Graduate School of Information Study

  • Korea, Republic of

Research Output

2007

Geometrically invariant image watermarking in the DWT domain

Xiang, S. & Kim, H. J., 2007 Dec 1, Information Security Applications - 8th International Workshop, WISA 2007, Revised Selected Papers. p. 76-90 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4867 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Key agreement for key hypergraph

Jeong, I. R. & Lee, D. H., 2007 Dec 1, In : Computers and Security. 26, 7-8, p. 452-458 7 p.

Research output: Contribution to journalArticle

9 Citations (Scopus)

Low-frequency critical dynamics in (CnH2n+1NH3)2SnCl6 model biomembrane systems

Lee, K. W., Lee, C. E., Choi, J. Y. & Kim, J., 2007 Jan 1, In : Current Applied Physics. 7, 1, p. 31-33 3 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)

MBAL: A mobile beacon-assisted localization scheme for wireless sensor networks

Kim, K. & Lee, W., 2007 Dec 1, Proceedings of 16th International Conference on Computer Communications and Networks 2007, ICCCN 2007. p. 57-62 6 p. 4317797. (Proceedings - International Conference on Computer Communications and Networks, ICCCN).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

64 Citations (Scopus)

Mobility driven vertical handover for mobile IPTV traffic in hybrid IEEE 802.11e/16e networks

Choi, E., Lee, W. & Kim, J., 2007 Dec 1, Ubiquitous Intelligence and Computing - 4th International Conference, UIC 2007, Proceedings. p. 767-776 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4611 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Movement-aware vertical handoff of WLAN and mobile WiMAX for seamless ubiquitous access

Lee, W., Kim, E., Kim, J., Lee, I. & Lee, C., 2007 Nov 1, In : IEEE Transactions on Consumer Electronics. 53, 4, p. 1268-1275 8 p.

Research output: Contribution to journalArticle

59 Citations (Scopus)

On the calculation of the maximal MOT throughput in T-DMB

Choi, J., Lee, D., Yu, J., Kim, K. & Lee, W., 2007 Aug 1, In : IEEE Transactions on Consumer Electronics. 53, 3, p. 877-884 8 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Optimal resource allocation for data service in CDMA reverse link

Zhang, D., Oh, S. J. & Bhushan, N., 2007 Oct 1, In : IEEE Transactions on Wireless Communications. 6, 10, p. 3648-3656 9 p.

Research output: Contribution to journalArticle

17 Citations (Scopus)

Optimized cryptographic binding protocol using MIPv6 over IEEE 802.16e

Park, H. S., Lim, S. H., Yun, S., Yi, O. & Lim, J., 2007 Dec 1, ISCIT 2007 - 2007 International Symposium on Communications and Information Technologies Proceedings. p. 1225-1230 6 p. 4392204. (ISCIT 2007 - 2007 International Symposium on Communications and Information Technologies Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Optimized transmission power control of interrogators for collision arbitration in UHF RFID systems

Kim, J., Lee, W., Kim, E., Kim, D. & Suh, K., 2007 Jan 1, In : IEEE Communications Letters. 11, 1, p. 22-24 3 p.

Research output: Contribution to journalArticle

20 Citations (Scopus)

Power saving medium access for beacon-enabled IEEE 802.15.4 LR-WPANs

Joongheon, K. & Wonjun, L., 2007 Dec 1, Human Interface and the Management of Information: Interacting in Information Environments - Symposium on Human Interface 2007. Held as Part of HCI International 2007, Proceedings. PART 2 ed. p. 555-562 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4558 LNCS, no. PART 2).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Preimage attack on the parallel FFT-hashing function

Donghoon, C., Moti, Y., Jaechul, S., Seokhie, H. & Sangjin, L., 2007 Dec 1, Information Security and Privacy - 12th Australasian Conference, ACISP 2007, Proceedings. p. 59-67 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4586 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

QoS-aware Internet access schemes for wireless mobile ad hoc networks

Park, B. N., Lee, W. & Lee, C., 2007 Jan 15, In : Computer Communications. 30, 2, p. 369-384 16 p.

Research output: Contribution to journalArticle

32 Citations (Scopus)

Related-key amplified boomerang attacks on the full-round eagle-64 and eagle-128

Jeong, K., Lee, C., Sung, J., Hong, S. & Lim, J., 2007 Dec 1, Information Security and Privacy - 12th Australasian Conference, ACISP 2007, Proceedings. p. 143-157 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4586 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Citations (Scopus)

Related-key rectangle attacks on reduced AES-192 and AES-256

Kim, J., Hong, S. & Preneel, B., 2007 Dec 1, Fast Software Encryption - 14th International Workshop, FSE 2007. p. 225-241 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4593 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

54 Citations (Scopus)

Secure Mobile RFID system against privacy and security problems

Il, J. K., Eun, Y. C. & Dong, H. L., 2007 Dec 1, Proceedings of the 3rd International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerU 2007. p. 67-72 6 p. 4279773. (Proceedings - 3rd International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerU 2007).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

12 Citations (Scopus)

Secure similarity search

Park, H. A., Kim, B. H., Lee, D. H., Chung, Y. D. & Zhan, J., 2007 Dec 1, Proceedings - 2007 IEEE International Conference on Granular Computing, GrC 2007. p. 598-604 7 p. 4403170. (Proceedings - 2007 IEEE International Conference on Granular Computing, GrC 2007).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

29 Citations (Scopus)

SPA countermeasure based on unsigned left-to-right recodings

Kim, S. K., Han, D. G., Kim, H. W., Chung, K. I. L. & Lim, J., 2007 Dec 1, Autonomic and Trusted Computing - 4th International Conference, ATC 2007, Proceedings. p. 286-295 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4610 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Three-round smart card-based key exchange scheme

Kwon, J. O., Jeong, I. R. & Lee, D. H., 2007 Jan 1, In : IEICE Transactions on Communications. E90-B, 11, p. 3255-3258 4 p.

Research output: Contribution to journalArticle

10 Citations (Scopus)

Traffic flow based EDCF for QoS enhancement in IEEE 802.11e wireless LAN

Choi, E., Lee, W. & Shih, T. K., 2007 Sep 25, Proceedings - 21st International Conference on Advanced Information Networking and Applications, AINA 2007. p. 467-473 7 p. 4220929. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

Verification method of network simulation for pervasive environments

Cho, K., Lee, J., Lim, J. & Moon, J., 2007 Dec 1, Proceedings of the 3rd International Conference on Security and Privacy in Communication Networks, SecureComm. p. 155-161 7 p. 4550323. (Proceedings of the 3rd International Conference on Security and Privacy in Communication Networks, SecureComm).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Windows pagefile collection and analysis for a live forensics context

Lee, S., Savoldi, A., Lee, S. & Lim, J., 2007 Dec 1, Proceedings of Future Generation Communication and Networking, FGCN 2007. p. 97-101 5 p. 4426211. (Proceedings of Future Generation Communication and Networking, FGCN 2007; vol. 2).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)
2006

Adaptive binary splitting: A RFID tag collision arbitration protocol for tag identification

Myung, J. & Lee, W., 2006 Oct, In : Mobile Networks and Applications. 11, 5, p. 711-722 12 p.

Research output: Contribution to journalArticle

61 Citations (Scopus)

A flexible DRM system considering ubiquitous environment

Park, J. H., Lee, S. & Koh, B. S., 2006 Jan 1, In : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3983 LNCS, p. 236-244 9 p.

Research output: Contribution to journalConference article

A model for security vulnerability pattern

Kang, H., Kim, K., Hong, S. & Lee, D. H., 2006 Jan 1, Computational Science and Its Applications - ICCSA 2006: International Conference, Proceedings - Part III. Springer Verlag, p. 385-394 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3982 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

An efficient ID-based delegation network

Youn, T. G., Park, Y. H., Kim, C. H. & Lim, J., 2006 Jan 1, In : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4277 LNCS - I, p. 382-391 10 p.

Research output: Contribution to journalConference article

1 Citation (Scopus)

Attack on JPEG2000 steganography using LRCA

Oh, H., Lee, K. & Lee, S., 2006 Jan 1, Digital Watermarking - 5th International Workshop, IWDW 2006, Proceedings. Springer Verlag, p. 268-281 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4283 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Automatic trap detection of ubiquitous learning on SCORM sequencing

Wang, C. C., Lin, H. W., Shih, T. K. & Lee, W., 2006 Jan 1, Ubiquitous Intelligence and Computing - Third International Conference, UIC 2006, Proceedings. Springer Verlag, p. 1164-1173 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4159 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Category attack for LSB steganalysis of JPEG images

Kwangsoo, L., Westfeld, A. & Sangjin, L., 2006 Jan 1, Digital Watermarking - 5th International Workshop, IWDW 2006, Proceedings. Springer Verlag, p. 35-48 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4283 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

14 Citations (Scopus)

C-iUMS: Context based smart and secure multimedia service in intelligent ubiquitous home

Park, J. H., Lee, S. & Hong, S. H., 2006 Jan 1, Emerging Directions in Embedded and Ubiquitous Computing - EUC 2006 Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Proceedings. Mu, Y., Jeong, Y-S., Xu, C-Z., Yan, L., Shao, Z., Lee, D-C., Sokolsky, O., Yan, L., Jung, E-S., Zhou, X. & Kim, D. (eds.). Springer Verlag, p. 660-670 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4097 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Detection and removal of long scratch lines in aged films

Shih, T. K., Lin, L. H. & Lee, W., 2006 Dec 1, 2006 IEEE International Conference on Multimedia and Expo, ICME 2006 - Proceedings. p. 477-480 4 p. 4036640. (2006 IEEE International Conference on Multimedia and Expo, ICME 2006 - Proceedings; vol. 2006).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

16 Citations (Scopus)

Efficient and provably secure client-to-client password-based key exchange protocol

Byun, J. W., Lee, D. H. & Lim, J. I., 2006 Jul 6, Frontiers of WWW Research and Development - APWeb 2006 - 8th Asia-Pacific Web Conference, Proceedings. p. 830-836 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3841 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

20 Citations (Scopus)

Evolution of Ubi-autonomous entities

Hung, J., Li, K. C., Lee, W. & Shin, T. K., 2006 Jan 1, Ubiquitous Intelligence and Computing - Third International Conference, UIC 2006, Proceedings. Springer Verlag, p. 1114-1123 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4159 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Forgery and key recovery attacks on PMAC and Mitchell's TMAC variant

Lee, C., Kim, J., Sung, J., Hong, S. & Lee, S., 2006 Jan 1, Information Security and Privacy: 11th Australasian Conference, ACISP 2006, Proceedings. Springer Verlag, p. 421-431 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4058 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Citations (Scopus)

Off-line keyword guessing attacks on recent keyword search schemes over encrypted data

Byun, J. W., Rhee, H. S., Park, H. A. & Lee, D. H., 2006 Jan 1, Secure Data Management - Third VLDB Workshop, SDM 2006, Proceedings. Springer Verlag, p. 75-83 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4165 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

168 Citations (Scopus)

One-round protocol for two-party verifier-based password-authenticated key exchange

Kwon, J. O., Sakurai, K. & Lee, D. H., 2006 Jan 1, Communications and Multimedia Security - 10th IFIP TC-6 TC-11 International Conference, CMS 2006, Proceedings. Leitold, H. & Markatos, E. (eds.). Springer Verlag, p. 87-96 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4237 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

QoS-aware adaptive internet gateway selection in ad hoc wireless internet access networks

Park, B. N., Lee, W., Lee, C. & Shin, C. K., 2006 Dec 1, 2006 3rd International Conference on Broadband Communications, Networks and Systems, BROADNETS 2006. 4374361. (2006 3rd International Conference on Broadband Communications, Networks and Systems, BROADNETS 2006).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

Robust e-mail protocols with perfect forward secrecy

Kim, B. H., Koo, J. H. & Lee, D. H., 2006 Jun 1, In : IEEE Communications Letters. 10, 6, p. 510-512 3 p.

Research output: Contribution to journalArticle

22 Citations (Scopus)

Secure EPCglobal Class-1 Gen-2 RFID system against security and privacy problems

Kim, K. H., Choi, E. Y., Lee, S. M. & Lee, D. H., 2006 Jan 1, In : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4277 LNCS - I, p. 362-371 10 p.

Research output: Contribution to journalConference article

15 Citations (Scopus)

Securing Internet gateway discovery protocol in ubiquitous wireless Internet access networks

Park, B. N., Lee, W. & Shin, C., 2006 Jan 1, Embedded and Ubiquitous Computing - International Conference, EUC 2006, Proceedings. Springer Verlag, p. 318-327 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4096 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Security analysis of RFID authentication for pervasive systems using model checking

Kim, H. S., Oh, J. H. & Choi, J. Y., 2006 Dec 1, Proceedings - 30th Annual International Computer Software and Applications Conference, COMPSAC 2006 - Short Papers/Workshops/Fast Abstracts/Doctoral Symposium. p. 195-202 8 p. 4020167. (Proceedings - International Computer Software and Applications Conference; vol. 2).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Side channel attacks and countermeasures on pairing based cryptosystems over binary fields

Kim, T. H., Takagi, T., Han, D. G., Kim, H. W. & Lim, J., 2006 Dec 1, Cryptology and Network Security - 5th International Conference, CANS 2006, Proceedings. p. 168-181 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4301 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

18 Citations (Scopus)

The vulnerabilities analysis and design of the security protocol for RFID system

Kim, H. S., Oh, J. H., Choi, J. Y. & Kim, J. W., 2006 Dec 1, Proceedings - Sixth IEEE International Conference on Computer and Information Technology, CIT 2006. 4019943. (Proceedings - Sixth IEEE International Conference on Computer and Information Technology, CIT 2006).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Threat evaluation method for distributed network environment

Han, K. H., Kim, I. G., Lee, K. W., Choi, J. Y. & Jeon, S. H., 2006 Jul 1, In : Journal of Information Science and Engineering. 22, 4, p. 889-902 14 p.

Research output: Contribution to journalArticle

W-LLC: Weighted low-energy localized clustering for embedded networked sensors

Kim, J., Lee, W., Kim, E. & Lee, C., 2006 Jan 1, Fuzzy Systems and Knowledge Discovery - Second International Conference, FSKD 2005, Proceedings. Springer Verlag, p. 1162-1165 4 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3614 LNAI).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2005

Adaptive binary splitting: A RFID tag collision arbitration protocol for tag identification

Myung, J. & Lee, W., 2005 Dec 1, p. 375-383. 9 p.

Research output: Contribution to conferencePaper

15 Citations (Scopus)

A license management protocol for protecting user privacy and digital contents in Digital Rights Management systems

Park, B. N., Lee, W. & Kim, J. W., 2005 Aug, In : IEICE Transactions on Information and Systems. E88-D, 8, p. 1958-1965 8 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)