• 2445 Citations
  • 22 h-Index
19952020

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

  • 2445 Citations
  • 22 h-Index
  • 92 Conference contribution
  • 77 Article
  • 3 Conference article
Article

A method of detecting abnormal malicious remote control codes using network domain information

Oh, H. G., Seo, J. T., Lim, J. I. & Moon, J. S., 2012 May 1, In : Information. 15, 5, p. 2181-2192 12 p.

Research output: Contribution to journalArticle

Analysis of job stress's impact on job performance and turnover of cybersecurity professionals

Cho, J., Yoo, J. & Lim, J. I., 2020 Jan 1, In : ICIC Express Letters. 14, 4, p. 409-415 7 p.

Research output: Contribution to journalArticle

57 Citations (Scopus)

An efficient signature scheme with fast online signing

Youn, T. Y., Park, Y. H. & Lim, J. I., 2009 Oct 1, In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E92-A, 10, p. 2431-2437 7 p.

Research output: Contribution to journalArticle

A new bit-serial multiplier over GF(pm) using irreducible trinomials

Chang, N. S., Kim, T. H., Kim, C. H., Han, D. G. & Lim, J., 2010 Jul 1, In : Computers and Mathematics with Applications. 60, 2, p. 355-361 7 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)

A new hardware architecture for operations in GF(2n)

Kim, C. H., Oh, S. & Lim, J. I., 2002 Jan 1, In : IEEE Transactions on Computers. 51, 1, p. 90-92 3 p.

Research output: Contribution to journalArticle

12 Citations (Scopus)

Anti-cloning protocol suitable to EPCglobal Class-1 Generation-2 RFID systems

Choi, E. Y., Lee, D. H. & Lim, J. I., 2009 Nov 1, In : Computer Standards and Interfaces. 31, 6, p. 1124-1130 7 p.

Research output: Contribution to journalArticle

52 Citations (Scopus)

A quantum communication protocol transferring unknown photons using path-polarization hybrid entanglement

Heo, J., Hong, C. H., Lim, J. I. & Yang, H. J., 2013 Apr 1, In : Chinese Physics Letters. 30, 4, 040301.

Research output: Contribution to journalArticle

8 Citations (Scopus)

A quantum network system of QSS-QDC using χ-type entangled states

Hong, C. H., Heo, J. O., Lim, J. I. & Yang, H. J., 2012 May 1, In : Chinese Physics Letters. 29, 5, 050303.

Research output: Contribution to journalArticle

14 Citations (Scopus)

Arbitrated quantum signature scheme with message recovery

Lee, H., Hong, C., Kim, H., Lim, J. I. & Yang, H. J., 2004 Feb 16, In : Physics Letters, Section A: General, Atomic and Solid State Physics. 321, 5-6, p. 295-300 6 p.

Research output: Contribution to journalArticle

137 Citations (Scopus)

A statistical model for network data analysis: KDD CUP 99' data evaluation and its comparing with MIT Lincoln Laboratory network data

Cho, J., Lee, C., Cho, S., Song, J. H., Lim, J. & Moon, J., 2010 Apr 1, In : Simulation Modelling Practice and Theory. 18, 4, p. 431-435 5 p.

Research output: Contribution to journalArticle

5 Citations (Scopus)
1 Citation (Scopus)

A study of the security of Internet banking and financial private information in South Korea

Lee, J. H., Lim, W. G. & Lim, J. I., 2013 Jul 1, In : Mathematical and Computer Modelling. 58, 1-2, p. 117-131 15 p.

Research output: Contribution to journalArticle

8 Citations (Scopus)

Behavior analysis and anomaly detection for a digital substation on cyber-physical system

Kwon, Y., Lee, S., King, R., Lim, J. I. & Kim, H. K., 2019 Mar 1, In : Electronics (Switzerland). 8, 3, 326.

Research output: Contribution to journalArticle

Open Access
1 Citation (Scopus)

Bidirectional quantum teleportation of unknown photons using path-polarization intra-particle hybrid entanglement and controlled-unitary gates via cross-Kerr nonlinearity

Heo, J., Hong, C. H., Lim, J. I. & Yang, H. J., 2015 May 1, In : Chinese Physics B. 24, 5, p. 50304 1 p., 050304.

Research output: Contribution to journalArticle

21 Citations (Scopus)
1 Citation (Scopus)

Comment on "Quantum Signature Scheme with Weak Arbitrator"

Kang, M. S., Hong, C. H., Heo, J., Lim, J. I. & Yang, H. J., 2014 Jun, In : International Journal of Theoretical Physics. 53, 6, p. 1862-1866 5 p.

Research output: Contribution to journalArticle

7 Citations (Scopus)

Compression function design principles supporting variable output lengths from a single small function

Chang, D., Nandi, M., Lee, J., Sung, J., Hong, S., Lim, J., Park, H. & Chun, K., 2008 Sep, In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E91-A, 9, p. 2607-2614 8 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Constructing strong identity-based designated verifier signatures with self-unverifiability

Ki, J., Hwang, J. Y., Nyang, D., Chang, B. H., Lee, D. H. & Lim, J. I., 2012 Apr 1, In : ETRI Journal. 34, 2, p. 235-244 10 p.

Research output: Contribution to journalArticle

13 Citations (Scopus)

Controlled mutual quantum entity authentication using entanglement swapping

Kang, M. S., Hong, C. H., Heo, J., Lim, J. I. & Yang, H. J., 2015 Sep 1, In : Chinese Physics B. 24, 9, 090306.

Research output: Contribution to journalArticle

9 Citations (Scopus)

Covert Channel Detection in the ICMP Payload Using Support Vector Machine

Sohn, T., Moon, J., Lee, S., Lee, D. H. & Lim, J. I., 2003 Jan 1, In : Lecture Notes in Computer Science. 2869, p. 828-835 8 p.

Research output: Contribution to journalArticle

18 Citations (Scopus)

De-identification policy and risk distribution framework for securing personal information

Joo, M. H., Yoon, S. P., Kwon, H-Y. & Lim, J. I., 2018 Jan 1, In : Information Polity. 23, 2, p. 195-219 25 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)
1 Citation (Scopus)

Developing iot security requirements for service providers

Kim, D. H., Yeon Cho, J., Lim, J. I. & Lee, B. G., 2016 Feb 1, In : Information (Japan). 19, 2, p. 595-603 9 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Differential power analysis on countermeasures using binary signed digit representations

Kim, T. H., Han, D. G., Okeya, K. & Lim, J. I., 2007 Oct 1, In : ETRI Journal. 29, 5, p. 619-632 14 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)
10 Citations (Scopus)

EC2C-PAKA: An efficient client-to-client password-authenticated key agreement

Byun, J. W., Lee, D. H. & Lim, J. I., 2007 Oct 1, In : Information Sciences. 177, 19, p. 3995-4013 19 p.

Research output: Contribution to journalArticle

62 Citations (Scopus)

Efficient flexible batch signing techniques for imbalanced communication applications

Youn, T. Y., Park, Y. H., Kwon, T., Kwon, S. & Lim, J. I., 2008 May 1, In : IEICE Transactions on Information and Systems. E91-D, 5, p. 1481-1484 4 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)

Efficient normal basis multipliers in composite fields

Oh, S., Kim, C. H., Lim, J. I. & Cheon, D. H., 2000 Oct 1, In : IEEE Transactions on Computers. 49, 10, p. 1133-1138 6 p.

Research output: Contribution to journalArticle

16 Citations (Scopus)
21 Citations (Scopus)

Efficient sequential architecture of AES CCM for the IEEE 802.16e

Ji, J. D., Jung, S. W. & Lim, J. I., 2012 Jan 1, In : IEICE Transactions on Information and Systems. E-95-D, 1, p. 185-187 3 p.

Research output: Contribution to journalArticle

Efficient trapdoor commitment as secure as factoring with useful properties

Youn, T. Y., Park, Y. H. & Lim, J., 2009 Jan 1, In : IEICE Transactions on Information and Systems. E92-D, 12, p. 2520-2523 4 p.

Research output: Contribution to journalArticle

Formalizing the design, evaluation, and analysis of quality of protection in wireless networks

Lim, S. H., Yun, S., Lim, J. & Yi, O., 2009 Dec, In : Journal of Communications and Networks. 11, 6, p. 634-644 11 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Fraud detection for information reliability from the internet in forensic accounting

Kim, Y., Lee, S. & Lim, J. I., 2010 Jun 14, In : Journal of Internet Technology. 11, 3, p. 323-332 10 p.

Research output: Contribution to journalArticle

4 Citations (Scopus)
3 Citations (Scopus)

Global avalanche characteristics and nonlinearity of balanced Boolean functions

Son, J. J., Lim, J. I., Chee, S. & Sung, S. H., 1998 Feb 13, In : Information Processing Letters. 65, 3, p. 139-144 6 p.

Research output: Contribution to journalArticle

21 Citations (Scopus)

Impersonation attack on a strong ID-based key distribution

Hwang, J. Y., Lim, J. & Lee, D., 2008 Jan 1, In : IEICE Transactions on Communications. E91-B, 8, p. 2702-2703 2 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)
69 Citations (Scopus)

Impossible differential cryptanalysis of zodiac

Hong, D., Sung, J., Moriai, S., Lee, S. & Lim, J. I., 2002 Jan 1, In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E85-A, 1, p. 38-43 6 p.

Research output: Contribution to journalArticle

Impossible differential cryptanalysis using matrix method

Kim, J., Hong, S. & Lim, J. I., 2010 Mar 6, In : Discrete Mathematics. 310, 5, p. 988-1002 15 p.

Research output: Contribution to journalArticle

31 Citations (Scopus)

Improved delegation-based authentication protocol for secure roaming service with unlinkability

Youn, T. Y. & Lim, J. I., 2010 Sep 1, In : IEEE Communications Letters. 14, 9, p. 791-793 3 p., 5547598.

Research output: Contribution to journalArticle

18 Citations (Scopus)
10 Citations (Scopus)
42 Citations (Scopus)

Known-IV, known-in-advance-IV, and replayed-and-known-IV attacks on multiple modes of operation of block ciphers

Hong, D., Hong, S., Lee, W., Lee, S., Lim, J. I., Sung, J. & Yi, O., 2006 Oct 1, In : Journal of Cryptology. 19, 4, p. 441-462 22 p.

Research output: Contribution to journalArticle

21 Citations (Scopus)

Measures for automaker’s legal risks from security threats in connected car development lifecycle

Kim, D. H., Baek, S. J. & Lim, J. I., 2017 Feb 28, In : KSII Transactions on Internet and Information Systems. 11, 2, p. 865-882 18 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)
2 Citations (Scopus)

Multi-user quantum network system and quantum communication using χ-type entangled states

Hong, C. H., Heo, J. O., Lim, J. I. & Yang, H. J., 2012 Jul 1, In : Journal of the Korean Physical Society. 61, 1, p. 1-5 5 p.

Research output: Contribution to journalArticle

12 Citations (Scopus)

National cyber security enhancement scheme for intelligent surveillance capacity with public IoT environment

Kim, K., Kim, I. J. & Lim, J. I., 2016 Sep 19, (Accepted/In press) In : Journal of Supercomputing. p. 1-12 12 p.

Research output: Contribution to journalArticle

5 Citations (Scopus)