Calculated based on number of publications stored in Pure and citations from Scopus
1995 …2023

Research activity per year

If you made any changes in Pure these will be visible here soon.

Search results

  • Chapter

    Full-round differential attack on the original version of the hash function proposed at PKC'98

    Chang, D., Sung, J., Sung, S., Lee, S. & Lim, J., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Nyberg, K. & Heys, H. (eds.). Springer Verlag, p. 160-174 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2595).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    Open Access
  • Higher order universal one-way hash functions

    Hong, D., Preneel, B. & Lee, S., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Lee, P. J. & Lee, P. J. (eds.). Springer Verlag, p. 201-213 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3329).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    Open Access
  • High quality perceptual steganographic techniques

    Chang, K., Jung, C., Lee, S. & Yang, W., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Kalker, T., Cox, I. J. & Ro, Y. M. (eds.). Springer Verlag, p. 518-531 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2939).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    2 Citations (Scopus)
  • Impossible differential attack on 30-round SHACAL-2

    Hong, S., Kim, J., Kim, G., Sung, J., Lee, C. & Lee, S., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Johansson, T. & Maitra, S. (eds.). Springer Verlag, p. 97-106 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2904).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    17 Citations (Scopus)
  • Impossible differential cryptanalysis for block cipher structures

    Kim, J., Hong, S., Sung, J., Lee, S., Lim, J. & Sung, S., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Johansson, T. & Maitra, S. (eds.). Springer Verlag, p. 82-96 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2904).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    30 Citations (Scopus)
  • Linear cryptanalysis on SPECTR-H64 with higher order differential property

    Ko, Y., Hong, D., Hong, S., Lee, S. & Lim, J., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Gorodetsky, V., Popyack, L. & Skormin, V. (eds.). Springer Verlag, p. 298-307 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2776).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    1 Citation (Scopus)
  • New block cipher: ARIA

    Kwon, D., Kim, J., Park, S., Sung, S. H., Sohn, Y., Song, J. H., Yeom, Y., Yoon, E. J., Lee, S., Lee, J., Chee, S., Han, D. & Hong, J., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Lim, J. I. & Lee, D. H. (eds.). Springer Verlag, p. 432-445 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2971).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    78 Citations (Scopus)
  • New parallel domain extenders for UOWHF

    Lee, W., Chang, D., Lee, S., Sung, S. & Nandi, M., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Laih, C. S. (ed.). Springer Verlag, p. 208-227 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2894).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    Open Access
    10 Citations (Scopus)
  • The related-key rectangle attack - Application to SHACAL-1

    Kim, J., Kim, G., Hong, S., Lee, S. & Hong, D., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Wang, H., Pieprzyk, J. & Varadharajan, V. (eds.). Springer Verlag, p. 123-136 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3108).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    57 Citations (Scopus)
  • Truncated Differential Attacks on 8-Round CRYPTON

    Kim, J., Hong, S., Lee, S., Song, J. & Yang, H., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Lim, J. I. & Lee, D. H. (eds.). Springer Verlag, p. 446-456 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2971).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    9 Citations (Scopus)
  • Conference article

    A flexible DRM system considering ubiquitous environment

    Park, J. H., Lee, S. & Koh, B. S., 2006, In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3983 LNCS, p. 236-244 9 p.

    Research output: Contribution to journalConference articlepeer-review

  • Color cube analysis for detection of LSB steganography in RGB color images

    Lee, K., Jung, C., Lee, S. & Lim, J., 2005, In: Lecture Notes in Computer Science. 3481, II, p. 537-546 10 p.

    Research output: Contribution to journalConference articlepeer-review

    6 Citations (Scopus)
  • Key recovery attacks on the RMAC, TMAC, and IACBC

    Sung, J., Hong, D. & Lee, S., 2003, In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2727 LNCS, p. 265-273 9 p.

    Research output: Contribution to journalConference articlepeer-review

    2 Citations (Scopus)
  • On security notions for steganalysis

    Chang, K., Deng, R. H., Feng, B., Lee, S., Kim, H. & Lim, J., 2005, In: Lecture Notes in Computer Science. 3506, p. 440-454 15 p.

    Research output: Contribution to journalConference articlepeer-review

    1 Citation (Scopus)
  • On security notions of steganographic systems

    Chang, K., Deng, R. H., Feng, B., Lee, S. & Kim, H., 2005, In: Lecture Notes in Computer Science. 3304, p. 137-151 15 p.

    Research output: Contribution to journalConference articlepeer-review

  • On the pseudorandomness of a modification of KASUMI type permutations

    Lee, W., Sakurai, K., Hong, S. & Lee, S., 2005, In: Lecture Notes in Computer Science. 3506, p. 313-329 17 p.

    Research output: Contribution to journalConference articlepeer-review

  • Padding oracle attacks on multiple modes of operation

    Lee, T., Kim, J., Lee, C., Sung, J., Lee, S. & Hong, D., 2005, In: Lecture Notes in Computer Science. 3506, p. 343-351 9 p.

    Research output: Contribution to journalConference articlepeer-review

    5 Citations (Scopus)
  • Related-key and meet-in-the-middle attacks on triple-DES and DES-EXE

    Choi, J., Kim, J., Sung, J., Lee, S. & Lim, J., 2005, In: Lecture Notes in Computer Science. 3481, II, p. 567-576 10 p.

    Research output: Contribution to journalConference articlepeer-review

    5 Citations (Scopus)
  • Related-key rectangle attacks on reduced versions of SHACAL-1 and AES-192

    Hong, S., Kim, J., Lee, S. & Preneel, B., 2005, In: Lecture Notes in Computer Science. 3557, p. 368-383 16 p.

    Research output: Contribution to journalConference articlepeer-review

    Open Access
    63 Citations (Scopus)
  • Security analysis of a 2/3-rate double length compression function in the black-box model

    Nandi, M., Lee, W., Sakurai, K. & Lee, S., 2005, In: Lecture Notes in Computer Science. 3557, p. 243-254 12 p.

    Research output: Contribution to journalConference articlepeer-review

    Open Access
    29 Citations (Scopus)
  • Steganographic scheme using a block cipher

    Yu, J. J., Jung, C. H., Yoon, S. K. & Lee, S., 2005, In: Lecture Notes in Computer Science. 3304, p. 163-170 8 p.

    Research output: Contribution to journalConference articlepeer-review

  • User centric intelligent IPMPS in Ubi-Home

    Park, J. H., Song, J., Lee, S., Koh, B. S. & Hong, I. H., 2006, In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3983 LNCS, p. 245-254 10 p.

    Research output: Contribution to journalConference articlepeer-review

    1 Citation (Scopus)
  • Conference contribution

    A chosen plaintext linear attack on block cipher CIKS-1

    Lee, C., Hong, D., Lee, S., Lee, S., Yang, H. & Lim, J. I., 2002, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 2513. p. 456-468 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2513).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • A DRBAC model based on context for smart and secure services in intelligent ubiquitous home

    Park, J. H., Park, J. S., Lee, S. J. & Koh, B. S., 2006, Ubiquitous Intelligence and Computing - Third International Conference, UIC 2006, Proceedings. Springer Verlag, p. 893-901 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4159 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • A field guide to hidden accounting information detection

    Kim, Y., Bang, J., Lee, G. T., Lee, S. J. & Lim, J., 2007, Proceedings of Future Generation Communication and Networking, FGCN 2007. Institute of Electrical and Electronics Engineers Inc., p. 146-150 5 p. 4426220. (Proceedings of Future Generation Communication and Networking, FGCN 2007; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • A methodology for forensic analysis of embedded systems

    Lim, K. S. & Lee, S., 2008, Proceedings of the 2008 2nd International Conference on Future Generation Communication and Networking, FGCN 2008. p. 283-286 4 p. 4734223. (Proceedings of the 2008 2nd International Conference on Future Generation Communication and Networking, FGCN 2008; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • Amplified boomerang attack against reduced-round shacal

    Kim, J., Moon, D., Lee, W., Hong, S., Lee, S. & Jung, S., 2002, Advances in Cryptology - ASIACRYPT 2002 - 8th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Zheng, Y. (ed.). Springer Verlag, p. 243-253 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2501).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Analysis framework to detect artifacts of portable web browser

    Choi, J. H., Lee, K. G., Park, J., Lee, C. & Lee, S., 2012, Information Technology Convergence, Secure and Trust Computing, and Data Management, ITCS 2012 and STA 2012. p. 207-214 8 p. (Lecture Notes in Electrical Engineering; vol. 180 LNEE).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • Analysis of connection information for database server detection

    Han, J., Lee, K. G., Choi, J., Lim, K. S. & Lee, S., 2009, Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009. 5404207. (Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Analysis of smartphone-based location information

    Kim, D., Bang, J. & Lee, S., 2012, Computer Science and Convergence, CSA 2011 and WCC 2011 Proceedings. p. 43-53 11 p. (Lecture Notes in Electrical Engineering; vol. 114 LNEE).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Analysis of the HIKVISION DVR file system

    Han, J., Jeong, D. & Lee, S., 2015, Digital Forensics and Cyber Crime - 7th International Conference, ICDF2C 2015, Revised Selected Papers. Breitinger, F. & James, J. I. (eds.). Springer Verlag, p. 189-199 11 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 157).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • Analysis of time information for digital investigation

    Bang, J., Yoo, B., Kim, J. & Lee, S., 2009, NCM 2009 - 5th International Joint Conference on INC, IMS, and IDC. p. 1858-1864 7 p. 5331448. (NCM 2009 - 5th International Joint Conference on INC, IMS, and IDC).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Citations (Scopus)
  • Analysis of window Transactional NTFS(TxF) and Transactional Registry(TxR) in the digital forensic perspective

    Yoo, B., Bang, J., Lim, K. S. & Lee, S., 2009, Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009. 5404233. (Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • An efficient method of extracting strings from unfixed-form data

    Jeon, S., Park, J., Lee, K. G. & Lee, S., 2012, Future Information Technology, Application, and Service, FutureTech 2012. VOL. 1 ed. p. 425-434 10 p. (Lecture Notes in Electrical Engineering; vol. 164 LNEE, no. VOL. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • A new dedicated 256-bit hash function: FORK-256

    Hong, D., Chang, D., Sung, J., Lee, S., Hong, S., Lee, J., Moon, D. & Chee, S., 2006, Fast Software Encryption - 13th International Workshop, FSE 2006, Revised Selected Papers. Springer Verlag, p. 195-209 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4047 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    13 Citations (Scopus)
  • A new hash function based on mdx-family and its application to MAC

    Uk Shin, S., Hyune Rhee, K., Hyun Ryu, D. & Jin Lee, S., 1998, Public Key Cryptography - 1st International Workshop on Practice and Theory in Public Key Cryptography, PKC 1998, Proceedings. Zheng, Y. & Imai, H. (eds.). Springer Verlag, p. 234-246 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1431).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • An improved method of multiplication on certain elliptic curves

    Park, Y. H., Oh, S., Lee, S., Lim, J. I. & Sung, M., 2002, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 2274. p. 310-322 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2274).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Applying a stepwise forensic approach to incident response and computer usage analysis

    Lim, K. S., Lee, S. B. & Lee, S., 2009, Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009. 5404204. (Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • Applying LR cube analysis to JSteg detection

    Lee, K., Jung, C., Lee, S., Kim, H. J. & Lim, J., 2005, Communications and Multimedia Security - 9th IFIP TC-6 TC-11International Conference, CMS 2005, Proceedings. Dittmann, J., Katzenbeisser, S. & Uhl, A. (eds.). Springer Verlag, p. 275-276 2 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3677 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    2 Citations (Scopus)
  • A practical approach defeating blackmailing

    Han, D. G., Park, H. Y., Park, Y. H., Lee, S., Lee, D. H. & Yang, H. J., 2002, Information Security and Privacy - 7th Australasian Conference, ACISP 2002, Proceedings. Batten, L. & Seberry, J. (eds.). Springer Verlag, p. 464-481 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2384).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • A proposal of a new public key cryptosystem using matrices over a ring

    Yoo, H., Hong, S., Lee, S., Lim, J. I., Yi, O. & Sung, M., 2000, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 1841. p. 41-48 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1841).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • A research for partition restoration techniques

    Namgung, J., Hong, I. Y., Park, J., Lee, C. & Lee, S., 2014, Future Information Technology, FutureTech 2013. Springer Verlag, p. 315-322 8 p. (Lecture Notes in Electrical Engineering; vol. 276 LNEE).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • A statistical-based anomaly detection method for connected cars in internet of things environment

    Han, M. L., Lee, S., Kang, A. R., Kang, S., Park, J. K. & Kim, H. K., 2015, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 9502. p. 89-97 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9502).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    27 Citations (Scopus)
  • A stepwise methodology for tracing computer usage

    Lee, S. B., Bang, J., Lim, K. S., Kim, J. & Lee, S., 2009, NCM 2009 - 5th International Joint Conference on INC, IMS, and IDC. p. 1852-1857 6 p. 5331447. (NCM 2009 - 5th International Joint Conference on INC, IMS, and IDC).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • A study for classification of web browser log and timeline visualization

    Oh, J., Son, N., Lee, S. & Lee, K., 2012, Information Security Applications - 13th International Workshop, WISA 2012, Revised Selected Papers. Lee, D. H. & Yung, M. (eds.). Springer Verlag, p. 192-207 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7690 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • A tool for the detection of hidden data in microsoft compound document file format

    Kwon, H., Yeog, K., Sangjin, L. & Jongin, L., 2008, Proceedings of the International Conference on Information Science and Security, ICISS 2008. IEEE Computer Society, p. 141-146 6 p. 4438224. (Proceedings of the International Conference on Information Science and Security, ICISS 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • Attack on JPEG2000 steganography using LRCA

    Oh, H., Lee, K. & Lee, S., 2006, Digital Watermarking - 5th International Workshop, IWDW 2006, Proceedings. Springer Verlag, p. 268-281 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4283 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • A watermarking method using quantization and statistical characteristics of wavelet transform

    Byun, K. D., Lee, S. & Kim, H. J., 2005, Proceedings - Sixth International Conference on Parallel and Distributed Computing, Applications and Technologies, PDCAT 2005. p. 689-693 5 p. 1579008. (Parallel and Distributed Computing, Applications and Technologies, PDCAT Proceedings; vol. 2005).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    15 Citations (Scopus)
  • Category attack for LSB steganalysis of JPEG images

    Kwangsoo, L., Westfeld, A. & Sangjin, L., 2006, Digital Watermarking - 5th International Workshop, IWDW 2006, Proceedings. Springer Verlag, p. 35-48 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4283 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    19 Citations (Scopus)
  • C-iUMS: Context based smart and secure multimedia service in intelligent ubiquitous home

    Park, J. H., Lee, S. & Hong, S. H., 2006, Emerging Directions in Embedded and Ubiquitous Computing - EUC 2006 Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Proceedings. Zhou, X., Sokolsky, O., Yan, L., Yan, L., Jung, E-S., Shao, Z., Mu, Y., Lee, D-C., Kim, D., Jeong, Y-S. & Xu, C-Z. (eds.). Springer Verlag, p. 660-670 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4097 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    1 Citation (Scopus)