• 2483 Citations
  • 22 h-Index
19952020

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

  • 2483 Citations
  • 22 h-Index
  • 82 Conference contribution
  • 69 Article
  • 14 Conference article
  • 7 Chapter
2020

Analysis of job stress's impact on job performance and turnover of cybersecurity professionals

Cho, J., Yoo, J. & Lim, J. I., 2020, In : ICIC Express Letters. 14, 4, p. 409-415 7 p.

Research output: Contribution to journalArticle

2019

Behavior analysis and anomaly detection for a digital substation on cyber-physical system

Kwon, Y., Lee, S., King, R., Lim, J. I. & Kim, H. K., 2019 Mar 1, In : Electronics (Switzerland). 8, 3, 326.

Research output: Contribution to journalArticle

Open Access
3 Citations (Scopus)

The All-Purpose Sword: North Korea's Cyber Operations and Strategies

Ji-Young, K., Lim, J. I. & Kyoung Gon, K., 2019 May 1, 2019 11th International Conference on Cyber Conflict: Silent Battle, CyCon 2019. Signoretti, M., Tolga, I., Minarik, T., Visky, G., Alatalu, S. & Biondi, S. (eds.). NATO CCD COE Publications, 8756954. (International Conference on Cyber Conflict, CYCON; vol. 2019-May).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2018

De-identification policy and risk distribution framework for securing personal information

Joo, M. H., Yoon, S. P., Kwon, H-Y. & Lim, J. I., 2018 Jan 1, In : Information Polity. 23, 2, p. 195-219 25 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Legal Consideration on the Use of Artificial Intelligence Technology and Self-regulation in Financial Sector: Focused on Robo-Advisors

Lee, K. Y., Kwon, H-Y. & Lim, J. I., 2018 Jan 1, Information Security Applications - 18th International Conference, WISA 2017, Revised Selected Papers. Kang, B. B. & Kim, T. (eds.). Springer Verlag, p. 323-335 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10763 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Security Paper Design with Frequency-Selective Structure for X-Band Electromagnetic Detection System

Lee, S. H., Kim, M. S., Kim, J. K., Lim, J. I. & Hong, I. P., 2018 Jan 1, In : International Journal of Antennas and Propagation. 2018, 9836937.

Research output: Contribution to journalArticle

2017

Automated vulnerability analysis technique for smart grid infrastructure

Kwon, Y., Kim, H. K., Koumadi, K. M., Lim, Y. H. & Lim, J. I., 2017 Oct 26, 2017 IEEE Power and Energy Society Innovative Smart Grid Technologies Conference, ISGT 2017. Institute of Electrical and Electronics Engineers Inc., 8085965

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Measures for automaker’s legal risks from security threats in connected car development lifecycle

Kim, D. H., Baek, S. J. & Lim, J. I., 2017 Feb 28, In : KSII Transactions on Internet and Information Systems. 11, 2, p. 865-882 18 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)
2016

Changes of cybersecurity legal system in East Asia: Focusing on comparison between Korea and Japan

Kim, K., Park, S. & Lim, J. I., 2016, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 9503. p. 348-356 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9503).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Developing iot security requirements for service providers

Kim, D. H., Yeon Cho, J., Lim, J. I. & Lee, B. G., 2016 Feb 1, In : Information (Japan). 19, 2, p. 595-603 9 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

National cyber security enhancement scheme for intelligent surveillance capacity with public IoT environment

Kim, K., Kim, I. J. & Lim, J. I., 2016 Sep 19, (Accepted/In press) In : Journal of Supercomputing. p. 1-12 12 p.

Research output: Contribution to journalArticle

6 Citations (Scopus)
7 Citations (Scopus)
2015

A behavior-based intrusion detection technique for smart grid infrastructure

Kwon, Y. J., Kim, H. K., Lim, Y. H. & Lim, J. I., 2015 Aug 31, 2015 IEEE Eindhoven PowerTech, PowerTech 2015. Institute of Electrical and Electronics Engineers Inc., 7232339

Research output: Chapter in Book/Report/Conference proceedingConference contribution

19 Citations (Scopus)

A framework of device authentication management in IoT environments

Park, A. J., Kim, H. Y. & Lim, J. I., 2015 Oct 5, 2015 5th International Conference on IT Convergence and Security, ICITCS 2015 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 7292918

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)
1 Citation (Scopus)

Bidirectional quantum teleportation of unknown photons using path-polarization intra-particle hybrid entanglement and controlled-unitary gates via cross-Kerr nonlinearity

Heo, J., Hong, C. H., Lim, J. I. & Yang, H. J., 2015 May 1, In : Chinese Physics B. 24, 5, p. 50304 1 p., 050304.

Research output: Contribution to journalArticle

21 Citations (Scopus)
1 Citation (Scopus)

Controlled mutual quantum entity authentication using entanglement swapping

Kang, M. S., Hong, C. H., Heo, J., Lim, J. I. & Yang, H. J., 2015 Sep 1, In : Chinese Physics B. 24, 9, 090306.

Research output: Contribution to journalArticle

9 Citations (Scopus)

Network and system management object modeling for smart grid infrastructure

Kwon, Y., Kim, M. S., Lim, Y. H. & Lim, J. I., 2015 Sep 24, 17th Asia-Pacific Network Operations and Management Symposium: Managing a Very Connected World, APNOMS 2015. Institute of Electrical and Electronics Engineers Inc., p. 588-591 4 p. 7275400

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Quantum signature scheme based on a quantum search algorithm

Yoon, C. S., Kang, M. S., Lim, J. I. & Yang, H. J., 2015 Jan 1, In : Physica Scripta. 90, 1, 015103.

Research output: Contribution to journalArticle

15 Citations (Scopus)
10 Citations (Scopus)

Weakness of lightweight block ciphers mCrypton and LED against biclique cryptanalysis

Jeong, K., Kang, H. C., Lee, C., Sung, J., Hong, S. & Lim, J. I., 2015 Jul 20, In : Peer-to-Peer Networking and Applications. 8, 4, p. 716-732 17 p.

Research output: Contribution to journalArticle

9 Citations (Scopus)
2014

Comment on "Quantum Signature Scheme with Weak Arbitrator"

Kang, M. S., Hong, C. H., Heo, J., Lim, J. I. & Yang, H. J., 2014 Jun, In : International Journal of Theoretical Physics. 53, 6, p. 1862-1866 5 p.

Research output: Contribution to journalArticle

7 Citations (Scopus)

New detection method and countermeasure of cyber attacks in mix networks

Park, K. C., Shin, H., Park, W. H. & Lim, J. I., 2014 Jun 27, In : Multimedia Tools and Applications. 74, 16, p. 6509-6518 10 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)

Quantum secure direct communication network with hyperentanglement

Hong, C. H., Heo, J., Lim, J. I. & Yang, H. J., 2014, In : Chinese Physics B. 23, 9, 090309.

Research output: Contribution to journalArticle

21 Citations (Scopus)

Quantum Signature Scheme Using a Single Qubit Rotation Operator

Kang, M. S., Hong, C. H., Heo, J., Lim, J. I. & Yang, H. J., 2014, In : International Journal of Theoretical Physics. 54, 2, p. 614-629 16 p.

Research output: Contribution to journalArticle

12 Citations (Scopus)
2013

A quantum communication protocol transferring unknown photons using path-polarization hybrid entanglement

Heo, J., Hong, C. H., Lim, J. I. & Yang, H. J., 2013 Apr, In : Chinese Physics Letters. 30, 4, 040301.

Research output: Contribution to journalArticle

8 Citations (Scopus)

A study of the security of Internet banking and financial private information in South Korea

Lee, J. H., Lim, W. G. & Lim, J. I., 2013 Jul, In : Mathematical and Computer Modelling. 58, 1-2, p. 117-131 15 p.

Research output: Contribution to journalArticle

8 Citations (Scopus)
10 Citations (Scopus)
2012

A method of detecting abnormal malicious remote control codes using network domain information

Oh, H. G., Seo, J. T., Lim, J. I. & Moon, J. S., 2012 May, In : Information. 15, 5, p. 2181-2192 12 p.

Research output: Contribution to journalArticle

A quantum network system of QSS-QDC using χ-type entangled states

Hong, C. H., Heo, J. O., Lim, J. I. & Yang, H. J., 2012 May, In : Chinese Physics Letters. 29, 5, 050303.

Research output: Contribution to journalArticle

14 Citations (Scopus)

Constructing strong identity-based designated verifier signatures with self-unverifiability

Ki, J., Hwang, J. Y., Nyang, D., Chang, B. H., Lee, D. H. & Lim, J. I., 2012 Apr, In : ETRI Journal. 34, 2, p. 235-244 10 p.

Research output: Contribution to journalArticle

13 Citations (Scopus)

Efficient sequential architecture of AES CCM for the IEEE 802.16e

Ji, J. D., Jung, S. W. & Lim, J., 2012 Jan, In : IEICE Transactions on Information and Systems. E-95-D, 1, p. 185-187 3 p.

Research output: Contribution to journalArticle

Multi-user quantum network system and quantum communication using χ-type entangled states

Hong, C. H., Heo, J. O., Lim, J. I. & Yang, H. J., 2012 Jul, In : Journal of the Korean Physical Society. 61, 1, p. 1-5 5 p.

Research output: Contribution to journalArticle

12 Citations (Scopus)
2011

A fast and provably secure higher-order masking of AES S-box

Kim, H. S., Hong, S. & Lim, J., 2011, Cryptographic Hardware and Embedded Systems - 13th International Workshop, CHES 2011, Proceedings. p. 95-107 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6917 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

58 Citations (Scopus)

Privacy-enhanced deniable authentication e-mail service

Ki, J. H., Yeong Hwang, J., Nyang, D. H., Hoon Lee, D. & Lim, J., 2011, Digital Enterprise and Information Systems - International Conference, DEIS 2011, Proceedings. p. 16-29 14 p. (Communications in Computer and Information Science; vol. 194 CCIS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)
2010

A new bit-serial multiplier over GF(pm) using irreducible trinomials

Chang, N. S., Kim, T. H., Kim, C. H., Han, D. G. & Lim, J., 2010 Jul, In : Computers and Mathematics with Applications. 60, 2, p. 355-361 7 p.

Research output: Contribution to journalArticle

4 Citations (Scopus)

A statistical model for network data analysis: KDD CUP 99' data evaluation and its comparing with MIT Lincoln Laboratory network data

Cho, J., Lee, C., Cho, S., Song, J. H., Lim, J. & Moon, J., 2010 Apr, In : Simulation Modelling Practice and Theory. 18, 4, p. 431-435 5 p.

Research output: Contribution to journalArticle

5 Citations (Scopus)

Fraud detection for information reliability from the internet in forensic accounting

Kim, Y., Lee, S. J. & Lim, J. I., 2010, In : Journal of Internet Technology. 11, 3, p. 323-332 10 p.

Research output: Contribution to journalArticle

4 Citations (Scopus)

Impossible differential cryptanalysis using matrix method

Kim, J., Hong, S. & Lim, J., 2010 Mar 6, In : Discrete Mathematics. 310, 5, p. 988-1002 15 p.

Research output: Contribution to journalArticle

31 Citations (Scopus)

Improved delegation-based authentication protocol for secure roaming service with unlinkability

Youn, T. Y. & Lim, J., 2010 Sep, In : IEEE Communications Letters. 14, 9, p. 791-793 3 p., 5547598.

Research output: Contribution to journalArticle

18 Citations (Scopus)

N quantum channels are sufficient for Multi-user Quantum Key Distribution protocol between n users

Hong, C. H., Heo, J. O., Khym, G. L., Lim, J., Hong, S. K. & Yang, H. J., 2010 Jun 15, In : Optics Communications. 283, 12, p. 2644-2646 3 p.

Research output: Contribution to journalArticle

27 Citations (Scopus)

Two-way quantum direct communication protocol using entanglement swapping

Hong, C. H., Lim, J. I., Kim, J. I. & Yang, H. J., 2010 Jun 15, In : Journal of the Korean Physical Society. 56, 6, p. 1733-1737 5 p.

Research output: Contribution to journalArticle

9 Citations (Scopus)
2009

An efficient signature scheme with fast online signing

Youn, T. Y., Park, Y. H. & Lim, J., 2009 Oct, In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E92-A, 10, p. 2431-2437 7 p.

Research output: Contribution to journalArticle

Anti-cloning protocol suitable to EPCglobal Class-1 Generation-2 RFID systems

Choi, E. Y., Lee, D. H. & Lim, J. I., 2009 Nov, In : Computer Standards and Interfaces. 31, 6, p. 1124-1130 7 p.

Research output: Contribution to journalArticle

52 Citations (Scopus)

A regression method to compare network data and modeling data using generalized additive model

Chae, S., Lee, H., Cho, J., Jung, M., Lim, J. & Moon, J., 2009, Information Security Applications - 9th International Workshop, WISA 2008, Revised Selected Papers. p. 190-200 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5379 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Efficient sequential architecture for the AES CCM mode in the 802.16e standard

Ji, J. D., Jung, S. W., Jun, E. A. & Lim, J., 2009, ICINIS 2009 - Proceedings of the 2nd International Conference on Intelligent Networks and Intelligent Systems. p. 253-256 4 p. 5364531. (ICINIS 2009 - Proceedings of the 2nd International Conference on Intelligent Networks and Intelligent Systems).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

Efficient trapdoor commitment as secure as factoring with useful properties

Youn, T. Y., Park, Y. H. & Lim, J., 2009, In : IEICE Transactions on Information and Systems. E92-D, 12, p. 2520-2523 4 p.

Research output: Contribution to journalArticle

Evaluation of quality of protection adding HVM in wireless network

Lim, S. H., Kim, H. S., Yun, S., Cho, J. W., Yi, O. & Lim, J., 2009, Proceedings - 5th International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2009. 5302103. (Proceedings - 5th International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2009).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)