Graduate School of Information Study

  • Postal address

    Korea, Republic of

Filter
Conference contribution

Search results

  • Conference contribution

    Cannot take my allocation: Enforcing fairness by considering demand and payment in clouds

    Kim, G. & Lee, W., 2013, 2013 4th International Conference on the Network of the Future, NoF 2013. IEEE Computer Society, 6724514. (2013 4th International Conference on the Network of the Future, NoF 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Category attack for LSB steganalysis of JPEG images

    Kwangsoo, L., Westfeld, A. & Sangjin, L., 2006, Digital Watermarking - 5th International Workshop, IWDW 2006, Proceedings. Springer Verlag, p. 35-48 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4283 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    19 Citations (Scopus)
  • Certificateless public key encryption in the selective-ID security model (without random oracles)

    Park, J. H., Choi, K. Y., Hwang, J. Y. & Lee, D. H., 2007, Pairing-Based Cryptography - Pairing 2007 - First International Conference, Proceedings. p. 60-82 23 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4575 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    21 Citations (Scopus)
  • Channel Independent Wi-Fi Backscatter Networks

    Kim, T. & Lee, W., 2019 Apr, INFOCOM 2019 - IEEE Conference on Computer Communications. Institute of Electrical and Electronics Engineers Inc., p. 262-270 9 p. 8737376. (Proceedings - IEEE INFOCOM; vol. 2019-April).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Channel occupancy-based user association in IEEE 802.11 wireless LANs

    Jung, B., Lee, W., Pack, S. & Du, D. Z., 2009, 2009 IEEE 20th Personal, Indoor and Mobile Radio Communications Symposium, PIMRC 2009. Institute of Electrical and Electronics Engineers Inc., p. 747-751 5 p. 5449783. (IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • C-iUMS: Context based smart and secure multimedia service in intelligent ubiquitous home

    Park, J. H., Lee, S. & Hong, S. H., 2006, Emerging Directions in Embedded and Ubiquitous Computing - EUC 2006 Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Proceedings. Zhou, X., Sokolsky, O., Yan, L., Yan, L., Jung, E-S., Shao, Z., Mu, Y., Lee, D-C., Kim, D., Jeong, Y-S. & Xu, C-Z. (eds.). Springer Verlag, p. 660-670 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4097 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    2 Citations (Scopus)
  • Classification of key management schemes for wireless sensor networks

    Lee, H., Kim, Y. H., Lee, D. H. & Lim, J., 2007, Advances in Web and Network Technologies, and Information Management - APWeb/WAIM 2007 International Workshops DBMAN 2007, WebETrends 2007, PAIS 2007 and ASWAN 2007, Proceedings. Springer Verlag, p. 664-673 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4537 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • Coexistence analysis between IMT system and DTV system in the 700MHz band

    Kim, D. H., Oh, S. J. & Woo, J., 2012, 2012 International Conference on ICT Convergence: "Global Open Innovation Summit for Smart ICT Convergence", ICTC 2012. p. 284-288 5 p. 6386840. (International Conference on ICT Convergence).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    11 Citations (Scopus)
  • Comparative evaluation of probabilistic and deterministic tag anti-collision protocols for RFID networks

    Choi, J. & Lee, W., 2007, Emerging Direction in Embedded and Ubiquitous Computing - EUC 2007 Workshops: TRUST, WSOC NCUS, UUWSN, USN, ESO, and SECUBIQ, Proceedings. Denko, M. K., Denko, M. K., Denko, M. K., Shih, C-S., Shih, C-S., Shih, C-S., Li, K-C., Li, K-C., Li, K-C., Tsao, S-L., Tsao, S-L., Tsao, S-L., Zeng, Q-A., Zeng, Q-A., Zeng, Q-A., Park, S-H., Park, S-H., Park, S-H., Ko, Y-B., Ko, Y-B., Ko, Y-B., Hung, S-H., Hung, S-H., Hung, S-H., Park, J. H., Park, J. H. & Park, J. H. (eds.). Springer Verlag, p. 538-549 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4809 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    8 Citations (Scopus)
  • Comparative study of push schemes in online social networking services

    Ko, H., Pack, S. & Lee, W., 2012, ICUFN 2012 - 4th International Conference on Ubiquitous and Future Networks, Final Program. p. 225-226 2 p. 6261698. (ICUFN 2012 - 4th International Conference on Ubiquitous and Future Networks, Final Program).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Comparison of methods for parameter estimation of frequency hopping signals

    Kim, N. K. & Oh, S. J., 2017 Dec 12, International Conference on Information and Communication Technology Convergence: ICT Convergence Technologies Leading the Fourth Industrial Revolution, ICTC 2017. Institute of Electrical and Electronics Engineers Inc., p. 567-569 3 p. (International Conference on Information and Communication Technology Convergence: ICT Convergence Technologies Leading the Fourth Industrial Revolution, ICTC 2017; vol. 2017-December).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Comparison of the millimeter wave path loss estimation model with outages

    Lee, K. G. & Oh, S. J., 2017 Apr 26, 2017 IEEE International Conference on Computational Electromagnetics, ICCEM 2017. Institute of Electrical and Electronics Engineers Inc., p. 276-278 3 p. 7912810. (2017 IEEE International Conference on Computational Electromagnetics, ICCEM 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Complex Network of Damage Assessment Using GMM Based FAIR

    Park, M., Joo, M., Seo, J., Kim, K., Park, M. & Lee, K., 2018 May 25, Proceedings - 2018 IEEE International Conference on Big Data and Smart Computing, BigComp 2018. Institute of Electrical and Electronics Engineers Inc., p. 627-630 4 p. 8367191. (Proceedings - 2018 IEEE International Conference on Big Data and Smart Computing, BigComp 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Compressing JPEG compressed image using reversible data hiding technique

    Kang, S. U., Qu, X. & Kim, H. J., 2013, 2013 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, APSIPA 2013. 6694324. (2013 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, APSIPA 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Concrete security analysis of CTR-OFB and CTR-CFB modes of operation

    Sung, J., Lee, S., Lim, J., Lee, W. & Yi, O., 2002, Information Security and Cryptology - ICISC 2001 - 4th International Conference, Proceedings. Kim, K. (ed.). Springer Verlag, p. 103-113 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2288).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • Constant-approximation for target coverage problem in wireless sensor networks

    Ding, L., Wu, W., Willson, J., Wu, L., Lu, Z. & Lee, W., 2012, 2012 Proceedings IEEE INFOCOM, INFOCOM 2012. p. 1584-1592 9 p. 6195527. (Proceedings - IEEE INFOCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    53 Citations (Scopus)
  • Constant approximation for virtual backbone construction with Guaranteed Routing Cost in wireless sensor networks

    Du, H., Ye, Q., Wu, W., Lee, W., Li, D., Du, D. & Howard, S., 2011, 2011 Proceedings IEEE INFOCOM. p. 1737-1744 8 p. 5934967. (Proceedings - IEEE INFOCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    43 Citations (Scopus)
  • Construction of a national scale ENF map using online multimedia data

    Kim, H., Jeon, Y. & Yoon, J. W., 2017 Nov 6, CIKM 2017 - Proceedings of the 2017 ACM Conference on Information and Knowledge Management. Association for Computing Machinery, p. 19-28 10 p. (International Conference on Information and Knowledge Management, Proceedings; vol. Part F131841).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Construction of directional virtual backbones with minimum routing cost in wireless networks

    Ding, L., Wu, W., Willson, J. K., Du, H. & Lee, W., 2011, 2011 Proceedings IEEE INFOCOM. p. 1557-1565 9 p. 5934946. (Proceedings - IEEE INFOCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Context-aware service composition for mobile network environments

    Lee, C., Ko, S., Lee, S., Lee, W. & Helal, S., 2007, Ubiquitous Intelligence and Computing - 4th International Conference, UIC 2007, Proceedings. Springer Verlag, p. 941-952 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4611 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    14 Citations (Scopus)
  • Cooperative bridges: Topology control in cooperative wireless ad hoc networks

    Yu, J., Roh, H., Lee, W., Pack, S. & Du, D. Z., 2010, 2010 Proceedings IEEE INFOCOM. 5462126. (Proceedings - IEEE INFOCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    25 Citations (Scopus)
  • Cooperative relaying strategies for multi-hop wireless sensor networks

    Kim, J. & Lee, W., 2008, 3rd IEEE/Create-Net International Conference on Communication System Software and Middleware, COMSWARE. IEEE Computer Society, p. 103-106 4 p. 4554388. (3rd IEEE/Create-Net International Conference on Communication System Software and Middleware, COMSWARE).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Cooperative wireless data access algorithms in multi-radio wireless networks

    Pack, S., Lee, K., Ko, J. & Lee, W., 2010, 2010 7th IEEE Consumer Communications and Networking Conference, CCNC 2010. 5421773. (2010 7th IEEE Consumer Communications and Networking Conference, CCNC 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Correction of frequency offset of FFT-based frequency hopping detector

    Lee, K. G. & Oh, S. J., 2017 Dec 12, International Conference on Information and Communication Technology Convergence: ICT Convergence Technologies Leading the Fourth Industrial Revolution, ICTC 2017. Institute of Electrical and Electronics Engineers Inc., p. 846-848 3 p. (International Conference on Information and Communication Technology Convergence: ICT Convergence Technologies Leading the Fourth Industrial Revolution, ICTC 2017; vol. 2017-December).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Crime scene re-investigation: A postmortem analysis of game account stealers' behaviors

    Kim, H., Yang, S. & Kim, H. K., 2017 Jul 25, NetGames 2017 - 15th Annual Workshop on Network and Systems Support for Games. IEEE Computer Society, p. 1-6 6 p. 7991540. (Annual Workshop on Network and Systems Support for Games).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • Cryptanalysis and improvement of a multi-receiver identity-based key encapsulation at INDOCRYPT 06

    Park, J. H., Kim, K. T. & Lee, D. H., 2008, Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS '08. p. 373-380 8 p. (Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS '08).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    13 Citations (Scopus)
  • Cryptanalysis of secure key exchange protocol between STB and Smart card in IPTV broadcasting

    Lee, S. H., Park, N. S., Kim, S. K. & Choi, J. Y., 2009, Advances in Information Security and Assurance - Third International Conference and Workshops, ISA 2009, Proceedings. p. 797-803 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5576 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Cryptanalysis of two improved remote user authentication schemes preserving user anonymity

    Kim, S., Chun, J. Y. & Lee, D. H., 2008, Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008. p. 2235-2239 5 p. 4709320. (Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Cyber Influence Attack: Changes in Cyber Threats Seen in the Russian Hacking Incident

    Park, M., Park, M. & Lee, K., 2018, Information Security Applications - 18th International Conference, WISA 2017, Revised Selected Papers. Kang, B. B. & Kim, T. (eds.). Springer Verlag, p. 224-235 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10763 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Database forensic investigation based on table relationship analysis techniques

    Lee, D., Choi, J. & Lee, S., 2009, Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009. 5404235. (Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Citations (Scopus)
  • Data hiding in windows executable files

    Shin, D. M., Kim, Y., Byun, K. D. & Lee, S., 2008, Proceedings of the 6th Australian Digital Forensics Conference. p. 153-159 7 p. (Proceedings of the 6th Australian Digital Forensics Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Data industry and legislations for personal information protection

    Kwon, H. Y., Min, K. Y. & Chun, S. A., 2019 Jun 18, Proceedings of the 20th Annual International Conference on Digital Government Research: Governance in the Age of Artificial Intelligence, dg.o 2019. Chen, Y-C., Salem, F. & Zuiderwijk, A. (eds.). Association for Computing Machinery, p. 529-531 3 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Data leak analysis in a corporate environment

    Lee, S., Lee, K., Savoldi, A. & Lee, S., 2009, 2009 4th International Conference on Innovative Computing, Information and Control, ICICIC 2009. p. 38-43 6 p. 5412531. (2009 4th International Conference on Innovative Computing, Information and Control, ICICIC 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Data randomization for lightweight secure data aggregation in sensor network

    Mohaisen, A., Jeong, I. R., Hong, D., Jho, N. S. & Nyang, D., 2008, Ubiquitous Intelligence and Computing - 5th International Conference, UIC 2008, Proceedings. p. 338-351 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5061 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • DDoS Mitigation: Decentralized CDN Using Private Blockchain

    Kim, K., You, Y., Park, M. & Lee, K., 2018 Aug 14, ICUFN 2018 - 10th International Conference on Ubiquitous and Future Networks. IEEE Computer Society, p. 693-696 4 p. 8436643. (International Conference on Ubiquitous and Future Networks, ICUFN; vol. 2018-July).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Citations (Scopus)
  • Delay minimization of tree-based neighbor discovery in mobile robot networks

    Roh, H., Kim, K. & Lee, W., 2010, Wireless Algorithms, Systems, and Applications - 5th International Conference, WASA 2010, Proceedings. p. 167-171 5 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6221 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Design and implementation of a tool for System Restore Point analysis

    Yun, S. M., Savoldi, A., Gubian, P., Kim, Y., Lee, S. & Lee, S., 2008, Proceedings - 2008 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2008. p. 542-546 5 p. 4604116. (Proceedings - 2008 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Design and implementation of a tool to detect accounting frauds

    Kim, Y., Savoldi, A., Lee, H., Yun, S., Lee, S. & Lim, J., 2008, Proceedings - 2008 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2008. p. 547-552 6 p. 4604117. (Proceedings - 2008 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Design and implementation of the IMS-IPMP system in convergence home-network environment

    Park, J. H., Lee, S. J., Kim, Y. & Koh, B. S., 2005, Digital Libraries: Implementing Strategies and Sharing Experiences - 8th International Conference on Asian Digital Libraries, ICADL 2005, Proceedings. Springer Verlag, p. 465-466 2 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3815 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Design and implementation of the UsMSS: User-centric secure multimedia service system in intelligent home

    Park, J. H., Lee, S., Lee, D. H., Lim, J., Hong, I. H. & Yang, L. T., 2007, Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007. p. 1233-1238 6 p. 4197448. (Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Design and implementation of the UsMSS: User-centric secure multimedia service system in intelligent home

    Park, J. H., Lee, S., Lee, D. H., Lim, J., Hong, I. H. & Yang, L. T., 2007, Proceedings - 21st International Conference on Advanced Information Networking and Applications, AINA 2007. p. 311-316 6 p. 4220909. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Designing fingerprint-recognition-based access control for electronic medical records systems

    Shin, Y., Lee, Y., Shin, W. & Choi, J., 2008, Proceedings - 22nd International Conference on Advanced Information Networking and Applications Workshops/Symposia, AINA 2008. p. 106-110 5 p. 4482898. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • Design reviews of health care system

    Ahn, B. H. & Lee, D., 2008, ICCC 2008 - IEEE 6th International Conference on Computational Cybernetics, Proceedings. p. 253-257 5 p. 4721416. (ICCC 2008 - IEEE 6th International Conference on Computational Cybernetics, Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Detecting In-vehicle CAN Message Attacks Using Heuristics and RNNs

    Tariq, S., Lee, S., Kim, H. K. & Woo, S. S., 2019, Information and Operational Technology Security Systems - 1st International Workshop, IOSec 2018, CIPSEC Project, Revised Selected Papers. Marín Tordera, E., Fournaris, A. P. & Lampropoulos, K. (eds.). Springer Verlag, p. 39-45 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11398 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Detecting similar files based on hash and statistical analysis for digital forensic investigation

    Seo, K., Lim, K., Choi, J., Chang, K. & Lee, S., 2009, Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009. 5404198. (Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    13 Citations (Scopus)
  • Detection and removal of long scratch lines in aged films

    Shih, T. K., Lin, L. H. & Lee, W., 2006, 2006 IEEE International Conference on Multimedia and Expo, ICME 2006 - Proceedings. p. 477-480 4 p. 4036640. (2006 IEEE International Conference on Multimedia and Expo, ICME 2006 - Proceedings; vol. 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    18 Citations (Scopus)
  • Detection of hidden information in forensic tools

    Kim, Y., Bang, J., Lee, S. & Lim, J., 2008, Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. p. 248-252 5 p. 4511571. (Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Developing a multi-protocol mobility manager for SIP/SS7 networks

    Park, H. S., Lee, H. W., Park, S. J. & Lee, D. H., 2009, Proceedings of the International Conference on Complex, Intelligent and Software Intensive Systems, CISIS 2009. p. 565-570 6 p. 5066842. (Proceedings of the International Conference on Complex, Intelligent and Software Intensive Systems, CISIS 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Difference set attacks on conjunctive keyword search schemes

    Rhee, H. S., Jeong, I. R., Byun, J. W. & Lee, D. H., 2006, Secure Data Management - Third VLDB Workshop, SDM 2006, Proceedings. Springer Verlag, p. 64-74 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4165 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • Differential fault analysis on HAS-160 compression function

    Kang, J., Jeong, K., Sung, J. & Hong, S., 2012, Computer Science and Its Applications, CSA 2012. p. 97-105 9 p. (Lecture Notes in Electrical Engineering; vol. 203 LNEE).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)