Graduate School of Information Study

  • Korea, Republic of

Research Output

2013

Security analysis of HMAC/NMAC by using fault injection

Jeong, K., Lee, Y., Sung, J. & Hong, S., 2013, In : Journal of Applied Mathematics. 2013, 101907.

Research output: Contribution to journalArticle

3 Citations (Scopus)

Security analysis of scalable block cipher PP-1 applicable to distributed sensor networks

Lee, Y., Jeong, K., Sung, J., Lee, C., Hong, S. & Chang, K. Y., 2013, In : International Journal of Distributed Sensor Networks. 2013, 169638.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Security evaluation of double-block-length hash modes with preimage attacks on PGV schemes

Moon, D., Hong, D., Koo, B. & Hong, S., 2013, In : Journal of Internet Technology. 14, 3, p. 497-508 12 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Security scheme for high capacity USIM-based services

Jeong, E. S., Kim, B. H. & Lee, D. H., 2013, In : International Journal of Security and its Applications. 7, 4, p. 433-444 12 p.

Research output: Contribution to journalArticle

Self-updatable encryption: Time constrained access control with hidden attributes and better efficiency

Lee, K., Choi, S. G., Lee, D. H., Park, J. H. & Yung, M., 2013, Advances in Cryptology, ASIACRYPT 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. PART 1 ed. p. 235-254 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8269 LNCS, no. PART 1).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

30 Citations (Scopus)

Sequential aggregate signatures made shorter

Lee, K., Lee, D. H. & Yung, M., 2013, Applied Cryptography and Network Security - 11th International Conference, ACNS 2013, Proceedings. p. 202-217 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7954 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

Sequential aggregate signatures with short public keys: Design, analysis and implementation studies

Lee, K., Lee, D. H. & Yung, M., 2013, Public-Key Cryptography, PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Proceedings. p. 423-442 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7778 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

18 Citations (Scopus)

Sharded Router: A novel on-chip router architecture employing bandwidth sharding and stealing

Lee, J., Nicopoulos, C., Lee, H. G. & Kim, J., 2013, In : Parallel Computing. 39, 9, p. 372-388 17 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)

The contagion of malicious behaviors in online games

Woo, J., Kang, A. R. & Kim, H. K., 2013, SIGCOMM 2013 - Proceedings of the ACM SIGCOMM 2013 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication. p. 543-544 2 p. (SIGCOMM 2013 - Proceedings of the ACM SIGCOMM 2013 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

The contagion of malicious behaviors in online games

Woo, J., Kang, A. R. & Kim, H. K., 2013, Proceedings of the SIGCOMM 2013 and Best Papers of the Co-Located Workshops. 4 ed. p. 543-544 2 p. (Computer Communication Review; vol. 43, no. 4).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Topology control using selection diversity in ad hoc network

Moon, K. R. & Oh, S. J., 2013, 2013 IEEE Wireless Communications and Networking Conference, WCNC 2013. p. 1198-1203 6 p. 6554734. (IEEE Wireless Communications and Networking Conference, WCNC).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TornadoNoC: A lightweight and scalable on-Chip network architecture for the many-core era

Lee, J., Nicopoulos, C., Lee, H. G. & Kim, J., 2013 Dec, In : Transactions on Architecture and Code Optimization. 10, 4, 56.

Research output: Contribution to journalArticle

Open Access
5 Citations (Scopus)

Transmission-efficient broadcast encryption scheme with personalized messages

Han, J. H., Park, J. H. & Lee, D. H., 2013 Apr, In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E96-A, 4, p. 796-806 11 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)

Vulnerabilities and countermeasures of commercial online music streaming services in Korea

Lee, S., Choi, D., Won, D. & Kim, S., 2013, In : Journal of Software. 8, 3, p. 520-527 8 p.

Research output: Contribution to journalArticle

Vulnerabilities of android data sharing and malicious application to leaking private information

Cho, T., Kim, J. H., Cho, H. J., Seo, S. H. & Kim, S., 2013, ICUFN 2013 - 5th International Conference on Ubiquitous and Future Networks. p. 37-42 6 p. 6614773. (International Conference on Ubiquitous and Future Networks, ICUFN).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Citations (Scopus)
2012

A fully complex-valued radial basis function classifier for real-valued classification problems

Savitha, R., Suresh, S., Sundararajan, N. & Kim, H. J., 2012 Feb 15, In : Neurocomputing. 78, 1, p. 104-110 7 p.

Research output: Contribution to journalArticle

51 Citations (Scopus)

A method of detecting abnormal malicious remote control codes using network domain information

Oh, H. G., Seo, J. T., Lim, J. I. & Moon, J. S., 2012 May, In : Information. 15, 5, p. 2181-2192 12 p.

Research output: Contribution to journalArticle

Analysis framework to detect artifacts of portable web browser

Choi, J. H., Lee, K. G., Park, J., Lee, C. & Lee, S., 2012, Information Technology Convergence, Secure and Trust Computing, and Data Management, ITCS 2012 and STA 2012. p. 207-214 8 p. (Lecture Notes in Electrical Engineering; vol. 180 LNEE).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Analysis of context dependence in social interaction networks of a massively multiplayer online role-playing game

Son, S., Kang, A. R., Kim, H. C., Kwon, T., Park, J. & Kim, H. K., 2012 Apr 4, In : PloS one. 7, 4, e33918.

Research output: Contribution to journalArticle

28 Citations (Scopus)

Analysis of smartphone-based location information

Kim, D., Bang, J. & Lee, S., 2012, Computer Science and Convergence, CSA 2011 and WCC 2011 Proceedings. p. 43-53 11 p. (Lecture Notes in Electrical Engineering; vol. 114 LNEE).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

An automatic and proactive identity theft detection model in MMORPGs

Woo, J., Choi, H. J. & Kim, H. K., 2012 Jan, In : Applied Mathematics and Information Sciences. 6, 1 SUPPL., p. 291S-302S

Research output: Contribution to journalArticle

10 Citations (Scopus)

An efficient embedder for BCH coding for steganography

Zhang, R., Sachnev, V., Botnan, M. B., Kim, H. J. & Heo, J., 2012, In : IEEE Transactions on Information Theory. 58, 12, p. 7272-7279 8 p., 6294443.

Research output: Contribution to journalArticle

30 Citations (Scopus)

An efficient method of extracting strings from unfixed-form data

Jeon, S., Park, J., Lee, K. G. & Lee, S., 2012, Future Information Technology, Application, and Service, FutureTech 2012. VOL. 1 ed. p. 425-434 10 p. (Lecture Notes in Electrical Engineering; vol. 164 LNEE, no. VOL. 1).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

An improved matrix encoding scheme for JPEG steganography

Sachnev, V. & Kim, H. J., 2012, Digital-Forensics and Watermarking - 10th International Workshop, IWDW 2011, Revised Selected Papers. p. 3-15 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7128 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

18 Citations (Scopus)

A photographic forensic case study: Myths, principles and techniques

Kim, H. J., Lim, S., Moon, J., Kim, B. & Jung, E. S., 2012 Jan, In : Mathematical and Computer Modelling. 55, 1-2, p. 3-11 9 p.

Research output: Contribution to journalArticle

6 Citations (Scopus)

A price-based spectrum management scheme with stackelberg game in cooperative cognitive radio networks

Roh, H., Park, H., Jung, C., Du, D. Z. & Lee, W., 2012 Sep, In : IEICE Transactions on Communications. E95-B, 9, p. 2956-2958 3 p.

Research output: Contribution to journalArticle

A privacy-strengthened scheme for E-healthcare monitoring system

Huang, C., Lee, H. & Lee, D. H., 2012 Oct, In : Journal of Medical Systems. 36, 5, p. 2959-2971 13 p.

Research output: Contribution to journalArticle

26 Citations (Scopus)

A programmable processing array architecture supporting dynamic task scheduling and module-level prefetching

Lee, J., Lee, H. G., Ha, S., Kim, J. & Nicopoulos, C., 2012, CF '12 - Proceedings of the ACM Computing Frontiers Conference. p. 153-162 10 p. (CF '12 - Proceedings of the ACM Computing Frontiers Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

A projection based learning meta-cognitive RBF network classifier for effective diagnosis of Parkinson's disease

Sateesh Babu, G., Suresh, S., Uma Sangumathi, K. & Kim, H. J., 2012, Advances in Neural Networks, ISNN 2012 - 9th International Symposium on Neural Networks, Proceedings. PART 2 ed. p. 611-620 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7368 LNCS, no. PART 2).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Citations (Scopus)

A quantum network system of QSS-QDC using χ-type entangled states

Hong, C. H., Heo, J. O., Lim, J. I. & Yang, H. J., 2012 May, In : Chinese Physics Letters. 29, 5, 050303.

Research output: Contribution to journalArticle

14 Citations (Scopus)

A recovery method of deleted record for SQLite database

Jeon, S., Bang, J., Byun, K. & Lee, S., 2012 Aug, In : Personal and Ubiquitous Computing. 16, 6, p. 707-715 9 p.

Research output: Contribution to journalArticle

35 Citations (Scopus)

A research on the investigation method of digital forensics for a VMware Workstation's virtual machine

Lim, S., Yoo, B., Park, J., Byun, K. D. & Lee, S., 2012 Jan, In : Mathematical and Computer Modelling. 55, 1-2, p. 151-160 10 p.

Research output: Contribution to journalArticle

6 Citations (Scopus)

A strong binding encryption scheme from lattices for secret broadcast

Noh, G., Hong, D., Kwon, J. O. & Jeong, I. R., 2012 Jun, In : IEEE Communications Letters. 16, 6, p. 781-784 4 p., 6188494.

Research output: Contribution to journalArticle

1 Citation (Scopus)

A study for classification of web browser log and timeline visualization

Oh, J., Son, N., Lee, S. & Lee, K., 2012, Information Security Applications - 13th International Workshop, WISA 2012, Revised Selected Papers. Lee, D. H. & Yung, M. (eds.). Springer Verlag, p. 192-207 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7690 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

A study on multimedia file carving method

Yoo, B., Park, J., Lim, S., Bang, J. & Lee, S., 2012 Nov, In : Multimedia Tools and Applications. 61, 1, p. 243-261 19 p.

Research output: Contribution to journalArticle

14 Citations (Scopus)

A study on static analysis model of mobile application for privacy protection

Kim, S., Cho, J. I., Myeong, H. W. & Lee, D. H., 2012, Computer Science and Convergence, CSA 2011 and WCC 2011 Proceedings. p. 529-540 12 p. (Lecture Notes in Electrical Engineering; vol. 114 LNEE).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

12 Citations (Scopus)

BAT: Bimodal cryptographic algorithm suitable for various environments

Lee, J., Jeong, K., Kang, J., Lee, Y., Sung, J., Chang, K. Y. & Hong, S., 2012, Computer Science and Its Applications, CSA 2012. p. 371-387 17 p. (Lecture Notes in Electrical Engineering; vol. 203 LNEE).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Bayesian implementation of a Lagrangian macroscopic traffic flow model

Yoon, J. W. & Tchrakian, T. T., 2012, ICPR 2012 - 21st International Conference on Pattern Recognition. p. 214-217 4 p. 6460110. (Proceedings - International Conference on Pattern Recognition).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Bayesian separation of wind power generation signals

Yoon, J. W., Fusco, F. & Wurst, M., 2012, ICPR 2012 - 21st International Conference on Pattern Recognition. p. 2660-2663 4 p. 6460713. (Proceedings - International Conference on Pattern Recognition).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Biometric based secure communications without pre-deployed key for biosensor implanted in body sensor networks

Cho, K. & Lee, D. H., 2012, Information Security Applications - 12th International Workshop, WISA 2011, Revised Selected Papers. p. 203-218 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7115 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

14 Citations (Scopus)

Capacity bound for discrete memoryless user-relaying channel

Moon, K. R., Yoo, D. S. & Oh, S. J., 2012 Mar, In : KSII Transactions on Internet and Information Systems. 6, 3, p. 855-868 14 p.

Research output: Contribution to journalArticle

Chatting pattern based game BOT detection: Do they talk like us?

Kang, A. R., Kim, H. K. & Woo, J., 2012 Nov 30, In : KSII Transactions on Internet and Information Systems. 6, 11, p. 2866-2879 14 p.

Research output: Contribution to journalArticle

13 Citations (Scopus)

Cityride: A predictive bike sharing journey advisor

Yoon, J. W., Pinelli, F. & Calabrese, F., 2012, Proceedings - 2012 IEEE 13th International Conference on Mobile Data Management, MDM 2012. p. 306-311 6 p. 6341407. (Proceedings - 2012 IEEE 13th International Conference on Mobile Data Management, MDM 2012).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

54 Citations (Scopus)

Coexistence analysis between IMT system and DTV system in the 700MHz band

Kim, D. H., Oh, S. J. & Woo, J., 2012, 2012 International Conference on ICT Convergence: "Global Open Innovation Summit for Smart ICT Convergence", ICTC 2012. p. 284-288 5 p. 6386840. (International Conference on ICT Convergence).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

10 Citations (Scopus)

Comparative study of push schemes in online social networking services

Ko, H., Pack, S. & Lee, W., 2012, ICUFN 2012 - 4th International Conference on Ubiquitous and Future Networks, Final Program. p. 225-226 2 p. 6261698. (ICUFN 2012 - 4th International Conference on Ubiquitous and Future Networks, Final Program).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Complexity and approximation of the connected set-cover problem

Zhang, W., Wu, W., Lee, W. & Du, D. Z., 2012 Jul, In : Journal of Global Optimization. 53, 3, p. 563-572 10 p.

Research output: Contribution to journalArticle

5 Citations (Scopus)

Compliance risk assessment measures of financial information security using system dynamics

Kim, A. C., Lee, S. M. & Lee, D. H., 2012, In : International Journal of Security and its Applications. 6, 4, p. 191-200 10 p.

Research output: Contribution to journalArticle

10 Citations (Scopus)

Constant-approximation for target coverage problem in wireless sensor networks

Ding, L., Wu, W., Willson, J., Wu, L., Lu, Z. & Lee, W., 2012, 2012 Proceedings IEEE INFOCOM, INFOCOM 2012. p. 1584-1592 9 p. 6195527. (Proceedings - IEEE INFOCOM).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

45 Citations (Scopus)

Constructing strong identity-based designated verifier signatures with self-unverifiability

Ki, J., Hwang, J. Y., Nyang, D., Chang, B. H., Lee, D. H. & Lim, J. I., 2012 Apr, In : ETRI Journal. 34, 2, p. 235-244 10 p.

Research output: Contribution to journalArticle

13 Citations (Scopus)