If you made any changes in Pure these will be visible here soon.

Research Output 1995 2019

  • 2374 Citations
  • 22 h-Index
  • 94 Conference contribution
  • 77 Article
2019

Behavior analysis and anomaly detection for a digital substation on cyber-physical system

Kwon, Y., Lee, S., King, R., Lim, J. I. & Kim, H. K., 2019 Mar 1, In : Electronics (Switzerland). 8, 3, 326.

Research output: Contribution to journalArticle

Open Access
Testbeds
Information technology
Transmission control protocol
Internet protocols
Electric power systems

The All-Purpose Sword: North Korea's Cyber Operations and Strategies

Ji-Young, K., Lim, J. I. & Kyoung Gon, K., 2019 May 1, 2019 11th International Conference on Cyber Conflict: Silent Battle, CyCon 2019. Signoretti, M., Tolga, I., Minarik, T., Visky, G., Alatalu, S. & Biondi, S. (eds.). NATO CCD COE Publications, 8756954. (International Conference on Cyber Conflict, CYCON; vol. 2019-May).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Nuclear weapons
Military operations
Missiles
Computer systems
Economics
2018

De-identification policy and risk distribution framework for securing personal information

Joo, M. H., Yoon, S. P., Kwon, H-Y. & Lim, J. I., 2018 Jan 1, In : Information Polity. 23, 2, p. 195-219 25 p.

Research output: Contribution to journalArticle

liability
responsibility
privacy
risk society
exemption

Legal Consideration on the Use of Artificial Intelligence Technology and Self-regulation in Financial Sector: Focused on Robo-Advisors

Lee, K. Y., Kwon, H-Y. & Lim, J. I., 2018 Jan 1, Information Security Applications - 18th International Conference, WISA 2017, Revised Selected Papers. Kang, B. B. & Kim, T. (eds.). Springer Verlag, p. 323-335 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10763 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Artificial intelligence
Artificial Intelligence
Sector
Industry
Privacy

Security Paper Design with Frequency-Selective Structure for X-Band Electromagnetic Detection System

Lee, S. H., Kim, M. S., Kim, J. K., Lim, J. I. & Hong, I. P., 2018 Jan 1, In : International Journal of Antennas and Propagation. 2018, 9836937.

Research output: Contribution to journalArticle

Screen printing
Antenna arrays
Ink
Electromagnetic waves
Silver
2017
Defects
Security of data
Decision making
Industry
3 Citations (Scopus)

Automated vulnerability analysis technique for smart grid infrastructure

Kwon, Y., Kim, H. K., Koumadi, K. M., Lim, Y. H. & Lim, J. I., 2017 Oct 26, 2017 IEEE Power and Energy Society Innovative Smart Grid Technologies Conference, ISGT 2017. Institute of Electrical and Electronics Engineers Inc., 8085965

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Smart Grid
Vulnerability
Electricity
Infrastructure
Embedded software
2 Citations (Scopus)

Measures for automaker’s legal risks from security threats in connected car development lifecycle

Kim, D. H., Baek, S. J. & Lim, J. I., 2017 Feb 28, In : KSII Transactions on Internet and Information Systems. 11, 2, p. 865-882 18 p.

Research output: Contribution to journalArticle

Railroad cars
Sales
Defects
Communication
Automobiles
2016
1 Citation (Scopus)

Changes of cybersecurity legal system in East Asia: Focusing on comparison between Korea and Japan

Kim, K., Park, S. & Lim, J. I., 2016, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 9503. p. 348-356 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9503).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Japan
1 Citation (Scopus)

Developing iot security requirements for service providers

Kim, D. H., Yeon Cho, J., Lim, J. I. & Lee, B. G., 2016 Feb 1, In : Information (Japan). 19, 2, p. 595-603 9 p.

Research output: Contribution to journalArticle

Internet of things
Network protocols
5 Citations (Scopus)

National cyber security enhancement scheme for intelligent surveillance capacity with public IoT environment

Kim, K., Kim, I. J. & Lim, J. I., 2016 Sep 19, (Accepted/In press) In : Journal of Supercomputing. p. 1-12 12 p.

Research output: Contribution to journalArticle

Internet of Things
Surveillance
Enhancement
Critical infrastructures
Critical Infrastructure
5 Citations (Scopus)
Critical infrastructures
Nuclear energy
National security
Ports and harbors
Nuclear power plants
2015
13 Citations (Scopus)

A behavior-based intrusion detection technique for smart grid infrastructure

Kwon, Y. J., Kim, H. K., Lim, Y. H. & Lim, J. I., 2015 Aug 31, 2015 IEEE Eindhoven PowerTech, PowerTech 2015. Institute of Electrical and Electronics Engineers Inc., 7232339

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Intrusion detection
Electricity
SCADA systems
Statistical methods
Availability
2 Citations (Scopus)

A framework of device authentication management in IoT environments

Park, A. J., Kim, H. Y. & Lim, J. I., 2015 Oct 5, 2015 5th International Conference on IT Convergence and Security, ICITCS 2015 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 7292918

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authentication
Accidents
Internet of things
1 Citation (Scopus)
Association rules
Internet
Risk management
Deterioration
Industry
22 Citations (Scopus)

Bidirectional quantum teleportation of unknown photons using path-polarization intra-particle hybrid entanglement and controlled-unitary gates via cross-Kerr nonlinearity

Heo, J., Hong, C. H., Lim, J. I. & Yang, H. J., 2015 May 1, In : Chinese Physics B. 24, 5, p. 50304 1 p., 050304.

Research output: Contribution to journalArticle

nonlinearity
photons
polarization
photonics
detectors
1 Citation (Scopus)
Electric network analysis
virtual reality
Macros
confidence
network analysis
7 Citations (Scopus)

Controlled mutual quantum entity authentication using entanglement swapping

Kang, M. S., Hong, C. H., Heo, J., Lim, J. I. & Yang, H. J., 2015 Sep 1, In : Chinese Physics B. 24, 9, 090306.

Research output: Contribution to journalArticle

certification

Network and system management object modeling for smart grid infrastructure

Kwon, Y., Kim, M. S., Lim, Y. H. & Lim, J. I., 2015 Sep 24, 17th Asia-Pacific Network Operations and Management Symposium: Managing a Very Connected World, APNOMS 2015. Institute of Electrical and Electronics Engineers Inc., p. 588-591 4 p. 7275400

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Electricity
Automation
Network management
Modeling
System management
11 Citations (Scopus)

Quantum signature scheme based on a quantum search algorithm

Yoon, C. S., Kang, M. S., Lim, J. I. & Yang, H. J., 2015 Jan 1, In : Physica Scripta. 90, 1, 015103.

Research output: Contribution to journalArticle

Quantum Algorithms
Signature Scheme
Search Algorithm
signatures
Non-repudiation
10 Citations (Scopus)
Teleportation
Entanglement
Photon
nonlinearity
Nonlinearity
9 Citations (Scopus)

Weakness of lightweight block ciphers mCrypton and LED against biclique cryptanalysis

Jeong, K., Kang, H. C., Lee, C., Sung, J., Hong, S. & Lim, J. I., 2015 Jul 20, In : Peer-to-Peer Networking and Applications. 8, 4, p. 716-732 17 p.

Research output: Contribution to journalArticle

Light emitting diodes
Computational complexity
Cryptography
2014
6 Citations (Scopus)

Comment on "Quantum Signature Scheme with Weak Arbitrator"

Kang, M. S., Hong, C. H., Heo, J., Lim, J. I. & Yang, H. J., 2014 Jan 1, In : International Journal of Theoretical Physics. 53, 6, p. 1862-1866 5 p.

Research output: Contribution to journalArticle

Signature Scheme
Signature
Attack
signatures
Requirements
2 Citations (Scopus)

New detection method and countermeasure of cyber attacks in mix networks

Park, K. C., Shin, H., Park, W. H. & Lim, J. I., 2014 Jun 27, In : Multimedia Tools and Applications. 74, 16, p. 6509-6518 10 p.

Research output: Contribution to journalArticle

Communication
Data communication systems
Internet
20 Citations (Scopus)

Quantum secure direct communication network with hyperentanglement

Hong, C. H., Heo, J., Lim, J. I. & Yang, H. J., 2014, In : Chinese Physics B. 23, 9, 090309.

Research output: Contribution to journalArticle

communication networks
communication
channel capacity
borates
barium
10 Citations (Scopus)

Quantum Signature Scheme Using a Single Qubit Rotation Operator

Kang, M. S., Hong, C. H., Heo, J., Lim, J. I. & Yang, H. J., 2014, In : International Journal of Theoretical Physics. 54, 2, p. 614-629 16 p.

Research output: Contribution to journalArticle

Signature Scheme
Qubit
signatures
operators
Operator
2013
8 Citations (Scopus)

A quantum communication protocol transferring unknown photons using path-polarization hybrid entanglement

Heo, J., Hong, C. H., Lim, J. I. & Yang, H. J., 2013 Apr 1, In : Chinese Physics Letters. 30, 4, 040301.

Research output: Contribution to journalArticle

quantum communication
beam splitters
photons
polarization
detectors
7 Citations (Scopus)

A study of the security of Internet banking and financial private information in South Korea

Lee, J. H., Lim, W. G. & Lim, J. I., 2013 Jul 1, In : Mathematical and Computer Modelling. 58, 1-2, p. 117-131 15 p.

Research output: Contribution to journalArticle

Private Information
Banking
Internet
Electronic document identification systems
Digital Signature
10 Citations (Scopus)
Wireless sensor networks
Hardware
Side channel attack
2012

A method of detecting abnormal malicious remote control codes using network domain information

Oh, H. G., Seo, J. T., Lim, J. I. & Moon, J. S., 2012 May 1, In : Information. 15, 5, p. 2181-2192 12 p.

Research output: Contribution to journalArticle

Demolition
Security of data
Remote control
Security systems
14 Citations (Scopus)

A quantum network system of QSS-QDC using χ-type entangled states

Hong, C. H., Heo, J. O., Lim, J. I. & Yang, H. J., 2012 May 1, In : Chinese Physics Letters. 29, 5, 050303.

Research output: Contribution to journalArticle

communication
communication networks
13 Citations (Scopus)

Constructing strong identity-based designated verifier signatures with self-unverifiability

Ki, J., Hwang, J. Y., Nyang, D., Chang, B. H., Lee, D. H. & Lim, J. I., 2012 Apr 1, In : ETRI Journal. 34, 2, p. 235-244 10 p.

Research output: Contribution to journalArticle

Encapsulation

Efficient sequential architecture of AES CCM for the IEEE 802.16e

Ji, J. D., Jung, S. W. & Lim, J. I., 2012 Jan 1, In : IEICE Transactions on Information and Systems. E-95-D, 1, p. 185-187 3 p.

Research output: Contribution to journalArticle

Cryptography
Throughput
12 Citations (Scopus)

Multi-user quantum network system and quantum communication using χ-type entangled states

Hong, C. H., Heo, J. O., Lim, J. I. & Yang, H. J., 2012 Jul 1, In : Journal of the Korean Physical Society. 61, 1, p. 1-5 5 p.

Research output: Contribution to journalArticle

quantum communication
telecommunication
communication
communication networks
2011
54 Citations (Scopus)

A fast and provably secure higher-order masking of AES S-box

Kim, H., Hong, S. & Lim, J. I., 2011 Oct 11, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 6917 LNCS. p. 95-107 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6917 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

S-box
Masking
Higher Order
Table lookup
ROM
4 Citations (Scopus)

Privacy-enhanced deniable authentication e-mail service

Ki, J., Yeong Hwang, J., Nyang, D., Lee, D. H. & Lim, J. I., 2011 Sep 2, Communications in Computer and Information Science. Vol. 194 CCIS. p. 16-29 14 p. (Communications in Computer and Information Science; vol. 194 CCIS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Electronic mail
Authentication
2010
2 Citations (Scopus)

A new bit-serial multiplier over GF(pm) using irreducible trinomials

Chang, N. S., Kim, T. H., Kim, C. H., Han, D. G. & Lim, J. I., 2010 Jul 1, In : Computers and Mathematics with Applications. 60, 2, p. 355-361 7 p.

Research output: Contribution to journalArticle

p.m.
Cryptography
Multiplier
Pairing
Galois field
5 Citations (Scopus)

A statistical model for network data analysis: KDD CUP 99' data evaluation and its comparing with MIT Lincoln Laboratory network data

Cho, J., Lee, C., Cho, S., Song, J. H., Lim, J. I. & Moon, J., 2010 Apr 1, In : Simulation Modelling Practice and Theory. 18, 4, p. 431-435 5 p.

Research output: Contribution to journalArticle

Intrusion detection
Statistical Model
Data analysis
Evaluation
Telecommunication networks
4 Citations (Scopus)

Fraud detection for information reliability from the internet in forensic accounting

Kim, Y., Lee, S. & Lim, J. I., 2010 Jun 14, In : Journal of Internet Technology. 11, 3, p. 323-332 10 p.

Research output: Contribution to journalArticle

Internet
Industry
Finance
Taxation
31 Citations (Scopus)

Impossible differential cryptanalysis using matrix method

Kim, J., Hong, S. & Lim, J. I., 2010 Mar 6, In : Discrete Mathematics. 310, 5, p. 988-1002 15 p.

Research output: Contribution to journalArticle

Differential Cryptanalysis
Matrix Method
Block Ciphers
Block Cipher
Rijndael
18 Citations (Scopus)

Improved delegation-based authentication protocol for secure roaming service with unlinkability

Youn, T. Y. & Lim, J. I., 2010 Sep 1, In : IEEE Communications Letters. 14, 9, p. 791-793 3 p., 5547598.

Research output: Contribution to journalArticle

Delegation
Authentication Protocol
Authentication
Privacy
Communication systems
25 Citations (Scopus)

N quantum channels are sufficient for Multi-user Quantum Key Distribution protocol between n users

Hong, C. H., Heo, J. O., Khym, G. L., Lim, J. I., Hong, S. K. & Yang, H. J., 2010 Jun 15, In : Optics Communications. 283, 12, p. 2644-2646 3 p.

Research output: Contribution to journalArticle

Quantum cryptography
Communication
communication
Communication systems
telecommunication
9 Citations (Scopus)

Two-way quantum direct communication protocol using entanglement swapping

Hong, C. H., Lim, J. I., Kim, J. I. & Yang, H. J., 2010 Jun 15, In : Journal of the Korean Physical Society. 56, 6, p. 1733-1737 5 p.

Research output: Contribution to journalArticle

attack
communication
messages
receivers
2009

An efficient signature scheme with fast online signing

Youn, T. Y., Park, Y. H. & Lim, J. I., 2009 Oct 1, In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E92-A, 10, p. 2431-2437 7 p.

Research output: Contribution to journalArticle

Signature Scheme
Hash functions
Signature
Provable Security
Standard Model
50 Citations (Scopus)

Anti-cloning protocol suitable to EPCglobal Class-1 Generation-2 RFID systems

Choi, E. Y., Lee, D. H. & Lim, J. I., 2009 Nov 1, In : Computer Standards and Interfaces. 31, 6, p. 1124-1130 7 p.

Research output: Contribution to journalArticle

Cloning
Radio frequency identification (RFID)
radio
electronics
Bar codes

A regression method to compare network data and modeling data using generalized additive model

Chae, S., Lee, H., Cho, J., Jung, M., Lim, J. I. & Moon, J., 2009 Nov 9, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 5379 LNCS. p. 190-200 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5379 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Generalized Additive Models
Data Modeling
Data structures
Regression
Modeling
5 Citations (Scopus)

Efficient sequential architecture for the AES CCM mode in the 802.16e standard

Ji, J. D., Jung, S. W., Jun, E. A. & Lim, J. I., 2009 Dec 1, ICINIS 2009 - Proceedings of the 2nd International Conference on Intelligent Networks and Intelligent Systems. p. 253-256 4 p. 5364531

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
Authentication
Computer hardware
Clocks
Throughput

Efficient trapdoor commitment as secure as factoring with useful properties

Youn, T. Y., Park, Y. H. & Lim, J. I., 2009 Dec 1, In : IEICE Transactions on Information and Systems. E92-D, 12, p. 2520-2523 4 p.

Research output: Contribution to journalArticle

Hardness
1 Citation (Scopus)

Evaluation of quality of protection adding HVM in wireless network

Lim, S. H., Kim, H. S., Yun, S., Cho, J. W., Yi, O. & Lim, J. I., 2009 Dec 1, Proceedings - 5th International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2009. 5302103

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Wireless networks
vulnerability
evaluation
reward
traffic
1 Citation (Scopus)

Formalizing the design, evaluation, and analysis of quality of protection in wireless networks

Lim, S. H., Yun, S., Lim, J. I. & Yi, O., 2009 Dec 1, In : Journal of Communications and Networks. 11, 6, p. 634-644 11 p.

Research output: Contribution to journalArticle

Wireless networks
Heterogeneous networks
3G mobile communication systems
Wireless local area networks (WLAN)
Interoperability