Graduate School of Information Security

  • Korea, Republic of

Research Output

Filter
Article
2019

A Practical Collision-Based Power Analysis on RSA Prime Generation and Its Countermeasure

Lee, S., Cho, S. M., Kim, H. & Hong, S., 2019 Jan 1, In : IEEE Access. 7, p. 47582-47592 11 p., 8681035.

Research output: Contribution to journalArticle

Open Access
1 Citation (Scopus)

CCA security for self-updatable encryption:Protecting cloud data when clients read/write ciphertexts

Lee, K., Lee, D. H., Park, J. H. & Yung, M., 2019 Apr 1, In : Computer Journal. 62, 4, p. 545-562 18 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)
1 Citation (Scopus)

DQN-based OpenCL workload partition for performance optimization

Park, S. & Suh, T., 2019 Jan 1, In : Journal of Supercomputing.

Research output: Contribution to journalArticle

Enhanced android app-repackaging attack on in-vehicle network

Lee, Y., Woo, S., Lee, J., Song, Y., Moon, H., Lee, D. H. & Andersson, K., 2019 Jan 1, In : Wireless Communications and Mobile Computing. 2019, 5650245.

Research output: Contribution to journalArticle

Open Access
2 Citations (Scopus)

Forensic signature for tracking storage devices: Analysis of UEFI firmware image, disk signature and windows artifacts

Jeong, D. & Lee, S., 2019 Jun 1, In : Digital Investigation. 29, p. 21-27 7 p.

Research output: Contribution to journalArticle

Lightweight conversion from arithmetic to Boolean masking for embedded IoT processor

Kim, H. B., Hong, S. & Kim, H. S., 2019 Apr 1, In : Applied Sciences (Switzerland). 9, 7, 1438.

Research output: Contribution to journalArticle

Open Access

New technique for chosen-ciphertext security based on non-interactive zero-knowledge

Seo, M., Abdalla, M., Lee, D. H. & Park, J. H., 2019 Jul 1, In : Information Sciences. 490, p. 18-35 18 p.

Research output: Contribution to journalArticle

T-Box: A Forensics-Enabled Trusted Automotive Data Recording Method

Lee, S., Choi, W., Jo, H. J. & Lee, D. H., 2019 Jan 1, In : IEEE Access. 7, p. 49738-49755 18 p., 8689029.

Research output: Contribution to journalArticle

2 Citations (Scopus)
Open Access
2 Citations (Scopus)

Usability Evaluation Model for Biometric System considering Privacy Concern Based on MCDM Model

Oh, J., Lee, U. & Lee, K. H., 2019 Jan 1, In : Security and Communication Networks. 2019, 8715264.

Research output: Contribution to journalArticle

Open Access
1 Citation (Scopus)
2018

A cyber command and control framework for psychological operation using social media

Kim, K., Seo, J., Park, M., Park, M. & Lee, K. H., 2018 Oct 1, In : Journal of Telecommunication, Electronic and Computer Engineering. 10, 4, p. 101-105 5 p.

Research output: Contribution to journalArticle

A distributed snapshot protocol for efficient artificial intelligence computation in cloud computing environments

Lim, J. B., Gil, J. M. & Yu, H., 2018 Jan 1, In : Symmetry. 10, 1, 30.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Advanced approach to information security management system utilizing maturity models in critical infrastructure

You, Y., Oh, J., Kim, S. & Lee, K. H., 2018 Jan 1, In : KSII Transactions on Internet and Information Systems. 12, 10, p. 4995-5014 20 p.

Research output: Contribution to journalArticle

A Low-Cost Surveillance and Information System for Museum Using Visible Light Communication

Kim, M. & Suh, T., 2018 Jan 1, (Accepted/In press) In : IEEE Sensors Journal.

Research output: Contribution to journalArticle

3 Citations (Scopus)

An analysis of economic impact on IoT industry under GDPR

Seo, J., Kim, K., Park, M., Park, M. & Lee, K. H., 2018 Jan 1, In : Mobile Information Systems. 2018, 6792028.

Research output: Contribution to journalArticle

3 Citations (Scopus)

An intelligent residual resource monitoring scheme in cloud computing environments

Lim, J. B., Yu, H. & Gil, J. M., 2018 Jan 1, In : Journal of Information Processing Systems. 14, 6, p. 1480-1493 14 p.

Research output: Contribution to journalArticle

5 Citations (Scopus)

Anomaly intrusion detection method for vehicular networks based on survival analysis

Han, M. L., Kwak, B. I. & Kim, H. K., 2018 Oct 1, In : Vehicular Communications. 14, p. 52-63 12 p.

Research output: Contribution to journalArticle

8 Citations (Scopus)

Architectural Protection of Application Privacy against Software and Physical Attacks in Untrusted Cloud Environment

Xu, L., Lee, J., Kim, S. H., Zheng, Q., Xu, S., Suh, T., Ro, W. W. & Shi, W., 2018 Apr 1, In : IEEE Transactions on Cloud Computing. 6, 2, p. 478-491 14 p.

Research output: Contribution to journalArticle

Construction of a New Biometric-Based Key Derivation Function and Its Application

Seo, M., Park, J. H., Kim, Y., Cho, S., Lee, D. H. & Hwang, J. Y., 2018 Jan 1, In : Security and Communication Networks. 2018, 6107912.

Research output: Contribution to journalArticle

Contagion of Cheating Behaviors in Online Social Networks

Woo, J., Kang, S. W., Kim, H. K. & Park, J., 2018 May 5, (Accepted/In press) In : IEEE Access.

Research output: Contribution to journalArticle

2 Citations (Scopus)

Correction to: An efficient implementation of pairing-based cryptography on MSP430 processor

Kwon, J., Seo, S. C. & Hong, S., 2018 Mar 13, (Accepted/In press) In : Journal of Supercomputing. 1 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Detecting Potential Insider Threat: Analyzing Insiders' Sentiment Exposed in Social Media

Park, W., You, Y. & Lee, K. H., 2018 Jan 1, In : Security and Communication Networks. 2018, 7243296.

Research output: Contribution to journalArticle

6 Citations (Scopus)

Efficient Isogeny Computations on Twisted Edwards Curves

Kim, S., Yoon, K., Kwon, J., Hong, S. & Park, Y. H., 2018 Jan 1, In : Security and Communication Networks. 2018, 5747642.

Research output: Contribution to journalArticle

5 Citations (Scopus)

Energy-aware key exchange for securing implantable medical devices

Choi, W., Lee, Y., Lee, D., Kim, H., Park, J. H., Kim, I-S. & Lee, D. H., 2018 Jan 1, In : Security and Communication Networks. 2018, 1809302.

Research output: Contribution to journalArticle

Open Access

Evaluation of P2P and cloud computing as platform for exhaustive key search on block ciphers

Yoon, J. W., Hong, T. Y., Choi, J. W., Park, C. Y., Kim, K. B. & Yu, H., 2018 Mar 27, (Accepted/In press) In : Peer-to-Peer Networking and Applications. p. 1-11 11 p.

Research output: Contribution to journalArticle

4 Citations (Scopus)

Feature selection practice for unsupervised learning of credit card fraud detection

Lee, H., Choi, D., Yim, H., Choi, E., Go, W., Lee, T., Kim, I-S. & Lee, K. H., 2018 Jan 1, In : Journal of Theoretical and Applied Information Technology. 96, 2, p. 408-417 10 p.

Research output: Contribution to journalArticle

4 Citations (Scopus)

Further analysis on smart TV forensics

Park, M., Kang, H., Baek, S. & Kim, S-J., 2018 Jan 1, In : Journal of Internet Technology. 19, 4, p. 1055-1061 7 p.

Research output: Contribution to journalArticle

Mitigation technique for performance degradation of virtual machine owing to GPU pass-through in fog computing

Kang, J. & Yu, H., 2018 Jun 1, In : Journal of Communications and Networks. 20, 3, p. 257-265 9 p., 8437206.

Research output: Contribution to journalArticle

4 Citations (Scopus)

Multi-Client Order-Revealing Encryption

Eom, J., Lee, D. H. & Lee, K., 2018 Aug 11, (Accepted/In press) In : IEEE Access.

Research output: Contribution to journalArticle

2 Citations (Scopus)

Reversible Data Hiding with Automatic Brightness Preserving Contrast Enhancement

Kim, S., Lussi, R., Qu, X., Huang, F. & Kim, H. J., 2018 Sep 11, (Accepted/In press) In : IEEE Transactions on Circuits and Systems for Video Technology.

Research output: Contribution to journalArticle

2 Citations (Scopus)

Security Evaluation Framework for Military IoT Devices

Cha, S., Baek, S., Kang, S. & Kim, S-J., 2018 Jan 1, In : Security and Communication Networks. 2018, 6135845.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Security of self-driving car from the point of view of in-vehicle system

Seo, E. & Kim, H. K., 2018 Mar 1, In : Transactions of the Korean Society of Automotive Engineers. 26, 2, p. 240-253 14 p.

Research output: Contribution to journalArticle

Security Paper Design with Frequency-Selective Structure for X-Band Electromagnetic Detection System

Lee, S. H., Kim, M. S., Kim, J. K., Lim, J. I. & Hong, I. P., 2018 Jan 1, In : International Journal of Antennas and Propagation. 2018, 9836937.

Research output: Contribution to journalArticle

Single trace analysis on constant time CDT sampler and its countermeasure

Kim, S. & Hong, S., 2018 Oct 3, In : Applied Sciences (Switzerland). 8, 10, 1809.

Research output: Contribution to journalArticle

4 Citations (Scopus)

Situational awareness framework for threat intelligence measurement of android malware

Park, M., Seo, J., Han, J., Oh, H. & Lee, K. H., 2018 Sep 1, In : Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications. 9, 3, p. 25-38 14 p.

Research output: Contribution to journalArticle

6 Citations (Scopus)

Skewed Histogram Shifting for Reversible Data Hiding using a Pair of Extreme Predictions

Kim, S., Qu, X., Sachnev, V. & Kim, H. J., 2018 Jan 1, (Accepted/In press) In : IEEE Transactions on Circuits and Systems for Video Technology.

Research output: Contribution to journalArticle

12 Citations (Scopus)

Sound-Proximity: 2-Factor Authentication against Relay Attack on Passive Keyless Entry and Start System

Choi, W., Seo, M. & Lee, D. H., 2018 Jan 1, In : Journal of Advanced Transportation. 2018, 1935974.

Research output: Contribution to journalArticle

8 Citations (Scopus)

UnThemida: Commercial obfuscation technique analysis with a fully obfuscated program

Suk, J. H., Lee, J. Y., Jin, H., Kim, I-S. & Lee, D. H., 2018 Jan 1, (Accepted/In press) In : Software - Practice and Experience.

Research output: Contribution to journalArticle

3 Citations (Scopus)

VoltageIDS: Low-Level Communication Characteristics for Automotive Intrusion Detection System

Choi, W., Joo, K., Jo, H. J., Park, M. C. & Lee, D. H., 2018 Mar 3, (Accepted/In press) In : IEEE Transactions on Information Forensics and Security.

Research output: Contribution to journalArticle

39 Citations (Scopus)
2017
2 Citations (Scopus)

Alexa, Can i Trust You?

Chung, H., Iorga, M., Voas, J. & Lee, S., 2017, Computer, 50, 9, p. 100-104 5 p.

Research output: Contribution to specialist publicationArticle

39 Citations (Scopus)

A method and tool to recover data deleted from a MongoDB

Yoon, J. & Lee, S., 2017 Jan 1, (Accepted/In press) In : Digital Investigation.

Research output: Contribution to journalArticle

4 Citations (Scopus)

Analysis and Security Evaluation of Security Threat on Broadcasting Service

Lee, J. H. & Kim, S-J., 2017 Mar 2, (Accepted/In press) In : Wireless Personal Communications. p. 1-21 21 p.

Research output: Contribution to journalArticle

An efficient and energy-aware cloud consolidation algorithm for multimedia big data applications

Lim, J. B., Yu, H. & Gil, J. M., 2017 Sep 1, In : Symmetry. 9, 9, 184.

Research output: Contribution to journalArticle

7 Citations (Scopus)

An efficient implementation of pairing-based cryptography on MSP430 processor

Kwon, J., Seo, S. C. & Hong, S., 2017 Jul 17, (Accepted/In press) In : Journal of Supercomputing. p. 1-24 24 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)

A slave ants based ant colony optimization algorithm for task scheduling in cloud computing environments

Moon, Y. J., Yu, H., Gil, J. M. & Lim, J. B., 2017 Dec 1, In : Human-centric Computing and Information Sciences. 7, 1, 28.

Research output: Contribution to journalArticle

34 Citations (Scopus)