Graduate School of Information Study

  • Postal address

    Korea, Republic of

Filter
Conference contribution

Search results

  • 2007

    Modeling and simulation for security risk propagation in critical information systems

    Kim, Y. G., Jeong, D., Park, S. H., Lim, J. & Baik, D. K., 2007, Computational Intelligence and Security - International Conference, CIS 2006, Revised Selected Papers. Springer Verlag, p. 858-868 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4456 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • Optimized cryptographic binding protocol using MIPv6 over IEEE 802.16e

    Park, H. S., Lim, S. H., Yun, S., Yi, O. & Lim, J., 2007, ISCIT 2007 - 2007 International Symposium on Communications and Information Technologies Proceedings. p. 1225-1230 6 p. 4392204. (ISCIT 2007 - 2007 International Symposium on Communications and Information Technologies Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Password recovery using an evidence collection tool and countermeasures

    Lee, S., Savoldi, A., Lee, S. & Lim, J., 2007, Proceedings - 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2007.. p. 97-102 6 p. 4457662. (Proceedings - 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2007.; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    11 Citations (Scopus)
  • Performance evaluation model for the face recognition system

    Shin, Y. N., Kim, J., Lee, Y. J., Shin, W. & Choi, J., 2007, Proceedings of the Frontiers in the Convergence of Bioscience and Information Technologies, FBIT 2007. p. 704-708 5 p. 4524191. (Proceedings of the Frontiers in the Convergence of Bioscience and Information Technologies, FBIT 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Power saving medium access for beacon-enabled IEEE 802.15.4 LR-WPANs

    Joongheon, K. & Wonjun, L., 2007, Human Interface and the Management of Information: Interacting in Information Environments - Symposium on Human Interface 2007. Held as Part of HCI International 2007, Proceedings. PART 2 ed. p. 555-562 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4558 LNCS, no. PART 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • PPIDS: Privacy preserving intrusion detection system

    Park, H. A., Lee, D. H., Lim, J. & Cho, S. H., 2007, Intelligence and Security Informatics - Pacific Asia Workshop, PAISI 2007, Proceedings. Springer Verlag, p. 269-274 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4430 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Citations (Scopus)
  • Preimage attack on the parallel FFT-hashing function

    Donghoon, C., Moti, Y., Jaechul, S., Seokhie, H. & Sangjin, L., 2007, Information Security and Privacy - 12th Australasian Conference, ACISP 2007, Proceedings. p. 59-67 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4586 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Q+-Algorithm: An enhanced RFID tag collision arbitration algorithm

    Lee, D., Kim, K. & Lee, W., 2007, Ubiquitous Intelligence and Computing - 4th International Conference, UIC 2007, Proceedings. Springer Verlag, p. 23-32 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4611 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    35 Citations (Scopus)
  • Quantitative risk analysis and evaluation in information systems: A case study

    Kim, Y. G. & Lim, J., 2007, Computational Science - ICCS 2007 - 7th International Conference, Proceedings. PART 3 ed. Springer Verlag, p. 1040-1047 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4489 LNCS, no. PART 3).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    3 Citations (Scopus)
  • Related-key amplified boomerang attacks on the full-round eagle-64 and eagle-128

    Jeong, K., Lee, C., Sung, J., Hong, S. & Lim, J., 2007, Information Security and Privacy - 12th Australasian Conference, ACISP 2007, Proceedings. Springer Verlag, p. 143-157 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4586 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • Related-key rectangle attacks on reduced AES-192 and AES-256

    Kim, J., Hong, S. & Preneel, B., 2007, Fast Software Encryption - 14th International Workshop, FSE 2007. Springer Verlag, p. 225-241 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4593 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    71 Citations (Scopus)
  • RFID privacy protection scheme for secure ubiquitous computing

    Kim, H. S., Oh, J. H. & Choi, J. Y., 2007, Proceedings of the 1st International Workshop on RFID Technology - Concepts, Applications, Challenges IWRT 2007; In Conjunction with ICEIS 2007. p. 117-124 8 p. (Proceedings of the 1st International Workshop on RFID Technology - Concepts, Applications, Challenges IWRT 2007; In Conjunction with ICEIS 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Secure and efficient password-based authenticated key exchange protocol for two-server architecture

    Jun, H. L. & Dong, H. L., 2007, 2007 International Conference on Convergence Information Technology, ICCIT 2007. p. 2102-2107 6 p. 4420564. (2007 International Conference on Convergence Information Technology, ICCIT 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • Secure Mobile RFID system against privacy and security problems

    Il, J. K., Eun, Y. C. & Dong, H. L., 2007, Proceedings of the 3rd International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerU 2007. p. 67-72 6 p. 4279773. (Proceedings - 3rd International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerU 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    13 Citations (Scopus)
  • Secure signed radix-r recoding methods for constrained-embedded devices

    Han, D. G., Kim, S. K., Kim, H. W., Chung, K. I. & Lim, J., 2007, Information Security Practice and Experience - Third International Conference, ISPEC 2007, Proceedings. Springer Verlag, p. 238-253 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4464 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Secure similarity search

    Park, H. A., Kim, B. H., Lee, D. H., Chung, Y. D. & Zhan, J., 2007, Proceedings - 2007 IEEE International Conference on Granular Computing, GrC 2007. p. 598-604 7 p. 4403170. (Proceedings - 2007 IEEE International Conference on Granular Computing, GrC 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    32 Citations (Scopus)
  • Security and handover designs for VoWLAN system

    Kim, M. Y., Lim, M., Sohn, J. S. & Lee, D. H., 2007, Managing Next Generation Networks and Services - 10th Asia-Pacific Network Operations and Management Symposium, APNOMS 2007, Proceedings. Springer Verlag, p. 447-456 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4773 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Security and privacy analysis of RFID authentication protocol for ubiquitous computing

    Kim, H. S. & Choi, J. Y., 2007, Proceedings of 16th International Conference on Computer Communications and Networks 2007, ICCCN 2007. p. 1359-1363 5 p. 4318010. (Proceedings - International Conference on Computer Communications and Networks, ICCCN).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Security assessment for application network services using fault injection

    Kang, H. & Lee, D. H., 2007, Intelligence and Security Informatics - Pacific Asia Workshop, PAISI 2007, Proceedings. Springer Verlag, p. 172-183 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4430 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Self-updating: Strong privacy protection protocol for RFID-tagged banknotes

    Choi, E. Y., Lee, S. M. & Lee, D. H., 2007, Ubiquitous Intelligence and Computing - 4th International Conference, UIC 2007, Proceedings. Springer Verlag, p. 1171-1180 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4611 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • SPA countermeasure based on unsigned left-to-right recodings

    Kim, S. K., Han, D. G., Kim, H. W., Chung, K. I. L. & Lim, J., 2007, Autonomic and Trusted Computing - 4th International Conference, ATC 2007, Proceedings. Springer Verlag, p. 286-295 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4610 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • The design and verification of RFID authentication protocol for ubiquitous computing

    Kim, H. S. & Choi, J. Y., 2007, Proceedings DEXA 2007 18th International Workshop on Database and Expert Systems Applications. p. 693-697 5 p. 4312983. (Proceedings - International Workshop on Database and Expert Systems Applications, DEXA).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Traffic flow based EDCF for QoS enhancement in IEEE 802.11e wireless LAN

    Choi, E., Lee, W. & Shih, T. K., 2007, Proceedings - 21st International Conference on Advanced Information Networking and Applications, AINA 2007. p. 467-473 7 p. 4220929. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • Trapdoor-based mutual authentication scheme without cryptographic primitives in RFID tags

    Lee, H., Eun, Y. C., Lee, S. M. & Dong, H. L., 2007, Proceedings of the 3rd International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerU 2007. p. 73-78 6 p. 4279774. (Proceedings - 3rd International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerU 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Verification method of network simulation for pervasive environments

    Cho, K., Lee, J., Lim, J. & Moon, J., 2007, Proceedings of the 3rd International Conference on Security and Privacy in Communication Networks, SecureComm. p. 155-161 7 p. 4550323. (Proceedings of the 3rd International Conference on Security and Privacy in Communication Networks, SecureComm).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Windows pagefile collection and analysis for a live forensics context

    Lee, S., Savoldi, A., Lee, S. & Lim, J., 2007, Proceedings of Future Generation Communication and Networking, FGCN 2007. Institute of Electrical and Electronics Engineers Inc., p. 97-101 5 p. 4426211. (Proceedings of Future Generation Communication and Networking, FGCN 2007; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • 2006

    Adaptive Splitting Protocols for RFID tag collision arbitration

    Myung, J. & Lee, W., 2006, Proceedings of the Seventh ACM International Symposium on Mobile Ad Hoc Networking and Computing, MOBIHOC 2006. Association for Computing Machinery (ACM), p. 202-213 12 p. (Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc); vol. 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    145 Citations (Scopus)
  • A diffie-hellman key exchange protocol without random oracles

    Jeong, I. R., Kwon, J. O. & Lee, D. H., 2006, Cryptology and Network Security - 5th International Conference, CANS 2006, Proceedings. Springer Verlag, p. 37-54 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4301 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    17 Citations (Scopus)
  • A DRBAC model based on context for smart and secure services in intelligent ubiquitous home

    Park, J. H., Park, J. S., Lee, S. J. & Koh, B. S., 2006, Ubiquitous Intelligence and Computing - Third International Conference, UIC 2006, Proceedings. Springer Verlag, p. 893-901 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4159 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • A key management scheme for large scale distributed sensor networks

    Kim, Y. H., Lee, H., Lee, D. H. & Lim, J., 2006, Personal Wireless Communications - IFIP TC6 11th International Conference, PWC 2006, Proceedings. Cuenca, P. & Orozco-Barbosa, L. (eds.). Springer Verlag, p. 437-446 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4217 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    6 Citations (Scopus)
  • A medium access control scheme for providing reliability in wireless ad hoc networks

    Lee, S. H. & Choi, J. Y., 2006, Wireless Algorithms, Systems, and Applications - First International Conference, WASA 2006, Proceedings. Springer Verlag, p. 341-352 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4138 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • A model for security vulnerability pattern

    Kang, H., Kim, K., Hong, S. & Lee, D. H., 2006, Computational Science and Its Applications - ICCSA 2006: International Conference, Proceedings - Part III. Springer Verlag, p. 385-394 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3982 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Analysis of the power consumption of secure communication in wireless networks

    Kim, K., Hong, J. & Lim, J., 2006, Database and Expert Systems Applications - 17th International Conference, DEXA 2006, Proceedings. Springer Verlag, p. 894-903 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4080 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • An efficient public key cryptosystem with a privacy enhanced double decryption mechanism

    Youn, T. Y., Park, Y. H., Kim, C. H. & Lim, J., 2006, Selected Areas in Cryptography - 12th International Workshop, SAC 2005, Revised Selected Papers. p. 144-158 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3897 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Citations (Scopus)
  • A new dedicated 256-bit hash function: FORK-256

    Hong, D., Chang, D., Sung, J., Lee, S., Hong, S., Lee, J., Moon, D. & Chee, S., 2006, Fast Software Encryption - 13th International Workshop, FSE 2006, Revised Selected Papers. Springer Verlag, p. 195-209 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4047 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    17 Citations (Scopus)
  • A power balanced multipath routing protocol in wireless ad-hoc sensor networks

    Kim, D., Lee, W., Park, B. N., Kim, J., Shin, C. & Shin, C., 2006, Proceedings - Sixth IEEE International Conference on Computer and Information Technology, CIT 2006. 4019987. (Proceedings - Sixth IEEE International Conference on Computer and Information Technology, CIT 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Attack on JPEG2000 steganography using LRCA

    Oh, H., Lee, K. & Lee, S., 2006, Digital Watermarking - 5th International Workshop, IWDW 2006, Proceedings. Springer Verlag, p. 268-281 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4283 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Automatic trap detection of ubiquitous learning on SCORM sequencing

    Wang, C. C., Lin, H. W., Shih, T. K. & Lee, W., 2006, Ubiquitous Intelligence and Computing - Third International Conference, UIC 2006, Proceedings. Springer Verlag, p. 1164-1173 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4159 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • A weak key class of XTEA for a related-key rectangle attack

    Lee, E., Hong, D., Chang, D., Hong, S. & Lim, J., 2006, Progress in Cryptology, VIETCRYPT 2006 - 1st International Conference on Cryptology in Vietnam, Revised Selected Papers. Springer Verlag, p. 286-297 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4341 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Citations (Scopus)
  • Category attack for LSB steganalysis of JPEG images

    Kwangsoo, L., Westfeld, A. & Sangjin, L., 2006, Digital Watermarking - 5th International Workshop, IWDW 2006, Proceedings. Springer Verlag, p. 35-48 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4283 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    17 Citations (Scopus)
  • C-iUMS: Context based smart and secure multimedia service in intelligent ubiquitous home

    Park, J. H., Lee, S. & Hong, S. H., 2006, Emerging Directions in Embedded and Ubiquitous Computing - EUC 2006 Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Proceedings. Zhou, X., Sokolsky, O., Yan, L., Yan, L., Jung, E-S., Shao, Z., Mu, Y., Lee, D-C., Kim, D., Jeong, Y-S. & Xu, C-Z. (eds.). Springer Verlag, p. 660-670 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4097 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    1 Citation (Scopus)
  • Detection and removal of long scratch lines in aged films

    Shih, T. K., Lin, L. H. & Lee, W., 2006, 2006 IEEE International Conference on Multimedia and Expo, ICME 2006 - Proceedings. p. 477-480 4 p. 4036640. (2006 IEEE International Conference on Multimedia and Expo, ICME 2006 - Proceedings; vol. 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    18 Citations (Scopus)
  • Dynamic clustering for coverage-time maximization in two-tiered hierarchical sensor network architectures

    Kim, J., Lee, W., Kim, D., Kim, E., Kim, H. & Ahn, S., 2006, Embedded and Ubiquitous Computing - International Conference, EUC 2006, Proceedings. Springer Verlag, p. 652-661 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4096 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Efficient and provably secure client-to-client password-based key exchange protocol

    Byun, J. W., Lee, D. H. & Lim, J. I., 2006, Frontiers of WWW Research and Development - APWeb 2006 - 8th Asia-Pacific Web Conference, Proceedings. p. 830-836 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3841 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    24 Citations (Scopus)
  • Efficient conjunctive keyword search on encrypted data storage system

    Byun, J. W., Lee, D. H. & Lim, J., 2006, Public Key Infrastructure: Third European PKI Workshop - Theory and Practice, EuroPKI 2006, Proceedings. Springer Verlag, p. 184-196 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4043 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    71 Citations (Scopus)
  • Efficient password-authenticated key exchange for three-party secure against undetectable on-line dictionary attacks

    Kwon, J. O., Sakurai, K. & Lee, D. H., 2006, Computational Science - ICCS 2006: 6th International Conference, Proceedings. Springer Verlag, p. 977-980 4 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3991 LNCS - I).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Energy-aware distributed topology control for coverage-time optimization in clustering-based heterogeneous sensor networks

    Kim, J., Choi, J. & Lee, W., 2006, 2006 IEEE 63rd Vehicular Technology Conference, VTC 2006-Spring - Proceedings. p. 1033-1037 5 p. 1682991. (IEEE Vehicular Technology Conference; vol. 3).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    14 Citations (Scopus)
  • Evolution of Ubi-autonomous entities

    Hung, J., Li, K. C., Lee, W. & Shin, T. K., 2006, Ubiquitous Intelligence and Computing - Third International Conference, UIC 2006, Proceedings. Springer Verlag, p. 1114-1123 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4159 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Finding collision on 45-Step HAS-160

    Yun, A., Sung, S. H., Park, S., Chang, D., Hong, S. & Cho, H. S., 2006, Information Security and Cryptology, ICISC 2005 - 8th International Conference, Revised Selected Papers. Springer Verlag, p. 146-155 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3935 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    11 Citations (Scopus)
  • Forgery and key recovery attacks on PMAC and Mitchell's TMAC variant

    Lee, C., Kim, J., Sung, J., Hong, S. & Lee, S., 2006, Information Security and Privacy: 11th Australasian Conference, ACISP 2006, Proceedings. Springer Verlag, p. 421-431 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4058 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)