• 2445 Citations
  • 22 h-Index
19952020

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

  • 2445 Citations
  • 22 h-Index
  • 92 Conference contribution
  • 77 Article
  • 3 Conference article
Filter
Article
2020

Analysis of job stress's impact on job performance and turnover of cybersecurity professionals

Cho, J., Yoo, J. & Lim, J. I., 2020 Jan 1, In : ICIC Express Letters. 14, 4, p. 409-415 7 p.

Research output: Contribution to journalArticle

2019

Behavior analysis and anomaly detection for a digital substation on cyber-physical system

Kwon, Y., Lee, S., King, R., Lim, J. I. & Kim, H. K., 2019 Mar 1, In : Electronics (Switzerland). 8, 3, 326.

Research output: Contribution to journalArticle

Open Access
1 Citation (Scopus)
2018

De-identification policy and risk distribution framework for securing personal information

Joo, M. H., Yoon, S. P., Kwon, H-Y. & Lim, J. I., 2018 Jan 1, In : Information Polity. 23, 2, p. 195-219 25 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Security Paper Design with Frequency-Selective Structure for X-Band Electromagnetic Detection System

Lee, S. H., Kim, M. S., Kim, J. K., Lim, J. I. & Hong, I. P., 2018 Jan 1, In : International Journal of Antennas and Propagation. 2018, 9836937.

Research output: Contribution to journalArticle

2017

Measures for automaker’s legal risks from security threats in connected car development lifecycle

Kim, D. H., Baek, S. J. & Lim, J. I., 2017 Feb 28, In : KSII Transactions on Internet and Information Systems. 11, 2, p. 865-882 18 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)
2016

Developing iot security requirements for service providers

Kim, D. H., Yeon Cho, J., Lim, J. I. & Lee, B. G., 2016 Feb 1, In : Information (Japan). 19, 2, p. 595-603 9 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

National cyber security enhancement scheme for intelligent surveillance capacity with public IoT environment

Kim, K., Kim, I. J. & Lim, J. I., 2016 Sep 19, (Accepted/In press) In : Journal of Supercomputing. p. 1-12 12 p.

Research output: Contribution to journalArticle

5 Citations (Scopus)
5 Citations (Scopus)
2015
1 Citation (Scopus)

Bidirectional quantum teleportation of unknown photons using path-polarization intra-particle hybrid entanglement and controlled-unitary gates via cross-Kerr nonlinearity

Heo, J., Hong, C. H., Lim, J. I. & Yang, H. J., 2015 May 1, In : Chinese Physics B. 24, 5, p. 50304 1 p., 050304.

Research output: Contribution to journalArticle

21 Citations (Scopus)
1 Citation (Scopus)

Controlled mutual quantum entity authentication using entanglement swapping

Kang, M. S., Hong, C. H., Heo, J., Lim, J. I. & Yang, H. J., 2015 Sep 1, In : Chinese Physics B. 24, 9, 090306.

Research output: Contribution to journalArticle

9 Citations (Scopus)

Quantum signature scheme based on a quantum search algorithm

Yoon, C. S., Kang, M. S., Lim, J. I. & Yang, H. J., 2015 Jan 1, In : Physica Scripta. 90, 1, 015103.

Research output: Contribution to journalArticle

14 Citations (Scopus)
10 Citations (Scopus)

Weakness of lightweight block ciphers mCrypton and LED against biclique cryptanalysis

Jeong, K., Kang, H. C., Lee, C., Sung, J., Hong, S. & Lim, J. I., 2015 Jul 20, In : Peer-to-Peer Networking and Applications. 8, 4, p. 716-732 17 p.

Research output: Contribution to journalArticle

9 Citations (Scopus)
2014

Comment on "Quantum Signature Scheme with Weak Arbitrator"

Kang, M. S., Hong, C. H., Heo, J., Lim, J. I. & Yang, H. J., 2014 Jun, In : International Journal of Theoretical Physics. 53, 6, p. 1862-1866 5 p.

Research output: Contribution to journalArticle

7 Citations (Scopus)

New detection method and countermeasure of cyber attacks in mix networks

Park, K. C., Shin, H., Park, W. H. & Lim, J. I., 2014 Jun 27, In : Multimedia Tools and Applications. 74, 16, p. 6509-6518 10 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)

Quantum secure direct communication network with hyperentanglement

Hong, C. H., Heo, J., Lim, J. I. & Yang, H. J., 2014, In : Chinese Physics B. 23, 9, 090309.

Research output: Contribution to journalArticle

21 Citations (Scopus)

Quantum Signature Scheme Using a Single Qubit Rotation Operator

Kang, M. S., Hong, C. H., Heo, J., Lim, J. I. & Yang, H. J., 2014, In : International Journal of Theoretical Physics. 54, 2, p. 614-629 16 p.

Research output: Contribution to journalArticle

12 Citations (Scopus)
2013

A quantum communication protocol transferring unknown photons using path-polarization hybrid entanglement

Heo, J., Hong, C. H., Lim, J. I. & Yang, H. J., 2013 Apr 1, In : Chinese Physics Letters. 30, 4, 040301.

Research output: Contribution to journalArticle

8 Citations (Scopus)

A study of the security of Internet banking and financial private information in South Korea

Lee, J. H., Lim, W. G. & Lim, J. I., 2013 Jul 1, In : Mathematical and Computer Modelling. 58, 1-2, p. 117-131 15 p.

Research output: Contribution to journalArticle

8 Citations (Scopus)
10 Citations (Scopus)
2012

A method of detecting abnormal malicious remote control codes using network domain information

Oh, H. G., Seo, J. T., Lim, J. I. & Moon, J. S., 2012 May 1, In : Information. 15, 5, p. 2181-2192 12 p.

Research output: Contribution to journalArticle

A quantum network system of QSS-QDC using χ-type entangled states

Hong, C. H., Heo, J. O., Lim, J. I. & Yang, H. J., 2012 May 1, In : Chinese Physics Letters. 29, 5, 050303.

Research output: Contribution to journalArticle

14 Citations (Scopus)

Constructing strong identity-based designated verifier signatures with self-unverifiability

Ki, J., Hwang, J. Y., Nyang, D., Chang, B. H., Lee, D. H. & Lim, J. I., 2012 Apr 1, In : ETRI Journal. 34, 2, p. 235-244 10 p.

Research output: Contribution to journalArticle

13 Citations (Scopus)

Efficient sequential architecture of AES CCM for the IEEE 802.16e

Ji, J. D., Jung, S. W. & Lim, J. I., 2012 Jan 1, In : IEICE Transactions on Information and Systems. E-95-D, 1, p. 185-187 3 p.

Research output: Contribution to journalArticle

Multi-user quantum network system and quantum communication using χ-type entangled states

Hong, C. H., Heo, J. O., Lim, J. I. & Yang, H. J., 2012 Jul 1, In : Journal of the Korean Physical Society. 61, 1, p. 1-5 5 p.

Research output: Contribution to journalArticle

12 Citations (Scopus)
2010

A new bit-serial multiplier over GF(pm) using irreducible trinomials

Chang, N. S., Kim, T. H., Kim, C. H., Han, D. G. & Lim, J., 2010 Jul 1, In : Computers and Mathematics with Applications. 60, 2, p. 355-361 7 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)

A statistical model for network data analysis: KDD CUP 99' data evaluation and its comparing with MIT Lincoln Laboratory network data

Cho, J., Lee, C., Cho, S., Song, J. H., Lim, J. & Moon, J., 2010 Apr 1, In : Simulation Modelling Practice and Theory. 18, 4, p. 431-435 5 p.

Research output: Contribution to journalArticle

5 Citations (Scopus)

Fraud detection for information reliability from the internet in forensic accounting

Kim, Y., Lee, S. & Lim, J. I., 2010 Jun 14, In : Journal of Internet Technology. 11, 3, p. 323-332 10 p.

Research output: Contribution to journalArticle

4 Citations (Scopus)

Impossible differential cryptanalysis using matrix method

Kim, J., Hong, S. & Lim, J. I., 2010 Mar 6, In : Discrete Mathematics. 310, 5, p. 988-1002 15 p.

Research output: Contribution to journalArticle

31 Citations (Scopus)

Improved delegation-based authentication protocol for secure roaming service with unlinkability

Youn, T. Y. & Lim, J. I., 2010 Sep 1, In : IEEE Communications Letters. 14, 9, p. 791-793 3 p., 5547598.

Research output: Contribution to journalArticle

18 Citations (Scopus)

N quantum channels are sufficient for Multi-user Quantum Key Distribution protocol between n users

Hong, C. H., Heo, J. O., Khym, G. L., Lim, J. I., Hong, S. K. & Yang, H. J., 2010 Jun 15, In : Optics Communications. 283, 12, p. 2644-2646 3 p.

Research output: Contribution to journalArticle

25 Citations (Scopus)

Two-way quantum direct communication protocol using entanglement swapping

Hong, C. H., Lim, J. I., Kim, J. I. & Yang, H. J., 2010 Jun 15, In : Journal of the Korean Physical Society. 56, 6, p. 1733-1737 5 p.

Research output: Contribution to journalArticle

9 Citations (Scopus)
2009

An efficient signature scheme with fast online signing

Youn, T. Y., Park, Y. H. & Lim, J. I., 2009 Oct 1, In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E92-A, 10, p. 2431-2437 7 p.

Research output: Contribution to journalArticle

Anti-cloning protocol suitable to EPCglobal Class-1 Generation-2 RFID systems

Choi, E. Y., Lee, D. H. & Lim, J. I., 2009 Nov 1, In : Computer Standards and Interfaces. 31, 6, p. 1124-1130 7 p.

Research output: Contribution to journalArticle

52 Citations (Scopus)

Efficient trapdoor commitment as secure as factoring with useful properties

Youn, T. Y., Park, Y. H. & Lim, J., 2009 Jan 1, In : IEICE Transactions on Information and Systems. E92-D, 12, p. 2520-2523 4 p.

Research output: Contribution to journalArticle

Formalizing the design, evaluation, and analysis of quality of protection in wireless networks

Lim, S. H., Yun, S., Lim, J. & Yi, O., 2009 Dec, In : Journal of Communications and Networks. 11, 6, p. 634-644 11 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Technical protection measures for personal information in each processing phase in the Korean public sector

Shim, M., Baek, S., Park, T., Seol, J. & Lim, J. I., 2009 Nov 12, In : KSII Transactions on Internet and Information Systems. 3, 5, p. 548-574 27 p.

Research output: Contribution to journalArticle

U-HMS: Hybrid system for secure intelligent multimedia data services in Ubi-Home

Park, J. H., Lee, S., Lim, J. & Yang, L. T., 2009 Jun 1, In : Journal of Intelligent Manufacturing. 20, 3, p. 337-346 10 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)

Weaknesses in an anonymous authentication scheme for roaming service in global mobility networks

Youn, T. Y., Park, Y. H. & Lim, J., 2009 Aug 14, In : IEEE Communications Letters. 13, 7, p. 471-473 3 p.

Research output: Contribution to journalArticle

67 Citations (Scopus)
2008

Compression function design principles supporting variable output lengths from a single small function

Chang, D., Nandi, M., Lee, J., Sung, J., Hong, S., Lim, J., Park, H. & Chun, K., 2008 Sep, In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E91-A, 9, p. 2607-2614 8 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Efficient flexible batch signing techniques for imbalanced communication applications

Youn, T. Y., Park, Y. H., Kwon, T., Kwon, S. & Lim, J. I., 2008 May 1, In : IEICE Transactions on Information and Systems. E91-D, 5, p. 1481-1484 4 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)

Impersonation attack on a strong ID-based key distribution

Hwang, J. Y., Lim, J. & Lee, D., 2008 Jan 1, In : IEICE Transactions on Communications. E91-B, 8, p. 2702-2703 2 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Power analysis attacks and countermeasures on ηT pairing over binary fields

Kim, T. H., Takagi, T., Han, D. G., Kim, H. & Lim, J. I., 2008 Feb 1, In : ETRI Journal. 30, 1, p. 68-79 12 p.

Research output: Contribution to journalArticle

9 Citations (Scopus)

Weak-key classes of 7-round MISTY 1 and 2 for related-key amplified boomerang attacks

Lee, E., Kim, J., Hong, D., Lee, C., Sung, J., Hong, S. & Lim, J., 2008 Jan 1, In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E91-A, 2, p. 642-649 8 p.

Research output: Contribution to journalArticle

14 Citations (Scopus)

Weakness in a RSA-based password authenticated key exchange protocol

Youn, T. Y., Park, Y. H., Kim, C. & Lim, J. I., 2008 Nov 30, In : Information Processing Letters. 108, 6, p. 339-342 4 p.

Research output: Contribution to journalArticle

5 Citations (Scopus)
2007

Differential power analysis on countermeasures using binary signed digit representations

Kim, T. H., Han, D. G., Okeya, K. & Lim, J. I., 2007 Oct 1, In : ETRI Journal. 29, 5, p. 619-632 14 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)

EC2C-PAKA: An efficient client-to-client password-authenticated key agreement

Byun, J. W., Lee, D. H. & Lim, J. I., 2007 Oct 1, In : Information Sciences. 177, 19, p. 3995-4013 19 p.

Research output: Contribution to journalArticle

62 Citations (Scopus)