Graduate School of Information Study

  • Postal address

    Korea, Republic of

Filter
Conference contribution

Search results

  • 2005

    Related-key differential attacks on Cobra-S128, Cobra-F64a, and Cobra-F64b

    Lee, C., Kim, J., Hong, S., Sung, J. & Lee, S., 2005, Progress in Cryptology - Mycrypt 2005 - First International Conference on Cryptology in Malaysia, Proceedings. Springer Verlag, p. 244-262 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3715 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    13 Citations (Scopus)
  • Secure password pocket for distributed web services

    Koo, J. H. & Lee, D. H., 2005, Network and Parallel Computing - IFIP International Conference, NPC 2005, Proceedings. p. 327-334 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3779 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Sinusoidal modeling using wavelet packet transform applied to the analysis and synthesis of speech signals

    Kim, K., Hong, J. & Lim, J., 2005, Text, Speech and Dialogue - 8th International Conference, TSD 2005, Proceedings. Springer Verlag, p. 241-248 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3658 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • User-oriented multimedia service using smart sensor agent module in the intelligent home

    Park, J. H., Choi, J., Lee, S. J., Park, H. U. & Lee, D. G., 2005, Computational Intelligence and Security - International Conference, CIS 2005, Proceedings. Springer Verlag, p. 313-320 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3801 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Weighted localized clustering: A coverage-a ware reader collision arbitration protocol in RFID networks

    Kim, J., Lee, W., Jung, J., Choi, J., Kim, E. & Kim, J., 2005, Embedded Software and Systems: Second International Conference, ICESS 2005, Proceedings. Springer Verlag, p. 542-553 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3820 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Citations (Scopus)
  • 2004

    Formal verification of PAP and EAP-MD5 protocols in wireless networks: FDR model checking

    Kim, I. G. & Choi, J. Y., 2004, Proceedings - 18th International conference on Advanced Information Networking and Applications, AINA 2004 Volume 2 (Regional Papers). Barolli, L. (ed.). p. 264-269 6 p. (Proceedings - International Conference on Advanced Information Networking and Application (AINA); vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    18 Citations (Scopus)
  • PrecePt: A privacy-enhancing license management protocol for digital rights management

    Park, B. N., Kim, J. W. & Lee, W., 2004, Proceedings - 18th International Conference on Advanced Information Networking and Applications, AINA 2004 Volume 1 (Regional Papers). Barolli, L. (ed.). p. 574-579 6 p. (Proceedings - International Conference on Advanced Information Networking and Application (AINA); vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Citations (Scopus)
  • 2003

    An anonymous asymmetric public key traitor tracing scheme

    Choi, E. Y., Hwang, J. Y. & Lee, D. H., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Bauknecht, K., Min Tjoa, A. & Quirchmayr, G. (eds.). Springer Verlag, p. 104-114 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2738).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • A pay word-based micropayment protocol supporting multiple payments

    Kim, S. & Lee, W., 2003, Proceedings - 12th International Conference on Computer Communications and Networks, ICCCN 2003. Luijten, R. P., Park, E. K. & DaSilva, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 609-612 4 p. 1284234. (Proceedings - International Conference on Computer Communications and Networks, ICCCN; vol. 2003-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    14 Citations (Scopus)
  • A Pricing and Resource Negotiation Scheme for QoS Provisioning in Pervasive Computing Environments

    Lee, W., Kim, E. & Kim, D., 2003, Proceedings of the Seventh IASTED International Conference on Internet and Multimedia Systems and Applications. Hamza, M. H. (ed.). p. 189-194 6 p. (Proceedings of the IASTED International Conference on Internet and Multimedia Systems and Applications; vol. 7).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • SSR: Statechart with shared resources

    Jang, S. H., Bang, K. S. & Choi, J. Y., 2003, Proceedings - 2003 IEEE Symposium on Human Centric Computing Languages and Environments, HCC 2003. p. 198-200 3 p. 1260229. (Proceedings - 2003 IEEE Symposium on Human Centric Computing Languages and Environments, HCC 2003).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • 2002

    Amplified boomerang attack against reduced-round shacal

    Kim, J., Moon, D., Lee, W., Hong, S., Lee, S. & Jung, S., 2002, Advances in Cryptology - ASIACRYPT 2002 - 8th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Zheng, Y. (ed.). Springer Verlag, p. 243-253 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2501).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    14 Citations (Scopus)
  • A practical approach defeating blackmailing

    Han, D. G., Park, H. Y., Park, Y. H., Lee, S., Lee, D. H. & Yang, H. J., 2002, Information Security and Privacy - 7th Australasian Conference, ACISP 2002, Proceedings. Batten, L. & Seberry, J. (eds.). Springer Verlag, p. 464-481 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2384).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Bottleneck analysis of a gigabit network interface card: Formal verification approach

    Jin, H. W., Bang, K. S., Yoo, C., Choi, J. Y. & Cha, H. J., 2002, Model Checking Software - 9th International SPIN Workshop, Proceedings. Bosnacki, D. & Leue, S. (eds.). Springer Verlag, p. 170-186 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2318 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Concrete security analysis of CTR-OFB and CTR-CFB modes of operation

    Sung, J., Lee, S., Lim, J., Lee, W. & Yi, O., 2002, Information Security and Cryptology - ICISC 2001 - 4th International Conference, Proceedings. Kim, K. (ed.). Springer Verlag, p. 103-113 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2288).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • Experiences with evaluating system QoS and channel performance on media-on-demand systems

    Lee, W. & Srivastava, J., 2002, Proceedings - 22nd International Conference on Distributed Computing Systems Workshops, ICDCSW 2002. Wagner, R. (ed.). Institute of Electrical and Electronics Engineers Inc., p. 196-201 6 p. 1030769. (Proceedings - International Conference on Distributed Computing Systems; vol. 2002-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Impossible differential cryptanalysis of reduced round XTEA and TEA

    Moon, D., Hwang, K., Lee, W., Lee, S. & Lim, J., 2002, Fast Software Encryption - 9th International Workshop, FSE 2002, Revised Papers. Daemen, J. & Rijmen, V. (eds.). Springer Verlag, p. 49-60 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2365).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    35 Citations (Scopus)
  • Impossible differential cryptanalysis of zodiac

    Hong, D., Sung, J., Moriai, S., Lee, S. & Lim, J., 2002, Fast Software Encryption - 8th International Workshop, FSE 2001, Revised Papers. Matsui, M. (ed.). Springer Verlag, p. 300-311 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2355).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Citations (Scopus)
  • Infrastructure-less multicast protocol in mobile ad-hoc networks

    Ahn, S., Lim, Y., Lee, W. & Ha, E., 2002, Information Networking: Wireless Communications Technologies and Network Applications - International Conference, ICOIN 2002, Revised Papers. Chong, I. (ed.). Springer Verlag, p. 321-330 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2344).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Off-line authentication using watermarks

    Yoo, H., Lee, K., Lee, S. & Lim, J., 2002, Information Security and Cryptology - ICISC 2001 - 4th International Conference, Proceedings. Kim, K. (ed.). Springer Verlag, p. 200-213 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2288).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • On the security of reduced versions of 3-pass HAVAL

    Park, S., Sung, S. H., Chee, S. & Lim, J., 2002, Information Security and Privacy - 7th Australasian Conference, ACISP 2002, Proceedings. Batten, L. & Seberry, J. (eds.). Springer Verlag, p. 406-419 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2384).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • On the security of rijndael-like structures against differential and linear cryptanalysis

    Park, S., Sung, S. H., Chee, S., Yoon, E. J. & Lim, J., 2002, Advances in Cryptology - ASIACRYPT 2002 - 8th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Zheng, Y. (ed.). Springer Verlag, p. 176-191 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2501).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    27 Citations (Scopus)
  • Privacy against piracy: Protecting two-level revocable P-K traitor tracing

    Kim, H. J., Lee, D. H. & Yung, M., 2002, Information Security and Privacy - 7th Australasian Conference, ACISP 2002, Proceedings. Batten, L. & Seberry, J. (eds.). Springer Verlag, p. 482-496 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2384).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Saturation attacks on reduced round Skipjack

    Hwang, K., Lee, W., Lee, S., Lee, S. & Lim, J., 2002, Fast Software Encryption - 9th International Workshop, FSE 2002, Revised Papers. Daemen, J. & Rijmen, V. (eds.). Springer Verlag, p. 100-111 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2365).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Citations (Scopus)
  • Truncated differential cryptanalysis of Camellia

    Lee, S., Hong, S., Lee, S., Lim, J. & Yoon, S., 2002, Information Security and Cryptology - ICISC 2001 - 4th International Conference, Proceedings. Kim, K. (ed.). Springer Verlag, p. 32-38 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2288).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    25 Citations (Scopus)
  • 2001

    Efficient and secure member deletion in group signature schemes

    Kim, H. J., Lim, J. I. & Lee, D. H., 2001, Information Security and Cryptology - ICISC 2000 - 3rd International Conference, Proceedings. Won, D. (ed.). Springer Verlag, p. 150-161 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    34 Citations (Scopus)
  • Known-IV attacks on triple modes of operation of block ciphers

    Hong, D., Sung, J., Hong, S., Lee, W., Lee, S., Lim, J. & Yi, O., 2001, Advances in Cryptology - ASIACRYPT 2001 - 7th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Boyd, C. (ed.). Springer Verlag, p. 208-221 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2248).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    7 Citations (Scopus)
  • Provable security against differential and linear cryptanalysis for the SPN structure

    Hong, S., Lee, S., Lim, J., Sung, J., Cheon, D. & Cho, I., 2001, Fast Software Encryption - 7th International Workshop, FSE 2000, Proceedings. Schneier, B. (ed.). Springer Verlag, p. 273-283 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1978).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    54 Citations (Scopus)
  • 2000

    A framework for embedded real-time system design

    Choi, J. Y., Kwak, H. H. & Lee, I., 2000, Parallel and Distributed Processing - 15 IPDPS 2000 Workshops, Proceedings. Rolim, J. (ed.). Springer Verlag, p. 738-742 5 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1800 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • GAT(Give-And-Take): A Cooperative cache replacement policy for application-controlled file caching

    Kim, G. H., Cho, J. Y., Kang, H. K., Park, M. S. & Choi, J. Y., 2000, Proceedings of the Fifth Joint Conference on Information Sciences, JCIS 2000, Volume 1. Wang, P. P. & Wang, P. P. (eds.). 1 ed. p. 508-511 4 p. (Proceedings of the Joint Conference on Information Sciences; vol. 5, no. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • LMRU: An Efficient Buffer Management Scheme for Large Sequential and Looping Reference Pattern Applications

    Cho, J. Y., Kim, G. H., Kang, H. K., Park, M. S. & Choi, J. Y., 2000, Proceedings of the Fifth Joint Conference on Information Sciences, JCIS 2000, Volume 1. Wang, P. P. & Wang, P. P. (eds.). 1 ed. p. 504-507 4 p. (Proceedings of the Joint Conference on Information Sciences; vol. 5, no. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • On the optimal diffusion layers with practical security against differential and linear cryptanalysis

    Kang, J. S., Park, C., Lee, S. & Lim, J. I., 2000, Information Security and Cryptology - ICISC 1999 - 2nd International Conference, Proceedings. Song, J. (ed.). Springer Verlag, p. 38-52 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1787).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Provable security for the Skipjack-like structure against differential cryptanalysis and linear cryptanalysis

    Sung, J., Lee, S., Lim, J., Hong, S. & Park, S., 2000, Advances in Cryptology - ASIACRYPT 2000 - 6th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Okamoto, T. (ed.). Springer Verlag, p. 274-288 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1976).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    16 Citations (Scopus)
  • 1999

    A new aspect of dual basis for efficient field arithmetic

    Lee, C. H. & Lim, J. I., 1999, Public Key Cryptography - 2nd International Workshop on Practice and Theory in Public Key Cryptography, PKC 1999, Proceedings. Imai, H. & Zheng, Y. (eds.). Springer Verlag, p. 12-28 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1560).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Formal verification of RACE protocol using SSM

    Kim, H., Choi, J. Y., Ki, A. & Han, W. J., 1999, IEEE Region 10 Annual International Conference, Proceedings/TENCON. Institute of Electrical and Electronics Engineers Inc., p. 1083-1086 4 p. (IEEE Region 10 Annual International Conference, Proceedings/TENCON; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)