If you made any changes in Pure these will be visible here soon.

Research Output 1995 2019

  • 2374 Citations
  • 22 h-Index
  • 94 Conference contribution
  • 77 Article
Filter
Article
2019

Behavior analysis and anomaly detection for a digital substation on cyber-physical system

Kwon, Y., Lee, S., King, R., Lim, J. I. & Kim, H. K., 2019 Mar 1, In : Electronics (Switzerland). 8, 3, 326.

Research output: Contribution to journalArticle

Open Access
Testbeds
Information technology
Transmission control protocol
Internet protocols
Electric power systems
2018

De-identification policy and risk distribution framework for securing personal information

Joo, M. H., Yoon, S. P., Kwon, H-Y. & Lim, J. I., 2018 Jan 1, In : Information Polity. 23, 2, p. 195-219 25 p.

Research output: Contribution to journalArticle

liability
responsibility
privacy
risk society
exemption

Security Paper Design with Frequency-Selective Structure for X-Band Electromagnetic Detection System

Lee, S. H., Kim, M. S., Kim, J. K., Lim, J. I. & Hong, I. P., 2018 Jan 1, In : International Journal of Antennas and Propagation. 2018, 9836937.

Research output: Contribution to journalArticle

Screen printing
Antenna arrays
Ink
Electromagnetic waves
Silver
2017
Defects
Security of data
Decision making
Industry
2 Citations (Scopus)

Measures for automaker’s legal risks from security threats in connected car development lifecycle

Kim, D. H., Baek, S. J. & Lim, J. I., 2017 Feb 28, In : KSII Transactions on Internet and Information Systems. 11, 2, p. 865-882 18 p.

Research output: Contribution to journalArticle

Railroad cars
Sales
Defects
Communication
Automobiles
2016
1 Citation (Scopus)

Developing iot security requirements for service providers

Kim, D. H., Yeon Cho, J., Lim, J. I. & Lee, B. G., 2016 Feb 1, In : Information (Japan). 19, 2, p. 595-603 9 p.

Research output: Contribution to journalArticle

Internet of things
Network protocols
5 Citations (Scopus)

National cyber security enhancement scheme for intelligent surveillance capacity with public IoT environment

Kim, K., Kim, I. J. & Lim, J. I., 2016 Sep 19, (Accepted/In press) In : Journal of Supercomputing. p. 1-12 12 p.

Research output: Contribution to journalArticle

Internet of Things
Surveillance
Enhancement
Critical infrastructures
Critical Infrastructure
5 Citations (Scopus)
Critical infrastructures
Nuclear energy
National security
Ports and harbors
Nuclear power plants
2015
1 Citation (Scopus)
Association rules
Internet
Risk management
Deterioration
Industry
22 Citations (Scopus)

Bidirectional quantum teleportation of unknown photons using path-polarization intra-particle hybrid entanglement and controlled-unitary gates via cross-Kerr nonlinearity

Heo, J., Hong, C. H., Lim, J. I. & Yang, H. J., 2015 May 1, In : Chinese Physics B. 24, 5, p. 50304 1 p., 050304.

Research output: Contribution to journalArticle

nonlinearity
photons
polarization
photonics
detectors
1 Citation (Scopus)
Electric network analysis
virtual reality
Macros
confidence
network analysis
7 Citations (Scopus)

Controlled mutual quantum entity authentication using entanglement swapping

Kang, M. S., Hong, C. H., Heo, J., Lim, J. I. & Yang, H. J., 2015 Sep 1, In : Chinese Physics B. 24, 9, 090306.

Research output: Contribution to journalArticle

certification
11 Citations (Scopus)

Quantum signature scheme based on a quantum search algorithm

Yoon, C. S., Kang, M. S., Lim, J. I. & Yang, H. J., 2015 Jan 1, In : Physica Scripta. 90, 1, 015103.

Research output: Contribution to journalArticle

Quantum Algorithms
Signature Scheme
Search Algorithm
signatures
Non-repudiation
10 Citations (Scopus)
Teleportation
Entanglement
Photon
nonlinearity
Nonlinearity
9 Citations (Scopus)

Weakness of lightweight block ciphers mCrypton and LED against biclique cryptanalysis

Jeong, K., Kang, H. C., Lee, C., Sung, J., Hong, S. & Lim, J. I., 2015 Jul 20, In : Peer-to-Peer Networking and Applications. 8, 4, p. 716-732 17 p.

Research output: Contribution to journalArticle

Light emitting diodes
Computational complexity
Cryptography
2014
6 Citations (Scopus)

Comment on "Quantum Signature Scheme with Weak Arbitrator"

Kang, M. S., Hong, C. H., Heo, J., Lim, J. I. & Yang, H. J., 2014 Jan 1, In : International Journal of Theoretical Physics. 53, 6, p. 1862-1866 5 p.

Research output: Contribution to journalArticle

Signature Scheme
Signature
Attack
signatures
Requirements
2 Citations (Scopus)

New detection method and countermeasure of cyber attacks in mix networks

Park, K. C., Shin, H., Park, W. H. & Lim, J. I., 2014 Jun 27, In : Multimedia Tools and Applications. 74, 16, p. 6509-6518 10 p.

Research output: Contribution to journalArticle

Communication
Data communication systems
Internet
20 Citations (Scopus)

Quantum secure direct communication network with hyperentanglement

Hong, C. H., Heo, J., Lim, J. I. & Yang, H. J., 2014, In : Chinese Physics B. 23, 9, 090309.

Research output: Contribution to journalArticle

communication networks
communication
channel capacity
borates
barium
10 Citations (Scopus)

Quantum Signature Scheme Using a Single Qubit Rotation Operator

Kang, M. S., Hong, C. H., Heo, J., Lim, J. I. & Yang, H. J., 2014, In : International Journal of Theoretical Physics. 54, 2, p. 614-629 16 p.

Research output: Contribution to journalArticle

Signature Scheme
Qubit
signatures
operators
Operator
2013
8 Citations (Scopus)

A quantum communication protocol transferring unknown photons using path-polarization hybrid entanglement

Heo, J., Hong, C. H., Lim, J. I. & Yang, H. J., 2013 Apr 1, In : Chinese Physics Letters. 30, 4, 040301.

Research output: Contribution to journalArticle

quantum communication
beam splitters
photons
polarization
detectors
7 Citations (Scopus)

A study of the security of Internet banking and financial private information in South Korea

Lee, J. H., Lim, W. G. & Lim, J. I., 2013 Jul 1, In : Mathematical and Computer Modelling. 58, 1-2, p. 117-131 15 p.

Research output: Contribution to journalArticle

Private Information
Banking
Internet
Electronic document identification systems
Digital Signature
10 Citations (Scopus)
Wireless sensor networks
Hardware
Side channel attack
2012

A method of detecting abnormal malicious remote control codes using network domain information

Oh, H. G., Seo, J. T., Lim, J. I. & Moon, J. S., 2012 May 1, In : Information. 15, 5, p. 2181-2192 12 p.

Research output: Contribution to journalArticle

Demolition
Security of data
Remote control
Security systems
14 Citations (Scopus)

A quantum network system of QSS-QDC using χ-type entangled states

Hong, C. H., Heo, J. O., Lim, J. I. & Yang, H. J., 2012 May 1, In : Chinese Physics Letters. 29, 5, 050303.

Research output: Contribution to journalArticle

communication
communication networks
13 Citations (Scopus)

Constructing strong identity-based designated verifier signatures with self-unverifiability

Ki, J., Hwang, J. Y., Nyang, D., Chang, B. H., Lee, D. H. & Lim, J. I., 2012 Apr 1, In : ETRI Journal. 34, 2, p. 235-244 10 p.

Research output: Contribution to journalArticle

Encapsulation

Efficient sequential architecture of AES CCM for the IEEE 802.16e

Ji, J. D., Jung, S. W. & Lim, J. I., 2012 Jan 1, In : IEICE Transactions on Information and Systems. E-95-D, 1, p. 185-187 3 p.

Research output: Contribution to journalArticle

Cryptography
Throughput
12 Citations (Scopus)

Multi-user quantum network system and quantum communication using χ-type entangled states

Hong, C. H., Heo, J. O., Lim, J. I. & Yang, H. J., 2012 Jul 1, In : Journal of the Korean Physical Society. 61, 1, p. 1-5 5 p.

Research output: Contribution to journalArticle

quantum communication
telecommunication
communication
communication networks
2010
2 Citations (Scopus)

A new bit-serial multiplier over GF(pm) using irreducible trinomials

Chang, N. S., Kim, T. H., Kim, C. H., Han, D. G. & Lim, J. I., 2010 Jul 1, In : Computers and Mathematics with Applications. 60, 2, p. 355-361 7 p.

Research output: Contribution to journalArticle

p.m.
Cryptography
Multiplier
Pairing
Galois field
5 Citations (Scopus)

A statistical model for network data analysis: KDD CUP 99' data evaluation and its comparing with MIT Lincoln Laboratory network data

Cho, J., Lee, C., Cho, S., Song, J. H., Lim, J. I. & Moon, J., 2010 Apr 1, In : Simulation Modelling Practice and Theory. 18, 4, p. 431-435 5 p.

Research output: Contribution to journalArticle

Intrusion detection
Statistical Model
Data analysis
Evaluation
Telecommunication networks
4 Citations (Scopus)

Fraud detection for information reliability from the internet in forensic accounting

Kim, Y., Lee, S. & Lim, J. I., 2010 Jun 14, In : Journal of Internet Technology. 11, 3, p. 323-332 10 p.

Research output: Contribution to journalArticle

Internet
Industry
Finance
Taxation
31 Citations (Scopus)

Impossible differential cryptanalysis using matrix method

Kim, J., Hong, S. & Lim, J. I., 2010 Mar 6, In : Discrete Mathematics. 310, 5, p. 988-1002 15 p.

Research output: Contribution to journalArticle

Differential Cryptanalysis
Matrix Method
Block Ciphers
Block Cipher
Rijndael
18 Citations (Scopus)

Improved delegation-based authentication protocol for secure roaming service with unlinkability

Youn, T. Y. & Lim, J. I., 2010 Sep 1, In : IEEE Communications Letters. 14, 9, p. 791-793 3 p., 5547598.

Research output: Contribution to journalArticle

Delegation
Authentication Protocol
Authentication
Privacy
Communication systems
25 Citations (Scopus)

N quantum channels are sufficient for Multi-user Quantum Key Distribution protocol between n users

Hong, C. H., Heo, J. O., Khym, G. L., Lim, J. I., Hong, S. K. & Yang, H. J., 2010 Jun 15, In : Optics Communications. 283, 12, p. 2644-2646 3 p.

Research output: Contribution to journalArticle

Quantum cryptography
Communication
communication
Communication systems
telecommunication
9 Citations (Scopus)

Two-way quantum direct communication protocol using entanglement swapping

Hong, C. H., Lim, J. I., Kim, J. I. & Yang, H. J., 2010 Jun 15, In : Journal of the Korean Physical Society. 56, 6, p. 1733-1737 5 p.

Research output: Contribution to journalArticle

attack
communication
messages
receivers
2009

An efficient signature scheme with fast online signing

Youn, T. Y., Park, Y. H. & Lim, J. I., 2009 Oct 1, In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E92-A, 10, p. 2431-2437 7 p.

Research output: Contribution to journalArticle

Signature Scheme
Hash functions
Signature
Provable Security
Standard Model
50 Citations (Scopus)

Anti-cloning protocol suitable to EPCglobal Class-1 Generation-2 RFID systems

Choi, E. Y., Lee, D. H. & Lim, J. I., 2009 Nov 1, In : Computer Standards and Interfaces. 31, 6, p. 1124-1130 7 p.

Research output: Contribution to journalArticle

Cloning
Radio frequency identification (RFID)
radio
electronics
Bar codes

Efficient trapdoor commitment as secure as factoring with useful properties

Youn, T. Y., Park, Y. H. & Lim, J. I., 2009 Dec 1, In : IEICE Transactions on Information and Systems. E92-D, 12, p. 2520-2523 4 p.

Research output: Contribution to journalArticle

Hardness
1 Citation (Scopus)

Formalizing the design, evaluation, and analysis of quality of protection in wireless networks

Lim, S. H., Yun, S., Lim, J. I. & Yi, O., 2009 Dec 1, In : Journal of Communications and Networks. 11, 6, p. 634-644 11 p.

Research output: Contribution to journalArticle

Wireless networks
Heterogeneous networks
3G mobile communication systems
Wireless local area networks (WLAN)
Interoperability

Technical protection measures for personal information in each processing phase in the Korean public sector

Shim, M., Baek, S., Park, T., Seol, J. & Lim, J. I., 2009 Nov 12, In : KSII Transactions on Internet and Information Systems. 3, 5, p. 548-574 27 p.

Research output: Contribution to journalArticle

Processing
Cryptography
Access control
Websites
Economics
3 Citations (Scopus)

U-HMS: Hybrid system for secure intelligent multimedia data services in Ubi-Home

Park, J. H., Lee, S., Lim, J. I. & Yang, L. T., 2009 Jun 1, In : Journal of Intelligent Manufacturing. 20, 3, p. 337-346 10 p.

Research output: Contribution to journalArticle

Multimedia services
Hybrid systems
Authentication
Multimedia systems
Data privacy
65 Citations (Scopus)

Weaknesses in an anonymous authentication scheme for roaming service in global mobility networks

Youn, T. Y., Park, Y. H. & Lim, J. I., 2009 Aug 14, In : IEEE Communications Letters. 13, 7, p. 471-473 3 p.

Research output: Contribution to journalArticle

Network Mobility
Authentication
Wireless networks
Attack
Anonymity
2008
1 Citation (Scopus)

Compression function design principles supporting variable output lengths from a single small function

Chang, D., Nandi, M., Lee, J., Sung, J., Hong, S., Lim, J. I., Park, H. & Chun, K., 2008 Sep 1, In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E91-A, 9, p. 2607-2614 8 p.

Research output: Contribution to journalArticle

Small Function
Compression Function
Output
Random Oracle
Block Cipher
3 Citations (Scopus)

Efficient flexible batch signing techniques for imbalanced communication applications

Youn, T. Y., Park, Y. H., Kwon, T., Kwon, S. & Lim, J. I., 2008 May 1, In : IEICE Transactions on Information and Systems. E91-D, 5, p. 1481-1484 4 p.

Research output: Contribution to journalArticle

Communication
1 Citation (Scopus)

Impersonation attack on a strong ID-based key distribution

Hwang, J. Y., Lim, J. I. & Lee, D. H., 2008 Dec 1, In : IEICE Transactions on Communications. E91-B, 8, p. 2702-2703 2 p.

Research output: Contribution to journalArticle

9 Citations (Scopus)

Power analysis attacks and countermeasures on ηT pairing over binary fields

Kim, T. H., Takagi, T., Han, D. G., Kim, H. & Lim, J. I., 2008 Feb 1, In : ETRI Journal. 30, 1, p. 68-79 12 p.

Research output: Contribution to journalArticle

Smart cards
Side channel attack
14 Citations (Scopus)

Weak-key classes of 7-round MISTY 1 and 2 for related-key amplified boomerang attacks

Lee, E., Kim, J., Hong, D., Lee, C., Sung, J., Hong, S. & Lim, J. I., 2008 Dec 1, In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E91-A, 2, p. 642-649 8 p.

Research output: Contribution to journalArticle

Cryptography
Attack
Encryption
Linear Cryptanalysis
Differential Cryptanalysis
5 Citations (Scopus)

Weakness in a RSA-based password authenticated key exchange protocol

Youn, T. Y., Park, Y. H., Kim, C. & Lim, J. I., 2008 Nov 30, In : Information Processing Letters. 108, 6, p. 339-342 4 p.

Research output: Contribution to journalArticle

Authenticated Key Exchange
Password
Glossaries
Security Proof
Formal Proof
2007
3 Citations (Scopus)

Differential power analysis on countermeasures using binary signed digit representations

Kim, T. H., Han, D. G., Okeya, K. & Lim, J. I., 2007 Oct 1, In : ETRI Journal. 29, 5, p. 619-632 14 p.

Research output: Contribution to journalArticle

Cryptography
Side channel attack
62 Citations (Scopus)

EC2C-PAKA: An efficient client-to-client password-authenticated key agreement

Byun, J. W., Lee, D. H. & Lim, J. I., 2007 Oct 1, In : Information Sciences. 177, 19, p. 3995-4013 19 p.

Research output: Contribution to journalArticle

Key Agreement
Password
Network protocols
Paradigm
Security Model
2006
1 Citation (Scopus)

An efficient ID-based delegation network

Youn, T. G., Park, Y. H., Kim, C. H. & Lim, J. I., 2006 Dec 15, In : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4277 LNCS - I, p. 382-391 10 p.

Research output: Contribution to journalArticle

Delegation
Identity-based
Proxy
Proxy Signature
Pairing