Graduate School of Information Study

  • Korea, Republic of

Research Output

1H NMR-75As NQR cross relaxation study of ferroelastic TlH2AsO4

Lee, C. E., Lee, C. H., Lee, K. W., Lee, E. M., Choi, J. Y. & Kim, J., 2001 May 11, In : Solid State Communications. 118, 6, p. 283-286 4 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

A 0.6-V delta-sigma modulator with subthreshold-leakage suppression switches

Roh, H., Kim, H., Choi, Y., Roh, J., Kim, Y. G. & Kwon, J. K., 2009 Nov, In : IEEE Transactions on Circuits and Systems II: Express Briefs. 56, 11, p. 825-829 5 p., 5299254.

Research output: Contribution to journalArticle

33 Citations (Scopus)

A3RP: Anonymous and authenticated ad hoc routing protocol

Paik, J. H., Kim, B. H. & Lee, D. H., 2008, Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. p. 67-72 6 p. 4511536. (Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

26 Citations (Scopus)

A Bitwise Design and Implementation for Privacy-Preserving Data Mining: From Atomic Operations to Advanced Algorithms

Song, B. K., Yoo, J. S., Hong, M. & Yoon, J. W., 2019 Jan 1, In : Security and Communication Networks. 2019, 3648671.

Research output: Contribution to journalArticle

Open Access

A Bitwise Logistic Regression Using Binary Approximation and Real Number Division in Homomorphic Encryption Scheme

Yoo, J. S., Hwang, J. H., Song, B. K. & Yoon, J. W., 2019 Jan 1, Information Security Practice and Experience - 15th International Conference, ISPEC 2019, Proceedings. Heng, S-H. & Lopez, J. (eds.). Springer, p. 20-40 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11879 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

A calculus to reduce spatial and temporal complexity for specification and analysis of complex real-time systems

Choi, J., Choi, J. Y., On, J. & Lee, M., 2008, Proceedings - 4th International Conference on Networked Computing and Advanced Information Management, NCM 2008. p. 8-13 6 p. 4623969. (Proceedings - 4th International Conference on Networked Computing and Advanced Information Management, NCM 2008; vol. 1).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

A Cancelable Template for the Low-Quality Fingerprints from Wearable Devices

Lee, S., Jeong, I. R. & Araujo, A., 2019 Jan 1, In : Security and Communication Networks. 2019, 4202671.

Research output: Contribution to journalArticle

Open Access
1 Citation (Scopus)

Acceleration of differential power analysis through the parallel use of GPU and CPU

Lee, S. J., Seo, S. C., Han, D. G., Hong, S. & Lee, S., 2010 Sep, In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E93-A, 9, p. 1688-1692 5 p.

Research output: Contribution to journalArticle

4 Citations (Scopus)

A Combined Single Trace Attack on Global Shuffling Long Integer Multiplication and its Novel Countermeasure

Lee, S., Cho, S. M., Kim, H. & Hong, S., 2020 Jan 1, In : IEEE Access. 8, p. 5244-5255 12 p., 8948409.

Research output: Contribution to journalArticle

Open Access
1 Citation (Scopus)

A Complete Axiomatization of Finite-state ACSR Processes

Brémond-Grégoire, P., Choi, J. Y. & Lee, I., 1997 Nov 1, In : Information and Computation. 138, 2, p. 124-159 36 p.

Research output: Contribution to journalArticle

Open Access
9 Citations (Scopus)

A countermeasure of fake root key installation using one-time hash chain

Younggyo, L., Jeonghee, A., Seungjoo, K. & Dongho, W., 2007, Agent and Multi-Agent Systems: Technologies and Applications - First KES International Symposium, KES-AMSTA 2007, Proceedings. p. 1007-1016 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4496 LNAI).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Acoustic sensor-based multiple object tracking with visual information association

Lee, J., Hong, S., Moon, N. & Oh, S. J., 2010, In : Eurasip Journal on Advances in Signal Processing. 2010, 591340.

Research output: Contribution to journalArticle

6 Citations (Scopus)

Adaptive binary splitting: A RFID tag collision arbitration protocol for tag identification

Myung, J. & Lee, W., 2005, p. 375-383. 9 p.

Research output: Contribution to conferencePaper

15 Citations (Scopus)

Adaptive binary splitting: A RFID tag collision arbitration protocol for tag identification

Myung, J. & Lee, W., 2006 Oct, In : Mobile Networks and Applications. 11, 5, p. 711-722 12 p.

Research output: Contribution to journalArticle

61 Citations (Scopus)

Adaptive binary splitting for efficient RFID tag anti-collision

Myung, J., Lee, W. & Srivastava, J., 2006 Mar, In : IEEE Communications Letters. 10, 3, p. 144-146 3 p.

Research output: Contribution to journalArticle

233 Citations (Scopus)

Adaptive classification by hybrid EKF with truncated filtering: Brain computer interfacing

Yoon, J. W., Roberts, S. J., Dyson, M. & Gan, J. Q., 2008, Intelligent Data Engineering and Automated Learning - IDEAL 2008 - 9th International Conference, Proceedings. p. 370-377 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5326 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

Adaptive classification for Brain Computer Interface systems using Sequential Monte Carlo sampling

Yoon, J. W., Roberts, S. J., Dyson, M. & Gan, J. Q., 2009 Nov, In : Neural Networks. 22, 9, p. 1286-1294 9 p.

Research output: Contribution to journalArticle

23 Citations (Scopus)

Adaptive divisible load scheduling strategies for workstation clusters with unknown network resources

Ghose, D., Kim, H. J. & Kim, T. H., 2005 Oct, In : IEEE Transactions on Parallel and Distributed Systems. 16, 10, p. 897-907 11 p.

Research output: Contribution to journalArticle

39 Citations (Scopus)

Adaptive path planning for randomly deployed wireless sensor networks

Kim, K., Jung, B., Lee, W. & Du, D. Z., 2011 May, In : Journal of Information Science and Engineering. 27, 3, p. 1091-1106 16 p.

Research output: Contribution to journalArticle

16 Citations (Scopus)

Adaptive push-pull protocols for P2P-based video streaming

Jo, D., Helal, S., Kim, E., Lee, W. & Lee, C., 2011 Oct, In : IEICE Transactions on Communications. E94-B, 10, p. 2759-2762 4 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)

Adaptive resource management for DS-CDMA networks subject to energy constraints

Oh, S. J. & Wasserman, K. M., 1998, In : Proceedings - IEEE INFOCOM. 2, p. 556-563 8 p.

Research output: Contribution to journalConference article

3 Citations (Scopus)

Adaptive Splitting Protocols for RFID tag collision arbitration

Myung, J. & Lee, W., 2006, Proceedings of the Seventh ACM International Symposium on Mobile Ad Hoc Networking and Computing, MOBIHOC 2006. Association for Computing Machinery (ACM), p. 202-213 12 p. (Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc); vol. 2006).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

137 Citations (Scopus)

A data flow optimization method for high speed MAC processing in an IEEE 802.16m modem

Kim, K. W., Yi, J. & Oh, S. J., 2011 Apr 25, In : ieice electronics express. 8, 8, p. 530-535 6 p.

Research output: Contribution to journalArticle

A diffie-hellman key exchange protocol without random oracles

Jeong, I. R., Kwon, J. O. & Lee, D. H., 2006, Cryptology and Network Security - 5th International Conference, CANS 2006, Proceedings. p. 37-54 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4301 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

16 Citations (Scopus)

A digital ID purse mechanism using USIM in a mobile environment

Song, D., Lim, S. H., Yi, O. & Lim, J., 2007, Innovations'07: 4th International Conference on Innovations in Information Technology, IIT. IEEE Computer Society, p. 670-674 5 p. 4430424. (Innovations'07: 4th International Conference on Innovations in Information Technology, IIT).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Admission control and QoS negotiations for soft-real time applications

Lee, W. & Sabata, B., 1999, p. 147-152. 6 p.

Research output: Contribution to conferencePaper

19 Citations (Scopus)

Admission control for cellular networks with direct QoS monitoring

Kim, D. H., Zhang, D., Bhushan, N., Pankaj, R. & Oh, S. J., 2013, In : Wireless Networks. 19, 2, p. 131-144 14 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)

A DRBAC model based on context for smart and secure services in intelligent ubiquitous home

Park, J. H., Park, J. S., Lee, S. J. & Koh, B. S., 2006, Ubiquitous Intelligence and Computing - Third International Conference, UIC 2006, Proceedings. Springer Verlag, p. 893-901 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4159 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Advanced evidence collection and analysis of web browser activity

Oh, J., Lee, S. & Lee, S., 2011, p. S62-S70.

Research output: Contribution to conferencePaper

15 Citations (Scopus)

Advanced evidence collection and analysis of web browser activity

Oh, J., Lee, S. & Lee, S., 2011 Aug, In : Digital Investigation. 8, SUPPL., p. S62-S70

Research output: Contribution to journalArticle

40 Citations (Scopus)

Advanced information security management evaluation system

Jo, H., Kim, S. & Won, D., 2011 Jun, In : KSII Transactions on Internet and Information Systems. 5, 6, p. 1192-1213 22 p.

Research output: Contribution to journalArticle

8 Citations (Scopus)

Advanced insider threat detection model to apply periodic work atmosphere

Oh, J., Kim, T. H. & Lee, K. H., 2019 Mar 31, In : KSII Transactions on Internet and Information Systems. 13, 3, p. 1722-1737 16 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)

Advanced key-management architecture for secure SCADA communications

Choi, D., Kim, H., Won, D. & Kim, S., 2009, In : IEEE Transactions on Power Delivery. 24, 3, p. 1154-1163 10 p.

Research output: Contribution to journalArticle

64 Citations (Scopus)

Advanced protocol to prevent man-in-the-middle attack in SCADA system

Oh, S., Chung, H., Lee, S. & Lee, K., 2014, In : International Journal of Security and its Applications. 8, 2, p. 1-8 8 p.

Research output: Contribution to journalArticle

4 Citations (Scopus)

A dynamic path identification mechanism to defend against DDoS attacks

Lee, G. S., Lim, H., Hong, M. & Lee, D. H., 2005, In : Lecture Notes in Computer Science. 3391, p. 806-813 8 p.

Research output: Contribution to journalConference article

3 Citations (Scopus)

A fast and accurate algorithm for computing desired eigenpairs of hermitian matrices

Jeon, C. W., Kim, H. J. & Lee, J. G., 1996, In : IEICE Transactions on Information and Systems. E79-D, 3, p. 182-187 6 p.

Research output: Contribution to journalArticle

4 Citations (Scopus)

A fast and provably secure higher-order masking of AES S-box

Kim, H. S., Hong, S. & Lim, J., 2011, Cryptographic Hardware and Embedded Systems - 13th International Workshop, CHES 2011, Proceedings. p. 95-107 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6917 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

58 Citations (Scopus)

A fast implementation of arithmetic coding

Kim, H. J., 2010, Advances in Web Technologies and Applications - Proceedings of the 12th Asia-Pacific Web Conference, APWeb 2010. p. 419-423 5 p. 5474097. (Advances in Web Technologies and Applications - Proceedings of the 12th Asia-Pacific Web Conference, APWeb 2010).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

A fast inversion algorithm and low-complexity architecture over GF(2 m)

Kim, S., Chang, N. S., Kim, C. H., Park, Y. H. & Lim, J., 2005, Computational Intelligence and Security - International Conference, CIS 2005, Proceedings. Springer Verlag, p. 1-8 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3802 LNAI).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

A field guide to hidden accounting information detection

Kim, Y., Bang, J., Lee, G. T., Lee, S. J. & Lim, J., 2007, Proceedings of Future Generation Communication and Networking, FGCN 2007. Institute of Electrical and Electronics Engineers Inc., p. 146-150 5 p. 4426220. (Proceedings of Future Generation Communication and Networking, FGCN 2007; vol. 2).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

A fingerprint-based user authentication scheme using smart cards in IPTV environments

Jun, E. A., Rhee, H. S., Jung, S. W. & Lee, D. H., 2010, 2010 International Conference on Information Science and Applications, ICISA 2010. 5480301. (2010 International Conference on Information Science and Applications, ICISA 2010).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

A floorprint-based defect tolerance for nano-scale application-specific IC

Ahn, S., Patitz, Z., Park, N. J., Kim, H. J. & Park, N., 2009, In : IEEE Transactions on Instrumentation and Measurement. 58, 5, p. 1283-1290 8 p.

Research output: Contribution to journalArticle

5 Citations (Scopus)

A forward-secure e-mail protocol without certificated public keys

Kwon, J. O., Jeong, I. R. & Lee, D. H., 2009 Dec 15, In : Information Sciences. 179, 24, p. 4227-4231 5 p.

Research output: Contribution to journalArticle

5 Citations (Scopus)

A framework for anomaly pattern recognition in electronic financial transaction using moving average method

Kim, A. C., Park, W. H. & Lee, D. H., 2013, IT Convergence and Security 2012. p. 93-99 7 p. (Lecture Notes in Electrical Engineering; vol. 215 LNEE).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

A framework for embedded real-time system design

Choi, J. Y., Kwak, H. H. & Lee, I., 2000, Parallel and Distributed Processing - 15 IPDPS 2000 Workshops, Proceedings. Rolim, J. (ed.). Springer Verlag, p. 738-742 5 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1800 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

A fully complex-valued radial basis function classifier for real-valued classification problems

Savitha, R., Suresh, S., Sundararajan, N. & Kim, H. J., 2012 Feb 15, In : Neurocomputing. 78, 1, p. 104-110 7 p.

Research output: Contribution to journalArticle

51 Citations (Scopus)

A generalization of PGV-hash functions and security analysis in black-box model

Lee, W., Nandi, M., Sarkar, P., Chang, D., Lee, S. & Sakurai, K., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Wang, H., Pieprzyk, J. & Varadharajan, V. (eds.). Springer Verlag, p. 212-223 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3108).

Research output: Chapter in Book/Report/Conference proceedingChapter

2 Citations (Scopus)

A generic partial encryption scheme for low-power mobile devices

Jeong, E. S., Kim, B. H. & Lee, D. H., 2014 Oct, In : Multimedia Tools and Applications. 72, 3, p. 2087-2106 20 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)

Aggregating CL-signatures revisited: Extended functionality and better efficiency

Lee, K., Lee, D. H. & Yung, M., 2013, Financial Cryptography and Data Security - 17th International Conference, FC 2013, Revised Selected Papers. p. 171-188 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7859 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Citations (Scopus)