Graduate School of Information Study

  • Korea, Republic of

Research Output

1997

Correlation immune functions with controllable nonlinearity

Chee, S., Lee, S., Kim, K. & Kim, D., 1997 Dec 1, In : ETRI Journal. 19, 4, p. 389-400 12 p.

Research output: Contribution to journalArticle

6 Citations (Scopus)

Design and evaluation of policy-controllable buffer cache

Ahn, C. J., Choi, S. U., Park, M. S. & Choi, J. Y., 1997 Dec 1, p. 764-771. 8 p.

Research output: Contribution to conferencePaper

2 Citations (Scopus)
1999

Negotiated disk admission control in video streaming

Lee, W. & Srivastava, J., 1999 Oct 14, In : Electronics Letters. 35, 21, p. 1810-1812 3 p.

Research output: Contribution to journalArticle

2000

Equivalence checking of two statechart specifications

Park, M. H., Bang, K. S., Choi, J. Y. & Kang, I., 2000 Jan 1, In : Proceedings of the International Workshop on Rapid System Prototyping. p. 46-51 6 p.

Research output: Contribution to journalArticle

8 Citations (Scopus)

GAT(Give-And-Take): A Cooperative cache replacement policy for application-controlled file caching

Kim, G. H., Cho, J. Y., Kang, H. K., Park, M. S. & Choi, J. Y., 2000 Dec 1, Proceedings of the Fifth Joint Conference on Information Sciences, JCIS 2000, Volume 1. Wang, P. P. & Wang, P. P. (eds.). 1 ed. p. 508-511 4 p. (Proceedings of the Joint Conference on Information Sciences; vol. 5, no. 1).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2001

1H NMR-75As NQR cross relaxation study of ferroelastic TlH2AsO4

Lee, C. E., Lee, C. H., Lee, K. W., Lee, E. M., Choi, J. Y. & Kim, J., 2001 May 11, In : Solid State Communications. 118, 6, p. 283-286 4 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Minimizing mean squared deviation of completion times with maximum tardiness constraint

Seo, J. H., Kim, C. B. & Lee, D. H., 2001 Feb 15, In : European Journal of Operational Research. 129, 1, p. 95-104 10 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)

Practical and provable security against differential and linear cryptanalysis for substitution-permutation networks

Kang, J. S., Hong, S., Lee, S., Yi, O., Park, C. & Lim, J., 2001 Dec, In : ETRI Journal. 23, 4, p. 158-167 10 p.

Research output: Contribution to journalArticle

39 Citations (Scopus)

Secure and efficient key management for dynamic multicast groups

Park, C. S. & Lee, D. H., 2001 Oct, Operating Systems Review (ACM). 4 ed. Vol. 35. p. 32-38 7 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

6 Citations (Scopus)
2002

Bottleneck analysis of a gigabit network interface card: Formal verification approach

Jin, H. W., Bang, K. S., Yoo, C., Choi, J. Y. & Cha, H. J., 2002 Jan 1, Model Checking Software - 9th International SPIN Workshop, Proceedings. Springer Verlag, p. 170-186 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2318 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Off-line authentication using watermarks

Yoo, H., Lee, K., Lee, S. & Lim, J., 2002 Jan 1, Information Security and Cryptology - ICISC 2001 - 4th International Conference, Proceedings. Kim, K. (ed.). Springer Verlag, p. 200-213 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2288).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Privacy against piracy: Protecting two-level revocable P-K traitor tracing

Kim, H. J., Lee, D. H. & Yung, M., 2002 Jan 1, Information Security and Privacy - 7th Australasian Conference, ACISP 2002, Proceedings. Batten, L. & Seberry, J. (eds.). Springer Verlag, p. 482-496 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2384).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

Single machine MAD/Tmax problem with a common due date

Cho, S. A., Kim, C. B. & Lee, D. H., 2002 Jul 1, In : Computers and Operations Research. 29, 8, p. 1099-1113 15 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)
2003

A pay word-based micropayment protocol supporting multiple payments

Kim, S. & Lee, W., 2003 Jan 1, Proceedings - 12th International Conference on Computer Communications and Networks, ICCCN 2003. Luijten, R. P., Park, E. K. & DaSilva, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 609-612 4 p. 1284234. (Proceedings - International Conference on Computer Communications and Networks, ICCCN; vol. 2003-January).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

13 Citations (Scopus)

A Pricing and Resource Negotiation Scheme for QoS Provisioning in Pervasive Computing Environments

Lee, W., Kim, E. & Kim, D., 2003 Dec 1, Proceedings of the Seventh IASTED International Conference on Internet and Multimedia Systems and Applications. Hamza, M. H. (ed.). p. 189-194 6 p. (Proceedings of the IASTED International Conference on Internet and Multimedia Systems and Applications; vol. 7).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Differential and linear cryptanalysis for 2-round SPNs

Chun, K., Kim, S., Lee, S., Sung, S. H. & Yoon, S., 2003 Sep 15, In : Information Processing Letters. 87, 5, p. 277-282 6 p.

Research output: Contribution to journalArticle

13 Citations (Scopus)
3 Citations (Scopus)

Impossible differential attack on 30-round SHACAL-2

Hong, S., Kim, J., Kim, G., Sung, J., Lee, C. & Lee, S., 2003 Dec 1, In : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2904, p. 97-106 10 p.

Research output: Contribution to journalArticle

16 Citations (Scopus)
69 Citations (Scopus)
41 Citations (Scopus)
21 Citations (Scopus)

New parallel domain extenders for UOWHF

Lee, W., Chang, D., Lee, S., Sung, S. & Nandi, M., 2003 Dec 1, In : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2894, p. 208-227 20 p.

Research output: Contribution to journalArticle

9 Citations (Scopus)

Optimal extension fields for XTR

Han, D. G., Yoon, K. S., Park, Y. H., Kim, C. H. & Lim, J., 2003 Dec 1, In : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2595, p. 369-384 16 p.

Research output: Contribution to journalArticle

4 Citations (Scopus)

Verification and Testing of the RTOS for Safety-Critical Embedded Systems

Lee, N. Y., Kim, J. H., Sung, A. Y., Choi, B. J., Choi, J. Y. & Lee, J. S., 2003 Dec 29, In : Transactions of the American Nuclear Society. 89, 1 p.

Research output: Contribution to journalConference article

2004

A secure steganographic scheme against statistical analyses

Yu, J. J., Han, J. W., Lee, K. S., Seung Cheol, O., Lee, S. & Park, I. H., 2004 Dec 1, In : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2939, p. 497-507 11 p.

Research output: Contribution to journalArticle

6 Citations (Scopus)
8 Citations (Scopus)
47 Citations (Scopus)
14 Citations (Scopus)
45 Citations (Scopus)
2005

Adaptive binary splitting: A RFID tag collision arbitration protocol for tag identification

Myung, J. & Lee, W., 2005 Dec 1, p. 375-383. 9 p.

Research output: Contribution to conferencePaper

15 Citations (Scopus)

A license management protocol for protecting user privacy and digital contents in Digital Rights Management systems

Park, B. N., Lee, W. & Kim, J. W., 2005 Aug, In : IEICE Transactions on Information and Systems. E88-D, 8, p. 1958-1965 8 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)

A non-redundant and efficient architecture for Karatsuba-Ofman algorithm

Chang, N. S., Kim, C. H., Park, Y. H. & Lim, J., 2005 Dec 1, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). p. 288-299 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3650 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Citations (Scopus)

A secure and efficient communication resume protocol for secure wireless networks

Kim, K., Hong, J. & Lim, J., 2005 Oct 17, In : Lecture Notes in Computer Science. 3543, p. 157-168 12 p.

Research output: Contribution to journalConference article

1 Citation (Scopus)

A video streaming file server framework for digital video broadcasting environments

Kim, E., Lee, W. & Lee, C., 2005 Jan 1, In : IEICE Transactions on Information and Systems. E88-D, 3, p. 654-657 4 p.

Research output: Contribution to journalArticle

A video streaming system for mobile phones: Practice and experience

Cha, H., Lee, J., Nang, J., Park, S. Y., Jeong, J. H., Yoo, C. & Choi, J. Y., 2005 May 1, In : Wireless Networks. 11, 3, p. 265-274 10 p.

Research output: Contribution to journalArticle

6 Citations (Scopus)

Digital evidence collection process in integrity and memory information gathering

Lee, S., Kim, H., Lee, S. & Lim, J., 2005 Dec 1, Proceedings - First International Workshop on Systematic Approaches to Digital Forensic Engineering. p. 236-247 12 p. 1592536. (Proceedings - First International Workshop on Systematic Approaches to Digital Forensic Engineering; vol. 2005).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

15 Citations (Scopus)

Distinct critical fluctuations and molecular motions manifest in a model biomembrane

Lee, K. W., Lee, C. E., Choi, J. Y. & Kim, J., 2005 Jan 1, In : Solid State Communications. 133, 2, p. 83-88 6 p.

Research output: Contribution to journalArticle

6 Citations (Scopus)

Exploiting NIC architectural support for enhancing IP-based protocols on high-performance networks

Jin, H. W., Balaji, P., Yoo, C., Choi, J. Y. & Panda, D. K., 2005 Nov 1, In : Journal of Parallel and Distributed Computing. 65, 11, p. 1348-1365 18 p.

Research output: Contribution to journalArticle

14 Citations (Scopus)

Fast and secure communication resume protocol for wireless networks

Kim, K., Hong, J. & Lim, J., 2005 Oct 31, In : Lecture Notes in Computer Science. 3648, p. 1120-1129 10 p.

Research output: Contribution to journalConference article

Linear attack using multiple linear approximations

Choi, J., Hong, D., Hong, S. & Lee, S., 2005 Jan, In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E88-A, 1, p. 2-8 7 p.

Research output: Contribution to journalArticle

NMR study of distinct phase transitional behaviors in (C nH 2n+1NH 3) 2SnCl 6

Lee, K. W., Lee, C. E., Choi, J. Y. & Kim, J., 2005 Jan 1, In : Journal of the Korean Physical Society. 46, 1, p. 245-249 5 p.

Research output: Contribution to journalArticle

6 Citations (Scopus)

One-way chain based broadcast encryption schemes

Jho, N. S., Hwang, J. Y., Cheon, J. H., Kim, M. H., Lee, D. H. & Yoo, E. S., 2005 Sep 26, In : Lecture Notes in Computer Science. 3494, p. 559-574 16 p.

Research output: Contribution to journalConference article

48 Citations (Scopus)

On the security of encryption modes of MD4, MD5 and HAVAL

Kim, J., Biryukov, A., Preneel, B. & Lee, S., 2005 Dec 1, Information and Communications Security - 7th International Conference, ICICS 2005, Proceedings. p. 147-158 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3783 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

PGV-style block-cipher-based hash families and black-box analysis

Lee, W., Nandi, M., Sarkar, P., Chang, D., Lee, S. & Sakurai, K., 2005 Jan, In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E88-A, 1, p. 39-48 10 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)

Proton-beam irradiation effect in TlH2PO4

Kim, S. H., Lee, K. W., Jang, J. W., Lee, C. E., Choi, J. Y., Lee, K. S. & Kim, J., 2005 Dec 1, In : Physical Review B - Condensed Matter and Materials Physics. 72, 21, 214107.

Research output: Contribution to journalArticle

18 Citations (Scopus)

QoS-aware admission control and dynamic resource provisioning framework in ubiquitous multimedia computing environments

Lee, W., Srivastava, J. & Sabata, B., 2005 Apr 1, In : Journal of Supercomputing. 32, 1, p. 25-50 26 p.

Research output: Contribution to journalArticle

Related-key rectangle attacks on reduced versions of SHACAL-1 and AES-192

Hong, S., Kim, J., Lee, S. & Preneel, B., 2005 Oct 17, In : Lecture Notes in Computer Science. 3557, p. 368-383 16 p.

Research output: Contribution to journalConference article

44 Citations (Scopus)

Security analysis of a 2/3-rate double length compression function in the black-box model

Nandi, M., Lee, W., Sakurai, K. & Lee, S., 2005 Oct 17, In : Lecture Notes in Computer Science. 3557, p. 243-254 12 p.

Research output: Contribution to journalConference article

23 Citations (Scopus)