = {Ju Jinquan and Mohammed Abdulhakim Al{-}Absi and Ahmed Abdulhakim Al{-}Absi and Hoon{-}Jae Lee}, title = {Analysis and Protection of Computer Network Security Issues}, booktitle = {22nd International Conference on Advanced Communication Technology, {ICACT} 2020, Phoenix Park, PyeongChang, Korea (South), February 16-19, 2020}, pages = {577--580}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.23919/ICACT48636.2020.9061266}, doi = {10.23919/ICACT48636.2020.9061266}, timestamp = {Thu, 13 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icact/JinquanAAL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icact/AbdullaevAASL20, author = {Azamjon Abdullaev and Mohammed Abdulhakim Al{-}Absi and Ahmed Abdulhakim Al{-}Absi and Mangal Sain and Hoon{-}Jae Lee}, title = {Classify and Analyze the Security Issues and Challenges in Mobile banking in Uzbekistan}, booktitle = {22nd International Conference on Advanced Communication Technology, {ICACT} 2020, Phoenix Park, PyeongChang, Korea (South), February 16-19, 2020}, pages = {1211--1217}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.23919/ICACT48636.2020.9061572}, doi = {10.23919/ICACT48636.2020.9061572}, timestamp = {Thu, 13 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icact/AbdullaevAASL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icact/FuAAL20, author = {Rui Fu and Mohammed Abdulhakim Al{-}Absi and Ahmed Abdulhakim Al{-}Absi and Hoon{-}Jae Lee}, title = {Conservation Genetic Algorithm to Solve the E-commerce Environment Logistics Distribution Path Optimization Problem}, booktitle = {22nd International Conference on Advanced Communication Technology, {ICACT} 2020, Phoenix Park, PyeongChang, Korea (South), February 16-19, 2020}, pages = {1225--1231}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.23919/ICACT48636.2020.9061527}, doi = {10.23919/ICACT48636.2020.9061527}, timestamp = {Thu, 13 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icact/FuAAL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ihci/Saparmammedovich20, author = {Seyitmammet Alchekov Saparmammedovich and Mohammed Abdulhakim Al{-}Absi and Yusuph J. Koni and Hoon{-}Jae Lee}, editor = {Madhusudan Singh and Dae{-}Ki Kang and Jong{-}Ha Lee and Uma Shanker Tiwary and Dhananjay Singh and Wan{-}Young Chung}, title = {Voice Attacks to {AI} Voice Assistant}, booktitle = {Intelligent Human Computer Interaction - 12th International Conference, {IHCI} 2020, Daegu, South Korea, November 24-26, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12615}, pages = {250--261}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-68449-5\_26}, doi = {10.1007/978-3-030-68449-5\_26}, timestamp = {Thu, 13 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ihci/Saparmammedovich20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ihci/KoniASL20, author = {Yusuph J. Koni and Mohammed Abdulhakim Al{-}Absi and Seyitmammet Alchekov Saparmammedovich and Hoon{-}Jae Lee}, editor = {Madhusudan Singh and Dae{-}Ki Kang and Jong{-}Ha Lee and Uma Shanker Tiwary and Dhananjay Singh and Wan{-}Young Chung}, title = {AI-Based Voice Assistants Technology Comparison in Term of Conversational and Response Time}, booktitle = {Intelligent Human Computer Interaction - 12th International Conference, {IHCI} 2020, Daegu, South Korea, November 24-26, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12616}, pages = {370--379}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-68452-5\_39}, doi = {10.1007/978-3-030-68452-5\_39}, timestamp = {Thu, 13 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ihci/KoniASL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/Al-AbsiAL19, author = {Mohammed Abdulhakim Al{-}Absi and Ahmed Abdulhakim Al{-}Absi and Hoon{-}Jae Lee}, title = {Performance Enriching Channel Allocation Algorithm for Vehicle-to-Vehicle City, Highway and Rural Network}, journal = {Sensors}, volume = {19}, number = {15}, pages = {3283}, year = {2019}, url = {https://doi.org/10.3390/s19153283}, doi = {10.3390/S19153283}, timestamp = {Thu, 13 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/Al-AbsiAL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cse/SainKKL19, author = {Mangal Sain and Ki{-}Hwan Kim and Young{-}Jin Kang and Hoon{-}Jae Lee}, editor = {Meikang Qiu}, title = {An Improved Two Factor User Authentication Framework Based on {CAPTCHA} and Visual Secret Sharing}, booktitle = {2019 {IEEE} International Conference on Computational Science and Engineering, {CSE} 2019, and {IEEE} International Conference on Embedded and Ubiquitous Computing, {EUC} 2019, New York, NY, USA, August 1-3, 2019}, pages = {171--175}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CSE/EUC.2019.00041}, doi = {10.1109/CSE/EUC.2019.00041}, timestamp = {Thu, 13 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cse/SainKKL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icact/KamolovALP19, author = {Ahmadhon Kamolov and Mohammed Abdulhakim Al{-}Absi and Hoon{-}Jae Lee and Suhyun Park}, title = {Smart Flying Umbrella Drone on Internet of Things: {AVUS}}, booktitle = {21st International Conference on Advanced Communication Technology, {ICACT} 2019, Pyeongchang, South Korea, February 17-20, 2019}, pages = {191--195}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.23919/ICACT.2019.8702024}, doi = {10.23919/ICACT.2019.8702024}, timestamp = {Thu, 13 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icact/KamolovALP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icact/AbdullaevAASLL19, author = {Azamjon Abdullaev and Mohammed Abdulhakim Al{-}Absi and Ahmed Abdulhakim Al{-}Absi and Mangal Sain and Young{-}Sil Lee and Hoon{-}Jae Lee}, title = {Security Challenge and Issue of Mobile Banking in Republic of Uzbekistan: {A} State of Art Survey}, booktitle = {21st International Conference on Advanced Communication Technology, {ICACT} 2019, Pyeongchang, South Korea, February 17-20, 2019}, pages = {249--255}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.23919/ICACT.2019.8701952}, doi = {10.23919/ICACT.2019.8701952}, timestamp = {Thu, 13 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icact/AbdullaevAASLL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icact/IbrokhimovHALS19, author = {Sanjar Ibrokhimov and Kueh Lee Hui and Ahmed Abdulhakim Al{-}Absi and Hoon{-}Jae Lee and Mangal Sain}, title = {Multi-Factor Authentication in Cyber Physical System: {A} State of Art Survey}, booktitle = {21st International Conference on Advanced Communication Technology, {ICACT} 2019, Pyeongchang, South Korea, February 17-20, 2019}, pages = {279--284}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.23919/ICACT.2019.8701960}, doi = {10.23919/ICACT.2019.8701960}, timestamp = {Thu, 13 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icact/IbrokhimovHALS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icact/KangKL19, author = {Young{-}Jin Kang and Ki{-}Hwan Kim and Hoon{-}Jae Lee}, title = {Proposal of PingPong-128 Countermeasure against Power Analysis Attack}, booktitle = {21st International Conference on Advanced Communication Technology, {ICACT} 2019, Pyeongchang, South Korea, February 17-20, 2019}, pages = {431--434}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.23919/ICACT.2019.8702026}, doi = {10.23919/ICACT.2019.8702026}, timestamp = {Thu, 13 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icact/KangKL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icact/FuAAL19, author = {Rui Fu and Mohammed Abdulhakim Al{-}Absi and Ahmed Abdulhakim Al{-}Absi and Hoon{-}Jae Lee}, title = {A Conservation Genetic Algorithm for Optimization of the E-commerce Logistics Distribution Path}, booktitle = {21st International Conference on Advanced Communication Technology, {ICACT} 2019, Pyeongchang, South Korea, February 17-20, 2019}, pages = {558--562}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.23919/ICACT.2019.8702053}, doi = {10.23919/ICACT.2019.8702053}, timestamp = {Thu, 13 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icact/FuAAL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icact/SainCAL19, author = {Mangal Sain and Amlan Jyoti Chaudhray and Satyabrata Aich and Hoon{-}Jae Lee}, title = {Security Enhancement for Access Control Mechanism in Real-time Wireless Sensor Network}, booktitle = {21st International Conference on Advanced Communication Technology, {ICACT} 2019, Pyeongchang, South Korea, February 17-20, 2019}, pages = {1135--1142}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.23919/ICACT.2019.8701985}, doi = {10.23919/ICACT.2019.8701985}, timestamp = {Thu, 13 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icact/SainCAL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ictc/FuRuiAL19, author = {FuRui and Mohammed Abdulhakim Al{-}Absi and Hoon{-}Jae Lee}, title = {Introduce a Specific Process of Genetic Algorithm through an Example}, booktitle = {2019 International Conference on Information and Communication Technology Convergence, {ICTC} 2019, Jeju Island, Korea (South), October 16-18, 2019}, pages = {422--425}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICTC46691.2019.8939728}, doi = {10.1109/ICTC46691.2019.8939728}, timestamp = {Thu, 13 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ictc/FuRuiAL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ictc/Al-AbsiARL19, author = {Mohammed Abdulhakim Al{-}Absi and Ahmed Abdulhakim Al{-}Absi and Hind R'bigui and Hoon{-}Jae Lee}, title = {A Novel Throughput and Collision for City Environment in {V2V} Communication}, booktitle = {2019 International Conference on Information and Communication Technology Convergence, {ICTC} 2019, Jeju Island, Korea (South), October 16-18, 2019}, pages = {1413--1415}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICTC46691.2019.8939963}, doi = {10.1109/ICTC46691.2019.8939963}, timestamp = {Thu, 13 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ictc/Al-AbsiARL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/Al-AbsiAKL18, author = {Mohammed Abdulhakim Al{-}Absi and Ahmed Abdulhakim Al{-}Absi and TaeYong Kim and Hoon{-}Jae Lee}, title = {An environmental channel throughput and radio propagation modeling for vehicle-to-vehicle communication}, journal = {Int. J. Distributed Sens. Networks}, volume = {14}, number = {4}, year = {2018}, url = {https://doi.org/10.1177/1550147718772535}, doi = {10.1177/1550147718772535}, timestamp = {Thu, 13 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdsn/Al-AbsiAKL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/LamLLO18, author = {Jun Huy Lam and Sanggon Lee and Hoon{-}Jae Lee and Yustus Eko Oktian}, title = {Design, implementation, and performance evaluation of identity-based cryptography in {ONOS}}, journal = {Int. J. Netw. Manag.}, volume = {28}, number = {1}, year = {2018}, url = {https://doi.org/10.1002/nem.1990}, doi = {10.1002/NEM.1990}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/LamLLO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icact/Al-AbsiAKL18a, author = {Mohammed Abdulhakim Al{-}Absi and Ahmed Abdulhakim Al{-}Absi and Young{-}Jin Kang and Hoon{-}Jae Lee}, title = {Obstacles effects on signal attenuation in line of sight for different environments in {V2V} communication}, booktitle = {20th International Conference on Advanced Communication Technology, {ICACT} 2018, Elysian Gangchon, Chuncheon, Korea (South), February 11-14, 2018}, pages = {17--20}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.23919/ICACT.2018.8323630}, doi = {10.23919/ICACT.2018.8323630}, timestamp = {Thu, 13 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icact/Al-AbsiAKL18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icact/RyuK018, author = {SuMi Ryu and Young{-}Jin Kang and Hoonjae Lee}, title = {A study on detection of anomaly behavior in automation industry}, booktitle = {20th International Conference on Advanced Communication Technology, {ICACT} 2018, Elysian Gangchon, Chuncheon, Korea (South), February 11-14, 2018}, pages = {377--380}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.23919/ICACT.2018.8323764}, doi = {10.23919/ICACT.2018.8323764}, timestamp = {Tue, 22 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icact/RyuK018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ictc/Al-AbsiAL18, author = {Mohammed Abdulhakim Al{-}Absi and Ahmed Abdulhakim Al{-}Absi and Hoon{-}Jae Lee}, title = {Performance Analysis for City, Highway, and Rural Area in Vehicle-to-Vehicle Network}, booktitle = {International Conference on Information and Communication Technology Convergence, {ICTC} 2018, Jeju Island, Korea (South), October 17-19, 2018}, pages = {639--644}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ICTC.2018.8539418}, doi = {10.1109/ICTC.2018.8539418}, timestamp = {Thu, 13 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ictc/Al-AbsiAL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/OktianLLL17, author = {Yustus Eko Oktian and Sanggon Lee and Hoonjae Lee and Jun Huy Lam}, title = {Distributed {SDN} controller system: {A} survey on design choice}, journal = {Comput. Networks}, volume = {121}, pages = {100--111}, year = {2017}, url = {https://doi.org/10.1016/j.comnet.2017.04.038}, doi = {10.1016/J.COMNET.2017.04.038}, timestamp = {Thu, 11 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/OktianLLL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ictc/Al-AbsiAL17, author = {Mohammed Abdulhakim Al{-}Absi and Ahmed Abdulhakim Al{-}Absi and Hoon{-}Jae Lee}, title = {{V2V} communication modeling for environmental channel throughput and radio propagation}, booktitle = {International Conference on Information and Communication Technology Convergence, {ICTC} 2017, Jeju Island, Korea (South), October 18-20, 2017}, pages = {507--512}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ICTC.2017.8191029}, doi = {10.1109/ICTC.2017.8191029}, timestamp = {Thu, 13 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ictc/Al-AbsiAL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iasc/ChoiCLH16, author = {YongJe Choi and Dooho Choi and Hoonjae Lee and JaeCheol Ha}, title = {An Improved Square-always Exponentiation Resistant to Side-channel Attacks on {RSA} Implementation}, journal = {Intell. Autom. Soft Comput.}, volume = {22}, number = {3}, pages = {353--363}, year = {2016}, url = {https://doi.org/10.1080/10798587.2015.1118909}, doi = {10.1080/10798587.2015.1118909}, timestamp = {Fri, 26 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iasc/ChoiCLH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mis/LamLLO16, author = {Jun Huy Lam and Sanggon Lee and Hoon{-}Jae Lee and Yustus Eko Oktian}, title = {Securing {SDN} Southbound and Data Plane Communication with {IBC}}, journal = {Mob. Inf. Syst.}, volume = {2016}, pages = {1708970:1--1708970:12}, year = {2016}, url = {https://doi.org/10.1155/2016/1708970}, doi = {10.1155/2016/1708970}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mis/LamLLO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jicce/ZhangLL15, author = {Zhijun Zhang and Hyotaek Lim and Hoon{-}Jae Lee}, title = {The Design of an Efficient Proxy-Based Framework for Mobile Cloud Computing}, journal = {J. Inform. and Commun. Convergence Engineering}, volume = {13}, number = {1}, pages = {15--20}, year = {2015}, url = {https://doi.org/10.6109/jicce.2015.13.1.015}, doi = {10.6109/JICCE.2015.13.1.015}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jicce/ZhangLL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/RahayuLL15, author = {Triana Mugia Rahayu and Sanggon Lee and Hoonjae Lee}, title = {A Secure Routing Protocol for Wireless Sensor Networks Considering Secure Data Aggregation}, journal = {Sensors}, volume = {15}, number = {7}, pages = {15127--15158}, year = {2015}, url = {https://doi.org/10.3390/s150715127}, doi = {10.3390/S150715127}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/RahayuLL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/LeeBNAL15, author = {Young{-}Sil Lee and Bruce Ndibanje and Non Thiranant and Esko Alasaarela and Hoon{-}Jae Lee}, editor = {Leonard Barolli and Makoto Takizawa and Fatos Xhafa and Tomoya Enokido and Jong Hyuk Park}, title = {Hybrid Cloud Service Based Healthcare Solutions}, booktitle = {29th {IEEE} International Conference on Advanced Information Networking and Applications Workshops, {AINA} 2015 Workshops, Gwangju, South Korea, March 24-27, 2015}, pages = {25--30}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/WAINA.2015.42}, doi = {10.1109/WAINA.2015.42}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/LeeBNAL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/BruceKPL15, author = {Bruce Ndibanje and Hyunho Kim and Suhyun Park and Hoon{-}Jae Lee}, editor = {Leonard Barolli and Makoto Takizawa and Fatos Xhafa and Tomoya Enokido and Jong Hyuk Park}, title = {An Efficient and Provable Secret Shared Key Computation for Cryptographic Protocol Across Insecure Channel}, booktitle = {29th {IEEE} International Conference on Advanced Information Networking and Applications, {AINA} 2015, Gwangju, South Korea, March 24-27, 2015}, pages = {143--147}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/AINA.2015.178}, doi = {10.1109/AINA.2015.178}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/BruceKPL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/ThiranantLL15, author = {Non Thiranant and Young{-}Sil Lee and Hoon{-}Jae Lee}, editor = {Leonard Barolli and Makoto Takizawa and Fatos Xhafa and Tomoya Enokido and Jong Hyuk Park}, title = {Performance Comparison Between {RSA} and Elliptic Curve Cryptography-Based {QR} Code Authentication}, booktitle = {29th {IEEE} International Conference on Advanced Information Networking and Applications Workshops, {AINA} 2015 Workshops, Gwangju, South Korea, March 24-27, 2015}, pages = {278--282}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/WAINA.2015.62}, doi = {10.1109/WAINA.2015.62}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/ThiranantLL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/KimKBPL15, author = {Hyunho Kim and Young{-}Jin Kang and Bruce Ndibanje and Suhyun Park and Hoon{-}Jae Lee}, editor = {Leonard Barolli and Makoto Takizawa and Fatos Xhafa and Tomoya Enokido and Jong Hyuk Park}, title = {Smartphone-Based Secure Access Control in Wireless Network Analysis}, booktitle = {29th {IEEE} International Conference on Advanced Information Networking and Applications Workshops, {AINA} 2015 Workshops, Gwangju, South Korea, March 24-27, 2015}, pages = {344--347}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/WAINA.2015.91}, doi = {10.1109/WAINA.2015.91}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/KimKBPL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/BruceKKLL15, author = {Bruce Ndibanje and Hyunho Kim and Young{-}Jin Kang and Young{-}Sil Lee and Hoon{-}Jae Lee}, editor = {Leonard Barolli and Makoto Takizawa and Fatos Xhafa and Tomoya Enokido and Jong Hyuk Park}, title = {On Modeling Protocol-Based Clustering Tag in {RFID} Systems with Formal Security Analysis}, booktitle = {29th {IEEE} International Conference on Advanced Information Networking and Applications, {AINA} 2015, Gwangju, South Korea, March 24-27, 2015}, pages = {498--505}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/AINA.2015.227}, doi = {10.1109/AINA.2015.227}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/BruceKKLL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/KangKBPL15, author = {Young{-}Jin Kang and Hyunho Kim and Bruce Ndibanje and Younggoo Park and Hoonjae Lee}, editor = {Leonard Barolli and Makoto Takizawa and Fatos Xhafa and Tomoya Enokido and Jong Hyuk Park}, title = {Correlation Power Analysis Attack on the Ping Pong-128 Key Stream Generator}, booktitle = {29th {IEEE} International Conference on Advanced Information Networking and Applications, {AINA} 2015, Gwangju, South Korea, March 24-27, 2015}, pages = {506--509}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/AINA.2015.228}, doi = {10.1109/AINA.2015.228}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/KangKBPL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asunam/NdibanjeKSL15, author = {Bruce Ndibanje and Young{-}Jin Kang and Mangal Sain and Hoon{-}Jae Lee}, editor = {Jian Pei and Fabrizio Silvestri and Jie Tang}, title = {An Approach to Designing a Network Security-based Application for Communications Safety}, booktitle = {Proceedings of the 2015 {IEEE/ACM} International Conference on Advances in Social Networks Analysis and Mining, {ASONAM} 2015, Paris, France, August 25 - 28, 2015}, pages = {1002--1009}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808797.2808808}, doi = {10.1145/2808797.2808808}, timestamp = {Thu, 11 Mar 2021 17:04:51 +0100}, biburl = {https://dblp.org/rec/conf/asunam/NdibanjeKSL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hpcc/NdibanjeLLL15, author = {Bruce Ndibanje and Young{-}Sil Lee and Sanggon Lee and Hoon{-}Jae Lee}, title = {A Privacy Preserving Security Protocol-Based Application for Wireless Communication System}, booktitle = {17th {IEEE} International Conference on High Performance Computing and Communications, {HPCC} 2015, 7th {IEEE} International Symposium on Cyberspace Safety and Security, {CSS} 2015, and 12th {IEEE} International Conference on Embedded Software and Systems, {ICESS} 2015, New York, NY, USA, August 24-26, 2015}, pages = {1651--1656}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/HPCC-CSS-ICESS.2015.79}, doi = {10.1109/HPCC-CSS-ICESS.2015.79}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/hpcc/NdibanjeLLL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hpcc/LeeNAKL15, author = {Young{-}Sil Lee and Bruce Ndibanje and Esko Alasaarela and Tae{-}Yong Kim and Hoon{-}Jae Lee}, title = {An Effective and Secure User Authentication and Key Agreement Scheme in m-Healthcare Systems}, booktitle = {17th {IEEE} International Conference on High Performance Computing and Communications, {HPCC} 2015, 7th {IEEE} International Symposium on Cyberspace Safety and Security, {CSS} 2015, and 12th {IEEE} International Conference on Embedded Software and Systems, {ICESS} 2015, New York, NY, USA, August 24-26, 2015}, pages = {1685--1690}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/HPCC-CSS-ICESS.2015.91}, doi = {10.1109/HPCC-CSS-ICESS.2015.91}, timestamp = {Sat, 16 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hpcc/LeeNAKL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icufn/OktianLLL15, author = {Yustus Eko Oktian and Sanggon Lee and Hoonjae Lee and Jun Huy Lam}, title = {Secure your Northbound {SDN} {API}}, booktitle = {Seventh International Conference on Ubiquitous and Future Networks, {ICUFN} 2015, Sapporo, Japan, July 7-10, 2015}, pages = {919--920}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICUFN.2015.7182679}, doi = {10.1109/ICUFN.2015.7182679}, timestamp = {Thu, 11 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icufn/OktianLLL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icufn/LamLLO15, author = {Jun Huy Lam and Sang{-}Gon Lee and Hoonjae Lee and Yustus Eko Oktian}, title = {Securing distributed {SDN} with {IBC}}, booktitle = {Seventh International Conference on Ubiquitous and Future Networks, {ICUFN} 2015, Sapporo, Japan, July 7-10, 2015}, pages = {921--925}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICUFN.2015.7182680}, doi = {10.1109/ICUFN.2015.7182680}, timestamp = {Thu, 11 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icufn/LamLLO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jicce/MarpaungNL14, author = {Jonathan A. P. Marpaung and Bruce Ndibanje and Hoon{-}Jae Lee}, title = {Higher-Order Countermeasures against Side-Channel Cryptanalysis on Rabbit Stream Cipher}, journal = {J. Inform. and Commun. Convergence Engineering}, volume = {12}, number = {4}, pages = {237--245}, year = {2014}, url = {https://doi.org/10.6109/jicce.2014.12.4.237}, doi = {10.6109/JICCE.2014.12.4.237}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jicce/MarpaungNL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/HaCCL14, author = {JaeCheol Ha and YongJe Choi and Dooho Choi and Hoonjae Lee}, title = {Power Analysis Attacks on the Right-to-Left Square-Always Exponentiation Algorithm}, journal = {J. Internet Serv. Inf. Secur.}, volume = {4}, number = {4}, pages = {38--51}, year = {2014}, url = {https://doi.org/10.22667/JISIS.2014.11.31.038}, doi = {10.22667/JISIS.2014.11.31.038}, timestamp = {Thu, 23 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/HaCCL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/YeoPLL14, author = {Hui{-}Shyong Yeo and Xiao{-}Shen Phang and Hoon{-}Jae Lee and Hyotaek Lim}, title = {Leveraging client-side storage techniques for enhanced use of multiple consumer cloud storage services on resource-constrained mobile devices}, journal = {J. Netw. Comput. Appl.}, volume = {43}, pages = {142--156}, year = {2014}, url = {https://doi.org/10.1016/j.jnca.2014.04.006}, doi = {10.1016/J.JNCA.2014.04.006}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/YeoPLL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/KumarYGLL14, author = {Pardeep Kumar and Mika Ylianttila and Andrei V. Gurtov and Sanggon Lee and Hoon{-}Jae Lee}, title = {An Efficient and Adaptive Mutual Authentication Framework for Heterogeneous Wireless Sensor Network-Based Applications}, journal = {Sensors}, volume = {14}, number = {2}, pages = {2732--2755}, year = {2014}, url = {https://doi.org/10.3390/s140202732}, doi = {10.3390/S140202732}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/KumarYGLL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/NdibanjeLL14, author = {Bruce Ndibanje and Hoon{-}Jae Lee and Sanggon Lee}, title = {Security Analysis and Improvements of Authentication and Access Control in the Internet of Things}, journal = {Sensors}, volume = {14}, number = {8}, pages = {14786--14805}, year = {2014}, url = {https://doi.org/10.3390/s140814786}, doi = {10.3390/S140814786}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/NdibanjeLL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/LiuYL14, author = {Zengguang Liu and Xiaochun Yin and Hoonjae Lee}, title = {An Efficient Defense Scheme against {SIP} DoS Attack in {SDN} Using Cloud {SFW}}, booktitle = {Ninth Asia Joint Conference on Information Security, AsiaJCIS 2014, Wuhan, China, September 3-5, 2014}, pages = {52--55}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/AsiaJCIS.2014.12}, doi = {10.1109/ASIAJCIS.2014.12}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/LiuYL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/QiuHL14, author = {Junjie Qiu and Gi{-}Hyun Hwang and Hoonjae Lee}, title = {Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security}, booktitle = {Ninth Asia Joint Conference on Information Security, AsiaJCIS 2014, Wuhan, China, September 3-5, 2014}, pages = {104--110}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/AsiaJCIS.2014.11}, doi = {10.1109/ASIAJCIS.2014.11}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/QiuHL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cse/ThiranantKKJPL14, author = {Non Thiranant and Young{-}Jin Kang and Tae{-}Yong Kim and Won{-}Tae Jang and Suhyun Park and Hoonjae Lee}, editor = {Xingang Liu and Didier El Baz and Ching{-}Hsien Hsu and Kai Kang and Weifeng Chen}, title = {A Design of Elliptic Curve Cryptography-Based Authentication Using {QR} Code}, booktitle = {17th {IEEE} International Conference on Computational Science and Engineering, {CSE} 2014, Chengdu, China, December 19-21, 2014}, pages = {614--619}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CSE.2014.135}, doi = {10.1109/CSE.2014.135}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cse/ThiranantKKJPL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gcce/BruceL14, author = {Bruce Ndibanje and Hoon{-}Jae Lee}, title = {An enhanced passivation layer for secure consumer integrated circuit devices}, booktitle = {{IEEE} 3rd Global Conference on Consumer Electronics, {GCCE} 2014, Tokyo, Japan, 7-10 October 2014}, pages = {300--301}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/GCCE.2014.7031254}, doi = {10.1109/GCCE.2014.7031254}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/gcce/BruceL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icoin/LeeAL14, author = {Young{-}Sil Lee and Esko Alasaarela and Hoon{-}Jae Lee}, title = {Secure key management scheme based on {ECC} algorithm for patient's medical information in healthcare system}, booktitle = {The International Conference on Information Networking 2014, {ICOIN} 2014, Phuket, Thailand, February 10-12, 2014}, pages = {453--457}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/ICOIN.2014.6799723}, doi = {10.1109/ICOIN.2014.6799723}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icoin/LeeAL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icoin/NdibanjeL14, author = {Bruce Ndibanje and Hoon{-}Jae Lee}, title = {Cryptographic computation of private shared key based mutual authentication protocol: Simulation and modeling over wireless networks}, booktitle = {The International Conference on Information Networking 2014, {ICOIN} 2014, Phuket, Thailand, February 10-12, 2014}, pages = {578--582}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/ICOIN.2014.6799747}, doi = {10.1109/ICOIN.2014.6799747}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icoin/NdibanjeL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ictc/BruceL14, author = {Bruce Ndibanje and Hoon{-}Jae Lee}, title = {Anonymization algorithm for security and confidentiality of health data set across social network}, booktitle = {International Conference on Information and Communication Technology Convergence, {ICTC} 2014, Busan, South Korea, October 22-24, 2014}, pages = {65--70}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICTC.2014.6983085}, doi = {10.1109/ICTC.2014.6983085}, timestamp = {Thu, 13 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ictc/BruceL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ictc/YinLLL14, author = {XiaoChun Yin and Zengguang Liu and Young Sil Lee and Hoon{-}Jae Lee}, title = {PKI-based cryptography for secure cloud data storage using {ECC}}, booktitle = {International Conference on Information and Communication Technology Convergence, {ICTC} 2014, Busan, South Korea, October 22-24, 2014}, pages = {194--199}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICTC.2014.6983116}, doi = {10.1109/ICTC.2014.6983116}, timestamp = {Thu, 13 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ictc/YinLLL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ictc/OktianLL14, author = {Yustus Eko Oktian and Sanggon Lee and Hoonjae Lee}, title = {Mitigating Denial of Service (DoS) attacks in OpenFlow networks}, booktitle = {International Conference on Information and Communication Technology Convergence, {ICTC} 2014, Busan, South Korea, October 22-24, 2014}, pages = {325--330}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICTC.2014.6983147}, doi = {10.1109/ICTC.2014.6983147}, timestamp = {Thu, 11 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ictc/OktianLL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscit/LoukLLA14, author = {Maya Louk and Hyotaek Lim and Hoon{-}Jae Lee and Mohammed Atiquzzaman}, title = {An effective framework of behavior detection-advanced static analysis for malware detection}, booktitle = {14th International Symposium on Communications and Information Technologies, {ISCIT} 2014, Incheon, South Korea, September 24-26, 2014}, pages = {361--365}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ISCIT.2014.7011932}, doi = {10.1109/ISCIT.2014.7011932}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscit/LoukLLA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomsys/LeeJL13, author = {Young{-}Dong Lee and Do{-}Un Jeong and Hoon{-}Jae Lee}, title = {Empirical analysis of the reliability of low-rate wireless u-healthcare monitoring applications}, journal = {Int. J. Commun. Syst.}, volume = {26}, number = {4}, pages = {505--514}, year = {2013}, url = {https://doi.org/10.1002/dac.1360}, doi = {10.1002/DAC.1360}, timestamp = {Thu, 30 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomsys/LeeJL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/NdibanjeKL13, author = {Bruce Ndibanje and Tae{-}Yong Kim and Hoon{-}Jae Lee}, title = {Improved Security Patch on Secure Communication among Cell Phones and Sensor Networks}, journal = {Int. J. Distributed Sens. Networks}, volume = {9}, year = {2013}, url = {https://doi.org/10.1155/2013/348783}, doi = {10.1155/2013/348783}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdsn/NdibanjeKL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/SalamL13, author = {Md. Iftekhar Salam and Hoon{-}Jae Lee}, title = {Algebraic Countermeasure to Enhance the Improved Summation Generator with 2-Bit Memory}, journal = {J. Networks}, volume = {8}, number = {5}, pages = {977--984}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.5.977-984}, doi = {10.4304/JNW.8.5.977-984}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnw/SalamL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compute/SinhaSSL13, author = {Tanmay Sinha and Vrns Srikanth and Mangal Sain and Hoon{-}Jae Lee}, editor = {R. K. Shyamasundar and Lokendra Shastri and D. Janakiram and Srinivas Padmanabhuni}, title = {Trends and research directions for privacy preserving approaches on the cloud}, booktitle = {Proceedings of the 6th {ACM} India Computing Convention, {COMPUTE} 2013, Vellore, Tamil Nadu, India, August 22 - 24, 2013}, pages = {21:1--21:12}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2522548.2523138}, doi = {10.1145/2522548.2523138}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/compute/SinhaSSL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ictc/BruceHL13, author = {Bruce Ndibanje and Gi{-}Hyun Hwang and Hoon{-}Jae Lee}, title = {A hybrid and fast authentication protocol for handoff support in e-healthcare systems among WSNs}, booktitle = {International Conference on Information and Communication Technology Convergence, {ICTC} 2013, Jeju Island, South Korea, 4-16 October 2013}, pages = {72--77}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICTC.2013.6675309}, doi = {10.1109/ICTC.2013.6675309}, timestamp = {Thu, 13 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ictc/BruceHL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ictc/YinL13, author = {XiaoChun Yin and Hoon{-}Jae Lee}, title = {Threshold tuning for demand queue based Overload Control Module}, booktitle = {International Conference on Information and Communication Technology Convergence, {ICTC} 2013, Jeju Island, South Korea, 4-16 October 2013}, pages = {1013--1016}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICTC.2013.6675542}, doi = {10.1109/ICTC.2013.6675542}, timestamp = {Thu, 13 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ictc/YinL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwcmc/LeeLA13, author = {Young{-}Sil Lee and Hoon{-}Jae Lee and Esko Alasaarela}, editor = {Roberto Saracco and Khaled Ben Letaief and Mario Gerla and Sergio Palazzo and Luigi Atzori}, title = {Mutual authentication in wireless body sensor networks {(WBSN)} based on Physical Unclonable Function {(PUF)}}, booktitle = {2013 9th International Wireless Communications and Mobile Computing Conference, {IWCMC} 2013, Sardinia, Italy, July 1-5, 2013}, pages = {1314--1318}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/IWCMC.2013.6583746}, doi = {10.1109/IWCMC.2013.6583746}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/iwcmc/LeeLA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/SalamL12, author = {Md. Iftekhar Salam and Hoon{-}Jae Lee}, title = {On the algebraic attack against summation type keystream generators}, journal = {Int. J. Inf. Comput. Secur.}, volume = {5}, number = {2}, pages = {132--149}, year = {2012}, url = {https://doi.org/10.1504/IJICS.2012.051778}, doi = {10.1504/IJICS.2012.051778}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijics/SalamL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/KumarL12, author = {Pardeep Kumar and Hoon{-}Jae Lee}, title = {Security Issues in Healthcare Applications Using Wireless Medical Sensor Networks: {A} Survey}, journal = {Sensors}, volume = {12}, number = {1}, pages = {55--91}, year = {2012}, url = {https://doi.org/10.3390/s120100055}, doi = {10.3390/S120100055}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/KumarL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/KumarLL12, author = {Pardeep Kumar and Sanggon Lee and Hoon{-}Jae Lee}, title = {{E-SAP:} Efficient-Strong Authentication Protocol for Healthcare Applications Using Wireless Medical Sensor Networks}, journal = {Sensors}, volume = {12}, number = {2}, pages = {1625--1647}, year = {2012}, url = {https://doi.org/10.3390/s120201625}, doi = {10.3390/S120201625}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/KumarLL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/LeeKL12, author = {Young{-}Sil Lee and Tae{-}Yong Kim and Hoon{-}Jae Lee}, editor = {Leonard Barolli and Tomoya Enokido and Fatos Xhafa and Makoto Takizawa}, title = {Mutual Authentication Protocol for Enhanced {RFID} Security and Anti-counterfeiting}, booktitle = {26th International Conference on Advanced Information Networking and Applications Workshops, {WAINA} 2012, Fukuoka, Japan, March 26-29, 2012}, pages = {558--563}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/WAINA.2012.12}, doi = {10.1109/WAINA.2012.12}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/LeeKL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/ChoudhuryLL12, author = {Amlan Jyoti Choudhury and Hyotaek Lim and Hoon{-}Jae Lee}, editor = {Leonard Barolli and Tomoya Enokido and Fatos Xhafa and Makoto Takizawa}, title = {An Efficient {FPGA} Design of PingPong-128 Stream Cipher for Secure Computing}, booktitle = {{IEEE} 26th International Conference on Advanced Information Networking and Applications, AINA, 2012 , Fukuoka, Japan, March 26-29, 2012}, pages = {695--700}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/AINA.2012.24}, doi = {10.1109/AINA.2012.24}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/ChoudhuryLL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/NdibanjeKL12, author = {Bruce Ndibanje and Tae{-}Yong Kim and Hoon{-}Jae Lee}, editor = {Tai{-}Hoon Kim and Dae{-}Sik Ko and Thanos Vasilakos and Adrian Stoica and Jemal H. Abawajy}, title = {Data Link Layer' Security Analysis for Wireless Sensor Networks}, booktitle = {Computer Applications for Communication, Networking, and Digital Contents - International Conferences, {FGCN} and {DCA} 2012, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2012, Gangneug, Korea, December 16-19, 2012. Proceedings}, series = {Communications in Computer and Information Science}, volume = {350}, pages = {25--32}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35594-3\_4}, doi = {10.1007/978-3-642-35594-3\_4}, timestamp = {Tue, 23 May 2017 01:07:31 +0200}, biburl = {https://dblp.org/rec/conf/fgit/NdibanjeKL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SalamL12, author = {Md. Iftekhar Salam and Hoon{-}Jae Lee}, title = {Algebraic Countermeasure to Enhance the Improved Summation Generator with 2-Bit Memory}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {282}, year = {2012}, url = {http://eprint.iacr.org/2012/282}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SalamL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jicce/SainCL11, author = {Mangal Sain and Wan{-}Young Chung and Hoon{-}Jae Lee}, title = {A Personalized Healthcare Analysis System in Ubiquitous Environment}, journal = {J. Inform. and Commun. Convergence Engineering}, volume = {9}, number = {2}, pages = {235--243}, year = {2011}, url = {https://doi.org/10.6109/jicce.2011.9.2.235}, doi = {10.6109/JICCE.2011.9.2.235}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jicce/SainCL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jicce/SinghLL11, author = {Madhusudan Singh and Sanggon Lee and Hoon{-}Jae Lee}, title = {Performance of Mobility Models for Routing Protocol in Wireless Ad-hoc Networks}, journal = {J. Inform. and Commun. Convergence Engineering}, volume = {9}, number = {5}, pages = {610--614}, year = {2011}, url = {https://doi.org/10.6109/jicce.2011.9.5.610}, doi = {10.6109/JICCE.2011.9.5.610}, timestamp = {Tue, 20 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jicce/SinghLL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/KumarCSLL11, author = {Pardeep Kumar and Amlan Jyoti Choudhury and Mangal Sain and Sanggon Lee and Hoon{-}Jae Lee}, title = {{RUASN:} {A} Robust User Authentication Framework for Wireless Sensor Networks}, journal = {Sensors}, volume = {11}, number = {5}, pages = {5020--5046}, year = {2011}, url = {https://doi.org/10.3390/s110505020}, doi = {10.3390/S110505020}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/KumarCSLL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apscc/ChoudhuryKSLL11, author = {Amlan Jyoti Choudhury and Pardeep Kumar and Mangal Sain and Hyotaek Lim and Hoon{-}Jae Lee}, editor = {James J. Park and Christos Nikolaou and Jiannong Cao}, title = {A Strong User Authentication Framework for Cloud Computing}, booktitle = {2011 {IEEE} Asia-Pacific Services Computing Conference, {APSCC} 2011, Jeju, Korea (South), December 12-15, 2011}, pages = {110--115}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/APSCC.2011.14}, doi = {10.1109/APSCC.2011.14}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/apscc/ChoudhuryKSLL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hpcc/KumarLL11, author = {Pardeep Kumar and Sanggon Lee and Hoon{-}Jae Lee}, editor = {Parimala Thulasiraman and Laurence Tianruo Yang and Qiwen Pan and Xingang Liu and Yaw{-}Chung Chen and Yo{-}Ping Huang and Lin{-}Huang Chang and Che{-}Lun Hung and Che{-}Rung Lee and Justin Y. Shi and Ying Zhang}, title = {A User Authentication for Healthcare Application Using Wireless Medical Sensor Networks}, booktitle = {13th {IEEE} International Conference on High Performance Computing {\&} Communication, {HPCC} 2011, Banff, Alberta, Canada, September 2-4, 2011}, pages = {647--652}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/HPCC.2011.92}, doi = {10.1109/HPCC.2011.92}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hpcc/KumarLL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ichit/ChoudhuryPBLLL11, author = {Amlan Jyoti Choudhury and Beum{-}Su Park and Bruce Ndibanje and Young{-}Sil Lee and Hyotaek Lim and Hoon{-}Jae Lee}, editor = {Geuk Lee and Daniel Howard and Dominik Slezak}, title = {An Efficient Hardware Countermeasure against Differential Power Analysis Attack}, booktitle = {Convergence and Hybrid Information Technology - 5th International Conference, {ICHIT} 2011, Daejeon, Korea, September 22-24, 2011. Proceedings}, series = {Communications in Computer and Information Science}, volume = {206}, pages = {153--159}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24106-2\_20}, doi = {10.1007/978-3-642-24106-2\_20}, timestamp = {Thu, 28 Dec 2017 16:02:42 +0100}, biburl = {https://dblp.org/rec/conf/ichit/ChoudhuryPBLLL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ichit/LeeL11, author = {Soh Yee Lee and Hoonjae Lee}, editor = {Geuk Lee and Daniel Howard and Dominik Slezak}, title = {Hardware Implementation and Performance Analysis of {NLM-128} Stream Cipher}, booktitle = {Convergence and Hybrid Information Technology - 5th International Conference, {ICHIT} 2011, Daejeon, Korea, September 22-24, 2011. Proceedings}, series = {Communications in Computer and Information Science}, volume = {206}, pages = {446--453}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24106-2\_57}, doi = {10.1007/978-3-642-24106-2\_57}, timestamp = {Thu, 11 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ichit/LeeL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ichit/ParkCLKL11, author = {Beum{-}Su Park and Amlan Jyoti Choudhury and Young{-}Sil Lee and Tae{-}Yong Kim and Hoon{-}Jae Lee}, editor = {Geuk Lee and Daniel Howard and Dominik Slezak}, title = {An Efficient Password Authentication Method Using {CAPTCHA}}, booktitle = {Convergence and Hybrid Information Technology - 5th International Conference, {ICHIT} 2011, Daejeon, Korea, September 22-24, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6935}, pages = {456--463}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24082-9\_56}, doi = {10.1007/978-3-642-24082-9\_56}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/ichit/ParkCLKL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/BaeALHM11, author = {KiSeok Bae and MahnKi Ahn and Hoon{-}Jae Lee and JaeCheol Ha and Sang{-}Jae Moon}, editor = {Jan J{\"{u}}rjens and Seok{-}Won Lee and Mattia Monga}, title = {Power analysis attack and countermeasure on the Rabbit Stream Cipher (position paper)}, booktitle = {Proceedings of the 7th International Workshop on Software Engineering for Secure Systems, {SESS} 2011, Waikiki, Honolulu, HI, USA, May 22, 2011}, pages = {50--56}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1988630.1988640}, doi = {10.1145/1988630.1988640}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse/BaeALHM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1107-4189, author = {Annapurna Sharma and Hakimjon Zaynidinov and Hoon{-}Jae Lee}, title = {Development and Modelling of High-Efficiency Computing Structure for Digital Signal Processing}, journal = {CoRR}, volume = {abs/1107.4189}, year = {2011}, url = {http://arxiv.org/abs/1107.4189}, eprinttype = {arXiv}, eprint = {1107.4189}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1107-4189.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomsys/SinghZL10, author = {Dhananjay Singh and Hakimjon Zaynidinov and Hoon{-}Jae Lee}, title = {Piecewise-quadratic Harmut basis functions and their application to problems in digital signal processing}, journal = {Int. J. Commun. Syst.}, volume = {23}, number = {6-7}, pages = {751--762}, year = {2010}, url = {https://doi.org/10.1002/dac.1093}, doi = {10.1002/DAC.1093}, timestamp = {Sun, 20 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcomsys/SinghZL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijhisi/GautamLC10, author = {Alka Gautam and Hoon{-}Jae Lee and Wan{-}Young Chung}, title = {{ECG} Signal De-noising with Asynchronous Averaging and Filtering Algorithm}, journal = {Int. J. Heal. Inf. Syst. Informatics}, volume = {5}, number = {2}, pages = {30--36}, year = {2010}, url = {https://doi.org/10.4018/jhisi.2010040104}, doi = {10.4018/JHISI.2010040104}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijhisi/GautamLC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jicce/LeeJK10, author = {Hoon{-}Jae Lee and Won{-}Tae Jang and Tae{-}Yong Kim}, title = {Reliable and Secure Voice Encryption over {GSM} Voice Channel}, journal = {J. Inform. and Commun. Convergence Engineering}, volume = {8}, number = {1}, pages = {64--70}, year = {2010}, url = {https://doi.org/10.6109/jicce.2010.8.1.064}, doi = {10.6109/JICCE.2010.8.1.064}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jicce/LeeJK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jicce/KumarCLLL10, author = {Pardeep Kumar and Sang il Cho and Dea{-}Seok Lee and Young{-}Dong Lee and Hoon{-}Jae Lee}, title = {TriSec: {A} Secure Data Framework for Wireless Sensor Networks Using Authenticated Encryption}, journal = {J. Inform. and Commun. Convergence Engineering}, volume = {8}, number = {2}, pages = {129--135}, year = {2010}, url = {https://doi.org/10.6109/jicce.2010.8.2.129}, doi = {10.6109/JICCE.2010.8.2.129}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jicce/KumarCLLL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jicce/LeeOLL10, author = {Shirly Lee and Ivy Ong and Hyotaek Lim and Hoon{-}Jae Lee}, title = {Two Factor Authentication for Cloud Computing}, journal = {J. Inform. and Commun. Convergence Engineering}, volume = {8}, number = {4}, pages = {427--432}, year = {2010}, url = {https://doi.org/10.6109/jicce.2010.8.4.427}, doi = {10.6109/JICCE.2010.8.4.427}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jicce/LeeOLL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jicce/OngLLL10, author = {Ivy Ong and Shirly Lee and Hoon{-}Jae Lee and Hyotaek Lim}, title = {Mutual Authentication and Secure Session Termination Scheme in iATA Protocol}, journal = {J. Inform. and Commun. Convergence Engineering}, volume = {8}, number = {4}, pages = {437--442}, year = {2010}, url = {https://doi.org/10.6109/jicce.2010.8.4.437}, doi = {10.6109/JICCE.2010.8.4.437}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jicce/OngLLL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jicce/LiewOLLL10, author = {Jiun{-}Hau Liew and Ivy Ong and Sanggon Lee and Hyotaek Lim and Hoon{-}Jae Lee}, title = {Practical Attacks on Hybrid Group Key Management for {SOHAN}}, journal = {J. Inform. and Commun. Convergence Engineering}, volume = {8}, number = {5}, pages = {549--553}, year = {2010}, url = {https://doi.org/10.6109/jicce.2010.8.5.549}, doi = {10.6109/JICCE.2010.8.5.549}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jicce/LiewOLLL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ncm/KumarSLL10, author = {Pardeep Kumar and Md. Iftekhar Salam and Sanggon Lee and Hoon{-}Jae Lee}, title = {Addressing secure data routing scheme for heterogeneous sensor networks}, booktitle = {International Conference on Networked Computing and Advanced Information Management, {NCM} 2010, Sixth International Joint Conference on INC, {IMS} and {IDC:} {INC} 2010: International Conference on Networked Computing, {IMS} 2010: International Conference on Advanced Information Management and Service, {IDC} 2010: International Conference on Digital Content, Multimedia Technology and its Applications, Seoul, Korea, August 16-18, 2010}, pages = {86--90}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5572329/}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ncm/KumarSLL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ncm/SalamKL10, author = {Md. Iftekhar Salam and Pardeep Kumar and Hoon{-}Jae Lee}, title = {An efficient key pre-distribution scheme for wireless sensor network using public key cryptography}, booktitle = {International Conference on Networked Computing and Advanced Information Management, {NCM} 2010, Sixth International Joint Conference on INC, {IMS} and {IDC:} {INC} 2010: International Conference on Networked Computing, {IMS} 2010: International Conference on Advanced Information Management and Service, {IDC} 2010: International Conference on Digital Content, Multimedia Technology and its Applications, Seoul, Korea, August 16-18, 2010}, pages = {402--407}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5572065/}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ncm/SalamKL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ncm/KumarLL10, author = {Pardeep Kumar and Young{-}Dong Lee and Hoon{-}Jae Lee}, title = {Secure health monitoring using medical wireless sensor networks}, booktitle = {International Conference on Networked Computing and Advanced Information Management, {NCM} 2010, Sixth International Joint Conference on INC, {IMS} and {IDC:} {INC} 2010: International Conference on Networked Computing, {IMS} 2010: International Conference on Advanced Information Management and Service, {IDC} 2010: International Conference on Digital Content, Multimedia Technology and its Applications, Seoul, Korea, August 16-18, 2010}, pages = {491--494}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5572412/}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ncm/KumarLL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jicce/LeeLL09, author = {Sanggon Lee and Meng{-}Hui Lim and Hoon{-}Jae Lee}, title = {Cryptanalysis of Hu-Niu-Yang's Multi-server Password Authenticated Key Agreement Schemes Using Smart Card}, journal = {J. Inform. and Commun. Convergence Engineering}, volume = {7}, number = {3}, pages = {340--344}, year = {2009}, url = {http://www.koreascience.or.kr/article/ArticleFullRecord.jsp?cn=E1ICAW\_2009\_v7n3\_340}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jicce/LeeLL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jicce/KimJL09, author = {Tae{-}Yong Kim and Won{-}Tae Jang and Hoon{-}Jae Lee}, title = {Development of a Cryptographic Dongle for Secure Voice Encryption over {GSM} Voice Channel}, journal = {J. Inform. and Commun. Convergence Engineering}, volume = {7}, number = {4}, pages = {561--564}, year = {2009}, url = {http://www.koreascience.or.kr/article/ArticleFullRecord.jsp?cn=E1ICAW\_2009\_v7n4\_561}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jicce/KimJL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csie/SinghKTLC09, author = {Dhananjay Singh and Hsein{-}Ping Kew and Uma Shanker Tiwary and Hoon{-}Jae Lee and Wan{-}Young Chung}, editor = {Mark Burgin and Masud H. Chowdhury and Chan H. Ham and Simone A. Ludwig and Weilian Su and Sumanth Yenduri}, title = {Global Patient Monitoring System Using IP-Enabled Ubiquitous Sensor Network}, booktitle = {{CSIE} 2009, 2009 {WRI} World Congress on Computer Science and Information Engineering, March 31 - April 2, 2009, Los Angeles, California, USA, 7 Volumes}, pages = {524--528}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CSIE.2009.921}, doi = {10.1109/CSIE.2009.921}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csie/SinghKTLC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/SainBLC09, author = {Mangal Sain and Sachin Bhardwaj and Hoon{-}Jae Lee and Wan{-}Young Chung}, editor = {Dominik Slezak and Tai{-}Hoon Kim and Alan Chin{-}Chen Chang and Thanos Vasilakos and Mingchu Li and Kouichi Sakurai}, title = {Architecture of Personal Healthcare Information System in Ubiquitous Healthcare}, booktitle = {Communication and Networking - International Conference, {FGCN/ACN} 2009, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings}, series = {Communications in Computer and Information Science}, volume = {56}, pages = {157--164}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10844-0\_20}, doi = {10.1007/978-3-642-10844-0\_20}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fgit/SainBLC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ichit/kumarLC09, author = {Pardeep Kumar and Hoon{-}Jae Lee and Wan{-}Young Chung}, editor = {Geuk Lee and Daniel Howard and Jeong Jin Kang and Dominik Slezak and Tae Nam Ahn and Chung{-}Huang Yang}, title = {A secure ubiquitous sensor network with Dragon}, booktitle = {Proceedings of the 2009 International Conference on Hybrid Information Technology, {ICHIT} 2009, Daejeon, Korea, August 27-29, 2009}, series = {{ACM} International Conference Proceeding Series}, volume = {321}, pages = {71--74}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1644993.1645006}, doi = {10.1145/1644993.1645006}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ichit/kumarLC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/interaction/SinghL09, author = {Dhananjay Singh and Hoon{-}Jae Lee}, editor = {Sungwon Sohn and Ling Chen and Soonwook Hwang and Kyungeun Cho and Shigeo Kawata and Kyhyun Um and Franz I. S. Ko and Kae{-}Dal Kwack and Jong Hyung Lee and Gang Kou and Kiyoshi Nakamura and Alvis Cheuk M. Fong and Patrick C. M. Ma}, title = {Database design for global patient monitoring applications using {WAP}}, booktitle = {Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human {(ICIS} 2009), Seoul, Korea, 24-26 November 2009}, series = {{ACM} International Conference Proceeding Series}, volume = {403}, pages = {25--31}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1655925.1655930}, doi = {10.1145/1655925.1655930}, timestamp = {Sun, 20 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/interaction/SinghL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/interaction/SainLC09, author = {Mangal Sain and Hoon{-}Jae Lee and Wan{-}Young Chung}, editor = {Sungwon Sohn and Ling Chen and Soonwook Hwang and Kyungeun Cho and Shigeo Kawata and Kyhyun Um and Franz I. S. Ko and Kae{-}Dal Kwack and Jong Hyung Lee and Gang Kou and Kiyoshi Nakamura and Alvis Cheuk M. Fong and Patrick C. M. Ma}, title = {Middleware in ubiquitous computing system with MedRec architecture}, booktitle = {Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human {(ICIS} 2009), Seoul, Korea, 24-26 November 2009}, series = {{ACM} International Conference Proceeding Series}, volume = {403}, pages = {149--154}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1655925.1655953}, doi = {10.1145/1655925.1655953}, timestamp = {Sun, 28 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/interaction/SainLC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/interaction/kumarCL09, author = {Pardeep Kumar and Sang il Cho and Hoon{-}Jae Lee}, editor = {Sungwon Sohn and Ling Chen and Soonwook Hwang and Kyungeun Cho and Shigeo Kawata and Kyhyun Um and Franz I. S. Ko and Kae{-}Dal Kwack and Jong Hyung Lee and Gang Kou and Kiyoshi Nakamura and Alvis Cheuk M. Fong and Patrick C. M. Ma}, title = {PingPong-MAC: secure ubiquitous sensor network with authenticated encryption}, booktitle = {Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human {(ICIS} 2009), Seoul, Korea, 24-26 November 2009}, series = {{ACM} International Conference Proceeding Series}, volume = {403}, pages = {256--260}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1655925.1655970}, doi = {10.1145/1655925.1655970}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/interaction/kumarCL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/interaction/SinghLC09, author = {Dhananjay Singh and Hoon{-}Jae Lee and Wan{-}Young Chung}, editor = {Sungwon Sohn and Ling Chen and Soonwook Hwang and Kyungeun Cho and Shigeo Kawata and Kyhyun Um and Franz I. S. Ko and Kae{-}Dal Kwack and Jong Hyung Lee and Gang Kou and Kiyoshi Nakamura and Alvis Cheuk M. Fong and Patrick C. M. Ma}, title = {An energy consumption technique for global healthcare monitoring applications}, booktitle = {Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human {(ICIS} 2009), Seoul, Korea, 24-26 November 2009}, series = {{ACM} International Conference Proceeding Series}, volume = {403}, pages = {539--542}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1655925.1656023}, doi = {10.1145/1655925.1656023}, timestamp = {Sun, 20 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/interaction/SinghLC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ncm/DavaanaymLLLL09, author = {Bayalagmaa Davaanaym and Young{-}Sil Lee and Hoon{-}Jae Lee and Sanggon Lee and Hyotaek Lim}, editor = {Jinhwa Kim and Dursun Delen and Jinsoo Park and Franz Ko and Chen Rui and Jong Hyung Lee and Jian Wang and Gang Kou}, title = {A Ping Pong Based One-Time-Passwords Authentication System}, booktitle = {International Conference on Networked Computing and Advanced Information Management, {NCM} 2009, Fifth International Joint Conference on INC, {IMS} and {IDC:} {INC} 2009: International Conference on Networked Computing, {IMS} 2009: International Conference on Advanced Information Management and Service, {IDC} 2009: International Conference on Digital Content, Multimedia Technology and its Applications, Seoul, Korea, August 25-27, 2009}, pages = {574--579}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/NCM.2009.247}, doi = {10.1109/NCM.2009.247}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ncm/DavaanaymLLLL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ncm/SainLC09, author = {Mangal Sain and Hoon{-}Jae Lee and Wan{-}Young Chung}, editor = {Jinhwa Kim and Dursun Delen and Jinsoo Park and Franz Ko and Chen Rui and Jong Hyung Lee and Jian Wang and Gang Kou}, title = {Personal Healthcare Information System}, booktitle = {International Conference on Networked Computing and Advanced Information Management, {NCM} 2009, Fifth International Joint Conference on INC, {IMS} and {IDC:} {INC} 2009: International Conference on Networked Computing, {IMS} 2009: International Conference on Advanced Information Management and Service, {IDC} 2009: International Conference on Digital Content, Multimedia Technology and its Applications, Seoul, Korea, August 25-27, 2009}, pages = {1540--1545}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/NCM.2009.347}, doi = {10.1109/NCM.2009.347}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ncm/SainLC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ncm/KumarL09, author = {Pardeep Kumar and Hoon{-}Jae Lee}, editor = {Jinhwa Kim and Dursun Delen and Jinsoo Park and Franz Ko and Chen Rui and Jong Hyung Lee and Jian Wang and Gang Kou}, title = {A Secure Data Mechanism for Ubiquitous Sensor Network with Dragon Cipher}, booktitle = {International Conference on Networked Computing and Advanced Information Management, {NCM} 2009, Fifth International Joint Conference on INC, {IMS} and {IDC:} {INC} 2009: International Conference on Networked Computing, {IMS} 2009: International Conference on Advanced Information Management and Service, {IDC} 2009: International Conference on Digital Content, Multimedia Technology and its Applications, Seoul, Korea, August 25-27, 2009}, pages = {1675--1680}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/NCM.2009.348}, doi = {10.1109/NCM.2009.348}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ncm/KumarL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cas/LeeK08, author = {Hoon{-}Jae Lee and Il Seok Ko}, title = {An Intelligent Security Agent for a Reliable Cipher System Using Pingpong}, journal = {Cybern. Syst.}, volume = {39}, number = {7}, pages = {705--718}, year = {2008}, url = {https://doi.org/10.1080/01969720802257949}, doi = {10.1080/01969720802257949}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cas/LeeK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/LimLLL08, author = {Shu Yun Lim and Meng{-}Hui Lim and Sanggon Lee and Hoonjae Lee}, editor = {Massimiliano Rak and Ajith Abraham and Valentina Casola}, title = {Secure Hybrid Group Key Management for Hierarchical Self-Organizing Sensor Network}, booktitle = {Proccedings of the Fourth International Conference on Information Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli, Italy}, pages = {43--49}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IAS.2008.16}, doi = {10.1109/IAS.2008.16}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/LimLLL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsa/LimLL08, author = {Meng{-}Hui Lim and Sanggon Lee and Hoonjae Lee}, editor = {Osvaldo Gervasi and Beniamino Murgante and Antonio Lagan{\`{a}} and David Taniar and Youngsong Mun and Marina L. Gavrilova}, title = {Cryptanalytic Flaws in Oh et al.'s ID-Based Authenticated Key Agreement Protocol}, booktitle = {Computational Science and Its Applications - {ICCSA} 2008, International Conference, Perugia, Italy, June 30 - July 3, 2008, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {5073}, pages = {458--467}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-69848-7\_38}, doi = {10.1007/978-3-540-69848-7\_38}, timestamp = {Tue, 14 May 2019 10:00:43 +0200}, biburl = {https://dblp.org/rec/conf/iccsa/LimLL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kesamsta/KimLM08, author = {HyeongRag Kim and Hoon{-}Jae Lee and Sang{-}Jae Moon}, editor = {Ngoc Thanh Nguyen and GeunSik Jo and Robert J. Howlett and Lakhmi C. Jain}, title = {A Security Enhancement of the {E0} Cipher in Bluetooth System}, booktitle = {Agent and Multi-Agent Systems: Technologies and Applications, Second {KES} International Symposium, {KES-AMSTA} 2008, Incheon, Korea, March 26-28, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4953}, pages = {858--867}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78582-8\_87}, doi = {10.1007/978-3-540-78582-8\_87}, timestamp = {Thu, 16 Mar 2023 20:00:31 +0100}, biburl = {https://dblp.org/rec/conf/kesamsta/KimLM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mue/TheyYLL08, author = {Yu{-}Shu They and Chee{-}Min Yeoh and Hoonjae Lee and Hyotaek Lim}, title = {Design and Implementation of ATA-Based Virtual Storage System for Mobile Device}, booktitle = {2008 International Conference on Multimedia and Ubiquitous Engineering {(MUE} 2008), 24-26 April 2008, Busan, Korea}, pages = {490--495}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/MUE.2008.14}, doi = {10.1109/MUE.2008.14}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mue/TheyYLL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ncm/LimLL08, author = {Meng{-}Hui Lim and Sanggon Lee and Hoon{-}Jae Lee}, editor = {Jinhwa Kim and Dursun Delen and Jinsoo Park and Franz Ko and Yun Ji Na}, title = {An Improved Variant of Wang-Cao's Certificate-Based Authenticated Key Agreement Protocol}, booktitle = {{NCM} 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008 - Volume 2}, pages = {198--201}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/NCM.2008.20}, doi = {10.1109/NCM.2008.20}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ncm/LimLL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/networking/LimYLLL08, author = {Meng{-}Hui Lim and Chee{-}Min Yeoh and Sanggon Lee and Hyotaek Lim and Hoonjae Lee}, editor = {Amitabha Das and Hung Keng Pung and Francis Bu{-}Sung Lee and Lawrence Wai{-}Choong Wong}, title = {A Secure and Efficient Three-Pass Authenticated Key Agreement Protocol Based on Elliptic Curves}, booktitle = {{NETWORKING} 2008, Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet , 7th International {IFIP-TC6} Networking Conference, Singapore, May 5-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4982}, pages = {170--182}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-79549-0\_15}, doi = {10.1007/978-3-540-79549-0\_15}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/networking/LimYLLL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/snpd/PhangYLL08, author = {Seong{-}Yee Phang and Chee{-}Min Yeoh and Hoonjae Lee and Hyotaek Lim}, title = {Multicasting Support for {NEMO} based on {ODMRP}}, booktitle = {Ninth {ACIS} International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, {SNPD} 2008, In conjunction with Second International Workshop on Advanced Internet Technology and Applications, August 6-8, 2008, Phuket, Thailand}, pages = {611--616}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/SNPD.2008.72}, doi = {10.1109/SNPD.2008.72}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/snpd/PhangYLL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsa/LimLPL07, author = {Meng{-}Hui Lim and Sanggon Lee and Youngho Park and Hoonjae Lee}, editor = {Osvaldo Gervasi and Marina L. Gavrilova}, title = {An Enhanced One-Round Pairing-Based Tripartite Authenticated Key Agreement Protocol}, booktitle = {Computational Science and Its Applications - {ICCSA} 2007, International Conference, Kuala Lumpur, Malaysia, August 26-29, 2007. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {4706}, pages = {503--513}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74477-1\_47}, doi = {10.1007/978-3-540-74477-1\_47}, timestamp = {Tue, 14 May 2019 10:00:43 +0200}, biburl = {https://dblp.org/rec/conf/iccsa/LimLPL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsa/LimLPL07a, author = {Meng{-}Hui Lim and Sanggon Lee and Youngho Park and Hoonjae Lee}, editor = {Osvaldo Gervasi and Marina L. Gavrilova}, title = {An Enhanced ID-Based Deniable Authentication Protocol on Pairings}, booktitle = {Computational Science and Its Applications - {ICCSA} 2007, International Conference, Kuala Lumpur, Malaysia, August 26-29, 2007. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {4706}, pages = {1008--1017}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74477-1\_90}, doi = {10.1007/978-3-540-74477-1\_90}, timestamp = {Fri, 09 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccsa/LimLPL07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kesamsta/JoL07, author = {Heung{-}Kuk Jo and Hoon{-}Jae Lee}, editor = {Ngoc Thanh Nguyen and Adam Grzech and Robert J. Howlett and Lakhmi C. Jain}, title = {A Relay-Transmission of the {RFID} Tag {ID} over the Wireless and {TCP/IP} with a Security Agent}, booktitle = {Agent and Multi-Agent Systems: Technologies and Applications, First {KES} International Symposium, {KES-AMSTA} 2007, Wroclaw, Poland, May 31- June 1, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4496}, pages = {918--927}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72830-6\_97}, doi = {10.1007/978-3-540-72830-6\_97}, timestamp = {Thu, 16 Mar 2023 20:00:31 +0100}, biburl = {https://dblp.org/rec/conf/kesamsta/JoL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LimLPL07, author = {Meng{-}Hui Lim and Sanggon Lee and Youngho Park and Hoonjae Lee}, title = {An Enhanced ID-based Deniable Authentication Protocol on Pairings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {113}, year = {2007}, url = {http://eprint.iacr.org/2007/113}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LimLPL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LimLPL07a, author = {Meng{-}Hui Lim and Sanggon Lee and Youngho Park and Hoonjae Lee}, title = {An Enhanced One-round Pairing-based Tripartite Authenticated Key Agreement Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {142}, year = {2007}, url = {http://eprint.iacr.org/2007/142}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LimLPL07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LimPLL07, author = {Shu Yun Lim and Chuan Chin Pu and Hyotaek Lim and Hoon{-}Jae Lee}, title = {Dragon-MAC: Securing Wireless Sensor Networks with Authenticated Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {204}, year = {2007}, url = {http://eprint.iacr.org/2007/204}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LimPLL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LimLL07, author = {Meng{-}Hui Lim and Sanggon Lee and Hoonjae Lee}, title = {Cryptanalysis on Improved Chou et al.'s ID-Based Deniable Authentication Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {383}, year = {2007}, url = {http://eprint.iacr.org/2007/383}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LimLL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LimLL07a, author = {Meng{-}Hui Lim and Sanggon Lee and Hoonjae Lee}, title = {Cryptanalysis on Improved One-round Lin-Li's Tripartite Key Agreement Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {411}, year = {2007}, url = {http://eprint.iacr.org/2007/411}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LimLL07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LimLL07b, author = {Meng{-}Hui Lim and Sanggon Lee and Hoonjae Lee}, title = {Cryptanalytic Flaws in Oh et al.'s ID-Based Authenticated Key Agreement Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {415}, year = {2007}, url = {http://eprint.iacr.org/2007/415}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LimLL07b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcit/JoL06, author = {Heung{-}Kuk Jo and Hoon{-}Jae Lee}, title = {An Implementation of a {RFID} Tag {ID} Relay-Transmission over the Wireless and {TCP/IP}}, journal = {J. Convergence Inf. Technol.}, volume = {1}, number = {1}, pages = {98--104}, year = {2006}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcit/JoL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ParkLHCKM06, author = {JeaHoon Park and Hoon{-}Jae Lee and JaeCheol Ha and YongJe Choi and Howon Kim and Sang{-}Jae Moon}, editor = {Yuping Wang and Yiu{-}ming Cheung and Hai{-}Lin Liu}, title = {A Differential Power Analysis Attack of Block Cipher Based on the Hamming Weight of Internal Operation Unit}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2006, Guangzhou, China, November 3-6, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4456}, pages = {417--426}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-74377-4\_44}, doi = {10.1007/978-3-540-74377-4\_44}, timestamp = {Thu, 02 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ParkLHCKM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsa/AhnL06, author = {ManKi Ahn and Hoon{-}Jae Lee}, editor = {Marina L. Gavrilova and Osvaldo Gervasi and Vipin Kumar and Chih Jeng Kenneth Tan and David Taniar and Antonio Lagan{\`{a}} and Youngsong Mun and Hyunseung Choo}, title = {Experiments and Hardware Countermeasures on Power Analysis Attacks}, booktitle = {Computational Science and Its Applications - {ICCSA} 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {3982}, pages = {48--53}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11751595\_6}, doi = {10.1007/11751595\_6}, timestamp = {Thu, 28 Apr 2022 16:17:38 +0200}, biburl = {https://dblp.org/rec/conf/iccsa/AhnL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsa/Lee06a, author = {Hoon{-}Jae Lee}, editor = {Marina L. Gavrilova and Osvaldo Gervasi and Vipin Kumar and Chih Jeng Kenneth Tan and David Taniar and Antonio Lagan{\`{a}} and Youngsong Mun and Hyunseung Choo}, title = {Highly Reliable Synchronous Stream Cipher System for Link Encryption}, booktitle = {Computational Science and Its Applications - {ICCSA} 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {3982}, pages = {269--278}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11751595\_30}, doi = {10.1007/11751595\_30}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccsa/Lee06a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsa/LeeALM04, author = {Hoon{-}Jae Lee and ManKi Ahn and Seongan Lim and Sang{-}Jae Moon}, editor = {Antonio Lagan{\`{a}} and Marina L. Gavrilova and Vipin Kumar and Youngsong Mun and Chih Jeng Kenneth Tan and Osvaldo Gervasi}, title = {A Study on Smart Card Security Evaluation Criteria for Side Channel Attacks}, booktitle = {Computational Science and Its Applications - {ICCSA} 2004, International Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {3043}, pages = {517--526}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24707-4\_63}, doi = {10.1007/978-3-540-24707-4\_63}, timestamp = {Thu, 28 Apr 2022 16:17:38 +0200}, biburl = {https://dblp.org/rec/conf/iccsa/LeeALM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/ChenHMFSDLM04, author = {Kevin Chen and Matthew Henricksen and William Millan and Joanne Fuller and Leonie Ruth Simpson and Ed Dawson and Hoon{-}Jae Lee and Sang{-}Jae Moon}, editor = {Choonsik Park and Seongtaek Chee}, title = {Dragon: {A} Fast Word Based Stream Cipher}, booktitle = {Information Security and Cryptology - {ICISC} 2004, 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3506}, pages = {33--50}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11496618\_5}, doi = {10.1007/11496618\_5}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icisc/ChenHMFSDLM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsa/AhnHLM03, author = {MahnKi Ahn and JaeCheol Ha and Hoon{-}Jae Lee and Sang{-}Jae Moon}, editor = {Vipin Kumar and Marina L. Gavrilova and Chih Jeng Kenneth Tan and Pierre L'Ecuyer}, title = {A Random M-ary Method Based Countermeasure against Side Channel Attacks}, booktitle = {Computational Science and Its Applications - {ICCSA} 2003, International Conference, Montreal, Canada, May 18-21, 2003, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {2668}, pages = {338--347}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-44843-8\_36}, doi = {10.1007/3-540-44843-8\_36}, timestamp = {Thu, 28 Apr 2022 16:17:38 +0200}, biburl = {https://dblp.org/rec/conf/iccsa/AhnHLM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigpro/LeeM02, author = {Hoon{-}Jae Lee and Sang{-}Jae Moon}, title = {Parallel stream cipher for secure high-speed communications}, journal = {Signal Process.}, volume = {82}, number = {2}, pages = {259--265}, year = {2002}, url = {https://doi.org/10.1016/S0165-1684(01)00180-3}, doi = {10.1016/S0165-1684(01)00180-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigpro/LeeM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ClarkDFGLMMS02, author = {Andrew J. Clark and Ed Dawson and Joanne Fuller and Jovan Dj. Golic and Hoon{-}Jae Lee and William Millan and Sang{-}Jae Moon and Leonie Simpson}, editor = {Lynn Margaret Batten and Jennifer Seberry}, title = {The {LILI-II} Keystream Generator}, booktitle = {Information Security and Privacy, 7th Australian Conference, {ACISP} 2002, Melbourne, Australia, July 3-5, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2384}, pages = {25--39}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45450-0\_3}, doi = {10.1007/3-540-45450-0\_3}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/ClarkDFGLMMS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cdma/KwakHLKM02, author = {Dong Jin Kwak and JaeCheol Ha and Hoon{-}Jae Lee and Hwankoo Kim and Sang{-}Jae Moon}, editor = {Jai{-}Yong Lee and Chul{-}Hee Kang}, title = {A {WTLS} Handshake Protocol with User Anonymity and Forward Secrecy}, booktitle = {Mobile Communications, 7th {CDMA} International Conference, {CIC} 2002, Seoul, Korea, October 29 - November 1, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2524}, pages = {219--230}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36555-9\_23}, doi = {10.1007/3-540-36555-9\_23}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cdma/KwakHLKM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigpro/LeeM00, author = {Hoon{-}Jae Lee and Sang{-}Jae Moon}, title = {On an improved summation generator with 2-bit memory}, journal = {Signal Process.}, volume = {80}, number = {1}, pages = {211--217}, year = {2000}, url = {https://doi.org/10.1016/S0165-1684(99)00123-1}, doi = {10.1016/S0165-1684(99)00123-1}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigpro/LeeM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.