Graduate School of Information Study

  • Korea, Republic of

Research Output

2013

A study of the security of Internet banking and financial private information in South Korea

Lee, J. H., Lim, W. G. & Lim, J. I., 2013 Jul 1, In : Mathematical and Computer Modelling. 58, 1-2, p. 117-131 15 p.

Research output: Contribution to journalArticle

7 Citations (Scopus)

A study of user data integrity during acquisition of android devices

Son, N., Lee, Y., Kim, D., James, J. I., Lee, S. & Lee, K. H., 2013 Jan 1, p. S3-S11.

Research output: Contribution to conferencePaper

Open Access
4 Citations (Scopus)

A study on the live forensic techniques for anomaly detection in user terminals

Kim, A. C., Park, W. H. & Lee, D. H., 2013 May 10, In : International Journal of Security and its Applications. 7, 1, p. 181-188 8 p.

Research output: Contribution to journalArticle

8 Citations (Scopus)

CDS-based virtual backbone construction with guaranteed routing cost in wireless sensor networks

Du, H., Wu, W., Ye, Q., Li, D., Lee, W. & Xu, X., 2013 Mar 19, In : IEEE Transactions on Parallel and Distributed Systems. 24, 4, p. 652-661 10 p., 6216366.

Research output: Contribution to journalArticle

57 Citations (Scopus)

Collision attacks on AES-192/256, Crypton-192/256, mCrypton-96/128, and anubis

Kang, J., Jeong, K., Sung, J., Hong, S. & Lee, K., 2013 Dec 16, In : Journal of Applied Mathematics. 2013, 713673.

Research output: Contribution to journalArticle

7 Citations (Scopus)

Damaged backup data recovery method for Windows mobile

Bang, J., Lee, C., Lee, S. & Lee, K., 2013 Apr 22, In : Journal of Supercomputing. 66, 2, p. 875-887 13 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Enhancing revenue from information goods through the free-to-play business model using price discrimination

Yoo, C. & Kim, H. K., 2013 Jan 1, In : Information (Japan). 16, 8 B, p. 5901-5909 9 p.

Research output: Contribution to journalArticle

Extended elliptic curve Montgomery ladder algorithm over binary fields with resistance to simple power analysis

Cho, S. M., Seo, S. C., Kim, T. H., Park, Y. H. & Hong, S., 2013 Oct 1, In : Information Sciences. 245, p. 304-312 9 p.

Research output: Contribution to journalArticle

4 Citations (Scopus)

Formal modeling and verification of SDN-OpenFlow

Kang, M., Kang, E. Y., Hwang, D. Y., Kim, B. J., Nam, K. H., Shin, M. K. & Choi, J. Y., 2013 Sep 9, p. 481-482. 2 p.

Research output: Contribution to conferencePaper

14 Citations (Scopus)

Hybrid key management architecture for robust SCADA systems

Choi, D., Jeong, H., Won, D. & Kim, S., 2013 Mar 1, In : Journal of Information Science and Engineering. 29, 2, p. 281-298 18 p.

Research output: Contribution to journalArticle

13 Citations (Scopus)

On bounding node-to-sink latency in wireless sensor networks with multiple sinks

Kim, D., Wang, W., Wu, W., Li, D., Ma, C., Sohaee, N., Lee, W., Wang, Y. & Du, D. Z., 2013 Apr 5, In : International Journal of Sensor Networks. 13, 1, p. 13-29 17 p.

Research output: Contribution to journalArticle

6 Citations (Scopus)

PND: A p-persistent neighbor discovery protocol in wireless networks

Kim, K., Roh, H., Lee, W., Lee, S. & Du, D. Z., 2013 May 1, In : Wireless Communications and Mobile Computing. 13, 7, p. 650-662 13 p.

Research output: Contribution to journalArticle

5 Citations (Scopus)

Resource pricing game in geo-distributed clouds

Roh, H., Jung, C., Lee, W. & Du, D. Z., 2013 Sep 2, 2013 Proceedings IEEE INFOCOM 2013. p. 1519-1527 9 p. 6566947. (Proceedings - IEEE INFOCOM).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

30 Citations (Scopus)

Security analysis of HMAC/NMAC by using fault injection

Jeong, K., Lee, Y., Sung, J. & Hong, S., 2013 Oct 28, In : Journal of Applied Mathematics. 2013, 101907.

Research output: Contribution to journalArticle

3 Citations (Scopus)

Security scheme for high capacity USIM-based services

Jeong, E. S., Kim, B. H. & Lee, D. H., 2013 Sep 5, In : International Journal of Security and its Applications. 7, 4, p. 433-444 12 p.

Research output: Contribution to journalArticle

Self-updatable encryption: Time constrained access control with hidden attributes and better efficiency

Lee, K., Choi, S. G., Lee, D. H., Park, J. H. & Yung, M., 2013 Dec 1, Advances in Cryptology, ASIACRYPT 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. PART 1 ed. p. 235-254 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8269 LNCS, no. PART 1).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

30 Citations (Scopus)

The contagion of malicious behaviors in online games

Woo, J., Kang, A. R. & Kim, H. K., 2013 Dec 1, Proceedings of the SIGCOMM 2013 and Best Papers of the Co-Located Workshops. 4 ed. p. 543-544 2 p. (Computer Communication Review; vol. 43, no. 4).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)
2012

A method of detecting abnormal malicious remote control codes using network domain information

Oh, H. G., Seo, J. T., Lim, J. I. & Moon, J. S., 2012 May 1, In : Information. 15, 5, p. 2181-2192 12 p.

Research output: Contribution to journalArticle

Analysis of context dependence in social interaction networks of a massively multiplayer online role-playing game

Son, S., Kang, A. R., Kim, H. C., Kwon, T., Park, J. & Kim, H. K., 2012 Apr 4, In : PloS one. 7, 4, e33918.

Research output: Contribution to journalArticle

25 Citations (Scopus)

An efficient method of extracting strings from unfixed-form data

Jeon, S., Park, J., Lee, K. G. & Lee, S., 2012 Oct 9, Future Information Technology, Application, and Service, FutureTech 2012. VOL. 1 ed. p. 425-434 10 p. (Lecture Notes in Electrical Engineering; vol. 164 LNEE, no. VOL. 1).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

18 Citations (Scopus)

A projection based learning meta-cognitive RBF network classifier for effective diagnosis of Parkinson's disease

Sateesh Babu, G., Suresh, S., Uma Sangumathi, K. & Kim, H. J., 2012 Aug 23, Advances in Neural Networks, ISNN 2012 - 9th International Symposium on Neural Networks, Proceedings. PART 2 ed. p. 611-620 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7368 LNCS, no. PART 2).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Citations (Scopus)

A research on the investigation method of digital forensics for a VMware Workstation's virtual machine

Lim, S., Yoo, B., Park, J., Byun, K. D. & Lee, S., 2012 Jan 1, In : Mathematical and Computer Modelling. 55, 1-2, p. 151-160 10 p.

Research output: Contribution to journalArticle

6 Citations (Scopus)

BAT: Bimodal cryptographic algorithm suitable for various environments

Lee, J., Jeong, K., Kang, J., Lee, Y., Sung, J., Chang, K. Y. & Hong, S., 2012 Nov 12, Computer Science and Its Applications, CSA 2012. p. 371-387 17 p. (Lecture Notes in Electrical Engineering; vol. 203 LNEE).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Coexistence analysis between IMT system and DTV system in the 700MHz band

Kim, D. H., Oh, S. J. & Woo, J., 2012 Dec 1, 2012 International Conference on ICT Convergence: "Global Open Innovation Summit for Smart ICT Convergence", ICTC 2012. p. 284-288 5 p. 6386840. (International Conference on ICT Convergence).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

10 Citations (Scopus)

Comparative study of push schemes in online social networking services

Ko, H., Pack, S. & Lee, W., 2012 Sep 24, ICUFN 2012 - 4th International Conference on Ubiquitous and Future Networks, Final Program. p. 225-226 2 p. 6261698. (ICUFN 2012 - 4th International Conference on Ubiquitous and Future Networks, Final Program).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Differential fault analysis on HAS-160 compression function

Kang, J., Jeong, K., Sung, J. & Hong, S., 2012 Nov 12, Computer Science and Its Applications, CSA 2012. p. 97-105 9 p. (Lecture Notes in Electrical Engineering; vol. 203 LNEE).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Exploiting whole-network mobility for mobile service discovery

Lee, C., Helal, S., Kim, E. & Lee, W., 2012 Nov 1, In : Information. 15, 11 B, p. 5197-5216 20 p.

Research output: Contribution to journalArticle

Forensic analysis techniques for fragmented flash memory pages in smartphones

Park, J., Chung, H. & Lee, S., 2012 Nov, In : Digital Investigation. 9, 2, p. 109-118 10 p.

Research output: Contribution to journalArticle

11 Citations (Scopus)

Formal specifications for software-defined networking

Kang, M., Park, J., Shin, J., Nam, K. H., Shin, M. K. & Choi, J. Y., 2012 Oct 26, Proceedings of the 7th International Conference on Future Internet Technologies, CFI'12. 1 p. (Proceedings of the 7th International Conference on Future Internet Technologies, CFI'12).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Identity-based ring signature schemes for multiple domains

Ki, J., Hwang, J. Y. & Lee, D. H., 2012 Dec 3, In : KSII Transactions on Internet and Information Systems. 6, 10, p. 2692-2707 16 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Known-key attacks on generalized Feistel schemes with SP round function

Kang, H., Hong, D., Moon, D., Kwon, D., Sung, J. & Hong, S., 2012 Sep, In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E95-A, 9, p. 1550-1560 11 p.

Research output: Contribution to journalArticle

8 Citations (Scopus)
4 Citations (Scopus)

On the security of an novel protocol for downloadable CAS

Jeong, H., Kim, S. & Won, D., 2012 May 8, Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, ICUIMC'12. 65. (Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, ICUIMC'12).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Polynomial time approximation scheme for t-latency bounded information propagation problem in wireless networks

Zhang, W., Zhang, Z., Wang, W., Zou, F. & Lee, W., 2012 May 1, In : Journal of Combinatorial Optimization. 23, 4, p. 451-461 11 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)

Preace

Shi, Y. Q., Kim, H. J. & Katzenbeisser, S., 2012 Dec 1, In : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7110

Research output: Contribution to journalArticle

Scheduling nonlinear divisible loads in a single level tree network

Suresh, S., Kim, H. J., Run, C. & Robertazzi, T. G., 2012 Sep 1, In : Journal of Supercomputing. 61, 3, p. 1068-1088 21 p.

Research output: Contribution to journalArticle

12 Citations (Scopus)

The Chain effect for the reputation-based trust model in peer-to-peer computing

Lee, S. & Lee, W., 2012 Jan, In : IEICE Transactions on Information and Systems. E-95-D, 1, p. 177-180 4 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

The effective method of database server forensics on the enterprise environment

Son, N., Lee, K., Jeon, S., Lee, S. & Lee, C., 2012 Oct, In : Security and Communication Networks. 5, 10, p. 1086-1093 8 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Threshold identity-based broadcast encryption from identity-based encryption

Kim, K., Kim, M., Kim, H., Park, J. H. & Lee, D. H., 2012 Dec 17, Computer Applications for Database, Education, and Ubiquitous Computing - Int. Conferences, EL, DTA and UNESST 2012, Held as Part of the Future Generation Information Technol. Conf., FGIT 2012, Proc.. p. 99-102 4 p. (Communications in Computer and Information Science; vol. 352 CCIS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Weakness and simple improvement of anonymous mutual authentication protocol with link-layer

Jo, H., Kim, S. & Won, D., 2012 Nov 19, Proceedings of the CUBE International Information Technology Conference, CUBE 2012. p. 816-819 4 p. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2011

A data flow optimization method for high speed MAC processing in an IEEE 802.16m modem

Kim, K. W., Yi, J. & Oh, S. J., 2011 Apr 25, In : ieice electronics express. 8, 8, p. 530-535 6 p.

Research output: Contribution to journalArticle

An efficient CRT-RSA algorithm secure against power and fault attacks

Kim, S. K., Kim, T. H., Han, D. G. & Hong, S., 2011 Oct, In : Journal of Systems and Software. 84, 10, p. 1660-1669 10 p.

Research output: Contribution to journalArticle

9 Citations (Scopus)

An efficient DPA countermeasure for the EtaT pairing algorithm over GF(2n) based on random value addition

Seo, S. C., Han, D. G. & Hong, S., 2011 Oct 1, In : ETRI Journal. 33, 5, p. 780-790 11 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)

An efficient implementation of block cipher in Android platform

Paik, J. H., Seo, S. C., Kim, Y., Lee, H. J., Jung, H. C. & Lee, D. H., 2011 Sep 14, Proceedings of the 2011 5th FTRA International Conference on Multimedia and Ubiquitous Engineering, MUE 2011. p. 173-176 4 p. 5992211. (Proceedings of the 2011 5th FTRA International Conference on Multimedia and Ubiquitous Engineering, MUE 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Blocking effect and halftoning impulse suppression in an ED/OD BTC image with optimized texture-dependent filter sets

Guo, J. M., Su, C. C. & Kim, H. J., 2011 Aug 24, Proceedings 2011 International Conference on System Science and Engineering, ICSSE 2011. p. 593-596 4 p. 5961972. (Proceedings 2011 International Conference on System Science and Engineering, ICSSE 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

Constant approximation for virtual backbone construction with Guaranteed Routing Cost in wireless sensor networks

Du, H., Ye, Q., Wu, W., Lee, W., Li, D., Du, D. & Howard, S., 2011 Aug 2, 2011 Proceedings IEEE INFOCOM. p. 1737-1744 8 p. 5934967. (Proceedings - IEEE INFOCOM).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

40 Citations (Scopus)

Extended fingerprint-based user authentication scheme using smart cards in education IPTV

Jun, E. A., Kim, J. G., Jung, S. W. & Lee, D. H., 2011 Jul 18, 2011 International Conference on Information Science and Applications, ICISA 2011. 5772392. (2011 International Conference on Information Science and Applications, ICISA 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Fast learning fully complex-valued classifiers for real-valued classification problems

Savitha, R., Suresh, S., Sundararajan, N. & Kim, H. J., 2011 Jun 6, Advances in Neural Networks - 8th International Symposium on Neural Networks, ISNN 2011. PART 1 ed. p. 602-609 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6675 LNCS, no. PART 1).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

27 Citations (Scopus)

First-order side channel attacks on Zhang's countermeasures

Kim, H., Han, D. G. & Hong, S., 2011 Sep 15, In : Information Sciences. 181, 18, p. 4051-4060 10 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)