default search action
Yunho Lee
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j9]Kyounga Shin, Yunho Lee, Jungho Lim, Honggoo Kang, Sangjin Lee:
System API Vectorization for Malware Detection. IEEE Access 11: 53788-53805 (2023) - 2022
- [c19]Myeong-Jae Park, Ho Sung Cho, Tae-Sik Yun, Sangjin Byeon, Young Jun Koo, Sang-Sic Yoon, Dong-Uk Lee, Seokwoo Choi, Ji Hwan Park, Jinhyung Lee, Kyungjun Cho, Junil Moon, Byung Kuk Yoon, Young Jun Park, Sangmuk Oh, Chang Kwon Lee, Tae-Kyun Kim, Seong-Hee Lee, Hyun-Woo Kim, Yucheon Ju, Seung-Kyun Lim, Seung Geun Baek, Kyo Yun Lee, Sang Hun Lee, Woo Sung We, Seungchan Kim, Yongseok Choi, Seong-Hak Lee, Seung Min Yang, Gunho Lee, In-Keun Kim, Younghyun Jeon, Jae-Hyung Park, Jong Chan Yun, Chanhee Park, Sun-Yeol Kim, Sungjin Kim, Dong-Yeol Lee, Su-Hyun Oh, Taejin Hwang, Junghyun Shin, Yunho Lee, Hyunsik Kim, Jaeseung Lee, Youngdo Hur, Sangkwon Lee, Jieun Jang, Junhyun Chun, Joohwan Cho:
A 192-Gb 12-High 896-GB/s HBM3 DRAM with a TSV Auto-Calibration Scheme and Machine-Learning-Based Layout Optimization. ISSCC 2022: 444-446
2010 – 2019
- 2019
- [c18]Byungsoo Oh, Tae Joon Jun, WonDeuk Yoon, Yunho Lee, Sangtae Kim, Daeyoung Kim:
Enhancing Trust of Supply Chain Using Blockchain Platform with Robust Data Model and Verification Mechanisms. SMC 2019: 3504-3511 - 2018
- [j8]Dohyun Kim, Yunho Lee, Sangjin Lee:
Mobile forensic reference set (MFReS) and mobile forensic investigation for android devices. J. Supercomput. 74(12): 6618-6632 (2018) - [c17]WonDeuk Yoon, Yunho Lee, Hyangseok Chae, Sangwon Seo, Sehyeon Heo, Nakyung Lee, Kiwoong Kwon, Daeyoung Kim:
HERMES: GS1-based Smart City Service Intercommunity. ISC2 2018: 1-8 - 2014
- [j7]Yongjoo Shin, Sihu Song, Yunho Lee, Hyunsoo Yoon:
A Novel Intrusion Tolerant System Using Live Migration. IEICE Trans. Inf. Syst. 97-D(4): 984-988 (2014) - 2013
- [j6]Namheun Son, Yunho Lee, Dohyun Kim, Joshua I. James, Sangjin Lee, Kyungho Lee:
A study of user data integrity during acquisition of Android devices. Digit. Investig. 10(Supplement): S3-S11 (2013) - [c16]Woongryul Jeon, Yunho Lee, Dongho Won:
A secure user-friendly authentication scheme with anonymity for wireless communications. ICUIMC 2013: 110 - [c15]Seongsoo Cho, Son Kwang Chul, Chung Hyeok Kim, Yunho Lee:
Development of Mobile Games for Rehabilitation Training for the Hearing Impaired. MUE 2013: 621-625 - 2012
- [j5]Yunho Lee, Sang Guun Yoo, Soojin Lee:
An Efficient Detection And Management Of False Accusation Attacks In Hierarchical Ad-Hoc Networks. KSII Trans. Internet Inf. Syst. 6(7): 1874-1893 (2012) - [c14]Shinkwon Ahn, Yunho Lee, Kyungil Park:
A Case Study on International Human Rights Restoration and Peace - (With Focus on the Problems Arising from the Japanese Military's Sex Slavery Practice). FGIT-GDC/IESH/CGAG 2012: 124-132 - [c13]Hakhyun Kim, Woongryul Jeon, Kwang-Woo Lee, Yunho Lee, Dongho Won:
Cryptanalysis and Improvement of a Biometrics-Based Multi-server Authentication with Key Agreement Scheme. ICCSA (3) 2012: 391-406 - 2011
- [c12]Jaesung Yoo, Yunho Lee, Dongho Won:
An improved key establishment scheme for wireless sensor network. CFI 2011: 70-71 - [c11]Yunho Lee, Sang Guun Yoo, Juho Kim, Soojin Lee:
Specification-Based Intrusion Detection System for WiBro. ICHIT (1) 2011: 445-455 - [i3]Hakhyun Kim, Woongryul Jeon, Yunho Lee, Dongho Won:
Cryptanalysis and improvement of a biometrics-based multi-server authentication with key agreement scheme. IACR Cryptol. ePrint Arch. 2011: 451 (2011) - 2010
- [j4]Yunho Lee, Seungjoo Kim, Dongho Won:
Enhancement of two-factor authenticated key exchange protocols in public wireless LANs. Comput. Electr. Eng. 36(1): 213-223 (2010) - [j3]Yunho Lee, Sangjoon Park, Masahiro Mambo, Seungjoo Kim, Dongho Won:
Towards trustworthy e-voting using paper receipts. Comput. Stand. Interfaces 32(5-6): 305-311 (2010) - [c10]Kwang-Woo Lee, Yunho Lee, Dongho Won, Seungjoo Kim:
Protection Profile for Secure E-Voting Systems. ISPEC 2010: 386-397
2000 – 2009
- 2009
- [c9]Kwang-Woo Lee, Yunho Lee, Seungjoo Kim, Dongho Won:
A Practical Approach to a Reliable Electronic Election. ICCSA (2) 2009: 191-203 - [c8]Heasuk Jo, Woongryul Jeon, Yunho Lee, Seungjoo Kim, Dongho Won:
Security Specification for Conversion Technologies of Heterogeneous DRM Systems. ISPEC 2009: 159-170 - [c7]Heasuk Jo, Yunho Lee, Mijin Kim, Seungjoo Kim, Dongho Won:
Off-Line Password-Guessing Attack to Yang's and Huang's Authentication Schemes for Session Initiation Protocol. NCM 2009: 618-621 - [i2]Yunho Lee, Soojin Lee:
A New Efficient Key Management Protocol for Wireless Sensor and Actor Networks. CoRR abs/0912.0580 (2009) - 2008
- [c6]Yunho Lee, Seungjoo Kim, Dongho Won:
How to Trust DRE Voting Machines Preserving Voter Privacy. ICEBE 2008: 302-307 - 2007
- [c5]Donghyun Choi, Yunho Lee, Hogab Kang, Seungjoo Kim, Dongho Won:
An Efficient and Secure Rights Sharing Method for DRM System Against Replay Attack. ATC 2007: 135-145 - [c4]Donghwi Shin, Youngsung Choi, Yunho Lee, Sangjoon Park, Seungjoo Kim, Dongho Won:
Security Analysis on the Authentication Mechanisms of Korean Popular Messengers. HCI (5) 2007: 547-552 - 2006
- [j2]Soojin Lee, Byungchun Chung, Heeyoul Kim, Yunho Lee, Chanil Park, Hyunsoo Yoon:
Real-time analysis of intrusion detection alerts via correlation. Comput. Secur. 25(3): 169-183 (2006) - [j1]Yunho Lee, Seungjoo Kim, Dongho Won:
Weakness and Improvements of Yong-Lee's Anonymous Fingerprinting Protocol. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 89-A(7): 2084-2087 (2006) - [c3]Yunho Lee:
Channel Prediction with Cascade AR Modeling. AICT/ICIW 2006: 40 - [c2]Yunho Lee, Heasuk Jo, Seungjoo Kim, Dongho Won:
An Efficient Dispute Resolving Method for Digital Images. OTM Workshops (1) 2006: 331-341 - [i1]Yunho Lee, Kwang-Woo Lee, Seungjoo Kim, Dongho Won:
Towards Trustworthy e-Voting using Paper Receipts. IACR Cryptol. ePrint Arch. 2006: 167 (2006) - 2005
- [c1]Yunho Lee, Kwang-Woo Lee, Seungjoo Kim, Dongho Won, Hyungkyu Yang:
A Method for Deciding Quantization Steps in QIM Watermarking Schemes. EUC Workshops 2005: 965-975
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint