Filter
Conference contribution

Search results

  • 2009

    Data leak analysis in a corporate environment

    Lee, S., Lee, K., Savoldi, A. & Lee, S., 2009, 2009 4th International Conference on Innovative Computing, Information and Control, ICICIC 2009. p. 38-43 6 p. 5412531. (2009 4th International Conference on Innovative Computing, Information and Control, ICICIC 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Detecting similar files based on hash and statistical analysis for digital forensic investigation

    Seo, K., Lim, K., Choi, J., Chang, K. & Lee, S., 2009, Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009. 5404198. (Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    14 Citations (Scopus)
  • Developing a multi-protocol mobility manager for SIP/SS7 networks

    Park, H. S., Lee, H. W., Park, S. J. & Lee, D. H., 2009, Proceedings of the International Conference on Complex, Intelligent and Software Intensive Systems, CISIS 2009. p. 565-570 6 p. 5066842. (Proceedings of the International Conference on Complex, Intelligent and Software Intensive Systems, CISIS 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Distributed SC-FDMA resource allocation algorithm based on the hungarian method

    Noh, J. H. & Oh, S. J., 2009, Proceedings of the 2009 IEEE 70th Vehicular Technology Conference Fall, VTC 2009 Fall. 5378857. (IEEE Vehicular Technology Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    21 Citations (Scopus)
  • Dynamic frequency reuse OFDMA downlink scheduling by random access scheme

    Kim, D. H. & Oh, S. J., 2009, Proceedings of the 2009 IEEE 70th Vehicular Technology Conference Fall, VTC 2009 Fall. 5378864. (IEEE Vehicular Technology Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Efficient sequential architecture for the AES CCM mode in the 802.16e standard

    Ji, J. D., Jung, S. W., Jun, E. A. & Lim, J., 2009, ICINIS 2009 - Proceedings of the 2nd International Conference on Intelligent Networks and Intelligent Systems. p. 253-256 4 p. 5364531. (ICINIS 2009 - Proceedings of the 2nd International Conference on Intelligent Networks and Intelligent Systems).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • Evaluation of quality of protection adding HVM in wireless network

    Lim, S. H., Kim, H. S., Yun, S., Cho, J. W., Yi, O. & Lim, J., 2009, Proceedings - 5th International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2009. 5302103. (Proceedings - 5th International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Evidence investigation methodologies for detecting financial fraud based on forensic accounting

    Choi, J., Choi, K. & Lee, S., 2009, Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009. 5404202. (Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    14 Citations (Scopus)
  • Fast BCH syndrome coding for steganography

    Zhang, R., Sachnev, V. & Kim, H. J., 2009, Information Hiding - 11th International Workshop, IH 2009, Revised Selected Papers. p. 48-58 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5806 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    64 Citations (Scopus)
  • FMIPv6 based secure binding update authentication in wireless vehicular networks

    Lee, S. H., Choi, J. Y. & Park, N. S., 2009, 2009 4th International Symposium on Wireless and Pervasive Computing, ISWPC 2009. IEEE Computer Society, 4800584. (2009 4th International Symposium on Wireless and Pervasive Computing, ISWPC 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Improved remote user authentication scheme using bilinear pairings

    Jun, E. A., Ji, J. D., Lim, J. & Jung, S. W., 2009, ICHIT 2009 - International Conference on Convergence and Hybrid Information Technology 2009. p. 602-605 4 p. (ACM International Conference Proceeding Series; vol. 321).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Improved searchable public key encryption with designated tester

    Rhee, H. S., Park, J. H., Susilo, W. & Lee, D. H., 2009, Proceedings of the 4th International Symposium on ACM Symposium on Information, Computer and Communications Security, ASIACCS'09. p. 376-379 4 p. (Proceedings of the 4th International Symposium on ACM Symposium on Information, Computer and Communications Security, ASIACCS'09).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    149 Citations (Scopus)
  • Improving the modified matrix encoding on steganography method

    Choi, Y. S. & Kim, H. J., 2009, 5th International Conference on Information Assurance and Security, IAS 2009. p. 205-208 4 p. 5283888. (5th International Conference on Information Assurance and Security, IAS 2009; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • Model for digital business forensics

    Ahn, J. & Lee, S., 2009, Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009. 5404231. (Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Online removal of ocular artifacts from single channel EEG for ubiquitous healthcare applications

    Shin, H., Kim, H., Lee, S. & Kang, J., 2009, Proceedings of the 4th International Conference on Ubiquitous Information Technologies and Applications, ICUT 2009. 5405708. (Proceedings of the 4th International Conference on Ubiquitous Information Technologies and Applications, ICUT 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • Optimal rate and power allocation in uplink packet CDMA transmission

    Kim, B. H. & Oh, S. J., 2009, 2009 IEEE Wireless Communications and Networking Conference, WCNC 2009 - Proceedings. 4917867. (IEEE Wireless Communications and Networking Conference, WCNC).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Packed PE file detection for malware forensics

    Han, S., Lee, K. & Lee, S., 2009, Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009. 5404211. (Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    15 Citations (Scopus)
  • Practical access control protocol for secure sensor networks

    Hwaseong, L., Kilho, S. & Dong, H. L., 2009, 2009 IEEE 13th International Symposium on Consumer Electronics, ISCE 2009. p. 806-809 4 p. 5157056. (Digest of Technical Papers - IEEE International Conference on Consumer Electronics).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Research about extracting and analyzing accounting data of company to detect financial fraud

    Kimin, S., Jaemin, C., Yong-seok, C., Dong-chan, L. & Sangjin, L., 2009, 2009 IEEE International Conference on Intelligence and Security Informatics, ISI 2009. p. 200-202 3 p. 5137302. (2009 IEEE International Conference on Intelligence and Security Informatics, ISI 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Citations (Scopus)
  • Security authentication for U-health application services

    Ahn, B. H., Hong, J. & Lee, D., 2009, Communication and Networking: International Conference, FGCN/ACN 2009, Held as Part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009. Pro. Slezak, D., Kim, T.-H., Chang, A.C.-C., Vasilakos, T., Li, M. & Sakurai, K. (eds.). p. 17-24 8 p. (Communications in Computer and Information Science; vol. 56).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Security enhancing compiler for localization schemes in pervasive sensor networks

    Chun, J. Y., Kim, Y. H., Hwang, J. Y. & Lee, D. H., 2009, Proceedings of the 2009 8th IEEE/ACIS International Conference on Computer and Information Science, ICIS 2009. p. 307-312 6 p. 5222880. (Proceedings of the 2009 8th IEEE/ACIS International Conference on Computer and Information Science, ICIS 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Universal forgery of the identity-based sequential aggregate signature scheme

    Hwang, J. Y., Lee, D. H. & Yung, M., 2009, Proceedings of the 4th International Symposium on ACM Symposium on Information, Computer and Communications Security, ASIACCS'09. p. 157-160 4 p. (Proceedings of the 4th International Symposium on ACM Symposium on Information, Computer and Communications Security, ASIACCS'09).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    34 Citations (Scopus)
  • 2008

    A3RP: Anonymous and authenticated ad hoc routing protocol

    Paik, J. H., Kim, B. H. & Lee, D. H., 2008, Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. p. 67-72 6 p. 4511536. (Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    26 Citations (Scopus)
  • A calculus to reduce spatial and temporal complexity for specification and analysis of complex real-time systems

    Choi, J., Choi, J. Y., On, J. & Lee, M., 2008, Proceedings - 4th International Conference on Networked Computing and Advanced Information Management, NCM 2008. p. 8-13 6 p. 4623969. (Proceedings - 4th International Conference on Networked Computing and Advanced Information Management, NCM 2008; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • A grid-based architecture for recording and replay of civil-engineering hybrid remote experiment

    Sun, J., Jang, H. L. & Wonjun, L., 2008, 2008 International Conference on Information Networking, ICOIN. 4472800. (2008 International Conference on Information Networking, ICOIN).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • A key distribution scheme for wireless sensor networks

    Kim, Y. H., Lee, H. & Lee, D. H., 2008, 6th Annual IEEE International Conference on Pervasive Computing and Communications, PerCom 2008. p. 572-577 6 p. 4517458. (6th Annual IEEE International Conference on Pervasive Computing and Communications, PerCom 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • A lightweight protocol analysis and modification for secure RFID system

    Kim, H. S. & Choi, J. Y., 2008, 2008 Proceedings of 17th International Conference on Computer Communications and Networks, ICCCN 2008. p. 958-962 5 p. 4674336. (Proceedings - International Conference on Computer Communications and Networks, ICCCN).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • A methodology for forensic analysis of embedded systems

    Lim, K. S. & Lee, S., 2008, Proceedings of the 2008 2nd International Conference on Future Generation Communication and Networking, FGCN 2008. p. 283-286 4 p. 4734223. (Proceedings of the 2008 2nd International Conference on Future Generation Communication and Networking, FGCN 2008; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • An efficient key establishment scheme for self-organizing sensor networks

    Kim, Y. H., Choi, K. Y., Lim, J. & Lee, D. H., 2008, Distributed Computing and Networking - 9th International Conference, ICDCN 2008, Proceedings. Springer Verlag, p. 345-349 5 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4904 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • A new public key broadcast encryption using Boneh-Boyen-Goh's HIBE scheme

    Park, J. H. & Lee, D. H., 2008, Information Security Practice and Experience - 4th International Conference, ISPEC 2008, Proceedings. p. 101-115 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4991 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • An improved reversible difference expansion watermarking algorithm

    Vasiliy, S., Kim, H. J., Xiang, S. & Nam, J., 2008, Digital Watermarking - 6th International Workshop, IWDW 2007, Proceedings. p. 254-263 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5041 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • An improved steganographic method

    Kim, H. J. & Md, A., 2008, SIGMAP 2008 - Proceedings of the International Conference on Signal Processing and Multimedia Applications. p. 145-150 6 p. (SIGMAP 2008 - Proceedings of the International Conference on Signal Processing and Multimedia Applications).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Anonymous and traceable authentication scheme using smart cards

    Kim, S., Rhee, H. S., Chun, J. Y. & Lee, D. H., 2008, Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. p. 162-165 4 p. 4511555. (Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    16 Citations (Scopus)
  • A pageranking based method for identifying characteristic genes of a disease

    Hai, D. T., Lee, W. & Thuy, H. Q., 2008, Proceedings of 2008 IEEE International Conference on Networking, Sensing and Control, ICNSC. p. 1496-1499 4 p. 4525457. (Proceedings of 2008 IEEE International Conference on Networking, Sensing and Control, ICNSC).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • A reliable multicast transport protocol for communicating real-time distributed objects

    Ahn, J. S., Paik, I., Seong, B. D., Hong, J. P., Han, S. & Lee, W., 2008, Information Networking: Towards Ubiquitous Networking and Services - International Conference, ICOIN 2007, Revised Selected Papers. Springer Verlag, p. 801-810 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5200 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • A tool for the detection of hidden data in microsoft compound document file format

    Kwon, H., Yeog, K., Sangjin, L. & Jongin, L., 2008, Proceedings of the International Conference on Information Science and Security, ICISS 2008. IEEE Computer Society, p. 141-146 6 p. 4438224. (Proceedings of the International Conference on Information Science and Security, ICISS 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • Attribute-based access control using combined authentication technologies

    Park, H. A., Dong, H. L. & Zhan, J., 2008, 2008 IEEE International Conference on Granular Computing, GRC 2008. p. 518-523 6 p. 4664774. (2008 IEEE International Conference on Granular Computing, GRC 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • Auditable and privacy-preserving authentication in vehicular networks

    Sung, H. K., Bum, H. K., Young, K. K. & Dong, H. L., 2008, Proceedings - The 2nd International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies, UBICOMM 2008. p. 19-24 6 p. 4641307. (Proceedings - The 2nd International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies, UBICOMM 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    11 Citations (Scopus)
  • Authenticated group key distribution for unreliable sensor networks

    Lee, H., Kim, Y. H. & Lee, D. H., 2008, Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. p. 285-288 4 p. 4511578. (Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Biometric handshake protocol on telebiometric system mechanism for national infrastructure

    Shin, Y. N., Lee, Y. J., Shin, W. & Choi, J. Y., 2008, Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. p. 57-60 4 p. 4511534. (Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • CADE: Cumulative acknowledgement based detection of selective forwarding attacks in wireless sensor networks*

    Kim, Y. K., Lee, H., Cho, K. & Lee, D. H., 2008, Proceedings - 3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008. p. 416-422 7 p. 4682277. (Proceedings - 3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Citations (Scopus)
  • Cooperative relaying strategies for multi-hop wireless sensor networks

    Kim, J. & Lee, W., 2008, 3rd IEEE/Create-Net International Conference on Communication System Software and Middleware, COMSWARE. IEEE Computer Society, p. 103-106 4 p. 4554388. (3rd IEEE/Create-Net International Conference on Communication System Software and Middleware, COMSWARE).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Cryptanalysis and improvement of a multi-receiver identity-based key encapsulation at INDOCRYPT 06

    Park, J. H., Kim, K. T. & Lee, D. H., 2008, Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS '08. p. 373-380 8 p. (Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS '08).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    18 Citations (Scopus)
  • Cryptanalysis of two improved remote user authentication schemes preserving user anonymity

    Kim, S., Chun, J. Y. & Lee, D. H., 2008, Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008. p. 2235-2239 5 p. 4709320. (Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Data hiding in windows executable files

    Shin, D. M., Kim, Y., Byun, K. D. & Lee, S., 2008, Proceedings of the 6th Australian Digital Forensics Conference. p. 153-159 7 p. (Proceedings of the 6th Australian Digital Forensics Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • Data randomization for lightweight secure data aggregation in sensor network

    Mohaisen, A., Jeong, I. R., Hong, D., Jho, N. S. & Nyang, D., 2008, Ubiquitous Intelligence and Computing - 5th International Conference, UIC 2008, Proceedings. p. 338-351 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5061 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Design and implementation of a tool for System Restore Point analysis

    Yun, S. M., Savoldi, A., Gubian, P., Kim, Y., Lee, S. & Lee, S., 2008, Proceedings - 2008 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2008. p. 542-546 5 p. 4604116. (Proceedings - 2008 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Design and implementation of a tool to detect accounting frauds

    Kim, Y., Savoldi, A., Lee, H., Yun, S., Lee, S. & Lim, J., 2008, Proceedings - 2008 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2008. p. 547-552 6 p. 4604117. (Proceedings - 2008 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Designing fingerprint-recognition-based access control for electronic medical records systems

    Shin, Y., Lee, Y., Shin, W. & Choi, J., 2008, Proceedings - 22nd International Conference on Advanced Information Networking and Applications Workshops/Symposia, AINA 2008. p. 106-110 5 p. 4482898. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Citations (Scopus)
  • Design reviews of health care system

    Ahn, B. H. & Lee, D., 2008, ICCC 2008 - IEEE 6th International Conference on Computational Cybernetics, Proceedings. p. 253-257 5 p. 4721416. (ICCC 2008 - IEEE 6th International Conference on Computational Cybernetics, Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)