Graduate School of Information Study

  • Korea, Republic of

Research Output

Filter
Chapter
2015

Fair-based loss measurement model for enterprise personal information breach

Yun, J. H., Cho, I. H. & Lee, K. H., 2015, Lecture Notes in Electrical Engineering. Springer Verlag, Vol. 373. p. 825-833 9 p. (Lecture Notes in Electrical Engineering; vol. 373).

Research output: Chapter in Book/Report/Conference proceedingChapter

2011

Histogram-based image hashing for searching content-preserving copies

Xiang, S. & Kim, H. J., 2011, Transactions on Data Hiding and Multimedia Security VI. Shi, Y., Emmanuel, S., Kankanhalli, M., Chang, S-F., Radhakrishnan, R., Ma, F. & Zhao, L. (eds.). p. 83-108 26 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6730 LNCS).

Research output: Chapter in Book/Report/Conference proceedingChapter

4 Citations (Scopus)
2009

A new trust and reputation-based chain model in peer-to-peer networks

Lee, S. & Lee, W., 2009 Jan 1, Ubiquitous Multimedia Computing. CRC Press, p. 127-136 10 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

1 Citation (Scopus)
2007

Robustness analysis of patchwork watermarking schemes

Kim, H. J., Xiang, S., Yeo, I. K. & Maitra, S., 2007, Digital Audio Watermarking Techniques and Technologies: Applications and Benchmarks. IGI Global, p. 172-186 15 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

2004

A generalization of PGV-hash functions and security analysis in black-box model

Lee, W., Nandi, M., Sarkar, P., Chang, D., Lee, S. & Sakurai, K., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Wang, H., Pieprzyk, J. & Varadharajan, V. (eds.). Springer Verlag, p. 212-223 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3108).

Research output: Chapter in Book/Report/Conference proceedingChapter

2 Citations (Scopus)

A restoration technique incorporating multi-objective goals in WDM optical networks

Tak, S. W. & Lee, W., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Freire, M. M., Chemouil, P., Lorenz, P. & Gravey, A. (eds.). Springer Verlag, p. 104-114 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3262).

Research output: Chapter in Book/Report/Conference proceedingChapter

A secure steganographic scheme against statistical analyses

Yu, J. J., Han, J. W., Lee, K. S., Seung Cheol, O., Lee, S. & Park, I. H., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Kalker, T., Cox, I. J. & Ro, Y. M. (eds.). Springer Verlag, p. 497-507 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2939).

Research output: Chapter in Book/Report/Conference proceedingChapter

6 Citations (Scopus)

Constant-round authenticated group key exchange for dynamic groups

Kim, H. J., Lee, S. M. & Lee, D. H., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Lee, P. J. & Lee, P. J. (eds.). Springer Verlag, p. 245-259 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3329).

Research output: Chapter in Book/Report/Conference proceedingChapter

Open Access
89 Citations (Scopus)

Differential cryptanalysis of tea and XTEA

Hong, S., Hong, D., Ko, Y., Chang, D., Lee, W. & Lee, S., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Lim, J. I. & Lee, D. H. (eds.). Springer Verlag, p. 402-417 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2971).

Research output: Chapter in Book/Report/Conference proceedingChapter

17 Citations (Scopus)

Efficient ID-based group key agreement with bilinear maps

Choi, K. Y., Hwang, J. Y. & Lee, D. H., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Bao, F., Deng, R. & Zhou, J. (eds.). Springer Verlag, p. 130-144 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2947).

Research output: Chapter in Book/Report/Conference proceedingChapter

Open Access
100 Citations (Scopus)

Efficient password-based group key exchange

Lee, S. M., Hwang, J. Y. & Lee, D. H., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Katsikas, S., Lopez, J. & Pernul, G. (eds.). Springer Verlag, p. 191-199 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3184).

Research output: Chapter in Book/Report/Conference proceedingChapter

39 Citations (Scopus)

Higher order universal one-way hash functions

Hong, D., Preneel, B. & Lee, S., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Lee, P. J. & Lee, P. J. (eds.). Springer Verlag, p. 201-213 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3329).

Research output: Chapter in Book/Report/Conference proceedingChapter

Open Access
8 Citations (Scopus)

High quality perceptual steganographic techniques

Chang, K., Jung, C., Lee, S. & Yang, W., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Kalker, T., Cox, I. J. & Ro, Y. M. (eds.). Springer Verlag, p. 518-531 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2939).

Research output: Chapter in Book/Report/Conference proceedingChapter

3 Citations (Scopus)

Modified power-analysis attacks on XTR and an efficient countermeasure

Han, D. G., Izu, T., Lim, J. & Sakurai, K., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Lopez, J., Qing, S. & Okamoto, E. (eds.). Springer Verlag, p. 305-317 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3269).

Research output: Chapter in Book/Report/Conference proceedingChapter

2 Citations (Scopus)

New block cipher: ARIA

Kwon, D., Kim, J., Park, S., Sung, S. H., Sohn, Y., Song, J. H., Yeom, Y., Yoon, E. J., Lee, S., Lee, J., Chee, S., Han, D. & Hong, J., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Lim, J. I. & Lee, D. H. (eds.). Springer Verlag, p. 432-445 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2971).

Research output: Chapter in Book/Report/Conference proceedingChapter

96 Citations (Scopus)

Normalization domain watermarking method based on pattern extraction

Lee, S. W., Choi, J. G., Kang, H. S., Hong, J. W. & Kim, H. J., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Kalker, T., Cox, I. J. & Ro, Y. M. (eds.). Springer Verlag, p. 390-395 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2939).

Research output: Chapter in Book/Report/Conference proceedingChapter

1 Citation (Scopus)

Optimizing authentication mechanisms using ID-based cryptography in ad hoc wireless mobile networks

Lee, W. & Sriborrirux, W., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Kahng, H-K. & Goto, S. (eds.). Springer Verlag, p. 925-934 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3090).

Research output: Chapter in Book/Report/Conference proceedingChapter

3 Citations (Scopus)

Sound code generation from communicating hybrid models

Hur, Y., Kim, J., Lee, I. & Choi, J. Y., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Alur, R. & Pappas, G. J. (eds.). Springer Verlag, p. 432-447 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2993).

Research output: Chapter in Book/Report/Conference proceedingChapter

11 Citations (Scopus)

The related-key rectangle attack - Application to SHACAL-1

Kim, J., Kim, G., Hong, S., Lee, S. & Hong, D., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Wang, H., Pieprzyk, J. & Varadharajan, V. (eds.). Springer Verlag, p. 123-136 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3108).

Research output: Chapter in Book/Report/Conference proceedingChapter

46 Citations (Scopus)

Truncated Differential Attacks on 8-Round CRYPTON

Kim, J., Hong, S., Lee, S., Song, J. & Yang, H., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Lim, J. I. & Lee, D. H. (eds.). Springer Verlag, p. 446-456 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2971).

Research output: Chapter in Book/Report/Conference proceedingChapter

7 Citations (Scopus)
2003

An analysis of proxy signatures: Is a secure channel necessary?

Lee, J. Y., Cheon, J. H. & Kim, S., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Joye, M. (ed.). Springer Verlag, p. 68-79 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2612).

Research output: Chapter in Book/Report/Conference proceedingChapter

87 Citations (Scopus)

An improvement of VeriSign's key roaming service protocol

Kim, J., Kwon, H., Park, H., Kim, S. & Won, D., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Cueva Lovelle, J. M., Rodriguez, B. M. G., Labra Gayo, J. E., del Puerto Paule Ruiz, M. & Aguilar, L. J. (eds.). Springer Verlag, p. 281-288 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2722).

Research output: Chapter in Book/Report/Conference proceedingChapter

Open Access
1 Citation (Scopus)

A QoS-aware framework for resource configuration and reservation in ubiquitous computing environments

Lee, W. & Sabata, B., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Kahng, H-K. (ed.). Springer Verlag, p. 504-514 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2662).

Research output: Chapter in Book/Report/Conference proceedingChapter

Covert channel detection in the ICMP payload using support vector machine

Sohn, T., Moon, J., Lee, S., Lee, D. H. & Lim, J., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Yazici, A. & Sener, C. (eds.). Springer Verlag, p. 828-835 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2869).

Research output: Chapter in Book/Report/Conference proceedingChapter

18 Citations (Scopus)

Designated verification of non-invertible watermark

Yoo, H., Lee, H., Lee, S. & Lim, J., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Boyd, C. & Mao, W. (eds.). Springer Verlag, p. 338-351 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2851).

Research output: Chapter in Book/Report/Conference proceedingChapter

1 Citation (Scopus)

Experiences with media-integrated distributed control for C4I applications in global military infosphere

Lee, W., Harinath, R., Srivastava, J., Su, D., Richardson, J. & Foresti, M., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Chung, C-W., Kim, C-K., Kim, W., Ling, T-W. & Song, K-H. (eds.). Springer Verlag, p. 744-750 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2713).

Research output: Chapter in Book/Report/Conference proceedingChapter

Formal modeling for a real-time scheduler and schedulability analysis

Kim, S. J. & Choi, J. Y., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Malyshkin, V. (ed.). Springer Verlag, p. 253-258 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2763).

Research output: Chapter in Book/Report/Conference proceedingChapter

1 Citation (Scopus)

Full-round differential attack on the original version of the hash function proposed at PKC'98

Chang, D., Sung, J., Sung, S., Lee, S. & Lim, J., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Nyberg, K. & Heys, H. (eds.). Springer Verlag, p. 160-174 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2595).

Research output: Chapter in Book/Report/Conference proceedingChapter

Open Access
3 Citations (Scopus)

Impossible differential attack on 30-round SHACAL-2

Hong, S., Kim, J., Kim, G., Sung, J., Lee, C. & Lee, S., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Johansson, T. & Maitra, S. (eds.). Springer Verlag, p. 97-106 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2904).

Research output: Chapter in Book/Report/Conference proceedingChapter

16 Citations (Scopus)

Impossible differential cryptanalysis for block cipher structures

Kim, J., Hong, S., Sung, J., Lee, S., Lim, J. & Sung, S., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Johansson, T. & Maitra, S. (eds.). Springer Verlag, p. 82-96 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2904).

Research output: Chapter in Book/Report/Conference proceedingChapter

69 Citations (Scopus)

Linear cryptanalysis on SPECTR-H64 with higher order differential property

Ko, Y., Hong, D., Hong, S., Lee, S. & Lim, J., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Gorodetsky, V., Popyack, L. & Skormin, V. (eds.). Springer Verlag, p. 298-307 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2776).

Research output: Chapter in Book/Report/Conference proceedingChapter

21 Citations (Scopus)

New parallel domain extenders for UOWHF

Lee, W., Chang, D., Lee, S., Sung, S. & Nandi, M., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Laih, C. S. (ed.). Springer Verlag, p. 208-227 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2894).

Research output: Chapter in Book/Report/Conference proceedingChapter

Open Access
9 Citations (Scopus)

Optimal extension fields for XTR

Han, D. G., Yoon, K. S., Park, Y. H., Kim, C. H. & Lim, J., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Nyberg, K. & Heys, H. (eds.). Springer Verlag, p. 369-384 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2595).

Research output: Chapter in Book/Report/Conference proceedingChapter

Open Access
4 Citations (Scopus)

Prime Numbers of Diffie-Hellman Groups for IKE-MODP

Yie, I., Lim, S., Kim, S. & Kim, D., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Johansson, T. & Maitra, S. (eds.). Springer Verlag, p. 228-234 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2904).

Research output: Chapter in Book/Report/Conference proceedingChapter

1 Citation (Scopus)

Process algebraic model of superscalar processor programs for instruction level timing analysis

Yoo, H. J. & Choi, J. Y., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Malyshkin, V. (ed.). Springer Verlag, p. 180-184 5 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2763).

Research output: Chapter in Book/Report/Conference proceedingChapter

Rethinking chosen-ciphertext security under Kerckhoffs' assumption

Kim, S., Mambo, M. & Zheng, Y., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Joye, M. (ed.). Springer Verlag, p. 227-243 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2612).

Research output: Chapter in Book/Report/Conference proceedingChapter