Filter
Conference contribution

Search results

  • 2012

    Process algebraic specification of software defined networks

    Kang, M., Park, J., Choi, J. Y., Nam, K. H. & Shin, M. K., 2012, Proceedings - 2012 4th International Conference on Computational Intelligence, Communication Systems and Networks, CICSyN 2012. p. 359-363 5 p. 6274368. (Proceedings - 2012 4th International Conference on Computational Intelligence, Communication Systems and Networks, CICSyN 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Recognizing numbers from the low-resolution patterns in digital images

    Tsomko, E. & Kim, H. J., 2012, 2012 13th International Workshop on Image Analysis for Multimedia Interactive Services, WIAMIS 2012. 6226777. (International Workshop on Image Analysis for Multimedia Interactive Services).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Security analysis of the keyschedule of ARIA-128

    Kang, H., Lee, Y., Jeong, K., Sung, J. & Hong, S., 2012, Computer Science and Its Applications, CSA 2012. p. 243-251 9 p. (Lecture Notes in Electrical Engineering; vol. 203 LNEE).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Silhouette: Volume shadow copy analyzer

    Bang, J. & Lee, S., 2012, Future Information Technology, Application, and Service, FutureTech 2012. VOL. 1 ed. p. 721-730 10 p. (Lecture Notes in Electrical Engineering; vol. 164 LNEE, no. VOL. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Survey and research direction on online game security

    Woo, J. & Kim, H. K., 2012, Proceedings - WASA 2012: Workshop at SIGGRAPH Asia 2012. p. 19-25 7 p. (Proceedings - WASA 2012: Workshop at SIGGRAPH Asia 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    17 Citations (Scopus)
  • Threshold identity-based broadcast encryption from identity-based encryption

    Kim, K., Kim, M., Kim, H., Park, J. H. & Lee, D. H., 2012, Computer Applications for Database, Education, and Ubiquitous Computing - Int. Conferences, EL, DTA and UNESST 2012, Held as Part of the Future Generation Information Technol. Conf., FGIT 2012, Proc.. p. 99-102 4 p. (Communications in Computer and Information Science; vol. 352 CCIS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Tree problems of the Resource Chain trust model for P2P storage cloud

    Lee, S. & Lee, W., 2012, 2012 International Conference on ICT Convergence: "Global Open Innovation Summit for Smart ICT Convergence", ICTC 2012. p. 331-332 2 p. 6386852. (International Conference on ICT Convergence).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Virtual machines placement for network isolation in clouds

    Kim, G., Park, H., Yu, J. & Lee, W., 2012, Proceeding of the 2012 ACM Research in Applied Computation Symposium, RACS 2012. p. 243-248 6 p. (Proceeding of the 2012 ACM Research in Applied Computation Symposium, RACS 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Citations (Scopus)
  • Weakness and simple improvement of anonymous mutual authentication protocol with link-layer

    Jo, H., Kim, S. & Won, D., 2012, Proceedings of the CUBE International Information Technology Conference, CUBE 2012. p. 816-819 4 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2011

    A fast and provably secure higher-order masking of AES S-box

    Kim, H. S., Hong, S. & Lim, J., 2011, Cryptographic Hardware and Embedded Systems - 13th International Workshop, CHES 2011, Proceedings. p. 95-107 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6917 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    73 Citations (Scopus)
  • Analysis on vulnerability of home healthcare medical devices and development of protection profile based on Common Criteria version 3.1

    Lee, C., Kim, S., Lee, K. & Won, D., 2011, Proceedings - 1st ACIS/JNU International Conference on Computers, Networks, Systems, and Industrial Engineering, CNSI 2011. p. 240-247 8 p. 5954315. (Proceedings - 1st ACIS/JNU International Conference on Computers, Networks, Systems, and Industrial Engineering, CNSI 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • An analysis of Multi-Function Peripheral with a digital forensics perspective

    Lee, K., Kim, S., Lee, C., Won, D. & Park, N., 2011, Proceedings - 1st ACIS/JNU International Conference on Computers, Networks, Systems, and Industrial Engineering, CNSI 2011. p. 252-257 6 p. 5954317. (Proceedings - 1st ACIS/JNU International Conference on Computers, Networks, Systems, and Industrial Engineering, CNSI 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • An efficient implementation of block cipher in Android platform

    Paik, J. H., Seo, S. C., Kim, Y., Lee, H. J., Jung, H. C. & Lee, D. H., 2011, Proceedings of the 2011 5th FTRA International Conference on Multimedia and Ubiquitous Engineering, MUE 2011. p. 173-176 4 p. 5992211. (Proceedings of the 2011 5th FTRA International Conference on Multimedia and Ubiquitous Engineering, MUE 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • An efficient implementation of KCDSA on Graphic Processing Units

    Seo, S. C., Paik, J. H., Lee, D. H., Hong, S., Lee, H. J. & Jung, H. C., 2011, Proceedings of the 2011 5th FTRA International Conference on Multimedia and Ubiquitous Engineering, MUE 2011. p. 167-172 6 p. 5992210. (Proceedings of the 2011 5th FTRA International Conference on Multimedia and Ubiquitous Engineering, MUE 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • An efficient pattern substitution watermarking method for binary images

    Dong, K. & Kim, H. J., 2011, Digital Watermarking - 9th International Workshop, IWDW 2010, Revised Selected Papers. p. 181-188 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6526 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • An efficient pattern substitution watermarking method for binary images

    Dong, K. & Kim, H. J., 2011, Digital Watermarking - 9th International Workshop, IWDW 2010, Revised Selected Papers. Springer Verlag, p. 181-188 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6526 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • A queuing model with random interruptions for electric vehicle charging systems

    Baek, S. J., Kim, D., Oh, S. J. & Jun, J. A., 2011, 2011 IEEE International Conference on Consumer Electronics, ICCE 2011. p. 679-680 2 p. 5722805. (Digest of Technical Papers - IEEE International Conference on Consumer Electronics).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    18 Citations (Scopus)
  • A Stackelberg game for spectrum investment and pricing in cooperative cognitive radio networks

    Roh, H., Park, H., Jung, C. & Lee, W., 2011, Proceedings of the ACM CoNEXT Student Workshop, CoNEXT 2011. (Proceedings of the ACM CoNEXT Student Workshop, CoNEXT 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Beamforming in cognitive radio with partial channel state information

    Noh, J. H. & Oh, S. J., 2011, 2011 IEEE Global Telecommunications Conference, GLOBECOM 2011. 6134381. (GLOBECOM - IEEE Global Telecommunications Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Blocking effect and halftoning impulse suppression in an ED/OD BTC image with optimized texture-dependent filter sets

    Guo, J. M., Su, C. C. & Kim, H. J., 2011, Proceedings 2011 International Conference on System Science and Engineering, ICSSE 2011. p. 593-596 4 p. 5961972. (Proceedings 2011 International Conference on System Science and Engineering, ICSSE 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Constant approximation for virtual backbone construction with Guaranteed Routing Cost in wireless sensor networks

    Du, H., Ye, Q., Wu, W., Lee, W., Li, D., Du, D. & Howard, S., 2011, 2011 Proceedings IEEE INFOCOM. p. 1737-1744 8 p. 5934967. (Proceedings - IEEE INFOCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    43 Citations (Scopus)
  • Construction of directional virtual backbones with minimum routing cost in wireless networks

    Ding, L., Wu, W., Willson, J. K., Du, H. & Lee, W., 2011, 2011 Proceedings IEEE INFOCOM. p. 1557-1565 9 p. 5934946. (Proceedings - IEEE INFOCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Extended fingerprint-based user authentication scheme using smart cards in education IPTV

    Jun, E. A., Kim, J. G., Jung, S. W. & Lee, D. H., 2011, 2011 International Conference on Information Science and Applications, ICISA 2011. 5772392. (2011 International Conference on Information Science and Applications, ICISA 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Fast learning fully complex-valued classifiers for real-valued classification problems

    Savitha, R., Suresh, S., Sundararajan, N. & Kim, H. J., 2011, Advances in Neural Networks - 8th International Symposium on Neural Networks, ISNN 2011. PART 1 ed. p. 602-609 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6675 LNCS, no. PART 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    28 Citations (Scopus)
  • Fault injection attack on A5/3

    Jeong, K., Lee, Y., Sung, J. & Hong, S., 2011, Proceedings - 9th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2011. p. 300-303 4 p. 5951922. (Proceedings - 9th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • Forensic analysis of residual information in adobe PDF files

    Chung, H., Park, J. & Lee, S., 2011, Future Information Technology - 6th International Conference, FutureTech 2011, Proceedings. PART 2 ed. p. 100-109 10 p. (Communications in Computer and Information Science; vol. 185 CCIS, no. PART 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Forensic investigation method and tool based on the user behaviour analysis

    Son, N. & Lee, S., 2011, Proceedings of the 9th Australian Digital Forensics Conference. p. 125-133 9 p. (Proceedings of the 9th Australian Digital Forensics Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Multi-relational social networks in a large-scale MMORPG

    Son, S., Kang, A. R., Kim, H. C., Kwon, T. T., Park, J. & Kim, H. K., 2011, Proceedings of the ACM SIGCOMM 2011 Conference, SIGCOMM'11. p. 414-415 2 p. (Proceedings of the ACM SIGCOMM 2011 Conference, SIGCOMM'11).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • Network Forensic Evidence Acquisition (NFEA) with packet marking

    Kim, H. S. & Kim, H. K., 2011, Proceedings - 9th IEEE International Symposium on Parallel and Distributed Processing with Applications Workshops, ISPAW 2011 - ICASE 2011, SGH 2011, GSDP 2011. p. 388-393 6 p. 5952007. (Proceedings - 9th IEEE International Symposium on Parallel and Distributed Processing with Applications Workshops, ISPAW 2011 - ICASE 2011, SGH 2011, GSDP 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    15 Citations (Scopus)
  • On a security model for a retrieval system over encrypted database

    Park, H. A., Byun, J. W., Park, J. H. & Lee, D. H., 2011, Proceedings - 7th International Conference on Information Processing and Management, ICIPM 2011. p. 76-82 7 p. 6222138. (Proceedings - 7th International Conference on Information Processing and Management, ICIPM 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Privacy-enhanced deniable authentication e-mail service

    Ki, J. H., Yeong Hwang, J., Nyang, D. H., Hoon Lee, D. & Lim, J., 2011, Digital Enterprise and Information Systems - International Conference, DEIS 2011, Proceedings. p. 16-29 14 p. (Communications in Computer and Information Science; vol. 194 CCIS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • Proactive detection of botnets with intended forceful infections from multiple malware collecting channels

    Moon, Y. H. & Kim, H. K., 2011, Future Information Technology - 6th International Conference, FutureTech 2011, Proceedings. PART 1 ed. p. 29-36 8 p. (Communications in Computer and Information Science; vol. 184 CCIS, no. PART 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Recovery techniques for deleted email items in digital forensic context

    Jeong, C., Lee, K. G. & Lee, S., 2011, Future Information Technology - 6th International Conference, FutureTech 2011, Proceedings. PART 2 ed. p. 115-122 8 p. (Communications in Computer and Information Science; vol. 185 CCIS, no. PART 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Self-similarity based lightweight intrusion detection method for cloud computing

    Kwon, H., Kim, T., Yu, S. J. & Kim, H. K., 2011, Intelligent Information and Database Systems - Third International Conference, ACIIDS 2011, Proceedings. PART 2 ed. p. 353-362 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6592 LNAI, no. PART 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    37 Citations (Scopus)
  • Sensitive privacy data acquisition in the iPhone for digital forensic analysis

    Jung, J., Jeong, C., Byun, K. & Lee, S., 2011, Secure and Trust Computing, Data Management, and Applications - 8th FTRA International Conference, STA 2011, Proceedings. p. 172-186 15 p. (Communications in Computer and Information Science; vol. 186 CCIS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Citations (Scopus)
  • System-level simulation of LTE/LTE-A for IMT-Advanced systems

    Noh, J. H. & Oh, S. J., 2011, 2011 IEEE 73rd Vehicular Technology Conference, VTC2011-Spring - Proceedings. 5956445. (IEEE Vehicular Technology Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Ternary data hiding technique for JPEG steganography

    Sachnev, V. & Kim, H. J., 2011, Digital Watermarking - 9th International Workshop, IWDW 2010, Revised Selected Papers. p. 202-210 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6526 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • Ternary data hiding technique for JPEG steganography

    Sachnev, V. & Kim, H. J., 2011, Digital Watermarking - 9th International Workshop, IWDW 2010, Revised Selected Papers. Springer Verlag, p. 202-210 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6526 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • The method of database server detection and investigation in the enterprise environment

    Son, N., Lee, K. G., Jeon, S., Chung, H., Lee, S. & Lee, C., 2011, Secure and Trust Computing, Data Management, and Applications - 8th FTRA International Conference, STA 2011, Proceedings. p. 164-171 8 p. (Communications in Computer and Information Science; vol. 186 CCIS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    13 Citations (Scopus)
  • User input pattern-based authentication method to prevent mobile e-financial incidents

    Seo, H. & Kim, H. K., 2011, Proceedings - 9th IEEE International Symposium on Parallel and Distributed Processing with Applications Workshops, ISPAW 2011 - ICASE 2011, SGH 2011, GSDP 2011. p. 382-387 6 p. 5952006. (Proceedings - 9th IEEE International Symposium on Parallel and Distributed Processing with Applications Workshops, ISPAW 2011 - ICASE 2011, SGH 2011, GSDP 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • What can free money tell us on the virtual black market?

    Woo, K., Kwon, H., Kim, H. C., Kim, C. K. & Kim, H. K., 2011, Proceedings of the ACM SIGCOMM 2011 Conference, SIGCOMM'11. p. 392-393 2 p. (Proceedings of the ACM SIGCOMM 2011 Conference, SIGCOMM'11).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    14 Citations (Scopus)
  • 2010

    A fast implementation of arithmetic coding

    Kim, H. J., 2010, Advances in Web Technologies and Applications - Proceedings of the 12th Asia-Pacific Web Conference, APWeb 2010. p. 419-423 5 p. 5474097. (Advances in Web Technologies and Applications - Proceedings of the 12th Asia-Pacific Web Conference, APWeb 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • A fingerprint-based user authentication scheme using smart cards in IPTV environments

    Jun, E. A., Rhee, H. S., Jung, S. W. & Lee, D. H., 2010, 2010 International Conference on Information Science and Applications, ICISA 2010. 5480301. (2010 International Conference on Information Science and Applications, ICISA 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • A method of measuring the propagation of damage to information communication system

    Yoo, D. Y., Yi, W. S., Lee, G. S. & Choi, J. Y., 2010, 2nd International Conference on Software Engineering and Data Mining, SEDM 2010. p. 192-196 5 p. 5542928. (2nd International Conference on Software Engineering and Data Mining, SEDM 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • A new approach to photography forensics using 3D analysis for correcting perception errors: A case study

    Kim, H. J., Lim, S., Kim, B. & Jung, E. S., 2010, SMVC'10 - Proceedings of the 2010 ACM Workshop on Surreal Media and Virtual Cloning, Co-located with ACM Multimedia 2010. p. 27-30 4 p. (SMVC'10 - Proceedings of the 2010 ACM Workshop on Surreal Media and Virtual Cloning, Co-located with ACM Multimedia 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • A process algebraic framework for modeling resource demand and supply

    Philippou, A., Lee, I., Sokolsky, O. & Choi, J. Y., 2010, Formal Modeling and Analysis of Timed Systems - 8th International Conference, FORMATS 2010, Proceedings. p. 183-197 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6246 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Cooperative bridges: Topology control in cooperative wireless ad hoc networks

    Yu, J., Roh, H., Lee, W., Pack, S. & Du, D. Z., 2010, 2010 Proceedings IEEE INFOCOM. 5462126. (Proceedings - IEEE INFOCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    25 Citations (Scopus)
  • Cooperative wireless data access algorithms in multi-radio wireless networks

    Pack, S., Lee, K., Ko, J. & Lee, W., 2010, 2010 7th IEEE Consumer Communications and Networking Conference, CCNC 2010. 5421773. (2010 7th IEEE Consumer Communications and Networking Conference, CCNC 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Delay minimization of tree-based neighbor discovery in mobile robot networks

    Roh, H., Kim, K. & Lee, W., 2010, Wireless Algorithms, Systems, and Applications - 5th International Conference, WASA 2010, Proceedings. p. 167-171 5 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6221 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Distributed construction of connected dominating sets with minimum routing cost in wireless networks

    Ding, L., Gao, X., Wu, W., Lee, W., Zhu, X. & Du, D. Z., 2010, ICDCS 2010 - 2010 International Conference on Distributed Computing Systems. p. 448-457 10 p. 5541660. (Proceedings - International Conference on Distributed Computing Systems).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    62 Citations (Scopus)