Filter
Conference contribution

Search results

  • 2012

    An efficient method of extracting strings from unfixed-form data

    Jeon, S., Park, J., Lee, K. G. & Lee, S., 2012, Future Information Technology, Application, and Service, FutureTech 2012. VOL. 1 ed. p. 425-434 10 p. (Lecture Notes in Electrical Engineering; vol. 164 LNEE, no. VOL. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • An improved matrix encoding scheme for JPEG steganography

    Sachnev, V. & Kim, H. J., 2012, Digital-Forensics and Watermarking - 10th International Workshop, IWDW 2011, Revised Selected Papers. p. 3-15 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7128 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • A projection based learning meta-cognitive RBF network classifier for effective diagnosis of Parkinson's disease

    Sateesh Babu, G., Suresh, S., Uma Sangumathi, K. & Kim, H. J., 2012, Advances in Neural Networks, ISNN 2012 - 9th International Symposium on Neural Networks, Proceedings. PART 2 ed. p. 611-620 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7368 LNCS, no. PART 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Citations (Scopus)
  • A study for classification of web browser log and timeline visualization

    Oh, J., Son, N., Lee, S. & Lee, K., 2012, Information Security Applications - 13th International Workshop, WISA 2012, Revised Selected Papers. Lee, D. H. & Yung, M. (eds.). Springer Verlag, p. 192-207 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7690 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • A study on static analysis model of mobile application for privacy protection

    Kim, S., Cho, J. I., Myeong, H. W. & Lee, D. H., 2012, Computer Science and Convergence, CSA 2011 and WCC 2011 Proceedings. p. 529-540 12 p. (Lecture Notes in Electrical Engineering; vol. 114 LNEE).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    18 Citations (Scopus)
  • BAT: Bimodal cryptographic algorithm suitable for various environments

    Lee, J., Jeong, K., Kang, J., Lee, Y., Sung, J., Chang, K. Y. & Hong, S., 2012, Computer Science and Its Applications, CSA 2012. p. 371-387 17 p. (Lecture Notes in Electrical Engineering; vol. 203 LNEE).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Biometric based secure communications without pre-deployed key for biosensor implanted in body sensor networks

    Cho, K. & Lee, D. H., 2012, Information Security Applications - 12th International Workshop, WISA 2011, Revised Selected Papers. p. 203-218 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7115 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    15 Citations (Scopus)
  • Coexistence analysis between IMT system and DTV system in the 700MHz band

    Kim, D. H., Oh, S. J. & Woo, J., 2012, 2012 International Conference on ICT Convergence: "Global Open Innovation Summit for Smart ICT Convergence", ICTC 2012. p. 284-288 5 p. 6386840. (International Conference on ICT Convergence).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    12 Citations (Scopus)
  • Comparative study of push schemes in online social networking services

    Ko, H., Pack, S. & Lee, W., 2012, ICUFN 2012 - 4th International Conference on Ubiquitous and Future Networks, Final Program. p. 225-226 2 p. 6261698. (ICUFN 2012 - 4th International Conference on Ubiquitous and Future Networks, Final Program).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Constant-approximation for target coverage problem in wireless sensor networks

    Ding, L., Wu, W., Willson, J., Wu, L., Lu, Z. & Lee, W., 2012, 2012 Proceedings IEEE INFOCOM, INFOCOM 2012. p. 1584-1592 9 p. 6195527. (Proceedings - IEEE INFOCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    57 Citations (Scopus)
  • Differential fault analysis on HAS-160 compression function

    Kang, J., Jeong, K., Sung, J. & Hong, S., 2012, Computer Science and Its Applications, CSA 2012. p. 97-105 9 p. (Lecture Notes in Electrical Engineering; vol. 203 LNEE).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Differential fault analysis on the block cipher HIGHT

    Lee, Y., Kim, J., Park, J. H. & Hong, S., 2012, Future Information Technology, Application, and Service, FutureTech 2012. VOL. 1 ed. p. 407-416 10 p. (Lecture Notes in Electrical Engineering; vol. 164 LNEE, no. VOL. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • Energy efficient broadcast in multiradio multichannel wireless networks

    Ma, C., Li, D., Du, H., Ma, H., Wang, Y. & Lee, W., 2012, 2012 Proceedings IEEE INFOCOM, INFOCOM 2012. p. 1907-1915 9 p. 6195566. (Proceedings - IEEE INFOCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • Extended NIST prime family for efficient modular reduction

    Cho, Y. I., Chang, N. S., Kim, C. H. & Hong, S., 2012, Computer Science and Convergence, CSA 2011 and WCC 2011 Proceedings. p. 105-111 7 p. (Lecture Notes in Electrical Engineering; vol. 114 LNEE).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Forensic analysis of android phone using Ext4 file system journal log

    Kim, D., Park, J., Lee, K. G. & Lee, S., 2012, Future Information Technology, Application, and Service, FutureTech 2012. VOL. 1 ed. p. 435-446 12 p. (Lecture Notes in Electrical Engineering; vol. 164 LNEE, no. VOL. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    22 Citations (Scopus)
  • Formal specifications for software-defined networking

    Kang, M., Park, J., Shin, J., Nam, K. H., Shin, M. K. & Choi, J. Y., 2012, Proceedings of the 7th International Conference on Future Internet Technologies, CFI'12. p. 51 1 p. (Proceedings of the 7th International Conference on Future Internet Technologies, CFI'12).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Improved differential fault analysis on block cipher SEED-128

    Lee, Y., Kim, J., Hong, S. & Lee, C., 2012, Proceedings of the 2012 15th International Conference on Network-Based Information Systems, NBIS 2012. p. 675-680 6 p. 6354905. (Proceedings of the 2012 15th International Conference on Network-Based Information Systems, NBIS 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Methodology for digital forensic investigation of iCloud

    Lee, J., Chung, H., Lee, C. & Lee, S., 2012, Information Technology Convergence, Secure and Trust Computing, and Data Management, ITCS 2012 and STA 2012. p. 197-206 10 p. (Lecture Notes in Electrical Engineering; vol. 180 LNEE).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • Methodology for digital investigation of illegal sharing using BitTorrent

    Park, S., Chung, H., Lee, C. & Lee, S., 2012, Information Technology Convergence, Secure and Trust Computing, and Data Management, ITCS 2012 and STA 2012. p. 187-195 9 p. (Lecture Notes in Electrical Engineering; vol. 180 LNEE).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Modeling of bot usage diffusion across social networks in MMORPGs

    Woo, J., Kang, A. R. & Kim, H. K., 2012, Proceedings - WASA 2012: Workshop at SIGGRAPH Asia 2012. p. 13-18 6 p. (Proceedings - WASA 2012: Workshop at SIGGRAPH Asia 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • On the security of an novel protocol for downloadable CAS

    Jeong, H., Kim, S. & Won, D., 2012, Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, ICUIMC'12. 65. (Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, ICUIMC'12).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Process algebraic specification of software defined networks

    Kang, M., Park, J., Choi, J. Y., Nam, K. H. & Shin, M. K., 2012, Proceedings - 2012 4th International Conference on Computational Intelligence, Communication Systems and Networks, CICSyN 2012. p. 359-363 5 p. 6274368. (Proceedings - 2012 4th International Conference on Computational Intelligence, Communication Systems and Networks, CICSyN 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Recognizing numbers from the low-resolution patterns in digital images

    Tsomko, E. & Kim, H. J., 2012, 2012 13th International Workshop on Image Analysis for Multimedia Interactive Services, WIAMIS 2012. 6226777. (International Workshop on Image Analysis for Multimedia Interactive Services).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Security analysis of the keyschedule of ARIA-128

    Kang, H., Lee, Y., Jeong, K., Sung, J. & Hong, S., 2012, Computer Science and Its Applications, CSA 2012. p. 243-251 9 p. (Lecture Notes in Electrical Engineering; vol. 203 LNEE).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Silhouette: Volume shadow copy analyzer

    Bang, J. & Lee, S., 2012, Future Information Technology, Application, and Service, FutureTech 2012. VOL. 1 ed. p. 721-730 10 p. (Lecture Notes in Electrical Engineering; vol. 164 LNEE, no. VOL. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Survey and research direction on online game security

    Woo, J. & Kim, H. K., 2012, Proceedings - WASA 2012: Workshop at SIGGRAPH Asia 2012. p. 19-25 7 p. (Proceedings - WASA 2012: Workshop at SIGGRAPH Asia 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    19 Citations (Scopus)
  • Threshold identity-based broadcast encryption from identity-based encryption

    Kim, K., Kim, M., Kim, H., Park, J. H. & Lee, D. H., 2012, Computer Applications for Database, Education, and Ubiquitous Computing - Int. Conferences, EL, DTA and UNESST 2012, Held as Part of the Future Generation Information Technol. Conf., FGIT 2012, Proc.. p. 99-102 4 p. (Communications in Computer and Information Science; vol. 352 CCIS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Tree problems of the Resource Chain trust model for P2P storage cloud

    Lee, S. & Lee, W., 2012, 2012 International Conference on ICT Convergence: "Global Open Innovation Summit for Smart ICT Convergence", ICTC 2012. p. 331-332 2 p. 6386852. (International Conference on ICT Convergence).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Virtual machines placement for network isolation in clouds

    Kim, G., Park, H., Yu, J. & Lee, W., 2012, Proceeding of the 2012 ACM Research in Applied Computation Symposium, RACS 2012. p. 243-248 6 p. (Proceeding of the 2012 ACM Research in Applied Computation Symposium, RACS 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Citations (Scopus)
  • Weakness and simple improvement of anonymous mutual authentication protocol with link-layer

    Jo, H., Kim, S. & Won, D., 2012, Proceedings of the CUBE International Information Technology Conference, CUBE 2012. p. 816-819 4 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2011

    A fast and provably secure higher-order masking of AES S-box

    Kim, H. S., Hong, S. & Lim, J., 2011, Cryptographic Hardware and Embedded Systems - 13th International Workshop, CHES 2011, Proceedings. p. 95-107 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6917 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    76 Citations (Scopus)
  • Analysis on vulnerability of home healthcare medical devices and development of protection profile based on Common Criteria version 3.1

    Lee, C., Kim, S., Lee, K. & Won, D., 2011, Proceedings - 1st ACIS/JNU International Conference on Computers, Networks, Systems, and Industrial Engineering, CNSI 2011. p. 240-247 8 p. 5954315. (Proceedings - 1st ACIS/JNU International Conference on Computers, Networks, Systems, and Industrial Engineering, CNSI 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • An analysis of Multi-Function Peripheral with a digital forensics perspective

    Lee, K., Kim, S., Lee, C., Won, D. & Park, N., 2011, Proceedings - 1st ACIS/JNU International Conference on Computers, Networks, Systems, and Industrial Engineering, CNSI 2011. p. 252-257 6 p. 5954317. (Proceedings - 1st ACIS/JNU International Conference on Computers, Networks, Systems, and Industrial Engineering, CNSI 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • An efficient implementation of block cipher in Android platform

    Paik, J. H., Seo, S. C., Kim, Y., Lee, H. J., Jung, H. C. & Lee, D. H., 2011, Proceedings of the 2011 5th FTRA International Conference on Multimedia and Ubiquitous Engineering, MUE 2011. p. 173-176 4 p. 5992211. (Proceedings of the 2011 5th FTRA International Conference on Multimedia and Ubiquitous Engineering, MUE 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • An efficient implementation of KCDSA on Graphic Processing Units

    Seo, S. C., Paik, J. H., Lee, D. H., Hong, S., Lee, H. J. & Jung, H. C., 2011, Proceedings of the 2011 5th FTRA International Conference on Multimedia and Ubiquitous Engineering, MUE 2011. p. 167-172 6 p. 5992210. (Proceedings of the 2011 5th FTRA International Conference on Multimedia and Ubiquitous Engineering, MUE 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • An efficient pattern substitution watermarking method for binary images

    Dong, K. & Kim, H. J., 2011, Digital Watermarking - 9th International Workshop, IWDW 2010, Revised Selected Papers. p. 181-188 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6526 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • An efficient pattern substitution watermarking method for binary images

    Dong, K. & Kim, H. J., 2011, Digital Watermarking - 9th International Workshop, IWDW 2010, Revised Selected Papers. Springer Verlag, p. 181-188 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6526 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • A queuing model with random interruptions for electric vehicle charging systems

    Baek, S. J., Kim, D., Oh, S. J. & Jun, J. A., 2011, 2011 IEEE International Conference on Consumer Electronics, ICCE 2011. p. 679-680 2 p. 5722805. (Digest of Technical Papers - IEEE International Conference on Consumer Electronics).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    18 Citations (Scopus)
  • A Stackelberg game for spectrum investment and pricing in cooperative cognitive radio networks

    Roh, H., Park, H., Jung, C. & Lee, W., 2011, Proceedings of the ACM CoNEXT Student Workshop, CoNEXT 2011. (Proceedings of the ACM CoNEXT Student Workshop, CoNEXT 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Beamforming in cognitive radio with partial channel state information

    Noh, J. H. & Oh, S. J., 2011, 2011 IEEE Global Telecommunications Conference, GLOBECOM 2011. 6134381. (GLOBECOM - IEEE Global Telecommunications Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Blocking effect and halftoning impulse suppression in an ED/OD BTC image with optimized texture-dependent filter sets

    Guo, J. M., Su, C. C. & Kim, H. J., 2011, Proceedings 2011 International Conference on System Science and Engineering, ICSSE 2011. p. 593-596 4 p. 5961972. (Proceedings 2011 International Conference on System Science and Engineering, ICSSE 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Constant approximation for virtual backbone construction with Guaranteed Routing Cost in wireless sensor networks

    Du, H., Ye, Q., Wu, W., Lee, W., Li, D., Du, D. & Howard, S., 2011, 2011 Proceedings IEEE INFOCOM. p. 1737-1744 8 p. 5934967. (Proceedings - IEEE INFOCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    45 Citations (Scopus)
  • Construction of directional virtual backbones with minimum routing cost in wireless networks

    Ding, L., Wu, W., Willson, J. K., Du, H. & Lee, W., 2011, 2011 Proceedings IEEE INFOCOM. p. 1557-1565 9 p. 5934946. (Proceedings - IEEE INFOCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Extended fingerprint-based user authentication scheme using smart cards in education IPTV

    Jun, E. A., Kim, J. G., Jung, S. W. & Lee, D. H., 2011, 2011 International Conference on Information Science and Applications, ICISA 2011. 5772392. (2011 International Conference on Information Science and Applications, ICISA 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Fast learning fully complex-valued classifiers for real-valued classification problems

    Savitha, R., Suresh, S., Sundararajan, N. & Kim, H. J., 2011, Advances in Neural Networks - 8th International Symposium on Neural Networks, ISNN 2011. PART 1 ed. p. 602-609 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6675 LNCS, no. PART 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    28 Citations (Scopus)
  • Fault injection attack on A5/3

    Jeong, K., Lee, Y., Sung, J. & Hong, S., 2011, Proceedings - 9th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2011. p. 300-303 4 p. 5951922. (Proceedings - 9th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • Forensic analysis of residual information in adobe PDF files

    Chung, H., Park, J. & Lee, S., 2011, Future Information Technology - 6th International Conference, FutureTech 2011, Proceedings. PART 2 ed. p. 100-109 10 p. (Communications in Computer and Information Science; vol. 185 CCIS, no. PART 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Forensic investigation method and tool based on the user behaviour analysis

    Son, N. & Lee, S., 2011, Proceedings of the 9th Australian Digital Forensics Conference. p. 125-133 9 p. (Proceedings of the 9th Australian Digital Forensics Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Multi-relational social networks in a large-scale MMORPG

    Son, S., Kang, A. R., Kim, H. C., Kwon, T. T., Park, J. & Kim, H. K., 2011, Proceedings of the ACM SIGCOMM 2011 Conference, SIGCOMM'11. p. 414-415 2 p. (Proceedings of the ACM SIGCOMM 2011 Conference, SIGCOMM'11).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    6 Citations (Scopus)
  • Network Forensic Evidence Acquisition (NFEA) with packet marking

    Kim, H. S. & Kim, H. K., 2011, Proceedings - 9th IEEE International Symposium on Parallel and Distributed Processing with Applications Workshops, ISPAW 2011 - ICASE 2011, SGH 2011, GSDP 2011. p. 388-393 6 p. 5952007. (Proceedings - 9th IEEE International Symposium on Parallel and Distributed Processing with Applications Workshops, ISPAW 2011 - ICASE 2011, SGH 2011, GSDP 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    15 Citations (Scopus)