default search action
Hoonjae Lee 0001
Person information
- affiliation: Dongseo University, Department of Computer Engineering, Busan, South Korea
Other persons with the same name
- Hoonjae Lee 0002 (aka: Hoon-Jae Lee 0002) — Korea University, School of Electrical Engineering, Seoul, South Korea
- Hoonjae Lee 0003 (aka: Hoon-Jae Lee 0003) — Hanyang University, Seoul, South Korea
- Hoonjae Lee 0004 — Korea University, Department of Brain and Cognitive Engineering, Seoul, South Korea
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c87]Khusanboy Kodirov, Hoon-Jae Lee, Young Sil Lee:
A Closer Look at Attacks on Lightweight Cryptosystems: Threats and Countermeasures. IHCI (2) 2023: 171-176 - 2022
- [c86]Seoung-Pyo Hong, Chae-Ho Lim, Hoon-Jae Lee:
APT attack response system through AM-HIDS. ICACT 2022: 271-274 - 2021
- [j40]Rui Fu, Mohammed Abdulhakim Al-Absi, Ki-Hwan Kim, Young Sil Lee, Ahmed Abdulhakim Al-Absi, Hoon-Jae Lee:
Deep Learning-Based Drone Classification Using Radar Cross Section Signatures at mmWave Frequencies. IEEE Access 9: 161431-161444 (2021) - [j39]Ahmed Abdulhakim Al-Absi, Mohammed Abdulhakim Al-Absi, Mangal Sain, Hoon-Jae Lee:
Channel Allocation for Connected Vehicles in Internet of Things Services. Sensors 21(11): 3646 (2021) - [j38]Mohammed Abdulhakim Al-Absi, Ahmed Abdulhakim Al-Absi, Rui Fu, Ki-Hwan Kim, Young-Sil Lee, Byung-Gook Lee, Sang-Gon Lee, Hoon-Jae Lee:
Secure and Efficient High Throughput Medium Access Control for Vehicular Ad-Hoc Network. Sensors 21(14): 4935 (2021) - [c85]Seoung-Pyo Hong, Chae-Ho Lim, Hoon-Jae Lee:
APT attack response system through AM-HIDS. ICACT 2021: 271-274 - 2020
- [j37]Mohammed Abdulhakim Al-Absi, Ahmed Abdulhakim Al-Absi, Hoon-Jae Lee:
Varied density of vehicles under city, highway and rural environments in V2V communication. Int. J. Sens. Networks 33(3): 148-158 (2020) - [j36]Mohammed Abdulhakim Al-Absi, Ahmed Abdulhakim Al-Absi, Hoon-Jae Lee:
A Secure Enhanced Non-Cooperative Cognitive Division Multiple Access for Vehicle-to-Vehicle Communication. Sensors 20(4): 1000 (2020) - [c84]Mohammed Abdulhakim Al-Absi, Ahmed Abdulhakim Al-Absi, Hoon-Jae Lee:
Comparison between DSRC and other Short Range Wireless Communication Technologies. ICACT 2020: 1-5 - [c83]Ju Jinquan, Mohammed Abdulhakim Al-Absi, Ahmed Abdulhakim Al-Absi, Hoon-Jae Lee:
Analysis and Protection of Computer Network Security Issues. ICACT 2020: 577-580 - [c82]Azamjon Abdullaev, Mohammed Abdulhakim Al-Absi, Ahmed Abdulhakim Al-Absi, Mangal Sain, Hoon-Jae Lee:
Classify and Analyze the Security Issues and Challenges in Mobile banking in Uzbekistan. ICACT 2020: 1211-1217 - [c81]Rui Fu, Mohammed Abdulhakim Al-Absi, Ahmed Abdulhakim Al-Absi, Hoon-Jae Lee:
Conservation Genetic Algorithm to Solve the E-commerce Environment Logistics Distribution Path Optimization Problem. ICACT 2020: 1225-1231 - [c80]Seyitmammet Alchekov Saparmammedovich, Mohammed Abdulhakim Al-Absi, Yusuph J. Koni, Hoon-Jae Lee:
Voice Attacks to AI Voice Assistant. IHCI (1) 2020: 250-261 - [c79]Yusuph J. Koni, Mohammed Abdulhakim Al-Absi, Seyitmammet Alchekov Saparmammedovich, Hoon-Jae Lee:
AI-Based Voice Assistants Technology Comparison in Term of Conversational and Response Time. IHCI (2) 2020: 370-379
2010 – 2019
- 2019
- [j35]Mohammed Abdulhakim Al-Absi, Ahmed Abdulhakim Al-Absi, Hoon-Jae Lee:
Performance Enriching Channel Allocation Algorithm for Vehicle-to-Vehicle City, Highway and Rural Network. Sensors 19(15): 3283 (2019) - [c78]Mangal Sain, Ki-Hwan Kim, Young-Jin Kang, Hoon-Jae Lee:
An Improved Two Factor User Authentication Framework Based on CAPTCHA and Visual Secret Sharing. CSE/EUC 2019: 171-175 - [c77]Ahmadhon Kamolov, Mohammed Abdulhakim Al-Absi, Hoon-Jae Lee, Suhyun Park:
Smart Flying Umbrella Drone on Internet of Things: AVUS. ICACT 2019: 191-195 - [c76]Azamjon Abdullaev, Mohammed Abdulhakim Al-Absi, Ahmed Abdulhakim Al-Absi, Mangal Sain, Young-Sil Lee, Hoon-Jae Lee:
Security Challenge and Issue of Mobile Banking in Republic of Uzbekistan: A State of Art Survey. ICACT 2019: 249-255 - [c75]Sanjar Ibrokhimov, Kueh Lee Hui, Ahmed Abdulhakim Al-Absi, Hoon-Jae Lee, Mangal Sain:
Multi-Factor Authentication in Cyber Physical System: A State of Art Survey. ICACT 2019: 279-284 - [c74]Young-Jin Kang, Ki-Hwan Kim, Hoon-Jae Lee:
Proposal of PingPong-128 Countermeasure against Power Analysis Attack. ICACT 2019: 431-434 - [c73]Rui Fu, Mohammed Abdulhakim Al-Absi, Ahmed Abdulhakim Al-Absi, Hoon-Jae Lee:
A Conservation Genetic Algorithm for Optimization of the E-commerce Logistics Distribution Path. ICACT 2019: 558-562 - [c72]Mangal Sain, Amlan Jyoti Chaudhray, Satyabrata Aich, Hoon-Jae Lee:
Security Enhancement for Access Control Mechanism in Real-time Wireless Sensor Network. ICACT 2019: 1135-1142 - [c71]FuRui, Mohammed Abdulhakim Al-Absi, Hoon-Jae Lee:
Introduce a Specific Process of Genetic Algorithm through an Example. ICTC 2019: 422-425 - [c70]Mohammed Abdulhakim Al-Absi, Ahmed Abdulhakim Al-Absi, Hind R'bigui, Hoon-Jae Lee:
A Novel Throughput and Collision for City Environment in V2V Communication. ICTC 2019: 1413-1415 - 2018
- [j34]Mohammed Abdulhakim Al-Absi, Ahmed Abdulhakim Al-Absi, TaeYong Kim, Hoon-Jae Lee:
An environmental channel throughput and radio propagation modeling for vehicle-to-vehicle communication. Int. J. Distributed Sens. Networks 14(4) (2018) - [j33]Jun Huy Lam, Sanggon Lee, Hoon-Jae Lee, Yustus Eko Oktian:
Design, implementation, and performance evaluation of identity-based cryptography in ONOS. Int. J. Netw. Manag. 28(1) (2018) - [c69]Mohammed Abdulhakim Al-Absi, Ahmed Abdulhakim Al-Absi, Young-Jin Kang, Hoon-Jae Lee:
Obstacles effects on signal attenuation in line of sight for different environments in V2V communication. ICACT 2018: 17-20 - [c68]SuMi Ryu, Young-Jin Kang, Hoonjae Lee:
A study on detection of anomaly behavior in automation industry. ICACT 2018: 377-380 - [c67]Mohammed Abdulhakim Al-Absi, Ahmed Abdulhakim Al-Absi, Hoon-Jae Lee:
Performance Analysis for City, Highway, and Rural Area in Vehicle-to-Vehicle Network. ICTC 2018: 639-644 - 2017
- [j32]Yustus Eko Oktian, Sanggon Lee, Hoonjae Lee, Jun Huy Lam:
Distributed SDN controller system: A survey on design choice. Comput. Networks 121: 100-111 (2017) - [c66]Mohammed Abdulhakim Al-Absi, Ahmed Abdulhakim Al-Absi, Hoon-Jae Lee:
V2V communication modeling for environmental channel throughput and radio propagation. ICTC 2017: 507-512 - 2016
- [j31]YongJe Choi, Dooho Choi, Hoonjae Lee, JaeCheol Ha:
An Improved Square-always Exponentiation Resistant to Side-channel Attacks on RSA Implementation. Intell. Autom. Soft Comput. 22(3): 353-363 (2016) - [j30]Jun Huy Lam, Sanggon Lee, Hoon-Jae Lee, Yustus Eko Oktian:
Securing SDN Southbound and Data Plane Communication with IBC. Mob. Inf. Syst. 2016: 1708970:1-1708970:12 (2016) - 2015
- [j29]Zhijun Zhang, Hyotaek Lim, Hoon-Jae Lee:
The Design of an Efficient Proxy-Based Framework for Mobile Cloud Computing. J. Inform. and Commun. Convergence Engineering 13(1): 15-20 (2015) - [j28]Triana Mugia Rahayu, Sanggon Lee, Hoonjae Lee:
A Secure Routing Protocol for Wireless Sensor Networks Considering Secure Data Aggregation. Sensors 15(7): 15127-15158 (2015) - [c65]Young-Sil Lee, Bruce Ndibanje, Non Thiranant, Esko Alasaarela, Hoon-Jae Lee:
Hybrid Cloud Service Based Healthcare Solutions. AINA Workshops 2015: 25-30 - [c64]Bruce Ndibanje, Hyunho Kim, Suhyun Park, Hoon-Jae Lee:
An Efficient and Provable Secret Shared Key Computation for Cryptographic Protocol Across Insecure Channel. AINA 2015: 143-147 - [c63]Non Thiranant, Young-Sil Lee, Hoon-Jae Lee:
Performance Comparison Between RSA and Elliptic Curve Cryptography-Based QR Code Authentication. AINA Workshops 2015: 278-282 - [c62]Hyunho Kim, Young-Jin Kang, Bruce Ndibanje, Suhyun Park, Hoon-Jae Lee:
Smartphone-Based Secure Access Control in Wireless Network Analysis. AINA Workshops 2015: 344-347 - [c61]Bruce Ndibanje, Hyunho Kim, Young-Jin Kang, Young-Sil Lee, Hoon-Jae Lee:
On Modeling Protocol-Based Clustering Tag in RFID Systems with Formal Security Analysis. AINA 2015: 498-505 - [c60]Young-Jin Kang, Hyunho Kim, Bruce Ndibanje, Younggoo Park, Hoonjae Lee:
Correlation Power Analysis Attack on the Ping Pong-128 Key Stream Generator. AINA 2015: 506-509 - [c59]Bruce Ndibanje, Young-Jin Kang, Mangal Sain, Hoon-Jae Lee:
An Approach to Designing a Network Security-based Application for Communications Safety. ASONAM 2015: 1002-1009 - [c58]Bruce Ndibanje, Young-Sil Lee, Sanggon Lee, Hoon-Jae Lee:
A Privacy Preserving Security Protocol-Based Application for Wireless Communication System. HPCC/CSS/ICESS 2015: 1651-1656 - [c57]Young-Sil Lee, Bruce Ndibanje, Esko Alasaarela, Tae-Yong Kim, Hoon-Jae Lee:
An Effective and Secure User Authentication and Key Agreement Scheme in m-Healthcare Systems. HPCC/CSS/ICESS 2015: 1685-1690 - [c56]Yustus Eko Oktian, Sanggon Lee, Hoonjae Lee, Jun Huy Lam:
Secure your Northbound SDN API. ICUFN 2015: 919-920 - [c55]Jun Huy Lam, Sang-Gon Lee, Hoonjae Lee, Yustus Eko Oktian:
Securing distributed SDN with IBC. ICUFN 2015: 921-925 - 2014
- [j27]Jonathan A. P. Marpaung, Bruce Ndibanje, Hoon-Jae Lee:
Higher-Order Countermeasures against Side-Channel Cryptanalysis on Rabbit Stream Cipher. J. Inform. and Commun. Convergence Engineering 12(4): 237-245 (2014) - [j26]JaeCheol Ha, YongJe Choi, Dooho Choi, Hoonjae Lee:
Power Analysis Attacks on the Right-to-Left Square-Always Exponentiation Algorithm. J. Internet Serv. Inf. Secur. 4(4): 38-51 (2014) - [j25]Hui-Shyong Yeo, Xiao-Shen Phang, Hoon-Jae Lee, Hyotaek Lim:
Leveraging client-side storage techniques for enhanced use of multiple consumer cloud storage services on resource-constrained mobile devices. J. Netw. Comput. Appl. 43: 142-156 (2014) - [j24]Pardeep Kumar, Mika Ylianttila, Andrei V. Gurtov, Sanggon Lee, Hoon-Jae Lee:
An Efficient and Adaptive Mutual Authentication Framework for Heterogeneous Wireless Sensor Network-Based Applications. Sensors 14(2): 2732-2755 (2014) - [j23]Bruce Ndibanje, Hoon-Jae Lee, Sanggon Lee:
Security Analysis and Improvements of Authentication and Access Control in the Internet of Things. Sensors 14(8): 14786-14805 (2014) - [c54]Zengguang Liu, Xiaochun Yin, Hoonjae Lee:
An Efficient Defense Scheme against SIP DoS Attack in SDN Using Cloud SFW. AsiaJCIS 2014: 52-55 - [c53]Junjie Qiu, Gi-Hyun Hwang, Hoonjae Lee:
Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security. AsiaJCIS 2014: 104-110 - [c52]Non Thiranant, Young-Jin Kang, Tae-Yong Kim, Won-Tae Jang, Suhyun Park, Hoonjae Lee:
A Design of Elliptic Curve Cryptography-Based Authentication Using QR Code. CSE 2014: 614-619 - [c51]Bruce Ndibanje, Hoon-Jae Lee:
An enhanced passivation layer for secure consumer integrated circuit devices. GCCE 2014: 300-301 - [c50]Young-Sil Lee, Esko Alasaarela, Hoon-Jae Lee:
Secure key management scheme based on ECC algorithm for patient's medical information in healthcare system. ICOIN 2014: 453-457 - [c49]Bruce Ndibanje, Hoon-Jae Lee:
Cryptographic computation of private shared key based mutual authentication protocol: Simulation and modeling over wireless networks. ICOIN 2014: 578-582 - [c48]Bruce Ndibanje, Hoon-Jae Lee:
Anonymization algorithm for security and confidentiality of health data set across social network. ICTC 2014: 65-70 - [c47]XiaoChun Yin, Zengguang Liu, Young Sil Lee, Hoon-Jae Lee:
PKI-based cryptography for secure cloud data storage using ECC. ICTC 2014: 194-199 - [c46]Yustus Eko Oktian, Sanggon Lee, Hoonjae Lee:
Mitigating Denial of Service (DoS) attacks in OpenFlow networks. ICTC 2014: 325-330 - [c45]Maya Louk, Hyotaek Lim, Hoon-Jae Lee, Mohammed Atiquzzaman:
An effective framework of behavior detection-advanced static analysis for malware detection. ISCIT 2014: 361-365 - 2013
- [j22]Young-Dong Lee, Do-Un Jeong, Hoon-Jae Lee:
Empirical analysis of the reliability of low-rate wireless u-healthcare monitoring applications. Int. J. Commun. Syst. 26(4): 505-514 (2013) - [j21]Bruce Ndibanje, Tae-Yong Kim, Hoon-Jae Lee:
Improved Security Patch on Secure Communication among Cell Phones and Sensor Networks. Int. J. Distributed Sens. Networks 9 (2013) - [j20]Md. Iftekhar Salam, Hoon-Jae Lee:
Algebraic Countermeasure to Enhance the Improved Summation Generator with 2-Bit Memory. J. Networks 8(5): 977-984 (2013) - [c44]Tanmay Sinha, Vrns Srikanth, Mangal Sain, Hoon-Jae Lee:
Trends and research directions for privacy preserving approaches on the cloud. COMPUTE 2013: 21:1-21:12 - [c43]Bruce Ndibanje, Gi-Hyun Hwang, Hoon-Jae Lee:
A hybrid and fast authentication protocol for handoff support in e-healthcare systems among WSNs. ICTC 2013: 72-77 - [c42]XiaoChun Yin, Hoon-Jae Lee:
Threshold tuning for demand queue based Overload Control Module. ICTC 2013: 1013-1016 - [c41]Young-Sil Lee, Hoon-Jae Lee, Esko Alasaarela:
Mutual authentication in wireless body sensor networks (WBSN) based on Physical Unclonable Function (PUF). IWCMC 2013: 1314-1318 - 2012
- [j19]Md. Iftekhar Salam, Hoon-Jae Lee:
On the algebraic attack against summation type keystream generators. Int. J. Inf. Comput. Secur. 5(2): 132-149 (2012) - [j18]Pardeep Kumar, Hoon-Jae Lee:
Security Issues in Healthcare Applications Using Wireless Medical Sensor Networks: A Survey. Sensors 12(1): 55-91 (2012) - [j17]Pardeep Kumar, Sanggon Lee, Hoon-Jae Lee:
E-SAP: Efficient-Strong Authentication Protocol for Healthcare Applications Using Wireless Medical Sensor Networks. Sensors 12(2): 1625-1647 (2012) - [c40]Young-Sil Lee, Tae-Yong Kim, Hoon-Jae Lee:
Mutual Authentication Protocol for Enhanced RFID Security and Anti-counterfeiting. AINA Workshops 2012: 558-563 - [c39]Amlan Jyoti Choudhury, Hyotaek Lim, Hoon-Jae Lee:
An Efficient FPGA Design of PingPong-128 Stream Cipher for Secure Computing. AINA 2012: 695-700 - [c38]Bruce Ndibanje, Tae-Yong Kim, Hoon-Jae Lee:
Data Link Layer' Security Analysis for Wireless Sensor Networks. FGIT-FGCN/DCA 2012: 25-32 - [i8]Md. Iftekhar Salam, Hoon-Jae Lee:
Algebraic Countermeasure to Enhance the Improved Summation Generator with 2-Bit Memory. IACR Cryptol. ePrint Arch. 2012: 282 (2012) - 2011
- [j16]Mangal Sain, Wan-Young Chung, Hoon-Jae Lee:
A Personalized Healthcare Analysis System in Ubiquitous Environment. J. Inform. and Commun. Convergence Engineering 9(2): 235-243 (2011) - [j15]Madhusudan Singh, Sanggon Lee, Hoon-Jae Lee:
Performance of Mobility Models for Routing Protocol in Wireless Ad-hoc Networks. J. Inform. and Commun. Convergence Engineering 9(5): 610-614 (2011) - [j14]Pardeep Kumar, Amlan Jyoti Choudhury, Mangal Sain, Sanggon Lee, Hoon-Jae Lee:
RUASN: A Robust User Authentication Framework for Wireless Sensor Networks. Sensors 11(5): 5020-5046 (2011) - [c37]Amlan Jyoti Choudhury, Pardeep Kumar, Mangal Sain, Hyotaek Lim, Hoon-Jae Lee:
A Strong User Authentication Framework for Cloud Computing. APSCC 2011: 110-115 - [c36]Pardeep Kumar, Sanggon Lee, Hoon-Jae Lee:
A User Authentication for Healthcare Application Using Wireless Medical Sensor Networks. HPCC 2011: 647-652 - [c35]Amlan Jyoti Choudhury, Beum-Su Park, Bruce Ndibanje, Young-Sil Lee, Hyotaek Lim, Hoon-Jae Lee:
An Efficient Hardware Countermeasure against Differential Power Analysis Attack. ICHIT (2) 2011: 153-159 - [c34]Soh Yee Lee, Hoonjae Lee:
Hardware Implementation and Performance Analysis of NLM-128 Stream Cipher. ICHIT (2) 2011: 446-453 - [c33]Beum-Su Park, Amlan Jyoti Choudhury, Young-Sil Lee, Tae-Yong Kim, Hoon-Jae Lee:
An Efficient Password Authentication Method Using CAPTCHA. ICHIT (1) 2011: 456-463 - [c32]KiSeok Bae, MahnKi Ahn, Hoon-Jae Lee, JaeCheol Ha, Sang-Jae Moon:
Power analysis attack and countermeasure on the Rabbit Stream Cipher (position paper). SESS@ICSE 2011: 50-56 - [i7]Annapurna Sharma, Hakimjon Zaynidinov, Hoon-Jae Lee:
Development and Modelling of High-Efficiency Computing Structure for Digital Signal Processing. CoRR abs/1107.4189 (2011) - 2010
- [j13]Dhananjay Singh, Hakimjon Zaynidinov, Hoon-Jae Lee:
Piecewise-quadratic Harmut basis functions and their application to problems in digital signal processing. Int. J. Commun. Syst. 23(6-7): 751-762 (2010) - [j12]Alka Gautam, Hoon-Jae Lee, Wan-Young Chung:
ECG Signal De-noising with Asynchronous Averaging and Filtering Algorithm. Int. J. Heal. Inf. Syst. Informatics 5(2): 30-36 (2010) - [j11]Hoon-Jae Lee, Won-Tae Jang, Tae-Yong Kim:
Reliable and Secure Voice Encryption over GSM Voice Channel. J. Inform. and Commun. Convergence Engineering 8(1): 64-70 (2010) - [j10]Pardeep Kumar, Sang il Cho, Dea-Seok Lee, Young-Dong Lee, Hoon-Jae Lee:
TriSec: A Secure Data Framework for Wireless Sensor Networks Using Authenticated Encryption. J. Inform. and Commun. Convergence Engineering 8(2): 129-135 (2010) - [j9]Shirly Lee, Ivy Ong, Hyotaek Lim, Hoon-Jae Lee:
Two Factor Authentication for Cloud Computing. J. Inform. and Commun. Convergence Engineering 8(4): 427-432 (2010) - [j8]Ivy Ong, Shirly Lee, Hoon-Jae Lee, Hyotaek Lim:
Mutual Authentication and Secure Session Termination Scheme in iATA Protocol. J. Inform. and Commun. Convergence Engineering 8(4): 437-442 (2010) - [j7]Jiun-Hau Liew, Ivy Ong, Sanggon Lee, Hyotaek Lim, Hoon-Jae Lee:
Practical Attacks on Hybrid Group Key Management for SOHAN. J. Inform. and Commun. Convergence Engineering 8(5): 549-553 (2010) - [c31]Pardeep Kumar, Md. Iftekhar Salam, Sanggon Lee, Hoon-Jae Lee:
Addressing secure data routing scheme for heterogeneous sensor networks. NCM 2010: 86-90 - [c30]Md. Iftekhar Salam, Pardeep Kumar, Hoon-Jae Lee:
An efficient key pre-distribution scheme for wireless sensor network using public key cryptography. NCM 2010: 402-407 - [c29]Pardeep Kumar, Young-Dong Lee, Hoon-Jae Lee:
Secure health monitoring using medical wireless sensor networks. NCM 2010: 491-494
2000 – 2009
- 2009
- [j6]Sanggon Lee, Meng-Hui Lim, Hoon-Jae Lee:
Cryptanalysis of Hu-Niu-Yang's Multi-server Password Authenticated Key Agreement Schemes Using Smart Card. J. Inform. and Commun. Convergence Engineering 7(3): 340-344 (2009) - [j5]Tae-Yong Kim, Won-Tae Jang, Hoon-Jae Lee:
Development of a Cryptographic Dongle for Secure Voice Encryption over GSM Voice Channel. J. Inform. and Commun. Convergence Engineering 7(4): 561-564 (2009) - [c28]Dhananjay Singh, Hsein-Ping Kew, Uma Shanker Tiwary, Hoon-Jae Lee, Wan-Young Chung:
Global Patient Monitoring System Using IP-Enabled Ubiquitous Sensor Network. CSIE (1) 2009: 524-528 - [c27]Mangal Sain, Sachin Bhardwaj, Hoon-Jae Lee, Wan-Young Chung:
Architecture of Personal Healthcare Information System in Ubiquitous Healthcare. FGIT-FGCN 2009: 157-164 - [c26]Pardeep Kumar, Hoon-Jae Lee, Wan-Young Chung:
A secure ubiquitous sensor network with Dragon. ICHIT 2009: 71-74 - [c25]Dhananjay Singh, Hoon-Jae Lee:
Database design for global patient monitoring applications using WAP. ICIS 2009: 25-31 - [c24]Mangal Sain, Hoon-Jae Lee, Wan-Young Chung:
Middleware in ubiquitous computing system with MedRec architecture. ICIS 2009: 149-154 - [c23]Pardeep Kumar, Sang il Cho, Hoon-Jae Lee:
PingPong-MAC: secure ubiquitous sensor network with authenticated encryption. ICIS 2009: 256-260 - [c22]Dhananjay Singh, Hoon-Jae Lee, Wan-Young Chung:
An energy consumption technique for global healthcare monitoring applications. ICIS 2009: 539-542 - [c21]Bayalagmaa Davaanaym, Young-Sil Lee, Hoon-Jae Lee, Sanggon Lee, Hyotaek Lim:
A Ping Pong Based One-Time-Passwords Authentication System. NCM 2009: 574-579 - [c20]Mangal Sain, Hoon-Jae Lee, Wan-Young Chung:
Personal Healthcare Information System. NCM 2009: 1540-1545 - [c19]Pardeep Kumar, Hoon-Jae Lee:
A Secure Data Mechanism for Ubiquitous Sensor Network with Dragon Cipher. NCM 2009: 1675-1680 - 2008
- [j4]Hoon-Jae Lee, Il Seok Ko:
An Intelligent Security Agent for a Reliable Cipher System Using Pingpong. Cybern. Syst. 39(7): 705-718 (2008) - [c18]Shu Yun Lim, Meng-Hui Lim, Sanggon Lee, Hoonjae Lee:
Secure Hybrid Group Key Management for Hierarchical Self-Organizing Sensor Network. IAS 2008: 43-49 - [c17]Meng-Hui Lim, Sanggon Lee, Hoonjae Lee:
Cryptanalytic Flaws in Oh et al.'s ID-Based Authenticated Key Agreement Protocol. ICCSA (2) 2008: 458-467 - [c16]HyeongRag Kim, Hoon-Jae Lee, Sang-Jae Moon:
A Security Enhancement of the E0 Cipher in Bluetooth System. KES-AMSTA 2008: 858-867 - [c15]Yu-Shu They, Chee-Min Yeoh, Hoonjae Lee, Hyotaek Lim:
Design and Implementation of ATA-Based Virtual Storage System for Mobile Device. MUE 2008: 490-495 - [c14]Meng-Hui Lim, Sanggon Lee, Hoon-Jae Lee:
An Improved Variant of Wang-Cao's Certificate-Based Authenticated Key Agreement Protocol. NCM (2) 2008: 198-201 - [c13]Meng-Hui Lim, Chee-Min Yeoh, Sanggon Lee, Hyotaek Lim, Hoonjae Lee:
A Secure and Efficient Three-Pass Authenticated Key Agreement Protocol Based on Elliptic Curves. Networking 2008: 170-182 - [c12]Seong-Yee Phang, Chee-Min Yeoh, Hoonjae Lee, Hyotaek Lim:
Multicasting Support for NEMO based on ODMRP. SNPD 2008: 611-616 - 2007
- [c11]Meng-Hui Lim, Sanggon Lee, Youngho Park, Hoonjae Lee:
An Enhanced One-Round Pairing-Based Tripartite Authenticated Key Agreement Protocol. ICCSA (2) 2007: 503-513 - [c10]Meng-Hui Lim, Sanggon Lee, Youngho Park, Hoonjae Lee:
An Enhanced ID-Based Deniable Authentication Protocol on Pairings. ICCSA (2) 2007: 1008-1017 - [c9]Heung-Kuk Jo, Hoon-Jae Lee:
A Relay-Transmission of the RFID Tag ID over the Wireless and TCP/IP with a Security Agent. KES-AMSTA 2007: 918-927 - [i6]Meng-Hui Lim, Sanggon Lee, Youngho Park, Hoonjae Lee:
An Enhanced ID-based Deniable Authentication Protocol on Pairings. IACR Cryptol. ePrint Arch. 2007: 113 (2007) - [i5]Meng-Hui Lim, Sanggon Lee, Youngho Park, Hoonjae Lee:
An Enhanced One-round Pairing-based Tripartite Authenticated Key Agreement Protocol. IACR Cryptol. ePrint Arch. 2007: 142 (2007) - [i4]Shu Yun Lim, Chuan Chin Pu, Hyotaek Lim, Hoon-Jae Lee:
Dragon-MAC: Securing Wireless Sensor Networks with Authenticated Encryption. IACR Cryptol. ePrint Arch. 2007: 204 (2007) - [i3]Meng-Hui Lim, Sanggon Lee, Hoonjae Lee:
Cryptanalysis on Improved Chou et al.'s ID-Based Deniable Authentication Protocol. IACR Cryptol. ePrint Arch. 2007: 383 (2007) - [i2]Meng-Hui Lim, Sanggon Lee, Hoonjae Lee:
Cryptanalysis on Improved One-round Lin-Li's Tripartite Key Agreement Protocol. IACR Cryptol. ePrint Arch. 2007: 411 (2007) - [i1]Meng-Hui Lim, Sanggon Lee, Hoonjae Lee:
Cryptanalytic Flaws in Oh et al.'s ID-Based Authenticated Key Agreement Protocol. IACR Cryptol. ePrint Arch. 2007: 415 (2007) - 2006
- [j3]Heung-Kuk Jo, Hoon-Jae Lee:
An Implementation of a RFID Tag ID Relay-Transmission over the Wireless and TCP/IP. J. Convergence Inf. Technol. 1(1): 98-104 (2006) - [c8]JeaHoon Park, Hoon-Jae Lee, JaeCheol Ha, YongJe Choi, Howon Kim, Sang-Jae Moon:
A Differential Power Analysis Attack of Block Cipher Based on the Hamming Weight of Internal Operation Unit. CIS 2006: 417-426 - [c7]ManKi Ahn, Hoon-Jae Lee:
Experiments and Hardware Countermeasures on Power Analysis Attacks. ICCSA (3) 2006: 48-53 - [c6]Hoon-Jae Lee:
Highly Reliable Synchronous Stream Cipher System for Link Encryption. ICCSA (3) 2006: 269-278 - 2004
- [c5]Hoon-Jae Lee, ManKi Ahn, Seongan Lim, Sang-Jae Moon:
A Study on Smart Card Security Evaluation Criteria for Side Channel Attacks. ICCSA (1) 2004: 517-526 - [c4]Kevin Chen, Matthew Henricksen, William Millan, Joanne Fuller, Leonie Ruth Simpson, Ed Dawson, Hoon-Jae Lee, Sang-Jae Moon:
Dragon: A Fast Word Based Stream Cipher. ICISC 2004: 33-50 - 2003
- [c3]MahnKi Ahn, JaeCheol Ha, Hoon-Jae Lee, Sang-Jae Moon:
A Random M-ary Method Based Countermeasure against Side Channel Attacks. ICCSA (2) 2003: 338-347 - 2002
- [j2]Hoon-Jae Lee, Sang-Jae Moon:
Parallel stream cipher for secure high-speed communications. Signal Process. 82(2): 259-265 (2002) - [c2]Andrew J. Clark, Ed Dawson, Joanne Fuller, Jovan Dj. Golic, Hoon-Jae Lee, William Millan, Sang-Jae Moon, Leonie Simpson:
The LILI-II Keystream Generator. ACISP 2002: 25-39 - [c1]Dong Jin Kwak, JaeCheol Ha, Hoon-Jae Lee, Hwankoo Kim, Sang-Jae Moon:
A WTLS Handshake Protocol with User Anonymity and Forward Secrecy. CDMA International Conference 2002: 219-230 - 2000
- [j1]Hoon-Jae Lee, Sang-Jae Moon:
On an improved summation generator with 2-bit memory. Signal Process. 80(1): 211-217 (2000)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-11 18:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint