• Source: Scopus
  • Calculated based on no. of publications stored in Pure and citations from Scopus
1995 …2021

Research activity per year

If you made any changes in Pure these will be visible here soon.
Filter
Conference contribution

Search results

  • 2019

    The All-Purpose Sword: North Korea's Cyber Operations and Strategies

    Ji-Young, K., Lim, J. I. & Kyoung Gon, K., 2019 May 1, 2019 11th International Conference on Cyber Conflict: Silent Battle, CyCon 2019. Signoretti, M., Tolga, I., Minarik, T., Visky, G., Alatalu, S. & Biondi, S. (eds.). NATO CCD COE Publications, 8756954. (International Conference on Cyber Conflict, CYCON; vol. 2019-May).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • 2018

    Legal Consideration on the Use of Artificial Intelligence Technology and Self-regulation in Financial Sector: Focused on Robo-Advisors

    Lee, K. Y., Kwon, H-Y. & Lim, J. I., 2018 Jan 1, Information Security Applications - 18th International Conference, WISA 2017, Revised Selected Papers. Kang, B. B. & Kim, T. (eds.). Springer Verlag, p. 323-335 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10763 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • 2017

    Automated vulnerability analysis technique for smart grid infrastructure

    Kwon, Y., Kim, H. K., Koumadi, K. M., Lim, Y. H. & Lim, J. I., 2017 Oct 26, 2017 IEEE Power and Energy Society Innovative Smart Grid Technologies Conference, ISGT 2017. Institute of Electrical and Electronics Engineers Inc., 8085965

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • 2016

    Changes of cybersecurity legal system in East Asia: Focusing on comparison between Korea and Japan

    Kim, K., Park, S. & Lim, J. I., 2016, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 9503. p. 348-356 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9503).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • 2015

    A behavior-based intrusion detection technique for smart grid infrastructure

    Kwon, Y. J., Kim, H. K., Lim, Y. H. & Lim, J. I., 2015 Aug 31, 2015 IEEE Eindhoven PowerTech, PowerTech 2015. Institute of Electrical and Electronics Engineers Inc., 7232339

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    23 Citations (Scopus)
  • A framework of device authentication management in IoT environments

    Park, A. J., Kim, H. Y. & Lim, J. I., 2015 Oct 5, 2015 5th International Conference on IT Convergence and Security, ICITCS 2015 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 7292918. (2015 5th International Conference on IT Convergence and Security, ICITCS 2015 - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Network and system management object modeling for smart grid infrastructure

    Kwon, Y., Kim, M. S., Lim, Y. H. & Lim, J. I., 2015 Sep 24, 17th Asia-Pacific Network Operations and Management Symposium: Managing a Very Connected World, APNOMS 2015. Institute of Electrical and Electronics Engineers Inc., p. 588-591 4 p. 7275400

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2011

    A fast and provably secure higher-order masking of AES S-box

    Kim, H. S., Hong, S. & Lim, J., 2011, Cryptographic Hardware and Embedded Systems - 13th International Workshop, CHES 2011, Proceedings. p. 95-107 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6917 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    62 Citations (Scopus)
  • Privacy-enhanced deniable authentication e-mail service

    Ki, J. H., Yeong Hwang, J., Nyang, D. H., Hoon Lee, D. & Lim, J., 2011, Digital Enterprise and Information Systems - International Conference, DEIS 2011, Proceedings. p. 16-29 14 p. (Communications in Computer and Information Science; vol. 194 CCIS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • 2009

    A regression method to compare network data and modeling data using generalized additive model

    Chae, S., Lee, H., Cho, J., Jung, M., Lim, J. & Moon, J., 2009, Information Security Applications - 9th International Workshop, WISA 2008, Revised Selected Papers. p. 190-200 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5379 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Efficient sequential architecture for the AES CCM mode in the 802.16e standard

    Ji, J. D., Jung, S. W., Jun, E. A. & Lim, J., 2009, ICINIS 2009 - Proceedings of the 2nd International Conference on Intelligent Networks and Intelligent Systems. p. 253-256 4 p. 5364531. (ICINIS 2009 - Proceedings of the 2nd International Conference on Intelligent Networks and Intelligent Systems).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Evaluation of quality of protection adding HVM in wireless network

    Lim, S. H., Kim, H. S., Yun, S., Cho, J. W., Yi, O. & Lim, J., 2009, Proceedings - 5th International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2009. 5302103. (Proceedings - 5th International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Improved remote user authentication scheme using bilinear pairings

    Jun, E. A., Ji, J. D., Lim, J. & Jung, S. W., 2009, ICHIT 2009 - International Conference on Convergence and Hybrid Information Technology 2009. p. 602-605 4 p. (ACM International Conference Proceeding Series; vol. 321).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • 2008

    An efficient key establishment scheme for self-organizing sensor networks

    Kim, Y. H., Choi, K. Y., Lim, J. & Lee, D. H., 2008, Distributed Computing and Networking - 9th International Conference, ICDCN 2008, Proceedings. Springer Verlag, p. 345-349 5 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4904 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • A tool for the detection of hidden data in microsoft compound document file format

    Kwon, H., Yeog, K., Sangjin, L. & Jongin, L., 2008, Proceedings of the International Conference on Information Science and Security, ICISS 2008. IEEE Computer Society, p. 141-146 6 p. 4438224. (Proceedings of the International Conference on Information Science and Security, ICISS 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Design and implementation of a tool to detect accounting frauds

    Kim, Y., Savoldi, A., Lee, H., Yun, S., Lee, S. & Lim, J., 2008, Proceedings - 2008 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2008. p. 547-552 6 p. 4604117. (Proceedings - 2008 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • Detection of hidden information in forensic tools

    Kim, Y., Bang, J., Lee, S. & Lim, J., 2008, Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. p. 248-252 5 p. 4511571. (Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • The evidence collection of DoS attack in WLAN by using WLAN forensic profiling system

    Yim, D., Lim, J. Y., Yun, S., Lim, S. H., Yi, O. & Lim, J., 2008, Proceedings of the International Conference on Information Science and Security, ICISS 2008. IEEE Computer Society, p. 197-204 8 p. 4438234. (Proceedings of the International Conference on Information Science and Security, ICISS 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • 2007

    A digital ID purse mechanism using USIM in a mobile environment

    Song, D., Lim, S. H., Yi, O. & Lim, J., 2007, Innovations'07: 4th International Conference on Innovations in Information Technology, IIT. IEEE Computer Society, p. 670-674 5 p. 4430424. (Innovations'07: 4th International Conference on Innovations in Information Technology, IIT).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • A field guide to hidden accounting information detection

    Kim, Y., Bang, J., Lee, G. T., Lee, S. J. & Lim, J., 2007, Proceedings of Future Generation Communication and Networking, FGCN 2007. Institute of Electrical and Electronics Engineers Inc., p. 146-150 5 p. 4426220. (Proceedings of Future Generation Communication and Networking, FGCN 2007; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Approach of the secure communication mechanism in aero-wireless environment

    Kim, K., Hong, J. & Lim, J., 2007, Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007. p. 1070-1075 6 p. 4197419. (Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • A secure handover protocol design in wireless networks with formal verification

    Lim, S. H., Bang, K. S., Yi, O. & Lim, J., 2007, Wired/Wireless Internet Communications - 5th International Conference, WWIC 2007, Proceedings. Springer Verlag, p. 67-78 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4517 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    12 Citations (Scopus)
  • Bogus data filtering in sensor networks

    Kim, Y. H., Park, J. H., Lee, D. H. & Lim, J., 2007, Emerging Technologies in Knowledge Discovery and Data Mining - PAKDD 2007 International Workshops, Revised Selected Papers. Springer Verlag, p. 629-635 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4819 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Classification of key management schemes for wireless sensor networks

    Lee, H., Kim, Y. H., Lee, D. H. & Lim, J., 2007, Advances in Web and Network Technologies, and Information Management - APWeb/WAIM 2007 International Workshops DBMAN 2007, WebETrends 2007, PAIS 2007 and ASWAN 2007, Proceedings. Springer Verlag, p. 664-673 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4537 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • Design and implementation of the UsMSS: User-centric secure multimedia service system in intelligent home

    Park, J. H., Lee, S., Lee, D. H., Lim, J., Hong, I. H. & Yang, L. T., 2007, Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007. p. 1233-1238 6 p. 4197448. (Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Design and implementation of the UsMSS: User-centric secure multimedia service system in intelligent home

    Park, J. H., Lee, S., Lee, D. H., Lim, J., Hong, I. H. & Yang, L. T., 2007, Proceedings - 21st International Conference on Advanced Information Networking and Applications, AINA 2007. p. 311-316 6 p. 4220909. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Dynamic activation of role on RBAC for ubiquitous applications

    Kim, Y. G. & Lim, J., 2007, 2007 International Conference on Convergence Information Technology, ICCIT 2007. p. 1148-1153 6 p. 4420412. (2007 International Conference on Convergence Information Technology, ICCIT 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    13 Citations (Scopus)
  • Efficient an implementation method research of a smart card atomic operation

    Jun, E. A., Jung, S. W., Kim, J. G. & Lim, J. I., 2007, Computational Science and Its Applications - ICCSA 2007 - International Conference, Proceedings. PART 2 ed. Springer Verlag, p. 113-121 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4706 LNCS, no. PART 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Enhanced doubling attacks on signed-all-bits set recoding

    Kim, H. S., Kim, T. H., Ryoo, J. C., Han, D. G., Kim, H. W. & Lim, J., 2007, Information Security Theory and Practices: Smart Cards, Mobile and Ubiquitous Computing Systems - First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Proceedings. Sauveron, D., Markantonakis, K., Bilas, A. & Quisquater, J-J. (eds.). Springer Verlag, p. 39-52 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4462 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Fast secure communication establishing mechanism for aero-wireless networks

    Kim, K., Hong, J. & Lim, J., 2007, ICECS 2007 - 14th IEEE International Conference on Electronics, Circuits and Systems. p. 1360-1363 4 p. 4511251. (Proceedings of the IEEE International Conference on Electronics, Circuits, and Systems).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • HMM-based approach for evaluating risk propagation

    Kim, Y. G. & Lim, J., 2007, Intelligence and Security Informatics - Pacific Asia Workshop, PAISI 2007, Proceedings. Springer Verlag, p. 325-326 2 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4430 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Location-aware random pair-wise keys scheme for wireless sensor networks

    Ji, Y. C., Yong, H. K., Lim, J. & Dong, H. L., 2007, Proceedings of the 3rd International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerU 2007. p. 31-36 6 p. 4279767. (Proceedings - 3rd International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerU 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Modeling and simulation for security risk propagation in critical information systems

    Kim, Y. G., Jeong, D., Park, S. H., Lim, J. & Baik, D. K., 2007, Computational Intelligence and Security - International Conference, CIS 2006, Revised Selected Papers. Springer Verlag, p. 858-868 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4456 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • Optimized cryptographic binding protocol using MIPv6 over IEEE 802.16e

    Park, H. S., Lim, S. H., Yun, S., Yi, O. & Lim, J., 2007, ISCIT 2007 - 2007 International Symposium on Communications and Information Technologies Proceedings. p. 1225-1230 6 p. 4392204. (ISCIT 2007 - 2007 International Symposium on Communications and Information Technologies Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Password recovery using an evidence collection tool and countermeasures

    Lee, S., Savoldi, A., Lee, S. & Lim, J., 2007, Proceedings - 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2007.. p. 97-102 6 p. 4457662. (Proceedings - 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2007.; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    11 Citations (Scopus)
  • PPIDS: Privacy preserving intrusion detection system

    Park, H. A., Lee, D. H., Lim, J. & Cho, S. H., 2007, Intelligence and Security Informatics - Pacific Asia Workshop, PAISI 2007, Proceedings. p. 269-274 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4430 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Citations (Scopus)
  • Quantitative risk analysis and evaluation in information systems: A case study

    Kim, Y. G. & Lim, J., 2007, Computational Science - ICCS 2007 - 7th International Conference, Proceedings. PART 3 ed. Springer Verlag, p. 1040-1047 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4489 LNCS, no. PART 3).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    3 Citations (Scopus)
  • Related-key amplified boomerang attacks on the full-round eagle-64 and eagle-128

    Jeong, K., Lee, C., Sung, J., Hong, S. & Lim, J., 2007, Information Security and Privacy - 12th Australasian Conference, ACISP 2007, Proceedings. Springer Verlag, p. 143-157 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4586 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • Secure signed radix-r recoding methods for constrained-embedded devices

    Han, D. G., Kim, S. K., Kim, H. W., Chung, K. I. & Lim, J., 2007, Information Security Practice and Experience - Third International Conference, ISPEC 2007, Proceedings. Springer Verlag, p. 238-253 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4464 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • SPA countermeasure based on unsigned left-to-right recodings

    Kim, S. K., Han, D. G., Kim, H. W., Chung, K. I. L. & Lim, J., 2007, Autonomic and Trusted Computing - 4th International Conference, ATC 2007, Proceedings. Springer Verlag, p. 286-295 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4610 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Verification method of network simulation for pervasive environments

    Cho, K., Lee, J., Lim, J. & Moon, J., 2007, Proceedings of the 3rd International Conference on Security and Privacy in Communication Networks, SecureComm. p. 155-161 7 p. 4550323. (Proceedings of the 3rd International Conference on Security and Privacy in Communication Networks, SecureComm).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Windows pagefile collection and analysis for a live forensics context

    Lee, S., Savoldi, A., Lee, S. & Lim, J., 2007, Proceedings of Future Generation Communication and Networking, FGCN 2007. Institute of Electrical and Electronics Engineers Inc., p. 97-101 5 p. 4426211. (Proceedings of Future Generation Communication and Networking, FGCN 2007; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • 2006

    A key management scheme for large scale distributed sensor networks

    Kim, Y. H., Lee, H., Lee, D. H. & Lim, J., 2006, Personal Wireless Communications - IFIP TC6 11th International Conference, PWC 2006, Proceedings. Cuenca, P. & Orozco-Barbosa, L. (eds.). Springer Verlag, p. 437-446 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4217 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    6 Citations (Scopus)
  • Analysis of the power consumption of secure communication in wireless networks

    Kim, K., Hong, J. & Lim, J., 2006, Database and Expert Systems Applications - 17th International Conference, DEXA 2006, Proceedings. Springer Verlag, p. 894-903 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4080 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • An efficient public key cryptosystem with a privacy enhanced double decryption mechanism

    Youn, T. Y., Park, Y. H., Kim, C. H. & Lim, J., 2006, Selected Areas in Cryptography - 12th International Workshop, SAC 2005, Revised Selected Papers. p. 144-158 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3897 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • A weak key class of XTEA for a related-key rectangle attack

    Lee, E., Hong, D., Chang, D., Hong, S. & Lim, J., 2006, Progress in Cryptology, VIETCRYPT 2006 - 1st International Conference on Cryptology in Vietnam, Revised Selected Papers. Springer Verlag, p. 286-297 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4341 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Citations (Scopus)
  • Efficient and provably secure client-to-client password-based key exchange protocol

    Byun, J. W., Lee, D. H. & Lim, J. I., 2006, Frontiers of WWW Research and Development - APWeb 2006 - 8th Asia-Pacific Web Conference, Proceedings. p. 830-836 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3841 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    20 Citations (Scopus)
  • Efficient conjunctive keyword search on encrypted data storage system

    Byun, J. W., Lee, D. H. & Lim, J., 2006, Public Key Infrastructure: Third European PKI Workshop - Theory and Practice, EuroPKI 2006, Proceedings. Springer Verlag, p. 184-196 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4043 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    61 Citations (Scopus)
  • Further security analysis of XTR

    Han, D. G., Takagi, T. & Lim, J., 2006, Information Security Practice and Experience - Second International Conference, ISPEC 2006, Proceedings. p. 33-44 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3903 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Generic cryptanalysis of combined countermeasures with randomized BSD representations

    Kim, T. H., Han, D. G., Okeya, K. & Lim, J., 2006, Smart Card Research and Advanced Applications - 7th IFIP WG 8.8/11.2 International Conference, CARDIS 2006, Proceedings. Domingo-Ferrer, J., Posegga, J. & Schreckling, D. (eds.). Springer Verlag, p. 119-134 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3928 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    1 Citation (Scopus)