Graduate School of Information Study

  • Postal address

    Korea, Republic of

Filter
Conference contribution

Search results

  • 1999

    A new aspect of dual basis for efficient field arithmetic

    Lee, C. H. & Lim, J. I., 1999, Public Key Cryptography - 2nd International Workshop on Practice and Theory in Public Key Cryptography, PKC 1999, Proceedings. Imai, H. & Zheng, Y. (eds.). Springer Verlag, p. 12-28 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1560).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Formal verification of RACE protocol using SSM

    Kim, H., Choi, J. Y., Ki, A. & Han, W. J., 1999, IEEE Region 10 Annual International Conference, Proceedings/TENCON. Institute of Electrical and Electronics Engineers Inc., p. 1083-1086 4 p. (IEEE Region 10 Annual International Conference, Proceedings/TENCON; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • 2000

    A framework for embedded real-time system design

    Choi, J. Y., Kwak, H. H. & Lee, I., 2000, Parallel and Distributed Processing - 15 IPDPS 2000 Workshops, Proceedings. Rolim, J. (ed.). Springer Verlag, p. 738-742 5 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1800 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • GAT(Give-And-Take): A Cooperative cache replacement policy for application-controlled file caching

    Kim, G. H., Cho, J. Y., Kang, H. K., Park, M. S. & Choi, J. Y., 2000, Proceedings of the Fifth Joint Conference on Information Sciences, JCIS 2000, Volume 1. Wang, P. P. & Wang, P. P. (eds.). 1 ed. p. 508-511 4 p. (Proceedings of the Joint Conference on Information Sciences; vol. 5, no. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • LMRU: An Efficient Buffer Management Scheme for Large Sequential and Looping Reference Pattern Applications

    Cho, J. Y., Kim, G. H., Kang, H. K., Park, M. S. & Choi, J. Y., 2000, Proceedings of the Fifth Joint Conference on Information Sciences, JCIS 2000, Volume 1. Wang, P. P. & Wang, P. P. (eds.). 1 ed. p. 504-507 4 p. (Proceedings of the Joint Conference on Information Sciences; vol. 5, no. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • On the optimal diffusion layers with practical security against differential and linear cryptanalysis

    Kang, J. S., Park, C., Lee, S. & Lim, J. I., 2000, Information Security and Cryptology - ICISC 1999 - 2nd International Conference, Proceedings. Song, J. (ed.). Springer Verlag, p. 38-52 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1787).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Provable security for the Skipjack-like structure against differential cryptanalysis and linear cryptanalysis

    Sung, J., Lee, S., Lim, J., Hong, S. & Park, S., 2000, Advances in Cryptology - ASIACRYPT 2000 - 6th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Okamoto, T. (ed.). Springer Verlag, p. 274-288 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1976).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    16 Citations (Scopus)
  • 2001

    Efficient and secure member deletion in group signature schemes

    Kim, H. J., Lim, J. I. & Lee, D. H., 2001, Information Security and Cryptology - ICISC 2000 - 3rd International Conference, Proceedings. Won, D. (ed.). Springer Verlag, p. 150-161 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    34 Citations (Scopus)
  • Known-IV attacks on triple modes of operation of block ciphers

    Hong, D., Sung, J., Hong, S., Lee, W., Lee, S., Lim, J. & Yi, O., 2001, Advances in Cryptology - ASIACRYPT 2001 - 7th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Boyd, C. (ed.). Springer Verlag, p. 208-221 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2248).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    7 Citations (Scopus)
  • Provable security against differential and linear cryptanalysis for the SPN structure

    Hong, S., Lee, S., Lim, J., Sung, J., Cheon, D. & Cho, I., 2001, Fast Software Encryption - 7th International Workshop, FSE 2000, Proceedings. Schneier, B. (ed.). Springer Verlag, p. 273-283 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1978).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    54 Citations (Scopus)
  • 2002

    Amplified boomerang attack against reduced-round shacal

    Kim, J., Moon, D., Lee, W., Hong, S., Lee, S. & Jung, S., 2002, Advances in Cryptology - ASIACRYPT 2002 - 8th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Zheng, Y. (ed.). Springer Verlag, p. 243-253 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2501).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    14 Citations (Scopus)
  • A practical approach defeating blackmailing

    Han, D. G., Park, H. Y., Park, Y. H., Lee, S., Lee, D. H. & Yang, H. J., 2002, Information Security and Privacy - 7th Australasian Conference, ACISP 2002, Proceedings. Batten, L. & Seberry, J. (eds.). Springer Verlag, p. 464-481 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2384).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Bottleneck analysis of a gigabit network interface card: Formal verification approach

    Jin, H. W., Bang, K. S., Yoo, C., Choi, J. Y. & Cha, H. J., 2002, Model Checking Software - 9th International SPIN Workshop, Proceedings. Bosnacki, D. & Leue, S. (eds.). Springer Verlag, p. 170-186 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2318 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Concrete security analysis of CTR-OFB and CTR-CFB modes of operation

    Sung, J., Lee, S., Lim, J., Lee, W. & Yi, O., 2002, Information Security and Cryptology - ICISC 2001 - 4th International Conference, Proceedings. Kim, K. (ed.). Springer Verlag, p. 103-113 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2288).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • Experiences with evaluating system QoS and channel performance on media-on-demand systems

    Lee, W. & Srivastava, J., 2002, Proceedings - 22nd International Conference on Distributed Computing Systems Workshops, ICDCSW 2002. Wagner, R. (ed.). Institute of Electrical and Electronics Engineers Inc., p. 196-201 6 p. 1030769. (Proceedings - International Conference on Distributed Computing Systems; vol. 2002-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Impossible differential cryptanalysis of reduced round XTEA and TEA

    Moon, D., Hwang, K., Lee, W., Lee, S. & Lim, J., 2002, Fast Software Encryption - 9th International Workshop, FSE 2002, Revised Papers. Daemen, J. & Rijmen, V. (eds.). Springer Verlag, p. 49-60 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2365).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    35 Citations (Scopus)
  • Impossible differential cryptanalysis of zodiac

    Hong, D., Sung, J., Moriai, S., Lee, S. & Lim, J., 2002, Fast Software Encryption - 8th International Workshop, FSE 2001, Revised Papers. Matsui, M. (ed.). Springer Verlag, p. 300-311 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2355).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Citations (Scopus)
  • Infrastructure-less multicast protocol in mobile ad-hoc networks

    Ahn, S., Lim, Y., Lee, W. & Ha, E., 2002, Information Networking: Wireless Communications Technologies and Network Applications - International Conference, ICOIN 2002, Revised Papers. Chong, I. (ed.). Springer Verlag, p. 321-330 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2344).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Off-line authentication using watermarks

    Yoo, H., Lee, K., Lee, S. & Lim, J., 2002, Information Security and Cryptology - ICISC 2001 - 4th International Conference, Proceedings. Kim, K. (ed.). Springer Verlag, p. 200-213 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2288).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • On the security of reduced versions of 3-pass HAVAL

    Park, S., Sung, S. H., Chee, S. & Lim, J., 2002, Information Security and Privacy - 7th Australasian Conference, ACISP 2002, Proceedings. Batten, L. & Seberry, J. (eds.). Springer Verlag, p. 406-419 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2384).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • On the security of rijndael-like structures against differential and linear cryptanalysis

    Park, S., Sung, S. H., Chee, S., Yoon, E. J. & Lim, J., 2002, Advances in Cryptology - ASIACRYPT 2002 - 8th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Zheng, Y. (ed.). Springer Verlag, p. 176-191 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2501).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    27 Citations (Scopus)
  • Privacy against piracy: Protecting two-level revocable P-K traitor tracing

    Kim, H. J., Lee, D. H. & Yung, M., 2002, Information Security and Privacy - 7th Australasian Conference, ACISP 2002, Proceedings. Batten, L. & Seberry, J. (eds.). Springer Verlag, p. 482-496 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2384).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Saturation attacks on reduced round Skipjack

    Hwang, K., Lee, W., Lee, S., Lee, S. & Lim, J., 2002, Fast Software Encryption - 9th International Workshop, FSE 2002, Revised Papers. Daemen, J. & Rijmen, V. (eds.). Springer Verlag, p. 100-111 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2365).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Citations (Scopus)
  • Truncated differential cryptanalysis of Camellia

    Lee, S., Hong, S., Lee, S., Lim, J. & Yoon, S., 2002, Information Security and Cryptology - ICISC 2001 - 4th International Conference, Proceedings. Kim, K. (ed.). Springer Verlag, p. 32-38 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2288).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    25 Citations (Scopus)
  • 2003

    An anonymous asymmetric public key traitor tracing scheme

    Choi, E. Y., Hwang, J. Y. & Lee, D. H., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Bauknecht, K., Min Tjoa, A. & Quirchmayr, G. (eds.). Springer Verlag, p. 104-114 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2738).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • A pay word-based micropayment protocol supporting multiple payments

    Kim, S. & Lee, W., 2003, Proceedings - 12th International Conference on Computer Communications and Networks, ICCCN 2003. Luijten, R. P., Park, E. K. & DaSilva, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 609-612 4 p. 1284234. (Proceedings - International Conference on Computer Communications and Networks, ICCCN; vol. 2003-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    14 Citations (Scopus)
  • A Pricing and Resource Negotiation Scheme for QoS Provisioning in Pervasive Computing Environments

    Lee, W., Kim, E. & Kim, D., 2003, Proceedings of the Seventh IASTED International Conference on Internet and Multimedia Systems and Applications. Hamza, M. H. (ed.). p. 189-194 6 p. (Proceedings of the IASTED International Conference on Internet and Multimedia Systems and Applications; vol. 7).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • SSR: Statechart with shared resources

    Jang, S. H., Bang, K. S. & Choi, J. Y., 2003, Proceedings - 2003 IEEE Symposium on Human Centric Computing Languages and Environments, HCC 2003. p. 198-200 3 p. 1260229. (Proceedings - 2003 IEEE Symposium on Human Centric Computing Languages and Environments, HCC 2003).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • 2004

    Formal verification of PAP and EAP-MD5 protocols in wireless networks: FDR model checking

    Kim, I. G. & Choi, J. Y., 2004, Proceedings - 18th International conference on Advanced Information Networking and Applications, AINA 2004 Volume 2 (Regional Papers). Barolli, L. (ed.). p. 264-269 6 p. (Proceedings - International Conference on Advanced Information Networking and Application (AINA); vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    18 Citations (Scopus)
  • PrecePt: A privacy-enhancing license management protocol for digital rights management

    Park, B. N., Kim, J. W. & Lee, W., 2004, Proceedings - 18th International Conference on Advanced Information Networking and Applications, AINA 2004 Volume 1 (Regional Papers). Barolli, L. (ed.). p. 574-579 6 p. (Proceedings - International Conference on Advanced Information Networking and Application (AINA); vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Citations (Scopus)
  • 2005

    A fast inversion algorithm and low-complexity architecture over GF(2 m)

    Kim, S., Chang, N. S., Kim, C. H., Park, Y. H. & Lim, J., 2005, Computational Intelligence and Security - International Conference, CIS 2005, Proceedings. Springer Verlag, p. 1-8 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3802 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • A key management scheme for commodity sensor networks

    Kim, Y. H., Kim, M. H., Lee, D. H. & Kim, C., 2005, Ad-Hoc, Mobile, and Wireless Networks - 4th International Conference, ADHOC-NOW 2005, Proceedings. Springer Verlag, p. 113-126 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3738 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • Analysis and modification of ASK mobile security protocol

    Kim, I. G., Kim, H. S., Lee, J. Y. & Choi, J. Y., 2005, Proceedings - 2005 Second IEEE International Workshop on Mobile Commerce and Services, WMCS'05. p. 79-83 5 p. 1581579. (Proceedings - 2005 Second IEEE International Workshop on Mobile Commerce and Services, WMCS'05; vol. 2005).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Analyzing the application of e-Commerce in wireless

    Kim, H. S., Kim, I. G. & Choi, J. Y., 2005, Proceedings - 2005 Second IEEE International Workshop on Mobile Commerce and Services, WMCS'05. p. 112-120 9 p. 1581583. (Proceedings - 2005 Second IEEE International Workshop on Mobile Commerce and Services, WMCS'05; vol. 2005).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • A non-redundant and efficient architecture for Karatsuba-Ofman algorithm

    Chang, N. S., Kim, C. H., Park, Y. H. & Lim, J., 2005, Information Security - 8th International Conference, ISC 2005, Proceedings. Springer Verlag, p. 288-299 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3650 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Citations (Scopus)
  • Applying LR cube analysis to JSteg detection

    Lee, K., Jung, C., Lee, S., Kim, H. J. & Lim, J., 2005, Communications and Multimedia Security - 9th IFIP TC-6 TC-11International Conference, CMS 2005, Proceedings. Dittmann, J., Katzenbeisser, S. & Uhl, A. (eds.). Springer Verlag, p. 275-276 2 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3677 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    2 Citations (Scopus)
  • A real coded genetic algorithm for data partitioning and scheduling in networks with arbitrary processor release time

    Suresh, S., Mani, V., Omkar, S. N. & Kim, H. J., 2005, Advances in Computer Systems Architecture - 10th Asia-Pacific Conference, ACSAC 2005, Proceedings. p. 529-539 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3740 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Authenticated public key distribution scheme without trusted third party

    Koo, J. H., Kim, B. H. & Lee, D. H., 2005, Embedded and Ubiquitous Computing - EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Proceedings. p. 926-935 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3823 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • A watermarking method using quantization and statistical characteristics of wavelet transform

    Byun, K. D., Lee, S. & Kim, H. J., 2005, Proceedings - Sixth International Conference on Parallel and Distributed Computing, Applications and Technologies, PDCAT 2005. p. 689-693 5 p. 1579008. (Parallel and Distributed Computing, Applications and Technologies, PDCAT Proceedings; vol. 2005).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    14 Citations (Scopus)
  • Design and implementation of the IMS-IPMP system in convergence home-network environment

    Park, J. H., Lee, S. J., Kim, Y. & Koh, B. S., 2005, Digital Libraries: Implementing Strategies and Sharing Experiences - 8th International Conference on Asian Digital Libraries, ICADL 2005, Proceedings. Springer Verlag, p. 465-466 2 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3815 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Digital evidence collection process in integrity and memory information gathering

    Lee, S., Kim, H., Lee, S. & Lim, J., 2005, Proceedings - First International Workshop on Systematic Approaches to Digital Forensic Engineering. p. 236-247 12 p. 1592536. (Proceedings - First International Workshop on Systematic Approaches to Digital Forensic Engineering; vol. 2005).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    15 Citations (Scopus)
  • Effect of localized optimal clustering for reader anti-collision in RFID networks: Fairness aspects to the readers

    Kim, J., Lee, W., Yu, J., Myung, J., Kim, E. & Lee, C., 2005, Proceedings - 14th International Conference on Computer Communications and Networks, ICCCN 2005. p. 497-502 6 p. 1523923. (Proceedings - International Conference on Computer Communications and Networks, ICCCN; vol. 2005).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    40 Citations (Scopus)
  • Efficient RFID authentication protocol for ubiquitous computing environment

    Choi, E. Y., Lee, S. M. & Lee, D. H., 2005, Embedded and Ubiquitous Computing - EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Proceedings. Enokido, T., Yan, L., Xiao, B., Kim, D., Dai, Y. & Yang, L. T. (eds.). Springer Verlag, p. 945-954 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3823 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    53 Citations (Scopus)
  • How to construct universal one-way hash functions of order r

    Hong, D., Sung, J., Hong, S. & Lee, S., 2005, Progress in Cryptology - INDOCRYPT 2005 - 6th International Conference on Cryptology in India, Proceedings. Springer Verlag, p. 63-76 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3797 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Intelligent multimedia service system based on context awareness in smart home

    Park, J. H., Park, H. S., Lee, S. J., Choi, J. & Lee, D. G., 2005, Knowledge-Based Intelligent Information and Engineering Systems - 9th International Conference, KES 2005, Proceedings. Springer Verlag, p. 1146-1152 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3681 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Citations (Scopus)
  • Model-based analysis of money accountability in electronic purses

    Kim, I. G., Moon, Y. J., Kang, I., Lee, J. Y., Han, K. H. & Choi, J. Y., 2005, Internet and Network Economics - First International Workshop, WINE 2005, Proceedings. Springer Verlag, p. 346-355 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3828 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Oblivious conjunctive keyword search

    Rhee, H. S., Byun, J. W., Lee, D. H. & Lim, J., 2005, Information Security Applications - 6th International Workshop, WISA 2005, Revised Selected Papers. p. 318-327 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3786 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    13 Citations (Scopus)
  • On energy-aware dynamic clustering for hierarchical sensor networks

    Kim, J., Lee, W., Kim, E., Kim, J., Lee, C., Kim, S. & Kim, S., 2005, Embedded and Ubiquitous Computing - EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Proceedings. Enokido, T., Yan, L., Xiao, B., Kim, D., Dai, Y. & Yang, L. T. (eds.). Springer Verlag, p. 460-469 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3823 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    1 Citation (Scopus)
  • On the security of encryption modes of MD4, MD5 and HAVAL

    Kim, J., Biryukov, A., Preneel, B. & Lee, S., 2005, Information and Communications Security - 7th International Conference, ICICS 2005, Proceedings. Springer Verlag, p. 147-158 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3783 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Password-based group key exchange secure against insider guessing attacks

    Byun, J. W., Lee, D. H. & Lim, J., 2005, Computational Intelligence and Security - International Conference, CIS 2005, Proceedings. p. 143-148 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3802 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    11 Citations (Scopus)