Filter
Conference contribution

Search results

  • 2007

    Windows pagefile collection and analysis for a live forensics context

    Lee, S., Savoldi, A., Lee, S. & Lim, J., 2007, Proceedings of Future Generation Communication and Networking, FGCN 2007. Institute of Electrical and Electronics Engineers Inc., p. 97-101 5 p. 4426211. (Proceedings of Future Generation Communication and Networking, FGCN 2007; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Citations (Scopus)
  • 2006

    Adaptive Splitting Protocols for RFID tag collision arbitration

    Myung, J. & Lee, W., 2006, Proceedings of the Seventh ACM International Symposium on Mobile Ad Hoc Networking and Computing, MOBIHOC 2006. Association for Computing Machinery (ACM), p. 202-213 12 p. (Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc); vol. 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    146 Citations (Scopus)
  • A diffie-hellman key exchange protocol without random oracles

    Jeong, I. R., Kwon, J. O. & Lee, D. H., 2006, Cryptology and Network Security - 5th International Conference, CANS 2006, Proceedings. Springer Verlag, p. 37-54 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4301 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    18 Citations (Scopus)
  • A DRBAC model based on context for smart and secure services in intelligent ubiquitous home

    Park, J. H., Park, J. S., Lee, S. J. & Koh, B. S., 2006, Ubiquitous Intelligence and Computing - Third International Conference, UIC 2006, Proceedings. Springer Verlag, p. 893-901 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4159 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • A key management scheme for large scale distributed sensor networks

    Kim, Y. H., Lee, H., Lee, D. H. & Lim, J., 2006, Personal Wireless Communications - IFIP TC6 11th International Conference, PWC 2006, Proceedings. Cuenca, P. & Orozco-Barbosa, L. (eds.). Springer Verlag, p. 437-446 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4217 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    7 Citations (Scopus)
  • A medium access control scheme for providing reliability in wireless ad hoc networks

    Lee, S. H. & Choi, J. Y., 2006, Wireless Algorithms, Systems, and Applications - First International Conference, WASA 2006, Proceedings. Springer Verlag, p. 341-352 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4138 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • A model for security vulnerability pattern

    Kang, H., Kim, K., Hong, S. & Lee, D. H., 2006, Computational Science and Its Applications - ICCSA 2006: International Conference, Proceedings - Part III. Springer Verlag, p. 385-394 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3982 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Analysis of the power consumption of secure communication in wireless networks

    Kim, K., Hong, J. & Lim, J., 2006, Database and Expert Systems Applications - 17th International Conference, DEXA 2006, Proceedings. Springer Verlag, p. 894-903 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4080 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • An efficient public key cryptosystem with a privacy enhanced double decryption mechanism

    Youn, T. Y., Park, Y. H., Kim, C. H. & Lim, J., 2006, Selected Areas in Cryptography - 12th International Workshop, SAC 2005, Revised Selected Papers. p. 144-158 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3897 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    12 Citations (Scopus)
  • A new dedicated 256-bit hash function: FORK-256

    Hong, D., Chang, D., Sung, J., Lee, S., Hong, S., Lee, J., Moon, D. & Chee, S., 2006, Fast Software Encryption - 13th International Workshop, FSE 2006, Revised Selected Papers. Springer Verlag, p. 195-209 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4047 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    25 Citations (Scopus)
  • A power balanced multipath routing protocol in wireless ad-hoc sensor networks

    Kim, D., Lee, W., Park, B. N., Kim, J., Shin, C. & Shin, C., 2006, Proceedings - Sixth IEEE International Conference on Computer and Information Technology, CIT 2006. 4019987. (Proceedings - Sixth IEEE International Conference on Computer and Information Technology, CIT 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Attack on JPEG2000 steganography using LRCA

    Oh, H., Lee, K. & Lee, S., 2006, Digital Watermarking - 5th International Workshop, IWDW 2006, Proceedings. Springer Verlag, p. 268-281 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4283 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Automatic trap detection of ubiquitous learning on SCORM sequencing

    Wang, C. C., Lin, H. W., Shih, T. K. & Lee, W., 2006, Ubiquitous Intelligence and Computing - Third International Conference, UIC 2006, Proceedings. Springer Verlag, p. 1164-1173 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4159 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • A weak key class of XTEA for a related-key rectangle attack

    Lee, E., Hong, D., Chang, D., Hong, S. & Lim, J., 2006, Progress in Cryptology, VIETCRYPT 2006 - 1st International Conference on Cryptology in Vietnam, Revised Selected Papers. Springer Verlag, p. 286-297 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4341 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Citations (Scopus)
  • Category attack for LSB steganalysis of JPEG images

    Kwangsoo, L., Westfeld, A. & Sangjin, L., 2006, Digital Watermarking - 5th International Workshop, IWDW 2006, Proceedings. Springer Verlag, p. 35-48 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4283 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    19 Citations (Scopus)
  • C-iUMS: Context based smart and secure multimedia service in intelligent ubiquitous home

    Park, J. H., Lee, S. & Hong, S. H., 2006, Emerging Directions in Embedded and Ubiquitous Computing - EUC 2006 Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Proceedings. Zhou, X., Sokolsky, O., Yan, L., Yan, L., Jung, E.-S., Shao, Z., Mu, Y., Lee, D.-C., Kim, D., Jeong, Y.-S. & Xu, C.-Z. (eds.). Springer Verlag, p. 660-670 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4097 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    2 Citations (Scopus)
  • Detection and removal of long scratch lines in aged films

    Shih, T. K., Lin, L. H. & Lee, W., 2006, 2006 IEEE International Conference on Multimedia and Expo, ICME 2006 - Proceedings. p. 477-480 4 p. 4036640. (2006 IEEE International Conference on Multimedia and Expo, ICME 2006 - Proceedings; vol. 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    20 Citations (Scopus)
  • Difference set attacks on conjunctive keyword search schemes

    Rhee, H. S., Jeong, I. R., Byun, J. W. & Lee, D. H., 2006, Secure Data Management - Third VLDB Workshop, SDM 2006, Proceedings. Springer Verlag, p. 64-74 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4165 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • Dynamic clustering for coverage-time maximization in two-tiered hierarchical sensor network architectures

    Kim, J., Lee, W., Kim, D., Kim, E., Kim, H. & Ahn, S., 2006, Embedded and Ubiquitous Computing - International Conference, EUC 2006, Proceedings. Springer Verlag, p. 652-661 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4096 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Efficient and provably secure client-to-client password-based key exchange protocol

    Byun, J. W., Lee, D. H. & Lim, J. I., 2006, Frontiers of WWW Research and Development - APWeb 2006 - 8th Asia-Pacific Web Conference, Proceedings. p. 830-836 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3841 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    24 Citations (Scopus)
  • Efficient conjunctive keyword search on encrypted data storage system

    Byun, J. W., Lee, D. H. & Lim, J., 2006, Public Key Infrastructure: Third European PKI Workshop - Theory and Practice, EuroPKI 2006, Proceedings. Springer Verlag, p. 184-196 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4043 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    82 Citations (Scopus)
  • Efficient password-authenticated key exchange for three-party secure against undetectable on-line dictionary attacks

    Kwon, J. O., Sakurai, K. & Lee, D. H., 2006, Computational Science - ICCS 2006: 6th International Conference, Proceedings. Springer Verlag, p. 977-980 4 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3991 LNCS - I).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Energy-aware distributed topology control for coverage-time optimization in clustering-based heterogeneous sensor networks

    Kim, J., Choi, J. & Lee, W., 2006, 2006 IEEE 63rd Vehicular Technology Conference, VTC 2006-Spring - Proceedings. p. 1033-1037 5 p. 1682991. (IEEE Vehicular Technology Conference; vol. 3).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    14 Citations (Scopus)
  • Evolution of Ubi-autonomous entities

    Hung, J., Li, K. C., Lee, W. & Shin, T. K., 2006, Ubiquitous Intelligence and Computing - Third International Conference, UIC 2006, Proceedings. Springer Verlag, p. 1114-1123 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4159 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Finding collision on 45-Step HAS-160

    Yun, A., Sung, S. H., Park, S., Chang, D., Hong, S. & Cho, H. S., 2006, Information Security and Cryptology, ICISC 2005 - 8th International Conference, Revised Selected Papers. Springer Verlag, p. 146-155 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3935 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    14 Citations (Scopus)
  • Forgery and key recovery attacks on PMAC and Mitchell's TMAC variant

    Lee, C., Kim, J., Sung, J., Hong, S. & Lee, S., 2006, Information Security and Privacy: 11th Australasian Conference, ACISP 2006, Proceedings. Springer Verlag, p. 421-431 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4058 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • Further security analysis of XTR

    Han, D. G., Takagi, T. & Lim, J., 2006, Information Security Practice and Experience - Second International Conference, ISPEC 2006, Proceedings. p. 33-44 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3903 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Generic cryptanalysis of combined countermeasures with randomized BSD representations

    Kim, T. H., Han, D. G., Okeya, K. & Lim, J., 2006, Smart Card Research and Advanced Applications - 7th IFIP WG 8.8/11.2 International Conference, CARDIS 2006, Proceedings. Domingo-Ferrer, J., Posegga, J. & Schreckling, D. (eds.). Springer Verlag, p. 119-134 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3928 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    1 Citation (Scopus)
  • Generic transformation for scalable broadcast encryption schemes

    Hwang, J. Y., Lee, D. H. & Lim, J., 2006, Advances in Cryptology - CRYPTO 2005 - 25th Annual International Cryptology Conference, Proceedings. p. 276-292 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3621 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    23 Citations (Scopus)
  • High-speed RSA crypto-processor with radix-4 modular multiplication and Chinese remainder theorem

    Koo, B., Lee, D., Ryu, G., Chang, T. & Lee, S., 2006, Information Security and Cryptology - ICISC 2006: 9th International Conference, Proceedings. p. 81-93 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4296 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • HIGHT: A new block cipher suitable for low-resource device

    Hong, D., Sung, J., Hong, S., Lim, J., Lee, S., Koo, B. S., Lee, C., Chang, D., Lee, J., Jeong, K., Kim, H., Kim, J. & Chee, S., 2006, Cryptographic Hardware and Embedded Systems, CHES 2006 - 8th International Workshop, Proceedings. Springer Verlag, p. 46-59 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4249 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    590 Citations (Scopus)
  • Improved fast correlation attack on the shrinking and self-shrinking generators

    Jeong, K., Sung, J., Hong, S., Lee, S., Kim, J. & Hong, D., 2006, Progress in Cryptology, VIETCRYPT 2006 - 1st International Conference on Cryptology in Vietnam, Revised Selected Papers. Springer Verlag, p. 260-270 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4341 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Indifferentiable security analysis of popular hash functions with prefix-free padding

    Chang, D., Lee, S., Nandi, M. & Yung, M., 2006, Advances in Cryptology - ASIACRYPT 2006 - 12th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. p. 283-298 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4284 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    41 Citations (Scopus)
  • LAID: Load-adaptive Internet gateway discovery for ubiquitous wireless Internet access networks

    Park, B. N., Lee, W., Lee, C., Hong, J. P. & Kim, J., 2006, Information Networking: Advances in Data Communications and Wireless Networks - International Conference, ICOIN 2006. Revised Selected Papers. Springer Verlag, p. 349-358 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3961 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    11 Citations (Scopus)
  • Modified ID-based threshold decryption and its application to mediated ID-based encryption

    Ju, H. S., Kim, D. Y., Lee, D. H., Park, H. & Chun, K., 2006, Frontiers of WWW Research and Development - APWeb 2006 - 8th Asia-Pacific Web Conference, Proceedings. p. 720-725 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3841 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • New steganalysis methodology: LR cube analysis for the detection of LSB steganography

    Lee, K., Jung, C., Lee, S. & Lim, J., 2006, Information Hiding - 7th International Workshop, IH 2005, Revised Selected Papers. Springer Verlag, p. 312-326 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3727 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Off-line keyword guessing attacks on recent keyword search schemes over encrypted data

    Byun, J. W., Rhee, H. S., Park, H. A. & Lee, D. H., 2006, Secure Data Management - Third VLDB Workshop, SDM 2006, Proceedings. Springer Verlag, p. 75-83 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4165 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    346 Citations (Scopus)
  • One-round protocol for two-party verifier-based password-authenticated key exchange

    Kwon, J. O., Sakurai, K. & Lee, D. H., 2006, Communications and Multimedia Security - 10th IFIP TC-6 TC-11 International Conference, CMS 2006, Proceedings. Leitold, H. & Markatos, E. (eds.). Springer Verlag, p. 87-96 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4237 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    5 Citations (Scopus)
  • On the security of HMAC and NMAC based on HAVAL, MD4, MD5, SHA-0 and SHA-1

    Kim, J., Biryukov, A., Preneel, B. & Hong, S., 2006, Security and Cryptography for Networks - 5th International Conference, SCN 2006, Proceedings. Springer Verlag, p. 242-256 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4116 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    68 Citations (Scopus)
  • Provable security for an RC6-like structure and a MISTY-FO-like structure against differential cryptanalysis

    Lee, C., Kim, J., Sung, J., Hong, S. & Lee, S., 2006, Computational Science and Its Applications - ICCSA 2006: International Conference, Proceedings - Part III. Springer Verlag, p. 446-455 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3982 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Provably-secure two-round password-authenticated group key exchange in the standard model

    Kwon, J. O., Jeong, I. R. & Lee, D. H., 2006, Advances in Information and Computer Security - First International Workshop on Security, IWSEC 2006, Proceedings. Springer Verlag, p. 322-336 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4266 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Citations (Scopus)
  • QoS-aware adaptive internet gateway selection in ad hoc wireless internet access networks

    Park, B. N., Lee, W., Lee, C. & Shin, C. K., 2006, 2006 3rd International Conference on Broadband Communications, Networks and Systems, BROADNETS 2006. 4374361. (2006 3rd International Conference on Broadband Communications, Networks and Systems, BROADNETS 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • QoS provisioning in IEEE 802.11 wireless LANs

    Tran, S. N. H. & Wonjun, L., 2006, HUT-ICCE 2006 1st International Conference on Communications and Electronics, Proceedings. p. 23-28 6 p. 4156505. (HUT-ICCE 2006 First International Conference on Communications and Electronics, Proceedings; vol. PART 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Secrecy analysis of purchase transaction in electronic purses

    Kim, I. G., Kim, H. S., Lee, J. Y., Kang, I. & Choi, J. Y., 2006, Proceedings - 20th International Conference on Advanced Information Networking and Applications. p. 979-984 6 p. 1620313. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Securing Internet gateway discovery protocol in ubiquitous wireless Internet access networks

    Park, B. N., Lee, W. & Shin, C., 2006, Embedded and Ubiquitous Computing - International Conference, EUC 2006, Proceedings. Springer Verlag, p. 318-327 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4096 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Security analysis of RFID authentication for pervasive systems using model checking

    Kim, H. S., Oh, J. H. & Choi, J. Y., 2006, Proceedings - 30th Annual International Computer Software and Applications Conference, COMPSAC 2006 - Short Papers/Workshops/Fast Abstracts/Doctoral Symposium. p. 195-202 8 p. 4020167. (Proceedings - International Computer Software and Applications Conference; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • Security and privacy analysis of RFID systems using model checking

    Kim, H. S., Kim, I. G., Han, K. H. & Choi, J. Y., 2006, High Performance Computing and Communications - Second International Conference, HPCC 2006, Proceedings. Springer Verlag, p. 495-504 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4208 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Side channel attacks and countermeasures on pairing based cryptosystems over binary fields

    Kim, T. H., Takagi, T., Han, D. G., Kim, H. W. & Lim, J., 2006, Cryptology and Network Security - 5th International Conference, CANS 2006, Proceedings. Springer Verlag, p. 168-181 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4301 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    22 Citations (Scopus)
  • The vulnerabilities analysis and design of the security protocol for RFID system

    Kim, H. S., Oh, J. H., Choi, J. Y. & Kim, J. W., 2006, Proceedings - Sixth IEEE International Conference on Computer and Information Technology, CIT 2006. 4019943. (Proceedings - Sixth IEEE International Conference on Computer and Information Technology, CIT 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • UbiComm: An Adaptive Vertical Handoff Decision Scheme for heterogeneous wireless networks

    Lee, W., Kim, E., Yu, J., Lee, D., Choi, J., Kim, J. & Shin, C. K., 2006, Ubiquitous Computing Systems - Third International Symposium, UCS 2006, Proceedings. Springer Verlag, p. 344-356 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4239 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)