Calculated based on number of publications stored in Pure and citations from Scopus
1995 …2021

Research activity per year

Search results

  • 2009

    Evaluation of quality of protection adding HVM in wireless network

    Lim, S. H., Kim, H. S., Yun, S., Cho, J. W., Yi, O. & Lim, J., 2009, Proceedings - 5th International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2009. 5302103. (Proceedings - 5th International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Formalizing the design, evaluation, and analysis of quality of protection in wireless networks

    Lim, S. H., Yun, S., Lim, J. & Yi, O., 2009 Dec, In: Journal of Communications and Networks. 11, 6, p. 634-644 11 p.

    Research output: Contribution to journalArticlepeer-review

    1 Citation (Scopus)
  • Improved remote user authentication scheme using bilinear pairings

    Jun, E. A., Ji, J. D., Lim, J. & Jung, S. W., 2009, ICHIT 2009 - International Conference on Convergence and Hybrid Information Technology 2009. p. 602-605 4 p. (ACM International Conference Proceeding Series; vol. 321).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Technical protection measures for personal information in each processing phase in the Korean public sector

    Shim, M., Baek, S., Park, T., Seol, J. & Lim, J., 2009, In: KSII Transactions on Internet and Information Systems. 3, 5, p. 548-574 27 p.

    Research output: Contribution to journalArticlepeer-review

  • U-HMS: Hybrid system for secure intelligent multimedia data services in Ubi-Home

    Park, J. H., Lee, S., Lim, J. & Yang, L. T., 2009 Jun, In: Journal of Intelligent Manufacturing. 20, 3, p. 337-346 10 p.

    Research output: Contribution to journalArticlepeer-review

    3 Citations (Scopus)
  • Weaknesses in an anonymous authentication scheme for roaming service in global mobility networks

    Youn, T. Y., Park, Y. H. & Lim, J., 2009, In: IEEE Communications Letters. 13, 7, p. 471-473 3 p.

    Research output: Contribution to journalArticlepeer-review

    73 Citations (Scopus)
  • 2008

    An efficient key establishment scheme for self-organizing sensor networks

    Kim, Y. H., Choi, K. Y., Lim, J. & Lee, D. H., 2008, Distributed Computing and Networking - 9th International Conference, ICDCN 2008, Proceedings. Springer Verlag, p. 345-349 5 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4904 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • A tool for the detection of hidden data in microsoft compound document file format

    Kwon, H., Yeog, K., Sangjin, L. & Jongin, L., 2008, Proceedings of the International Conference on Information Science and Security, ICISS 2008. IEEE Computer Society, p. 141-146 6 p. 4438224. (Proceedings of the International Conference on Information Science and Security, ICISS 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • Compression function design principles supporting variable output lengths from a single small function

    Chang, D., Nandi, M., Lee, J., Sung, J., Hong, S., Lim, J., Park, H. & Chun, K., 2008 Sept, In: IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E91-A, 9, p. 2607-2614 8 p.

    Research output: Contribution to journalArticlepeer-review

    2 Citations (Scopus)
  • Design and implementation of a tool to detect accounting frauds

    Kim, Y., Savoldi, A., Lee, H., Yun, S., Lee, S. & Lim, J., 2008, Proceedings - 2008 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2008. p. 547-552 6 p. 4604117. (Proceedings - 2008 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Detection of hidden information in forensic tools

    Kim, Y., Bang, J., Lee, S. & Lim, J., 2008, Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. p. 248-252 5 p. 4511571. (Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Efficient flexible batch signing techniques for imbalanced communication applications

    Youn, T. Y., Park, Y. H., Kwon, T., Kwon, S. & Lim, J., 2008 May, In: IEICE Transactions on Information and Systems. E91-D, 5, p. 1481-1484 4 p.

    Research output: Contribution to journalArticlepeer-review

    3 Citations (Scopus)
  • Impersonation attack on a strong ID-based key distribution

    Hwang, J. Y., Lim, J. & Lee, D., 2008, In: IEICE Transactions on Communications. E91-B, 8, p. 2702-2703 2 p.

    Research output: Contribution to journalArticlepeer-review

    2 Citations (Scopus)
  • Power analysis attacks and countermeasures on ηTpairing over binary fields

    Kim, T. H., Takagi, T., Han, D. G., Kim, H. & Lim, J., 2008 Feb 1, In: ETRI Journal. 30, 1, p. 68-79 12 p.

    Research output: Contribution to journalArticlepeer-review

    9 Citations (Scopus)
  • The evidence collection of DoS attack in WLAN by using WLAN forensic profiling system

    Yim, D., Lim, J. Y., Yun, S., Lim, S. H., Yi, O. & Lim, J., 2008, Proceedings of the International Conference on Information Science and Security, ICISS 2008. IEEE Computer Society, p. 197-204 8 p. 4438234. (Proceedings of the International Conference on Information Science and Security, ICISS 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • Weak-key classes of 7-round MISTY 1 and 2 for related-key amplified boomerang attacks

    Lee, E., Kim, J., Hong, D., Lee, C., Sung, J., Hong, S. & Lim, J., 2008, In: IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E91-A, 2, p. 642-649 8 p.

    Research output: Contribution to journalArticlepeer-review

    15 Citations (Scopus)
  • Weakness in a RSA-based password authenticated key exchange protocol

    Youn, T. Y., Park, Y. H., Kim, C. & Lim, J., 2008 Nov 30, In: Information Processing Letters. 108, 6, p. 339-342 4 p.

    Research output: Contribution to journalArticlepeer-review

    6 Citations (Scopus)
  • 2007

    A digital ID purse mechanism using USIM in a mobile environment

    Song, D., Lim, S. H., Yi, O. & Lim, J., 2007, Innovations'07: 4th International Conference on Innovations in Information Technology, IIT. IEEE Computer Society, p. 670-674 5 p. 4430424. (Innovations'07: 4th International Conference on Innovations in Information Technology, IIT).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • A field guide to hidden accounting information detection

    Kim, Y., Bang, J., Lee, G. T., Lee, S. J. & Lim, J., 2007, Proceedings of Future Generation Communication and Networking, FGCN 2007. Institute of Electrical and Electronics Engineers Inc., p. 146-150 5 p. 4426220. (Proceedings of Future Generation Communication and Networking, FGCN 2007; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Approach of the secure communication mechanism in aero-wireless environment

    Kim, K., Hong, J. & Lim, J., 2007, Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007. p. 1070-1075 6 p. 4197419. (Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • A secure handover protocol design in wireless networks with formal verification

    Lim, S. H., Bang, K. S., Yi, O. & Lim, J., 2007, Wired/Wireless Internet Communications - 5th International Conference, WWIC 2007, Proceedings. Springer Verlag, p. 67-78 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4517 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    14 Citations (Scopus)
  • Bogus data filtering in sensor networks

    Kim, Y. H., Park, J. H., Lee, D. H. & Lim, J., 2007, Emerging Technologies in Knowledge Discovery and Data Mining - PAKDD 2007 International Workshops, Revised Selected Papers. Springer Verlag, p. 629-635 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4819 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Classification of key management schemes for wireless sensor networks

    Lee, H., Kim, Y. H., Lee, D. H. & Lim, J., 2007, Advances in Web and Network Technologies, and Information Management - APWeb/WAIM 2007 International Workshops DBMAN 2007, WebETrends 2007, PAIS 2007 and ASWAN 2007, Proceedings. Springer Verlag, p. 664-673 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4537 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • Design and implementation of the UsMSS: User-centric secure multimedia service system in intelligent home

    Park, J. H., Lee, S., Lee, D. H., Lim, J., Hong, I. H. & Yang, L. T., 2007, Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007. p. 1233-1238 6 p. 4197448. (Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Design and implementation of the UsMSS: User-centric secure multimedia service system in intelligent home

    Park, J. H., Lee, S., Lee, D. H., Lim, J., Hong, I. H. & Yang, L. T., 2007, Proceedings - 21st International Conference on Advanced Information Networking and Applications, AINA 2007. p. 311-316 6 p. 4220909. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Differential power analysis on countermeasures using binary signed digit representations

    Kim, T. H., Han, D. G., Okeya, K. & Lim, J., 2007 Oct, In: ETRI Journal. 29, 5, p. 619-632 14 p.

    Research output: Contribution to journalArticlepeer-review

    3 Citations (Scopus)
  • Dynamic activation of role on RBAC for ubiquitous applications

    Kim, Y. G. & Lim, J., 2007, 2007 International Conference on Convergence Information Technology, ICCIT 2007. p. 1148-1153 6 p. 4420412. (2007 International Conference on Convergence Information Technology, ICCIT 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    14 Citations (Scopus)
  • EC2C-PAKA: An efficient client-to-client password-authenticated key agreement

    Byun, J. W., Lee, D. H. & Lim, J. I., 2007 Oct 1, In: Information Sciences. 177, 19, p. 3995-4013 19 p.

    Research output: Contribution to journalArticlepeer-review

    66 Citations (Scopus)
  • Efficient an implementation method research of a smart card atomic operation

    Jun, E. A., Jung, S. W., Kim, J. G. & Lim, J. I., 2007, Computational Science and Its Applications - ICCSA 2007 - International Conference, Proceedings. PART 2 ed. Springer Verlag, p. 113-121 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4706 LNCS, no. PART 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Enhanced doubling attacks on signed-all-bits set recoding

    Kim, H. S., Kim, T. H., Ryoo, J. C., Han, D. G., Kim, H. W. & Lim, J., 2007, Information Security Theory and Practices: Smart Cards, Mobile and Ubiquitous Computing Systems - First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Proceedings. Sauveron, D., Markantonakis, K., Bilas, A. & Quisquater, J.-J. (eds.). Springer Verlag, p. 39-52 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4462 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Fast secure communication establishing mechanism for aero-wireless networks

    Kim, K., Hong, J. & Lim, J., 2007, ICECS 2007 - 14th IEEE International Conference on Electronics, Circuits and Systems. p. 1360-1363 4 p. 4511251. (Proceedings of the IEEE International Conference on Electronics, Circuits, and Systems).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • HMM-based approach for evaluating risk propagation

    Kim, Y. G. & Lim, J., 2007, Intelligence and Security Informatics - Pacific Asia Workshop, PAISI 2007, Proceedings. Springer Verlag, p. 325-326 2 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4430 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Location-aware random pair-wise keys scheme for wireless sensor networks

    Ji, Y. C., Yong, H. K., Lim, J. & Dong, H. L., 2007, Proceedings of the 3rd International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerU 2007. p. 31-36 6 p. 4279767. (Proceedings - 3rd International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerU 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Modeling and simulation for security risk propagation in critical information systems

    Kim, Y. G., Jeong, D., Park, S. H., Lim, J. & Baik, D. K., 2007, Computational Intelligence and Security - International Conference, CIS 2006, Revised Selected Papers. Springer Verlag, p. 858-868 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4456 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • Optimized cryptographic binding protocol using MIPv6 over IEEE 802.16e

    Park, H. S., Lim, S. H., Yun, S., Yi, O. & Lim, J., 2007, ISCIT 2007 - 2007 International Symposium on Communications and Information Technologies Proceedings. p. 1225-1230 6 p. 4392204. (ISCIT 2007 - 2007 International Symposium on Communications and Information Technologies Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Password recovery using an evidence collection tool and countermeasures

    Lee, S., Savoldi, A., Lee, S. & Lim, J., 2007, Proceedings - 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2007.. p. 97-102 6 p. 4457662. (Proceedings - 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2007.; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    11 Citations (Scopus)
  • PPIDS: Privacy preserving intrusion detection system

    Park, H. A., Lee, D. H., Lim, J. & Cho, S. H., 2007, Intelligence and Security Informatics - Pacific Asia Workshop, PAISI 2007, Proceedings. Springer Verlag, p. 269-274 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4430 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    11 Citations (Scopus)
  • Quantitative risk analysis and evaluation in information systems: A case study

    Kim, Y. G. & Lim, J., 2007, Computational Science - ICCS 2007 - 7th International Conference, Proceedings. PART 3 ed. Springer Verlag, p. 1040-1047 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4489 LNCS, no. PART 3).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    3 Citations (Scopus)
  • Related-key amplified boomerang attacks on the full-round eagle-64 and eagle-128

    Jeong, K., Lee, C., Sung, J., Hong, S. & Lim, J., 2007, Information Security and Privacy - 12th Australasian Conference, ACISP 2007, Proceedings. Springer Verlag, p. 143-157 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4586 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Citations (Scopus)
  • Secure signed radix-r recoding methods for constrained-embedded devices

    Han, D. G., Kim, S. K., Kim, H. W., Chung, K. I. & Lim, J., 2007, Information Security Practice and Experience - Third International Conference, ISPEC 2007, Proceedings. Springer Verlag, p. 238-253 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4464 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • SPA countermeasure based on unsigned left-to-right recodings

    Kim, S. K., Han, D. G., Kim, H. W., Chung, K. I. L. & Lim, J., 2007, Autonomic and Trusted Computing - 4th International Conference, ATC 2007, Proceedings. Springer Verlag, p. 286-295 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4610 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Verification method of network simulation for pervasive environments

    Cho, K., Lee, J., Lim, J. & Moon, J., 2007, Proceedings of the 3rd International Conference on Security and Privacy in Communication Networks, SecureComm. p. 155-161 7 p. 4550323. (Proceedings of the 3rd International Conference on Security and Privacy in Communication Networks, SecureComm).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Windows pagefile collection and analysis for a live forensics context

    Lee, S., Savoldi, A., Lee, S. & Lim, J., 2007, Proceedings of Future Generation Communication and Networking, FGCN 2007. Institute of Electrical and Electronics Engineers Inc., p. 97-101 5 p. 4426211. (Proceedings of Future Generation Communication and Networking, FGCN 2007; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • 2006

    A key management scheme for large scale distributed sensor networks

    Kim, Y. H., Lee, H., Lee, D. H. & Lim, J., 2006, Personal Wireless Communications - IFIP TC6 11th International Conference, PWC 2006, Proceedings. Cuenca, P. & Orozco-Barbosa, L. (eds.). Springer Verlag, p. 437-446 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4217 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    7 Citations (Scopus)
  • Analysis of the power consumption of secure communication in wireless networks

    Kim, K., Hong, J. & Lim, J., 2006, Database and Expert Systems Applications - 17th International Conference, DEXA 2006, Proceedings. Springer Verlag, p. 894-903 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4080 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • An efficient ID-based delegation network

    Youn, T. G., Park, Y. H., Kim, C. H. & Lim, J., 2006, In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4277 LNCS - I, p. 382-391 10 p.

    Research output: Contribution to journalConference articlepeer-review

    1 Citation (Scopus)
  • An efficient public key cryptosystem with a privacy enhanced double decryption mechanism

    Youn, T. Y., Park, Y. H., Kim, C. H. & Lim, J., 2006, Selected Areas in Cryptography - 12th International Workshop, SAC 2005, Revised Selected Papers. p. 144-158 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3897 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    12 Citations (Scopus)
  • A weak key class of XTEA for a related-key rectangle attack

    Lee, E., Hong, D., Chang, D., Hong, S. & Lim, J., 2006, Progress in Cryptology, VIETCRYPT 2006 - 1st International Conference on Cryptology in Vietnam, Revised Selected Papers. Springer Verlag, p. 286-297 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4341 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Citations (Scopus)
  • Efficient and provably secure client-to-client password-based key exchange protocol

    Byun, J. W., Lee, D. H. & Lim, J. I., 2006, Frontiers of WWW Research and Development - APWeb 2006 - 8th Asia-Pacific Web Conference, Proceedings. p. 830-836 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3841 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    24 Citations (Scopus)
  • Efficient conjunctive keyword search on encrypted data storage system

    Byun, J. W., Lee, D. H. & Lim, J., 2006, Public Key Infrastructure: Third European PKI Workshop - Theory and Practice, EuroPKI 2006, Proceedings. Springer Verlag, p. 184-196 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4043 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    81 Citations (Scopus)