Filter
Chapter

Search results

  • 2020

    Barrier coverage

    Wu, W., Zhang, Z., Lee, W. & Du, D. Z., 2020, Springer Optimization and Its Applications. Springer, p. 159-181 23 p. (Springer Optimization and Its Applications; vol. 162).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • Camera sensors

    Wu, W., Zhang, Z., Lee, W. & Du, D. Z., 2020, Springer Optimization and Its Applications. Springer, p. 227-244 18 p. (Springer Optimization and Its Applications; vol. 162).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • Connected sensor cover

    Wu, W., Zhang, Z., Lee, W. & Du, D. Z., 2020, Springer Optimization and Its Applications. Springer, p. 33-65 33 p. (Springer Optimization and Its Applications; vol. 162).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • Crowdsensing

    Wu, W., Zhang, Z., Lee, W. & Du, D. Z., 2020, Springer Optimization and Its Applications. Springer, p. 261-266 6 p. (Springer Optimization and Its Applications; vol. 162).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • Energy-harvesting sensors

    Wu, W., Zhang, Z., Lee, W. & Du, D. Z., 2020, Springer Optimization and Its Applications. Springer, p. 245-255 11 p. (Springer Optimization and Its Applications; vol. 162).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • Fundamental issues

    Wu, W., Zhang, Z., Lee, W. & Du, D. Z., 2020, Springer Optimization and Its Applications. Springer, p. 7-22 16 p. (Springer Optimization and Its Applications; vol. 162).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • Grid-based deployment

    Wu, W., Zhang, Z., Lee, W. & Du, D. Z., 2020, Springer Optimization and Its Applications. Springer, p. 153-157 5 p. (Springer Optimization and Its Applications; vol. 162).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • Heterogeneous sensors

    Wu, W., Zhang, Z., Lee, W. & Du, D. Z., 2020, Springer Optimization and Its Applications. Springer, p. 135-151 17 p. (Springer Optimization and Its Applications; vol. 162).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • k-coverage

    Wu, W., Zhang, Z., Lee, W. & Du, D. Z., 2020, Springer Optimization and Its Applications. Springer, p. 117-133 17 p. (Springer Optimization and Its Applications; vol. 162).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    1 Citation (Scopus)
  • Lifetime of coverage

    Wu, W., Zhang, Z., Lee, W. & Du, D. Z., 2020, Springer Optimization and Its Applications. Springer, p. 67-86 20 p. (Springer Optimization and Its Applications; vol. 162).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • Mobile sensors

    Wu, W., Zhang, Z., Lee, W. & Du, D. Z., 2020, Springer Optimization and Its Applications. Springer, p. 209-226 18 p. (Springer Optimization and Its Applications; vol. 162).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • Optimal coverage in wireless sensor networks

    Wu, W., Zhang, Z., Lee, W. & Du, D. Z., 2020, Springer Optimization and Its Applications. Springer, p. 1-267 267 p. (Springer Optimization and Its Applications; vol. 162).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    6 Citations (Scopus)
  • Partial coverage

    Wu, W., Zhang, Z., Lee, W. & Du, D. Z., 2020, Springer Optimization and Its Applications. Springer, p. 193-202 10 p. (Springer Optimization and Its Applications; vol. 162).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • Probabilistic coverage

    Wu, W., Zhang, Z., Lee, W. & Du, D. Z., 2020, Springer Optimization and Its Applications. Springer, p. 203-207 5 p. (Springer Optimization and Its Applications; vol. 162).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • Sensor cover

    Wu, W., Zhang, Z., Lee, W. & Du, D. Z., 2020, Springer Optimization and Its Applications. Springer, p. 23-31 9 p. (Springer Optimization and Its Applications; vol. 162).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • Sweep-coverage

    Wu, W., Zhang, Z., Lee, W. & Du, D. Z., 2020, Springer Optimization and Its Applications. Springer, p. 183-192 10 p. (Springer Optimization and Its Applications; vol. 162).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • Underwater sensors

    Wu, W., Zhang, Z., Lee, W. & Du, D. Z., 2020, Springer Optimization and Its Applications. Springer, p. 257-260 4 p. (Springer Optimization and Its Applications; vol. 162).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • Weighted sensor cover

    Wu, W., Zhang, Z., Lee, W. & Du, D. Z., 2020, Springer Optimization and Its Applications. Springer, p. 87-116 30 p. (Springer Optimization and Its Applications; vol. 162).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • 2017

    Adaptive tag anticollision protocols for RFID passive tags

    Myung, J., Lee, W. & Shih, T. K., 2017 Jan 1, RFID Handbook: Applications, Technology, Security, and Privacy. CRC Press, p. 139-160 22 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

    1 Citation (Scopus)
  • A new approach to building a disguised server using the honey port against general scanning attacks

    Park, H. S., Jeon, Y. B. & Yoon, J. W., 2017, Lecture Notes on Data Engineering and Communications Technologies. Springer Science and Business Media Deutschland GmbH, p. 453-465 13 p. (Lecture Notes on Data Engineering and Communications Technologies; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    2 Citations (Scopus)
  • Comparative performance analysis of anticollision protocols in RFID networks

    Lee, W., Myung, J. & Lee, D., 2017 Jan 1, RFID Handbook: Applications, Technology, Security, and Privacy. CRC Press, p. 161-180 20 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

    1 Citation (Scopus)
  • 2016

    Weighted localized clustering: A coverage-aware reader collision arbitration protocol in RFID networks

    Kim, J., Kim, E., Lee, W., Kim, D., Choi, J., Jung, J. & Shin, C. K., 2016 Jan 1, Handbook on Mobile and Ubiquitous Computing: Status and Perspective. CRC Press, p. 525-545 21 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • 2015

    Fair-based loss measurement model for enterprise personal information breach

    Yun, J. H., Cho, I. H. & Lee, K. H., 2015, Lecture Notes in Electrical Engineering. Springer Verlag, p. 825-833 9 p. (Lecture Notes in Electrical Engineering; vol. 373).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • 2013

    Architectures for particle filtering

    Hong, S. & Oh, S. J., 2013 Jan 1, Handbook of Signal Processing Systems: Second Edition. Springer New York, p. 639-670 32 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • 2011

    Histogram-based image hashing for searching content-preserving copies

    Xiang, S. & Kim, H. J., 2011, Transactions on Data Hiding and Multimedia Security VI. Shi, Y., Emmanuel, S., Kankanhalli, M., Chang, S-F., Radhakrishnan, R., Ma, F. & Zhao, L. (eds.). p. 83-108 26 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6730 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    5 Citations (Scopus)
  • Secure communication between STB and smart card in IPTV broadcasting

    Lee, S. H., Park, N. S. & Choi, J. Y., 2011 Jan 1, Computer Science Research and Technology. Nova Science Publishers, Inc., p. 181-189 9 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • 2009

    A new trust and reputation-based chain model in peer-to-peer networks

    Lee, S. & Lee, W., 2009 Jan 1, Ubiquitous Multimedia Computing. CRC Press, p. 127-136 10 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

    1 Citation (Scopus)
  • 2007

    Robustness analysis of patchwork watermarking schemes

    Kim, H. J., Xiang, S., Yeo, I. K. & Maitra, S., 2007, Digital Audio Watermarking Techniques and Technologies: Applications and Benchmarks. IGI Global, p. 172-186 15 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • 2004

    A generalization of PGV-hash functions and security analysis in black-box model

    Lee, W., Nandi, M., Sarkar, P., Chang, D., Lee, S. & Sakurai, K., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Wang, H., Pieprzyk, J. & Varadharajan, V. (eds.). Springer Verlag, p. 212-223 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3108).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    3 Citations (Scopus)
  • A restoration technique incorporating multi-objective goals in WDM optical networks

    Tak, S. W. & Lee, W., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Freire, M. M., Chemouil, P., Lorenz, P. & Gravey, A. (eds.). Springer Verlag, p. 104-114 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3262).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • A secure steganographic scheme against statistical analyses

    Yu, J. J., Han, J. W., Lee, K. S., Seung Cheol, O., Lee, S. & Park, I. H., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Kalker, T., Cox, I. J. & Ro, Y. M. (eds.). Springer Verlag, p. 497-507 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2939).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • Constant-round authenticated group key exchange for dynamic groups

    Kim, H. J., Lee, S. M. & Lee, D. H., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Lee, P. J. & Lee, P. J. (eds.). Springer Verlag, p. 245-259 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3329).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    Open Access
    15 Citations (Scopus)
  • Development of RTOS for PLC using formal methods

    Kim, J. H., Lee, S. Y., Ahn, Y. A., Sim, J. H., Yang, J. S., Lee, N. Y. & Choi, J. Y., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Wang, F. (ed.). Springer Verlag, p. 479-482 4 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3299).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    1 Citation (Scopus)
  • Differential cryptanalysis of tea and XTEA

    Hong, S., Hong, D., Ko, Y., Chang, D., Lee, W. & Lee, S., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Lim, J. I. & Lee, D. H. (eds.). Springer Verlag, p. 402-417 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2971).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    23 Citations (Scopus)
  • Efficient ID-based group key agreement with bilinear maps

    Choi, K. Y., Hwang, J. Y. & Lee, D. H., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Bao, F., Deng, R. & Zhou, J. (eds.). Springer Verlag, p. 130-144 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2947).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    Open Access
    125 Citations (Scopus)
  • Efficient password-based group key exchange

    Lee, S. M., Hwang, J. Y. & Lee, D. H., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Katsikas, S., Lopez, J. & Pernul, G. (eds.). Springer Verlag, p. 191-199 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3184).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    43 Citations (Scopus)
  • Higher order universal one-way hash functions

    Hong, D., Preneel, B. & Lee, S., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Lee, P. J. & Lee, P. J. (eds.). Springer Verlag, p. 201-213 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3329).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    Open Access
  • High quality perceptual steganographic techniques

    Chang, K., Jung, C., Lee, S. & Yang, W., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Kalker, T., Cox, I. J. & Ro, Y. M. (eds.). Springer Verlag, p. 518-531 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2939).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    2 Citations (Scopus)
  • Modified power-analysis attacks on XTR and an efficient countermeasure

    Han, D. G., Izu, T., Lim, J. & Sakurai, K., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Lopez, J., Qing, S. & Okamoto, E. (eds.). Springer Verlag, p. 305-317 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3269).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • New block cipher: ARIA

    Kwon, D., Kim, J., Park, S., Sung, S. H., Sohn, Y., Song, J. H., Yeom, Y., Yoon, E. J., Lee, S., Lee, J., Chee, S., Han, D. & Hong, J., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Lim, J. I. & Lee, D. H. (eds.). Springer Verlag, p. 432-445 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2971).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    78 Citations (Scopus)
  • One-round protocols for two-party authenticated key exchange

    Jeong, I. R., Katz, J. & Lee, D. H., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Jakobsson, M., Yung, M. & Zhou, J. (eds.). Springer Verlag, p. 220-232 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3089).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    78 Citations (Scopus)
  • On security of XTR public key cryptosystems against side channel attacks

    Han, D. G., Lim, J. & Sakurai, K., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Wang, H., Pieprzyk, J. & Varadharajan, V. (eds.). Springer Verlag, p. 454-465 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3108).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    2 Citations (Scopus)
  • Optimizing authentication mechanisms using ID-based cryptography in ad hoc wireless mobile networks

    Lee, W. & Sriborrirux, W., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Kahng, H-K. & Goto, S. (eds.). Springer Verlag, p. 925-934 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3090).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    4 Citations (Scopus)
  • Sound code generation from communicating hybrid models

    Hur, Y., Kim, J., Lee, I. & Choi, J. Y., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Alur, R. & Pappas, G. J. (eds.). Springer Verlag, p. 432-447 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2993).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    8 Citations (Scopus)
  • The related-key rectangle attack - Application to SHACAL-1

    Kim, J., Kim, G., Hong, S., Lee, S. & Hong, D., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Wang, H., Pieprzyk, J. & Varadharajan, V. (eds.). Springer Verlag, p. 123-136 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3108).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    57 Citations (Scopus)
  • Truncated Differential Attacks on 8-Round CRYPTON

    Kim, J., Hong, S., Lee, S., Song, J. & Yang, H., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Lim, J. I. & Lee, D. H. (eds.). Springer Verlag, p. 446-456 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2971).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    9 Citations (Scopus)
  • 2003

    A QoS-aware framework for resource configuration and reservation in ubiquitous computing environments

    Lee, W. & Sabata, B., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Kahng, H-K. (ed.). Springer Verlag, p. 504-514 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2662).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • Covert channel detection in the ICMP payload using support vector machine

    Sohn, T., Moon, J., Lee, S., Lee, D. H. & Lim, J., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Yazici, A. & Sener, C. (eds.). Springer Verlag, p. 828-835 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2869).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    22 Citations (Scopus)
  • Designated verification of non-invertible watermark

    Yoo, H., Lee, H., Lee, S. & Lim, J., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Boyd, C. & Mao, W. (eds.). Springer Verlag, p. 338-351 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2851).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • Experiences with media-integrated distributed control for C4I applications in global military infosphere

    Lee, W., Harinath, R., Srivastava, J., Su, D., Richardson, J. & Foresti, M., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Chung, C-W., Kim, C-K., Kim, W., Ling, T-W. & Song, K-H. (eds.). Springer Verlag, p. 744-750 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2713).

    Research output: Chapter in Book/Report/Conference proceedingChapter