If you made any changes in Pure these will be visible here soon.

Research Output 1993 2019

Filter
Conference contribution
2019
1 Citation (Scopus)

Poster: How to securely record logs based on ARM trust zone

Lee, S., Jo, H. J., Choi, W. & Lee, D. H., 2019 Jul 2, AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 664-666 3 p. (AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
Embedded systems
Communication
Big data
2 Citations (Scopus)

Vehicle communication using secrecy capacity

Ahn, N. Y., Lee, D. H. & Oh, S-J., 2019 Jan 1, Proceedings of the Future Technologies Conference (FTC) 2018 - Volume 2. Kapoor, S., Arai, K. & Bhatia, R. (eds.). Springer Verlag, p. 158-172 15 p. (Advances in Intelligent Systems and Computing; vol. 881).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Communication
Power transmission
Wireless networks

VODKA: Virtualization obfuscation using dynamic key approach

Lee, J. Y., Suk, J. H. & Lee, D. H., 2019 Jan 1, Information Security Applications - 19th International Conference, WISA 2018, Revised Selected Papers. Kang, B. B. & Jang, J. (eds.). Springer Verlag, p. 131-145 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11402 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Obfuscation
Virtualization
Software Security
Debugging
Instrumentation
2018
1 Citation (Scopus)

A privacy-preserving data sharing solution for mobile healthcare

Huang, C., Yan, K., Wei, S. & Lee, D. H., 2018 May 15, Proceedings of 2017 International Conference on Progress in Informatics and Computing, PIC 2017. Institute of Electrical and Electronics Engineers Inc., p. 260-265 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data privacy
Health
mHealth
Biometrics
Access control
3 Citations (Scopus)

Efficient anonymous attribute-based encryption with access policy hidden for cloud computing

Huang, C., Yan, K., Wei, S., Zhang, G. & Lee, D. H., 2018 May 15, Proceedings of 2017 International Conference on Progress in Informatics and Computing, PIC 2017. Institute of Electrical and Electronics Engineers Inc., p. 266-270 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cloud computing
Cryptography
Access control
Security of data
Information technology

Forward secure searchable encryption using key-based blocks chain technique

Lv, S., Huang, Y., Li, B., Wei, Y., Liu, Z., Liu, J. K. & Lee, D. H., 2018 Jan 1, Algorithms and Architectures for Parallel Processing - 18th International Conference, ICA3PP 2018, Proceedings. Vaidya, J. & Li, J. (eds.). Springer Verlag, p. 85-97 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11337 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Encryption
Cryptography
Privacy
Range Query
Tree Structure

Recipient revocable broadcast encryption with dealership

Kim, J. S., Lee, Y., Eom, J. & Lee, D. H., 2018 Jan 1, Information Security and Cryptology - ICISC 2017 - 20th International Conference, Revised Selected Papers. Springer Verlag, p. 214-228 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10779 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Broadcast Encryption
Cryptography
Revocation
Random Oracle
Security Model

Update state tampering: A novel adversary post-compromise technique on cyber threats

Kim, S. J., Kim, B. J., Kim, H. C. & Lee, D. H., 2018 Jan 1, Detection of Intrusions and Malware, and Vulnerability Assessment - 15th International Conference, DIMVA 2018, Proceedings. Springer Verlag, p. 141-161 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10885 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Update
Servers
Vulnerability
Target
Countermeasures

WheelLogger: Driver Tracing Using Smart Watch

Park, J. Y., Yun, J. P. & Lee, D. H., 2018 Jan 1, Information Security Applications - 18th International Conference, WISA 2017, Revised Selected Papers. Springer Verlag, p. 87-100 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10763 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Watches
Tracing
Driver
Apple
Leakage
2017

POSTER: Secure infotainment infrastructure of connected car

Eun, C., Moon, J., Jung, I. Y., Lee, D. H., Park, J. & Kim, E., 2017 Jul 18, Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017. Association for Computing Machinery, Inc, p. 267-268 2 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Railroad cars
Hazards
Internet
Industry
2016
7 Citations (Scopus)

BadVoice: Soundless voice-control replay attack on modern smartphones

Young, P. J., Jin, J. H., Woo, S. & Lee, D. H., 2016 Aug 9, ICUFN 2016 - 8th International Conference on Ubiquitous and Future Networks. IEEE Computer Society, Vol. 2016-August. p. 882-887 6 p. 7537163

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Smartphones
Mobile devices
Speech recognition
Authentication
2 Citations (Scopus)

Keyword updatable PEKS

Rhee, H. S. & Lee, D. H., 2016, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 9503. p. 96-109 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9503).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Keyword Search
Public Key Encryption
Cryptography
Receiver
Privacy
7 Citations (Scopus)

Unbounded hierarchical identity-based encryption with efficient revocation

Ryu, G., Lee, K., Park, S. & Lee, D. H., 2016, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 9503. p. 122-133 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9503).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Identity-based Encryption
Revocation
Cryptography
Binary trees
Binary Tree
2015
2 Citations (Scopus)

An efficient ID-based mutual authentication secure against privileged-insider attack

Kim, S. Y., Kim, H. & Lee, D. H., 2015 Oct 5, 2015 5th International Conference on IT Convergence and Security, ICITCS 2015 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 7292941

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authentication
Network protocols
Cryptography
Internet

An improved fuzzy attribute-based authentication

Yun, J. P., Kim, H. & Lee, D. H., 2015 Oct 5, 2015 5th International Conference on IT Convergence and Security, ICITCS 2015 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 7292946

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authentication
Cryptography
Interpolation
Polynomials

Forward secure non-interactive key exchange from indistinguishability obfuscation

Lee, Y. K. & Lee, D. H., 2015 Oct 5, 2015 5th International Conference on IT Convergence and Security, ICITCS 2015 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 7292984

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Sanders

Self-certified privacy-preserving scheme for vehicle-to-vehicle communications

Cho, K., Lee, B. G. & Lee, D. H., 2015 Jan 1, Lecture Notes in Electrical Engineering. Springer Verlag, Vol. 330. p. 335-341 7 p. (Lecture Notes in Electrical Engineering; vol. 330).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Vehicle to vehicle communications
Vehicular ad hoc networks
Roadsides
Processing
Authentication
2014
7 Citations (Scopus)

Public-key revocation and tracing schemes with subset difference methods revisited

Lee, K., Koo, W. K., Lee, D. H. & Park, J. H., 2014 Jan 1, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). PART 2 ed. Springer Verlag, Vol. 8713 LNCS. p. 1-18 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8713 LNCS, no. PART 2).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Revocation
Public key
Tracing
Encryption
Difference Method
2013

A framework for anomaly pattern recognition in electronic financial transaction using moving average method

Kim, A. C., Park, W. H. & Lee, D. H., 2013 Feb 26, Lecture Notes in Electrical Engineering. Vol. 215 LNEE. p. 93-99 7 p. (Lecture Notes in Electrical Engineering; vol. 215 LNEE).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Pattern recognition
Internet
Industry
9 Citations (Scopus)

Aggregating CL-signatures revisited: Extended functionality and better efficiency

Lee, K., Lee, D. H. & Yung, M., 2013 Sep 5, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 7859 LNCS. p. 171-188 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7859 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Signature
Signature Scheme
Public key
Transactions
Certificate
1 Citation (Scopus)

Attribute-based encryption for commercial content distribution

Kim, H., Park, S., Park, J. H. & Lee, D. H., 2013 Feb 26, Lecture Notes in Electrical Engineering. Vol. 215 LNEE. p. 205-213 9 p. (Lecture Notes in Electrical Engineering; vol. 215 LNEE).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
IPTV
Access control
Videodisks
Computer systems
32 Citations (Scopus)

Predictability of Android OpenSSL's pseudo random number generator

Kim, S. H., Han, D. & Lee, D. H., 2013 Dec 9, Proceedings of the ACM Conference on Computer and Communications Security. p. 659-668 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Smartphones
Entropy
Experiments
Virtual machine
29 Citations (Scopus)

Self-updatable encryption: Time constrained access control with hidden attributes and better efficiency

Lee, K., Choi, S. G., Lee, D. H., Park, J. H. & Yung, M., 2013 Dec 1, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). PART 1 ed. Vol. 8269 LNCS. p. 235-254 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8269 LNCS, no. PART 1).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Constrained Control
Access Control
Access control
Encryption
Cryptography
5 Citations (Scopus)

Sequential aggregate signatures made shorter

Lee, K., Lee, D. H. & Yung, M., 2013 Jul 12, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 7954 LNCS. p. 202-217 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7954 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Short Signature
Signature Scheme
Signature
Public key
Random Oracle
18 Citations (Scopus)

Sequential aggregate signatures with short public keys: Design, analysis and implementation studies

Lee, K., Lee, D. H. & Yung, M., 2013 Feb 21, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 7778 LNCS. p. 423-442 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7778 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Public key
Signature
Signature Scheme
Short Signature
Water
2012
12 Citations (Scopus)

A study on static analysis model of mobile application for privacy protection

Kim, S., Cho, J. I., Myeong, H. W. & Lee, D. H., 2012 Jan 1, Lecture Notes in Electrical Engineering. Vol. 114 LNEE. p. 529-540 12 p. (Lecture Notes in Electrical Engineering; vol. 114 LNEE).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Static analysis
13 Citations (Scopus)

Biometric based secure communications without pre-deployed key for biosensor implanted in body sensor networks

Cho, K. & Lee, D. H., 2012 Mar 15, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 7115 LNCS. p. 203-218 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7115 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Body sensor networks
Biosensor
Secure Communication
Biometrics
Biosensors

Threshold identity-based broadcast encryption from identity-based encryption

Kim, K., Kim, M., Kim, H., Park, J. H. & Lee, D. H., 2012 Dec 17, Communications in Computer and Information Science. Vol. 352 CCIS. p. 99-102 4 p. (Communications in Computer and Information Science; vol. 352 CCIS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
2011
4 Citations (Scopus)

An efficient implementation of block cipher in Android platform

Paik, J. H., Seo, S. C., Kim, Y., Lee, H. J., Jung, H. C. & Lee, D. H., 2011 Sep 14, Proceedings of the 2011 5th FTRA International Conference on Multimedia and Ubiquitous Engineering, MUE 2011. p. 173-176 4 p. 5992211

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

An efficient implementation of KCDSA on Graphic Processing Units

Seo, S. C., Paik, J. H., Lee, D. H., Hong, S., Lee, H. J. & Jung, H. C., 2011 Sep 14, Proceedings of the 2011 5th FTRA International Conference on Multimedia and Ubiquitous Engineering, MUE 2011. p. 167-172 6 p. 5992210

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Electronic document identification systems
Cloud computing
Particle accelerators
Program processors
Servers
3 Citations (Scopus)

Extended fingerprint-based user authentication scheme using smart cards in education IPTV

Jun, E. A., Kim, J. G., Jung, S. W. & Lee, D. H., 2011 Jul 18, 2011 International Conference on Information Science and Applications, ICISA 2011. 5772392

Research output: Chapter in Book/Report/Conference proceedingConference contribution

IPTV
Smart cards
Authentication
Education
Crime

On a security model for a retrieval system over encrypted database

Park, H. A., Byun, J. W., Park, J. H. & Lee, D. H., 2011 Dec 1, Proceedings - 7th International Conference on Information Processing and Management, ICIPM 2011. p. 76-82 7 p. 6222138

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
4 Citations (Scopus)

Privacy-enhanced deniable authentication e-mail service

Ki, J., Yeong Hwang, J., Nyang, D., Lee, D. H. & Lim, J. I., 2011 Sep 2, Communications in Computer and Information Science. Vol. 194 CCIS. p. 16-29 14 p. (Communications in Computer and Information Science; vol. 194 CCIS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Electronic mail
Authentication
2010
3 Citations (Scopus)

A fingerprint-based user authentication scheme using smart cards in IPTV environments

Jun, E. A., Rhee, H. S., Jung, S. W. & Lee, D. H., 2010 Jul 15, 2010 International Conference on Information Science and Applications, ICISA 2010. 5480301

Research output: Chapter in Book/Report/Conference proceedingConference contribution

IPTV
Smart cards
Authentication
Set-top boxes
Cloning
2 Citations (Scopus)

Toward an integrated system between cloud computing and smartcard application

Park, H. A., Park, J. H., Choi, J. T. & Lee, D. H., 2010 Dec 1, Proceeding - 5th International Conference on Computer Sciences and Convergence Information Technology, ICCIT 2010. p. 580-587 8 p. 5711122

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cloud computing
Computer systems
Hardware
2009

Developing a multi-protocol mobility manager for SIP/SS7 networks

Park, H. S., Lee, H. W., Park, S. J. & Lee, D. H., 2009 Oct 13, Proceedings of the International Conference on Complex, Intelligent and Software Intensive Systems, CISIS 2009. p. 565-570 6 p. 5066842

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Internet protocols
Managers
Telecommunication networks
Network protocols
Wireless networks
93 Citations (Scopus)

Improved searchable public key encryption with designated tester

Rhee, H. S., Park, J. H., Susilo, W. & Lee, D. H., 2009 Dec 1, Proceedings of the 4th International Symposium on ACM Symposium on Information, Computer and Communications Security, ASIACCS'09. p. 376-379 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
1 Citation (Scopus)

Practical access control protocol for secure sensor networks

Hwaseong, L., Kilho, S. & Lee, D. H., 2009 Oct 27, Digest of Technical Papers - IEEE International Conference on Consumer Electronics. p. 806-809 4 p. 5157056

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access control
Authentication
Sensor networks
Network protocols

Security authentication for U-health application services

Ahn, B. H., Hong, J. & Lee, D. H., 2009 Dec 1, Communications in Computer and Information Science. Vol. 56. p. 17-24 8 p. (Communications in Computer and Information Science; vol. 56).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Radio frequency identification (RFID)
Authentication
Health
Information management
Software engineering

Security enhancing compiler for localization schemes in pervasive sensor networks

Chun, J. Y., Kim, Y. H., Hwang, J. Y. & Lee, D. H., 2009 Nov 10, Proceedings of the 2009 8th IEEE/ACIS International Conference on Computer and Information Science, ICIS 2009. p. 307-312 6 p. 5222880

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Anchors
Sensor networks
Sensor nodes
Global positioning system
29 Citations (Scopus)

Universal forgery of the identity-based sequential aggregate signature scheme

Hwang, J. Y., Lee, D. H. & Yung, M., 2009 Dec 1, Proceedings of the 4th International Symposium on ACM Symposium on Information, Computer and Communications Security, ASIACCS'09. p. 157-160 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Hardness
2008
26 Citations (Scopus)

A3RP: Anonymous and authenticated ad hoc routing protocol

Paik, J. H., Kim, B. H. & Lee, D. H., 2008 Sep 15, Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. p. 67-72 6 p. 4511536

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Routing protocols
Authentication
anonymity
privacy
Mobile ad hoc networks
2 Citations (Scopus)

A key distribution scheme for wireless sensor networks

Kim, Y. H., Lee, H. & Lee, D. H., 2008 Aug 15, 6th Annual IEEE International Conference on Pervasive Computing and Communications, PerCom 2008. p. 572-577 6 p. 4517458

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Sensor nodes
Sensor networks
Wireless sensor networks
resilience

An efficient key establishment scheme for self-organizing sensor networks

Kim, Y. H., Choi, K. Y., Lim, J. I. & Lee, D. H., 2008 Feb 21, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4904 LNCS. p. 345-349 5 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4904 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Confidentiality
Self-organizing
Sensor nodes
Sensor networks
Sensor Networks
4 Citations (Scopus)

A new public key broadcast encryption using Boneh-Boyen-Goh's HIBE scheme

Park, J. H. & Lee, D. H., 2008 Apr 7, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4991 LNCS. p. 101-115 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4991 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Broadcast Encryption
Public Key Encryption
Cryptography
Public key
Chosen-ciphertext Security
15 Citations (Scopus)

Anonymous and traceable authentication scheme using smart cards

Kim, S., Rhee, H. S., Chun, J. Y. & Lee, D. H., 2008 Sep 15, Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. p. 162-165 4 p. 4511555

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Smart cards
Authentication
Servers
privacy
guarantee
1 Citation (Scopus)

Attribute-based access control using combined authentication technologies

Park, H. A., Lee, D. H. & Zhan, J., 2008 Dec 30, 2008 IEEE International Conference on Granular Computing, GRC 2008. p. 518-523 6 p. 4664774

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access control
Authentication
Control systems
Data privacy
Ubiquitous computing
9 Citations (Scopus)

Auditable and privacy-preserving authentication in vehicular networks

Sung, H. K., Bum, H. K., Young, K. K. & Lee, D. H., 2008 Dec 1, Proceedings - The 2nd International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies, UBICOMM 2008. p. 19-24 6 p. 4641307

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authentication
Communication
Accidents

Authenticated group key distribution for unreliable sensor networks

Lee, H., Kim, Y. H. & Lee, D. H., 2008 Sep 16, Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. p. 285-288 4 p. 4511578

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Base stations
Authentication
Sensor networks
Wireless sensor networks
Group
7 Citations (Scopus)

CADE: Cumulative acknowledgement based detection of selective forwarding attacks in wireless sensor networks*

Kim, Y. K., Lee, H., Cho, K. & Lee, D. H., 2008 Dec 29, Proceedings - 3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008. Vol. 2. p. 416-422 7 p. 4682277

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Wireless sensor networks
Synchronization
Health care
Monitoring
Sensors