Graduate School of Information Study

  • Postal address

    Korea, Republic of

Filter
Conference contribution

Search results

  • 2008

    A key distribution scheme for wireless sensor networks

    Kim, Y. H., Lee, H. & Lee, D. H., 2008, 6th Annual IEEE International Conference on Pervasive Computing and Communications, PerCom 2008. p. 572-577 6 p. 4517458. (6th Annual IEEE International Conference on Pervasive Computing and Communications, PerCom 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • A lightweight protocol analysis and modification for secure RFID system

    Kim, H. S. & Choi, J. Y., 2008, 2008 Proceedings of 17th International Conference on Computer Communications and Networks, ICCCN 2008. p. 958-962 5 p. 4674336. (Proceedings - International Conference on Computer Communications and Networks, ICCCN).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • A methodology for forensic analysis of embedded systems

    Lim, K. S. & Lee, S., 2008, Proceedings of the 2008 2nd International Conference on Future Generation Communication and Networking, FGCN 2008. p. 283-286 4 p. 4734223. (Proceedings of the 2008 2nd International Conference on Future Generation Communication and Networking, FGCN 2008; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • An efficient key establishment scheme for self-organizing sensor networks

    Kim, Y. H., Choi, K. Y., Lim, J. & Lee, D. H., 2008, Distributed Computing and Networking - 9th International Conference, ICDCN 2008, Proceedings. Springer Verlag, p. 345-349 5 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4904 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • A new public key broadcast encryption using Boneh-Boyen-Goh's HIBE scheme

    Park, J. H. & Lee, D. H., 2008, Information Security Practice and Experience - 4th International Conference, ISPEC 2008, Proceedings. p. 101-115 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4991 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • An improved reversible difference expansion watermarking algorithm

    Vasiliy, S., Kim, H. J., Xiang, S. & Nam, J., 2008, Digital Watermarking - 6th International Workshop, IWDW 2007, Proceedings. p. 254-263 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5041 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • An improved steganographic method

    Kim, H. J. & Md, A., 2008, SIGMAP 2008 - Proceedings of the International Conference on Signal Processing and Multimedia Applications. p. 145-150 6 p. (SIGMAP 2008 - Proceedings of the International Conference on Signal Processing and Multimedia Applications).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Anonymous and traceable authentication scheme using smart cards

    Kim, S., Rhee, H. S., Chun, J. Y. & Lee, D. H., 2008, Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. p. 162-165 4 p. 4511555. (Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    16 Citations (Scopus)
  • A pageranking based method for identifying characteristic genes of a disease

    Hai, D. T., Lee, W. & Thuy, H. Q., 2008, Proceedings of 2008 IEEE International Conference on Networking, Sensing and Control, ICNSC. p. 1496-1499 4 p. 4525457. (Proceedings of 2008 IEEE International Conference on Networking, Sensing and Control, ICNSC).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • A reliable multicast transport protocol for communicating real-time distributed objects

    Ahn, J. S., Paik, I., Seong, B. D., Hong, J. P., Han, S. & Lee, W., 2008, Information Networking: Towards Ubiquitous Networking and Services - International Conference, ICOIN 2007, Revised Selected Papers. Springer Verlag, p. 801-810 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5200 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • A tool for the detection of hidden data in microsoft compound document file format

    Kwon, H., Yeog, K., Sangjin, L. & Jongin, L., 2008, Proceedings of the International Conference on Information Science and Security, ICISS 2008. IEEE Computer Society, p. 141-146 6 p. 4438224. (Proceedings of the International Conference on Information Science and Security, ICISS 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • Attribute-based access control using combined authentication technologies

    Park, H. A., Dong, H. L. & Zhan, J., 2008, 2008 IEEE International Conference on Granular Computing, GRC 2008. p. 518-523 6 p. 4664774. (2008 IEEE International Conference on Granular Computing, GRC 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Auditable and privacy-preserving authentication in vehicular networks

    Sung, H. K., Bum, H. K., Young, K. K. & Dong, H. L., 2008, Proceedings - The 2nd International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies, UBICOMM 2008. p. 19-24 6 p. 4641307. (Proceedings - The 2nd International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies, UBICOMM 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Citations (Scopus)
  • Authenticated group key distribution for unreliable sensor networks

    Lee, H., Kim, Y. H. & Lee, D. H., 2008, Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. p. 285-288 4 p. 4511578. (Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Biometric handshake protocol on telebiometric system mechanism for national infrastructure

    Shin, Y. N., Lee, Y. J., Shin, W. & Choi, J. Y., 2008, Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. p. 57-60 4 p. 4511534. (Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • CADE: Cumulative acknowledgement based detection of selective forwarding attacks in wireless sensor networks*

    Kim, Y. K., Lee, H., Cho, K. & Lee, D. H., 2008, Proceedings - 3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008. p. 416-422 7 p. 4682277. (Proceedings - 3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Citations (Scopus)
  • Cooperative relaying strategies for multi-hop wireless sensor networks

    Kim, J. & Lee, W., 2008, 3rd IEEE/Create-Net International Conference on Communication System Software and Middleware, COMSWARE. IEEE Computer Society, p. 103-106 4 p. 4554388. (3rd IEEE/Create-Net International Conference on Communication System Software and Middleware, COMSWARE).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Cryptanalysis and improvement of a multi-receiver identity-based key encapsulation at INDOCRYPT 06

    Park, J. H., Kim, K. T. & Lee, D. H., 2008, Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS '08. p. 373-380 8 p. (Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS '08).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    13 Citations (Scopus)
  • Cryptanalysis of two improved remote user authentication schemes preserving user anonymity

    Kim, S., Chun, J. Y. & Lee, D. H., 2008, Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008. p. 2235-2239 5 p. 4709320. (Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Data hiding in windows executable files

    Shin, D. M., Kim, Y., Byun, K. D. & Lee, S., 2008, Proceedings of the 6th Australian Digital Forensics Conference. p. 153-159 7 p. (Proceedings of the 6th Australian Digital Forensics Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Data randomization for lightweight secure data aggregation in sensor network

    Mohaisen, A., Jeong, I. R., Hong, D., Jho, N. S. & Nyang, D., 2008, Ubiquitous Intelligence and Computing - 5th International Conference, UIC 2008, Proceedings. p. 338-351 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5061 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Design and implementation of a tool for System Restore Point analysis

    Yun, S. M., Savoldi, A., Gubian, P., Kim, Y., Lee, S. & Lee, S., 2008, Proceedings - 2008 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2008. p. 542-546 5 p. 4604116. (Proceedings - 2008 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Design and implementation of a tool to detect accounting frauds

    Kim, Y., Savoldi, A., Lee, H., Yun, S., Lee, S. & Lim, J., 2008, Proceedings - 2008 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2008. p. 547-552 6 p. 4604117. (Proceedings - 2008 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Designing fingerprint-recognition-based access control for electronic medical records systems

    Shin, Y., Lee, Y., Shin, W. & Choi, J., 2008, Proceedings - 22nd International Conference on Advanced Information Networking and Applications Workshops/Symposia, AINA 2008. p. 106-110 5 p. 4482898. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • Design reviews of health care system

    Ahn, B. H. & Lee, D., 2008, ICCC 2008 - IEEE 6th International Conference on Computational Cybernetics, Proceedings. p. 253-257 5 p. 4721416. (ICCC 2008 - IEEE 6th International Conference on Computational Cybernetics, Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Detection of hidden information in forensic tools

    Kim, Y., Bang, J., Lee, S. & Lim, J., 2008, Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. p. 248-252 5 p. 4511571. (Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Distributed backoff reservation and scheduling for collision mitigation in IEEE 802.11 WLANs

    Choi, E. & Lee, W., 2008, 2008 International Conference on Information Networking, ICOIN. 4472740. (2008 International Conference on Information Networking, ICOIN).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • DSML: Dual signal metrics for localization in wireless sensor networks

    Kim, K., Lee, W. & Choi, C., 2008, WCNC 2008 - IEEE Wireless Communications and Networking Conference, Conference Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 2355-2360 6 p. 4489446. (IEEE Wireless Communications and Networking Conference, WCNC).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Efficient and secure communication between set-top box and smart card in IPTV broadcasting

    Lee, J. S., Rhee, H. S. & Lee, D. H., 2008, Proceedings - 2008 International Conference on Convergence and Hybrid Information Technology, ICHIT 2008. p. 307-310 4 p. 4622843. (Proceedings - 2008 International Conference on Convergence and Hybrid Information Technology, ICHIT 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Efficient and secure remote authenticated key agreement scheme for multi-server using mobile equipment

    Jun, H. L. & Dong, H. L., 2008, 2008 Digest of Technical Papers International Conference on Consumer Electronics, The Mobile Consumer, ICCE 2008. 4588089. (Digest of Technical Papers - IEEE International Conference on Consumer Electronics).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Citations (Scopus)
  • Efficient method of detecting globally blurry or sharp images

    Tsomko, E. & Kim, H. J., 2008, WIAMIS 2008 - Proceedings of the 9th International Workshop on Image Analysis for Multimedia Interactive Services. p. 171-174 4 p. 4556912. (WIAMIS 2008 - Proceedings of the 9th International Workshop on Image Analysis for Multimedia Interactive Services).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    13 Citations (Scopus)
  • Extended OCBP Scheme for MIPv6 over IEEE 802.16e Networks

    Park, H. S., Yun, S., Kim, B. H., Lee, D. C., Yi, O. & Lee, S., 2008, Proceedings - 2008 International Conference on Convergence and Hybrid Information Technology, ICHIT 2008. p. 732-738 7 p. 4622915. (Proceedings - 2008 International Conference on Convergence and Hybrid Information Technology, ICHIT 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Extraction of residual information in the microsoft powerpoint file from the viewpoint of digital forensics considering PerCom environment

    Park, J., Park, B., Lee, S., Hong, S. & Park, J. H., 2008, 6th Annual IEEE International Conference on Pervasive Computing and Communications, PerCom 2008. p. 584-589 6 p. 4517460. (6th Annual IEEE International Conference on Pervasive Computing and Communications, PerCom 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Formal verification of cryptographic protocol for secure RFID system

    Kim, H. S., Oh, J. H., Kim, J. B., Jeong, Y. O. & Choi, J. Y., 2008, Proceedings - 4th International Conference on Networked Computing and Advanced Information Management, NCM 2008. p. 470-477 8 p. 4624188. (Proceedings - 4th International Conference on Networked Computing and Advanced Information Management, NCM 2008; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • GENTLE: Reducing reader collision in mobile RFID networks

    Yu, J. & Lee, W., 2008, Proceedings - 4th International Conference on Mobile Ad-hoc and Sensor Networks, MSN 2008. p. 280-287 8 p. 4721283. (Proceedings - 4th International Conference on Mobile Ad-hoc and Sensor Networks, MSN 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    20 Citations (Scopus)
  • Handover latency analysis of a network-based localized mobility management protocol

    Kong, K. S., Lee, W., Han, Y. H. & Shin, M. K., 2008, ICC 2008 - IEEE International Conference on Communications, Proceedings. p. 5838-5843 6 p. 4534128. (IEEE International Conference on Communications).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    66 Citations (Scopus)
  • Implementation and analysis of new lightweight cryptographic algorithm suitable for wireless sensor networks

    Koo, W. K., Lee, H., Kim, Y. H. & Lee, D. H., 2008, Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. p. 73-76 4 p. 4511537. (Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    38 Citations (Scopus)
  • Live forensic analysis of a compromised linux system using LECT (Linux Evidence Collection Tool)

    Choi, J., Savoldi, A., Gubian, P., Lee, S. & Lee, S., 2008, Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. p. 231-236 6 p. 4511568. (Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • Methodologies for detecting covert database

    Lee, K. G., Savoldi, A., Gubian, P., Lim, K. S., Lee, S. & Lee, S., 2008, Proceedings - 2008 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2008. p. 538-541 4 p. 4604115. (Proceedings - 2008 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Practical security testing using file fuzzing

    Kim, H., Choi, Y., Lee, D. & Lee, D., 2008, 10th International Conference on Advanced Communication Technology, ICACT 2008 - Proceedings. p. 1304-1307 4 p. 4494003. (International Conference on Advanced Communication Technology, ICACT; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Citations (Scopus)
  • Privacy-aware access control through negotiation in daily life service

    Park, H. A., Zhan, J. & Lee, D. H., 2008, Intelligence and Security Informatics - IEEE ISI 2008 International Workshops: PAISI, PACCF, and SOCO 2008, Proceedings. p. 514-519 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5075 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Citations (Scopus)
  • Privacy preserving SQL queries

    Park, H. A., Zhan, J. & Lee, D. H., 2008, Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. p. 549-554 6 p. 4511626. (Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • Recovery of damaged compressed files for digital forensic purposes

    Park, B., Savoldi, A., Gubian, P., Park, J., Lee, S. H. & Leer, S., 2008, Proceedings - 2008 International Conference on Multimedia and Ubiquitous Engineering, MUE 2008. p. 365-372 8 p. 4505751. (Proceedings - 2008 International Conference on Multimedia and Ubiquitous Engineering, MUE 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • Related-key chosen IV attacks on grain-v1 and grain-128

    Lee, Y., Jeong, K., Sung, J. & Hong, S., 2008, Information Security and Privacy - 13th Australasian Conference, ACISP 2008, Proceedings. Springer Verlag, p. 321-335 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5107 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    53 Citations (Scopus)
  • SARC: A street-based anonymous vehicular ad hoc routing protocol for city environments

    Kim, H., Paik, J., Lee, B. & Lee, D., 2008, Proceedings of The 5th International Conference on Embedded and Ubiquitous Computing, EUC 2008. p. 324-329 6 p. 4755247. (Proceedings of The 5th International Conference on Embedded and Ubiquitous Computing, EUC 2008; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • Second preimage attack on 3-pass HAVAL and partial key-recovery attacks on HMAC/NMAC-3-pass HAVAL

    Lee, E., Chang, D., Kim, J., Sung, J. & Hong, S., 2008, Fast Software Encryption - 15th International Workshop, FSE 2008, Revised Selected Papers. p. 189-206 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5086 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    14 Citations (Scopus)
  • Secure mutual authentication and fair billing for roaming service in wireless mobile networks

    Im, T. R., Lee, H., Cho, K. T. & Lee, D. H., 2008, Proceedings - 3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008. p. 466-471 6 p. 4682285. (Proceedings - 3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Security analysis of CIKS-128 and CIKS-128H using key schedule weaknesses

    Lee, C., Kim, J., Hong, S., Lee, S., Sung, J. & Lee, H. M., 2008, Proceedings - International Symposium on Computer Science and Its Applications, CSA 2008. p. 199-206 8 p. 4654086. (Proceedings - International Symposium on Computer Science and Its Applications, CSA 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Smart card-based three-party key exchange without server's assistance

    Kim, Y. H., Youn, T. G., Park, Y. H. & Hong, S. H., 2008, Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. p. 146-149 4 p. 4511552. (Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Strong authentication protocol for secure RFID tag search without help of central database

    Won, T. Y., Chun, J. Y. & Lee, D. H., 2008, Proceedings of The 5th International Conference on Embedded and Ubiquitous Computing, EUC 2008. p. 153-158 6 p. 4755222. (Proceedings of The 5th International Conference on Embedded and Ubiquitous Computing, EUC 2008; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    23 Citations (Scopus)