Graduate School of Information Study

  • Korea, Republic of

Research Output

2013

A quantum communication protocol transferring unknown photons using path-polarization hybrid entanglement

Heo, J., Hong, C. H., Lim, J. I. & Yang, H. J., 2013 Apr, In : Chinese Physics Letters. 30, 4, 040301.

Research output: Contribution to journalArticle

8 Citations (Scopus)

A stackelberg game for cooperative cognitive radio network with active SUs

Roh, H., Jung, C., Lee, W. & Du, D. Z., 2013, 2013 International Conference on Computing, Networking and Communications, ICNC 2013. p. 911-915 5 p. 6504211. (2013 International Conference on Computing, Networking and Communications, ICNC 2013).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

A study of the security of Internet banking and financial private information in South Korea

Lee, J. H., Lim, W. G. & Lim, J. I., 2013 Jul, In : Mathematical and Computer Modelling. 58, 1-2, p. 117-131 15 p.

Research output: Contribution to journalArticle

8 Citations (Scopus)

A study of user data integrity during acquisition of Android devices

Son, N., Lee, Y., Kim, D., James, J. I., Lee, S. & Lee, K. H., 2013 Aug 1, p. S3-S11.

Research output: Contribution to conferencePaper

Open Access
28 Citations (Scopus)

A study on the live forensic techniques for anomaly detection in user terminals

Kim, A. C., Park, W. H. & Lee, D. H., 2013, In : International Journal of Security and its Applications. 7, 1, p. 181-188 8 p.

Research output: Contribution to journalArticle

8 Citations (Scopus)

A study on weakness and improvement of Cloud Shredder

Park, M., Kang, S. & Kim, S., 2013, 2013 International Conference on ICT Convergence: "Future Creative Convergence Technologies for New ICT Ecosystems", ICTC 2013. IEEE Computer Society, p. 1107-1113 7 p. 6675569. (International Conference on ICT Convergence).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Attribute-based encryption for commercial content distribution

Kim, H., Park, S., Park, J. H. & Lee, D. H., 2013, IT Convergence and Security 2012. p. 205-213 9 p. (Lecture Notes in Electrical Engineering; vol. 215 LNEE).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Beamforming in a multi-user cognitive radio system with partial channel state information

Noh, J. H. & Oh, S. J., 2013, In : IEEE Transactions on Wireless Communications. 12, 2, p. 616-625 10 p., 6409507.

Research output: Contribution to journalArticle

28 Citations (Scopus)

Cannot take my allocation: Enforcing fairness by considering demand and payment in clouds

Kim, G. & Lee, W., 2013, 2013 4th International Conference on the Network of the Future, NoF 2013. IEEE Computer Society, 6724514. (2013 4th International Conference on the Network of the Future, NoF 2013).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

CDS-based virtual backbone construction with guaranteed routing cost in wireless sensor networks

Du, H., Wu, W., Ye, Q., Li, D., Lee, W. & Xu, X., 2013, In : IEEE Transactions on Parallel and Distributed Systems. 24, 4, p. 652-661 10 p., 6216366.

Research output: Contribution to journalArticle

59 Citations (Scopus)

Classification and experimental analysis for clone detection approaches in wireless sensor networks

Cho, K., Jo, M., Kwon, T., Chen, H. H. & Lee, D. H., 2013, In : IEEE Systems Journal. 7, 1, p. 26-35 10 p., 6175923.

Research output: Contribution to journalArticle

22 Citations (Scopus)

Cloud-based malware Analysis System for mobile applications

Kim, S., Ko, S. W. & Lee, D. H., 2013 Jun, In : Information (Japan). 16, 6 B, p. 4357-4364 8 p.

Research output: Contribution to journalArticle

Collision attacks on AES-192/256, Crypton-192/256, mCrypton-96/128, and anubis

Kang, J., Jeong, K., Sung, J., Hong, S. & Lee, K., 2013, In : Journal of Applied Mathematics. 2013, 713673.

Research output: Contribution to journalArticle

7 Citations (Scopus)

Compressing JPEG compressed image using reversible data hiding technique

Kang, S. U., Qu, X. & Kim, H. J., 2013, 2013 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, APSIPA 2013. 6694324. (2013 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, APSIPA 2013).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Damaged backup data recovery method for Windows mobile

Bang, J., Lee, C., Lee, S. & Lee, K., 2013, In : Journal of Supercomputing. 66, 2, p. 875-887 13 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Deriving system behavior from UML state machine diagram: Applied to Missile project

Min, H. S., Chung, S. M. & Choi, J. Y., 2013, In : Journal of Universal Computer Science. 19, 1, p. 53-77 25 p.

Research output: Contribution to journalArticle

5 Citations (Scopus)

Design and analysis of cooperative wireless data access algorithms in multi-radio wireless networks

Lee, K., Jang, I., Pack, S. & Lee, W., 2013 Jan, In : Wireless Networks. 19, 1, p. 17-29 13 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)

Do we need wide flits in Networks-on-Chip?

Lee, J., Nicopoulos, C., Park, S. J., Swaminathan, M. & Kim, J., 2013, Proceedings - 2013 IEEE Computer Society Annual Symposium on VLSI, ISVLSI 2013. IEEE Computer Society, p. 2-7 6 p. 6654614. (Proceedings of IEEE Computer Society Annual Symposium on VLSI, ISVLSI).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

31 Citations (Scopus)

ECM: Effective Capacity Maximizer for high-performance compressed caching

Baek, S., Lee, H. G., Nicopoulos, C., Lee, J. & Kim, J., 2013, 19th IEEE International Symposium on High Performance Computer Architecture, HPCA 2013. p. 131-142 12 p. 6522313. (Proceedings - International Symposium on High-Performance Computer Architecture).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

22 Citations (Scopus)

Energy-efficient replica detection for resource-limited mobile devices in the internet of things

Cho, K., Lee, B. G., Lee, K. & Lee, D. H., 2013, In : IET Communications. 7, 18, p. 2141-2150 10 p.

Research output: Contribution to journalArticle

5 Citations (Scopus)

Enhancing revenue from information goods through the free-to-play business model using price discrimination

Yoo, C. & Kim, H. K., 2013, In : Information (Japan). 16, 8 B, p. 5901-5909 9 p.

Research output: Contribution to journalArticle

Extended elliptic curve Montgomery ladder algorithm over binary fields with resistance to simple power analysis

Cho, S. M., Seo, S. C., Kim, T. H., Park, Y. H. & Hong, S., 2013 Oct 1, In : Information Sciences. 245, p. 304-312 9 p.

Research output: Contribution to journalArticle

4 Citations (Scopus)

Fault attacks on cipher block chaining-message authentication code and its variants based on aes-128 suitable for wireless sensor networks

Jeong, K., Sung, J., Hong, S. & Chang, K. Y., 2013 Sep, In : Sensor Letters. 11, 9, p. 1755-1764 10 p.

Research output: Contribution to journalArticle

Fiat-shamir identification scheme immune to the hardware fault attacks

Kim, S. K., Kim, T. H. & Hong, S., 2013 Mar, In : Transactions on Embedded Computing Systems. 12, SUPPL1, 65.

Research output: Contribution to journalArticle

3 Citations (Scopus)

Formal modeling and verification of SDN-OpenFlow

Kang, M., Kang, E. Y., Hwang, D. Y., Kim, B. J., Nam, K. H., Shin, M. K. & Choi, J. Y., 2013, p. 481-482. 2 p.

Research output: Contribution to conferencePaper

14 Citations (Scopus)

Fully secure hidden vector encryption under standard assumptions

Park, J. H., Lee, K., Susilo, W. & Lee, D. H., 2013, In : Information Sciences. 232, p. 188-207 20 p.

Research output: Contribution to journalArticle

11 Citations (Scopus)

Hardware-assisted intrusion detection by preserving reference information integrity

Lee, J., Nicopoulos, C., Oh, G. H., Lee, S. W. & Kim, J., 2013, Algorithms and Architectures for Parallel Processing - 13th International Conference, ICA3PP 2013, Proceedings. PART 1 ed. p. 291-300 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8285 LNCS, no. PART 1).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Hybrid key management architecture for robust SCADA systems

Choi, D., Jeong, H., Won, D. & Kim, S., 2013 Mar, In : Journal of Information Science and Engineering. 29, 2, p. 281-298 18 p.

Research output: Contribution to journalArticle

13 Citations (Scopus)

Identity-based proxy signature from lattices

Kim, K. S., Hong, D. & Jeong, I. R., 2013 Feb, In : Journal of Communications and Networks. 15, 1, p. 1-7 7 p.

Research output: Contribution to journalArticle

23 Citations (Scopus)
10 Citations (Scopus)

Improved differential fault analysis on PRESENT-80/128

Jeong, K., Lee, Y., Sung, J. & Hong, S., 2013, In : International Journal of Computer Mathematics. 90, 12, p. 2553-2563 11 p.

Research output: Contribution to journalArticle

7 Citations (Scopus)

IsoNet: Hardware-based job queue management for many-core architectures

Lee, J., Nicopoulos, C., Lee, H. G., Panth, S., Lim, S. K. & Kim, J., 2013, In : IEEE Transactions on Very Large Scale Integration (VLSI) Systems. 21, 6, p. 1080-1093 14 p., 6243223.

Research output: Contribution to journalArticle

11 Citations (Scopus)

Major issues of the national cyber security system in South Korea, and its future direction

Kim, Y. D., Kim, J. S. & Lee, K. H., 2013, In : Korean Journal of Defense Analysis. 25, 4, p. 435-455 21 p.

Research output: Contribution to journalArticle

Mobility-aware call admission control algorithm with handoff queue in mobile hotspots

Kim, Y., Ko, H., Pack, S., Lee, W. & Shen, X., 2013, In : IEEE Transactions on Vehicular Technology. 62, 8, p. 3903-3912 10 p., 6457513.

Research output: Contribution to journalArticle

24 Citations (Scopus)

On bounding node-to-sink latency in wireless sensor networks with multiple sinks

Kim, D., Wang, W., Wu, W., Li, D., Ma, C., Sohaee, N., Lee, W., Wang, Y. & Du, D. Z., 2013, In : International Journal of Sensor Networks. 13, 1, p. 13-29 17 p.

Research output: Contribution to journalArticle

6 Citations (Scopus)

Online game bot detection based on party-play log analysis

Kang, A. R., Woo, J., Park, J. & Kim, H. K., 2013 May, In : Computers and Mathematics with Applications. 65, 9, p. 1384-1395 12 p.

Research output: Contribution to journalArticle

45 Citations (Scopus)

On-site investigation methodology for incident response in Windows environments

Lee, K., Lee, C. & Lee, S., 2013 May, In : Computers and Mathematics with Applications. 65, 9, p. 1413-1420 8 p.

Research output: Contribution to journalArticle

On the union of intermediate nodes of shortest paths

Li, X., Hu, X. & Lee, W., 2013 Jul, In : Journal of Combinatorial Optimization. 26, 1, p. 82-85 4 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Optimal lossless data hiding using selective block manipulation based on local characteristics

Qu, X., Kim, H. J. & Choi, Y. S., 2013 Apr, In : Information (Japan). 16, 4, p. 2739-2758 20 p.

Research output: Contribution to journalArticle

PND: A p-persistent neighbor discovery protocol in wireless networks

Kim, K., Roh, H., Lee, W., Lee, S. & Du, D. Z., 2013 May, In : Wireless Communications and Mobile Computing. 13, 7, p. 650-662 13 p.

Research output: Contribution to journalArticle

6 Citations (Scopus)

Predictability of Android OpenSSL's pseudo random number generator

Kim, S. H., Han, D. & Lee, D. H., 2013, CCS 2013 - Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security. p. 659-668 10 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

34 Citations (Scopus)

Preemptible I/O scheduling of garbage collection for solid state drives

Lee, J., Kim, Y., Shipman, G. M., Oral, S. & Kim, J., 2013, In : IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems. 32, 2, p. 247-260 14 p., 6416101.

Research output: Contribution to journalArticle

34 Citations (Scopus)

Price-based tethering for cooperative networking

Lee, J., Shao, C., Roh, H. & Lee, W., 2013, International Conference on Information Networking 2013, ICOIN 2013. p. 379-384 6 p. 6496408. (International Conference on Information Networking).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

Privacy-enhanced social network service SNS

Jeong, H., Lee, C., Kwak, J., Kwon, C., Kim, S. & Won, D., 2013 Sep, In : Information (Japan). 16, 9 B, p. 6905-6919 15 p.

Research output: Contribution to journalArticle

Privacy-preserving disjunctive normal form operations on distributed sets

Chun, J. Y., Hong, D., Jeong, I. R. & Lee, D. H., 2013 May 10, In : Information Sciences. 231, p. 113-122 10 p.

Research output: Contribution to journalArticle

12 Citations (Scopus)

Related-key amplified boomerang attacks on KT-64 and MD-64 suitable for wireless sensor networks

Kang, J., Jeong, K., Hong, S. & Lee, C., 2013 Sep, In : Sensor Letters. 11, 9, p. 1765-1770 6 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)

Resource pricing game in geo-distributed clouds

Roh, H., Jung, C., Lee, W. & Du, D. Z., 2013, 2013 Proceedings IEEE INFOCOM 2013. p. 1519-1527 9 p. 6566947. (Proceedings - IEEE INFOCOM).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

31 Citations (Scopus)

Reversible data hiding for halftone images using histogram modification

Kim, C., Choi, Y. S., Kim, H. J., Shin, D., Shin, D. & Yang, C. N., 2013 Mar, In : Information (Japan). 16, 3 A, p. 1861-1872 12 p.

Research output: Contribution to journalArticle

Scalable hierarchical identity-based signature scheme from lattices

Noh, G. & Jeong, I. R., 2013, In : KSII Transactions on Internet and Information Systems. 7, 12, p. 3261-3273 13 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)