If you made any changes in Pure these will be visible here soon.

Research Output 1995 2019

  • 2374 Citations
  • 22 h-Index
  • 94 Conference contribution
  • 77 Article
Filter
Conference contribution
2019

The All-Purpose Sword: North Korea's Cyber Operations and Strategies

Ji-Young, K., Lim, J. I. & Kyoung Gon, K., 2019 May 1, 2019 11th International Conference on Cyber Conflict: Silent Battle, CyCon 2019. Signoretti, M., Tolga, I., Minarik, T., Visky, G., Alatalu, S. & Biondi, S. (eds.). NATO CCD COE Publications, 8756954. (International Conference on Cyber Conflict, CYCON; vol. 2019-May).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Nuclear weapons
Military operations
Missiles
Computer systems
Economics
2018

Legal Consideration on the Use of Artificial Intelligence Technology and Self-regulation in Financial Sector: Focused on Robo-Advisors

Lee, K. Y., Kwon, H-Y. & Lim, J. I., 2018 Jan 1, Information Security Applications - 18th International Conference, WISA 2017, Revised Selected Papers. Kang, B. B. & Kim, T. (eds.). Springer Verlag, p. 323-335 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10763 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Artificial intelligence
Artificial Intelligence
Sector
Industry
Privacy
2017
3 Citations (Scopus)

Automated vulnerability analysis technique for smart grid infrastructure

Kwon, Y., Kim, H. K., Koumadi, K. M., Lim, Y. H. & Lim, J. I., 2017 Oct 26, 2017 IEEE Power and Energy Society Innovative Smart Grid Technologies Conference, ISGT 2017. Institute of Electrical and Electronics Engineers Inc., 8085965

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Smart Grid
Vulnerability
Electricity
Infrastructure
Embedded software
2016
1 Citation (Scopus)

Changes of cybersecurity legal system in East Asia: Focusing on comparison between Korea and Japan

Kim, K., Park, S. & Lim, J. I., 2016, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 9503. p. 348-356 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9503).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Japan
2015
13 Citations (Scopus)

A behavior-based intrusion detection technique for smart grid infrastructure

Kwon, Y. J., Kim, H. K., Lim, Y. H. & Lim, J. I., 2015 Aug 31, 2015 IEEE Eindhoven PowerTech, PowerTech 2015. Institute of Electrical and Electronics Engineers Inc., 7232339

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Intrusion detection
Electricity
SCADA systems
Statistical methods
Availability
2 Citations (Scopus)

A framework of device authentication management in IoT environments

Park, A. J., Kim, H. Y. & Lim, J. I., 2015 Oct 5, 2015 5th International Conference on IT Convergence and Security, ICITCS 2015 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 7292918

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authentication
Accidents
Internet of things

Network and system management object modeling for smart grid infrastructure

Kwon, Y., Kim, M. S., Lim, Y. H. & Lim, J. I., 2015 Sep 24, 17th Asia-Pacific Network Operations and Management Symposium: Managing a Very Connected World, APNOMS 2015. Institute of Electrical and Electronics Engineers Inc., p. 588-591 4 p. 7275400

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Electricity
Automation
Network management
Modeling
System management
2011
54 Citations (Scopus)

A fast and provably secure higher-order masking of AES S-box

Kim, H., Hong, S. & Lim, J. I., 2011 Oct 11, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 6917 LNCS. p. 95-107 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6917 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

S-box
Masking
Higher Order
Table lookup
ROM
4 Citations (Scopus)

Privacy-enhanced deniable authentication e-mail service

Ki, J., Yeong Hwang, J., Nyang, D., Lee, D. H. & Lim, J. I., 2011 Sep 2, Communications in Computer and Information Science. Vol. 194 CCIS. p. 16-29 14 p. (Communications in Computer and Information Science; vol. 194 CCIS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Electronic mail
Authentication
2009

A regression method to compare network data and modeling data using generalized additive model

Chae, S., Lee, H., Cho, J., Jung, M., Lim, J. I. & Moon, J., 2009 Nov 9, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 5379 LNCS. p. 190-200 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5379 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Generalized Additive Models
Data Modeling
Data structures
Regression
Modeling
5 Citations (Scopus)

Efficient sequential architecture for the AES CCM mode in the 802.16e standard

Ji, J. D., Jung, S. W., Jun, E. A. & Lim, J. I., 2009 Dec 1, ICINIS 2009 - Proceedings of the 2nd International Conference on Intelligent Networks and Intelligent Systems. p. 253-256 4 p. 5364531

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
Authentication
Computer hardware
Clocks
Throughput
1 Citation (Scopus)

Evaluation of quality of protection adding HVM in wireless network

Lim, S. H., Kim, H. S., Yun, S., Cho, J. W., Yi, O. & Lim, J. I., 2009 Dec 1, Proceedings - 5th International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2009. 5302103

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Wireless networks
vulnerability
evaluation
reward
traffic
1 Citation (Scopus)

Improved remote user authentication scheme using bilinear pairings

Jun, E. A., Ji, J. D., Lim, J. I. & Jung, S. W., 2009 Dec 1, ACM International Conference Proceeding Series. Vol. 321. p. 602-605 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authentication
Smart cards
Ubiquitous computing
2008
2 Citations (Scopus)

A digital ID purse mechanism using USIM in a mobile environment

Song, D., Lim, S. H., Yi, O. & Lim, J., 2008 Sep 1, Innovations'07: 4th International Conference on Innovations in Information Technology, IIT. p. 670-674 5 p. 4430424

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Internet

An efficient key establishment scheme for self-organizing sensor networks

Kim, Y. H., Choi, K. Y., Lim, J. I. & Lee, D. H., 2008 Feb 21, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4904 LNCS. p. 345-349 5 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4904 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Confidentiality
Self-organizing
Sensor nodes
Sensor networks
Sensor Networks
4 Citations (Scopus)

Design and implementation of a tool to detect accounting frauds

Kim, Y., Savoldi, A., Lee, H., Yun, S., Lee, S. & Lim, J. I., 2008 Oct 22, Proceedings - 2008 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2008. p. 547-552 6 p. 4604117

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Industry
Taxation
Transparency

Detection of hidden information in forensic tools

Kim, Y., Bang, J., Lee, S. & Lim, J. I., 2008 Sep 15, Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. p. 248-252 5 p. 4511571

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Computer forensics
Testing
Hidden information
Crime
Law enforcement
2007

A field guide to hidden accounting information detection

Kim, Y., Bang, J., Lee, G., Lee, S. & Lim, J. I., 2007 Dec 1, Proceedings of Future Generation Communication and Networking, FGCN 2007. Vol. 2. p. 146-150 5 p. 4426220

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Finance
Industry
Data acquisition
1 Citation (Scopus)

Approach of the secure communication mechanism in aero-wireless environment

Kim, K., Hong, J. & Lim, J. I., 2007 Dec 31, Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007. p. 1070-1075 6 p. 4197419

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Wireless networks
Insertion losses
Aircraft
Bit error rate
Secure communication
12 Citations (Scopus)

A secure handover protocol design in wireless networks with formal verification

Lim, S. H., Bang, K. S., Yi, O. & Lim, J. I., 2007 Dec 1, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4517 LNCS. p. 67-78 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4517 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Handover
Formal Verification
Wireless Networks
Wireless networks
Network protocols
5 Citations (Scopus)

A tool for the detection of hidden data in microsoft compound document file format

Kwon, H., Yeog, K., Lee, S. & Lim, J. I., 2007 Dec 1, Proceedings of the International Conference on Information Science and Security, ICISS 2008. p. 141-146 6 p. 4438224

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Application programming interfaces (API)
Internet
Digital forensics

Bogus data filtering in sensor networks

Kim, Y. H., Park, J. H., Lee, D. H. & Lim, J. I., 2007 Dec 1, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4819 LNAI. p. 629-635 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4819 LNAI).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Sensor networks
Sensor Networks
Threshold Scheme
Filtering
Injections
6 Citations (Scopus)

Classification of key management schemes for wireless sensor networks

Lee, H., Kim, Y. H., Lee, D. H. & Lim, J. I., 2007 Dec 1, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4537 LNCS. p. 664-673 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4537 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Key Management
Wireless Sensor Networks
Wireless sensor networks
Guidelines
Attack
1 Citation (Scopus)

Design and implementation of the UsMSS: User-centric secure multimedia service system in intelligent home

Park, J. H., Lee, S., Lee, D. H., Lim, J. I., Hong, I. H. & Yang, L. T., 2007 Sep 25, Proceedings - International Conference on Advanced Information Networking and Applications, AINA. p. 311-316 6 p. 4220909

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Multimedia services
Intelligent systems
Interoperability
Authentication
Sensor networks

Design and implementation of the UsMSS: User-centric secure multimedia service system in intelligent home

Park, J. H., Lee, S., Lee, D. H., Lim, J. I., Hong, I. H. & Yang, L. T., 2007 Dec 31, Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007. p. 1233-1238 6 p. 4197448

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Multimedia services
Intelligent systems
Interoperability
Authentication
Sensor networks
12 Citations (Scopus)

Dynamic activation of role on RBAC for ubiquitous applications

Kim, Y. G. & Lim, J. I., 2007 Dec 1, 2007 International Conference on Convergence Information Technology, ICCIT 2007. p. 1148-1153 6 p. 4420412

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access control
activation
Chemical activation
Personal digital assistants
grant

Efficient an implementation method research of a smart card atomic operation

Jun, E. A., Jung, S. W., Kim, J. G. & Lim, J. I., 2007 Dec 1, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). PART 2 ed. Vol. 4706 LNCS. p. 113-121 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4706 LNCS, no. PART 2).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Smart cards
Research Methods
Smart Card
Buffers
Research

Enhanced doubling attacks on signed-all-bits set recoding

Kim, H., Kim, T. H., Ryoo, J. C., Han, D. G., Kim, H. W. & Lim, J. I., 2007 Dec 20, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4462 LNCS. p. 39-52 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4462 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Aptitude
Countermeasures
Doubling
Signed
Noise

Fast secure communication establishing mechanism for aero-wireless networks

Kim, K., Hong, J. & Lim, J. I., 2007 Dec 1, Proceedings of the IEEE International Conference on Electronics, Circuits, and Systems. p. 1360-1363 4 p. 4511251

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Wireless networks
Bit error rate
Secure communication

HMM-based approach for evaluating risk propagation

Kim, Y. G. & Lim, J. I., 2007 Dec 1, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4430 LNCS. p. 325-326 2 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4430 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Location-aware random pair-wise keys scheme for wireless sensor networks

Ji, Y. C., Yong, H. K., Lim, J. I. & Lee, D. H., 2007 Dec 1, Proceedings - 3rd International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerU 2007. p. 31-36 6 p. 4279767

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Sensor nodes
Wireless sensor networks
Data storage equipment
5 Citations (Scopus)

Modeling and simulation for security risk propagation in critical information systems

Kim, Y. G., Jeong, D., Park, S. H., Lim, J. I. & Baik, D. K., 2007 Dec 1, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4456 LNAI. p. 858-868 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4456 LNAI).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Information Systems
Modeling and Simulation
Information systems
Propagation
Markov Chains
1 Citation (Scopus)

Optimized cryptographic binding protocol using MIPv6 over IEEE 802.16e

Park, H. S., Lim, S. H., Yun, S., Yi, O. & Lim, J. I., 2007 Dec 1, ISCIT 2007 - 2007 International Symposium on Communications and Information Technologies Proceedings. p. 1225-1230 6 p. 4392204

Research output: Chapter in Book/Report/Conference proceedingConference contribution

working group
Telecommunication networks
telecommunication
Internet
Network protocols
10 Citations (Scopus)

Password recovery using an evidence collection tool and countermeasures

Lee, S., Savoldi, A., Lee, S. & Lim, J. I., 2007 Dec 1, Proceedings - 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2007.. Vol. 2. p. 97-102 6 p. 4457662

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Recovery
Computer systems
Data storage equipment
Crime
Cryptography
6 Citations (Scopus)

PPIDS: Privacy preserving intrusion detection system

Park, H. A., Lee, D. H., Lim, J. I. & Cho, S. H., 2007 Dec 1, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4430 LNCS. p. 269-274 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4430 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Privacy
Privacy Preserving
Intrusion detection
Intrusion Detection
3 Citations (Scopus)

Quantitative risk analysis and evaluation in information systems: A case study

Kim, Y. G. & Lim, J. I., 2007 Dec 1, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). PART 3 ed. Vol. 4489 LNCS. p. 1040-1047 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4489 LNCS, no. PART 3).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Risk Evaluation
Quantitative Evaluation
Risk Analysis
Risk analysis
Quantitative Analysis
7 Citations (Scopus)

Related-key amplified boomerang attacks on the full-round eagle-64 and eagle-128

Jeong, K., Lee, C., Sung, J., Hong, S. & Lim, J. I., 2007 Dec 1, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4586 LNCS. p. 143-157 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4586 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Eagles
Cryptography
Attack
Encryption

Secure signed radix-r recoding methods for constrained-embedded devices

Han, D. G., Kim, S. K., Kim, H. W., Chung, K. I. & Lim, J. I., 2007 Dec 20, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4464 LNCS. p. 238-253 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4464 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Signed
Digit
Scalar
Random access storage
Equipment and Supplies

SPA countermeasure based on unsigned left-to-right recodings

Kim, S. K., Han, D. G., Kim, H. W., Chung, K. I. L. & Lim, J. I., 2007 Dec 1, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4610 LNCS. p. 286-295 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4610 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Countermeasures
Digit
Modular Exponentiation
Data storage equipment
Side Channel Attacks
4 Citations (Scopus)

The evidence collection of DoS attack in WLAN by using WLAN forensic profiling system

Yim, D., Lim, J. Y., Yun, S., Lim, S. H., Yi, O. & Lim, J. I., 2007 Dec 1, Proceedings of the International Conference on Information Science and Security, ICISS 2008. p. 197-204 8 p. 4438234

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Wireless local area networks (WLAN)
Crime
Denial-of-service attack
Communication

Verification method of network simulation for pervasive environments

Cho, K., Lee, J., Lim, J. I. & Moon, J., 2007 Dec 1, Proceedings of the 3rd International Conference on Security and Privacy in Communication Networks, SecureComm. p. 155-161 7 p. 4550323

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

Windows pagefile collection and analysis for a live forensics context

Lee, S., Savoldi, A., Lee, S. & Lim, J. I., 2007 Dec 1, Proceedings of Future Generation Communication and Networking, FGCN 2007. Vol. 2. p. 97-101 5 p. 4426211

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data storage equipment
Specifications
2006
6 Citations (Scopus)

A key management scheme for large scale distributed sensor networks

Kim, Y. H., Lee, H., Lee, D. H. & Lim, J. I., 2006 Oct 31, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4217 LNCS. p. 437-446 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4217 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Distributed Sensor
Key Management
Distributed Networks
Sensor nodes
Sensor networks
4 Citations (Scopus)

Analysis of the power consumption of secure communication in wireless networks

Kim, K., Hong, J. & Lim, J. I., 2006 Oct 10, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4080 LNCS. p. 894-903 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4080 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Secure Communication
Internet
Restart
Power Consumption
Wireless Networks
7 Citations (Scopus)

An efficient public key cryptosystem with a privacy enhanced double decryption mechanism

Youn, T. Y., Park, Y. H., Kim, C. H. & Lim, J. I., 2006 Jul 10, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 3897 LNCS. p. 144-158 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3897 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Public-key Cryptosystem
Privacy
Cryptography
Public key
8 Citations (Scopus)

A weak key class of XTEA for a related-key rectangle attack

Lee, E., Hong, D., Chang, D., Hong, S. & Lim, J. I., 2006 Dec 1, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4341 LNCS. p. 286-297 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4341 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Rectangle
Cryptography
Attack
Block Cipher
Encryption
20 Citations (Scopus)

Efficient and provably secure client-to-client password-based key exchange protocol

Byun, J. W., Lee, D. H. & Lim, J. I., 2006 Jul 6, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 3841 LNCS. p. 830-836 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3841 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Key Exchange
Password
Authenticated Key Exchange
Random Oracle Model
Diffie-Hellman
51 Citations (Scopus)

Efficient conjunctive keyword search on encrypted data storage system

Byun, J. W., Lee, D. H. & Lim, J. I., 2006 Jul 27, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4043 LNCS. p. 184-196 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4043 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Keyword Search
Information Storage and Retrieval
Data Storage
Storage System
Information Systems

Further security analysis of XTR

Han, D. G., Takagi, T. & Lim, J. I., 2006 Jul 10, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 3903 LNCS. p. 33-44 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3903 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Exponentiation
Security Analysis
Differential Power Analysis
Side Channel Attacks
Data storage equipment
1 Citation (Scopus)

Generic cryptanalysis of combined countermeasures with randomized BSD representations

Kim, T. H., Han, D. G., Okeya, K. & Lim, J. I., 2006 Jul 14, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 3928 LNCS. p. 119-134 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3928 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptanalysis
Countermeasures
Attack
Differential Power Analysis
Moon