Calculated based on number of publications stored in Pure and citations from Scopus
1995 …2023

Research activity per year

If you made any changes in Pure these will be visible here soon.

Search results

  • 2009

    An efficient signed digit montgomery multiplication for RSA

    Lim, D., Chang, N. S., Ji, S. Y., Kim, C. H., Lee, S. & Park, Y. H., 2009 Jul, In: Journal of Systems Architecture. 55, 7-9, p. 355-362 8 p.

    Research output: Contribution to journalArticlepeer-review

    7 Citations (Scopus)
  • Applying a stepwise forensic approach to incident response and computer usage analysis

    Lim, K. S., Lee, S. B. & Lee, S., 2009, Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009. 5404204. (Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • A stepwise methodology for tracing computer usage

    Lee, S. B., Bang, J., Lim, K. S., Kim, J. & Lee, S., 2009, NCM 2009 - 5th International Joint Conference on INC, IMS, and IDC. p. 1852-1857 6 p. 5331447. (NCM 2009 - 5th International Joint Conference on INC, IMS, and IDC).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • CFES: Comprehensive framework for forensic analysis of embedded systems

    Lim, K. S., Choi, Y., Kim, J., Lee, C. & Lee, S., 2009, In: Journal of Internet Technology. 10, 5, p. 549-562 14 p.

    Research output: Contribution to journalArticlepeer-review

    4 Citations (Scopus)
  • Database forensic investigation based on table relationship analysis techniques

    Lee, D., Choi, J. & Lee, S., 2009, Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009. 5404235. (Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    11 Citations (Scopus)
  • Data concealment and detection in Microsoft Office 2007 files

    Park, B., Park, J. & Lee, S., 2009 Mar, In: Digital Investigation. 5, 3-4, p. 104-114 11 p.

    Research output: Contribution to journalArticlepeer-review

    30 Citations (Scopus)
  • Data leak analysis in a corporate environment

    Lee, S., Lee, K., Savoldi, A. & Lee, S., 2009, 2009 4th International Conference on Innovative Computing, Information and Control, ICICIC 2009. p. 38-43 6 p. 5412531. (2009 4th International Conference on Innovative Computing, Information and Control, ICICIC 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Detecting similar files based on hash and statistical analysis for digital forensic investigation

    Seo, K., Lim, K., Choi, J., Chang, K. & Lee, S., 2009, Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009. 5404198. (Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    13 Citations (Scopus)
  • Evidence investigation methodologies for detecting financial fraud based on forensic accounting

    Choi, J., Choi, K. & Lee, S., 2009, Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009. 5404202. (Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    12 Citations (Scopus)
  • Forensic investigation of Microsoft PowerPoint files

    Park, J. & Lee, S., 2009 Sept, In: Digital Investigation. 6, 1-2, p. 16-24 9 p.

    Research output: Contribution to journalArticlepeer-review

    11 Citations (Scopus)
  • Improved side-channel attack on des with the first four rounds masked

    Kim, J., Hong, S., Han, D. G. & Lee, S., 2009 Oct, In: ETRI Journal. 31, 5, p. 625-627 3 p.

    Research output: Contribution to journalArticlepeer-review

    4 Citations (Scopus)
  • Model for digital business forensics

    Ahn, J. & Lee, S., 2009, Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009. 5404231. (Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Online removal of ocular artifacts from single channel EEG for ubiquitous healthcare applications

    Shin, H., Kim, H., Lee, S. & Kang, J., 2009, Proceedings of the 4th International Conference on Ubiquitous Information Technologies and Applications, ICUT 2009. 5405708. (Proceedings of the 4th International Conference on Ubiquitous Information Technologies and Applications, ICUT 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • Packed PE file detection for malware forensics

    Han, S., Lee, K. & Lee, S., 2009, Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009. 5404211. (Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    11 Citations (Scopus)
  • Research about extracting and analyzing accounting data of company to detect financial fraud

    Kimin, S., Jaemin, C., Yong-seok, C., Dong-chan, L. & Sangjin, L., 2009, 2009 IEEE International Conference on Intelligence and Security Informatics, ISI 2009. p. 200-202 3 p. 5137302. (2009 IEEE International Conference on Intelligence and Security Informatics, ISI 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • U-HMS: Hybrid system for secure intelligent multimedia data services in Ubi-Home

    Park, J. H., Lee, S., Lim, J. & Yang, L. T., 2009 Jun, In: Journal of Intelligent Manufacturing. 20, 3, p. 337-346 10 p.

    Research output: Contribution to journalArticlepeer-review

    3 Citations (Scopus)
  • 2008

    A methodology for forensic analysis of embedded systems

    Lim, K. S. & Lee, S., 2008, Proceedings of the 2008 2nd International Conference on Future Generation Communication and Networking, FGCN 2008. p. 283-286 4 p. 4734223. (Proceedings of the 2008 2nd International Conference on Future Generation Communication and Networking, FGCN 2008; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • A tool for the detection of hidden data in microsoft compound document file format

    Kwon, H., Yeog, K., Sangjin, L. & Jongin, L., 2008, Proceedings of the International Conference on Information Science and Security, ICISS 2008. IEEE Computer Society, p. 141-146 6 p. 4438224. (Proceedings of the International Conference on Information Science and Security, ICISS 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • Data hiding in windows executable files

    Shin, D. M., Kim, Y., Byun, K. D. & Lee, S., 2008, Proceedings of the 6th Australian Digital Forensics Conference. p. 153-159 7 p. (Proceedings of the 6th Australian Digital Forensics Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • Design and implementation of a tool for System Restore Point analysis

    Yun, S. M., Savoldi, A., Gubian, P., Kim, Y., Lee, S. & Lee, S., 2008, Proceedings - 2008 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2008. p. 542-546 5 p. 4604116. (Proceedings - 2008 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Design and implementation of a tool to detect accounting frauds

    Kim, Y., Savoldi, A., Lee, H., Yun, S., Lee, S. & Lim, J., 2008, Proceedings - 2008 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2008. p. 547-552 6 p. 4604117. (Proceedings - 2008 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Detection of hidden information in forensic tools

    Kim, Y., Bang, J., Lee, S. & Lim, J., 2008, Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. p. 248-252 5 p. 4511571. (Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Extended OCBP Scheme for MIPv6 over IEEE 802.16e Networks

    Park, H. S., Yun, S., Kim, B. H., Lee, D. C., Yi, O. & Lee, S., 2008, Proceedings - 2008 International Conference on Convergence and Hybrid Information Technology, ICHIT 2008. p. 732-738 7 p. 4622915. (Proceedings - 2008 International Conference on Convergence and Hybrid Information Technology, ICHIT 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Extraction of residual information in the microsoft powerpoint file from the viewpoint of digital forensics considering PerCom environment

    Park, J., Park, B., Lee, S., Hong, S. & Park, J. H., 2008, 6th Annual IEEE International Conference on Pervasive Computing and Communications, PerCom 2008. p. 584-589 6 p. 4517460. (6th Annual IEEE International Conference on Pervasive Computing and Communications, PerCom 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Live forensic analysis of a compromised linux system using LECT (Linux Evidence Collection Tool)

    Choi, J., Savoldi, A., Gubian, P., Lee, S. & Lee, S., 2008, Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. p. 231-236 6 p. 4511568. (Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • Methodologies for detecting covert database

    Lee, K. G., Savoldi, A., Gubian, P., Lim, K. S., Lee, S. & Lee, S., 2008, Proceedings - 2008 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2008. p. 538-541 4 p. 4604115. (Proceedings - 2008 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Performance enhancement of differential power analysis attacks with signal companding methods

    Ryoo, J. C., Han, D. G., Kim, S. K. & Lee, S., 2008, In: IEEE Signal Processing Letters. 15, p. 625-628 4 p.

    Research output: Contribution to journalArticlepeer-review

    10 Citations (Scopus)
  • Security analysis of CIKS-128 and CIKS-128H using key schedule weaknesses

    Lee, C., Kim, J., Hong, S., Lee, S., Sung, J. & Lee, H. M., 2008, Proceedings - International Symposium on Computer Science and Its Applications, CSA 2008. p. 199-206 8 p. 4654086. (Proceedings - International Symposium on Computer Science and Its Applications, CSA 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Security analysis of the full-round DDO-64 block cipher

    Lee, C., Kim, J., Hong, S., Sung, J. & Lee, S., 2008 Dec, In: Journal of Systems and Software. 81, 12, p. 2328-2335 8 p.

    Research output: Contribution to journalArticlepeer-review

    10 Citations (Scopus)
  • Seven new block cipher structures with provable security against differential cryptanalysis

    Kim, J., Lee, C., Sung, J., Hong, S., Lee, S. & Elm, J., 2008 Oct, In: IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E91-A, 10, p. 3047-3058 12 p.

    Research output: Contribution to journalArticlepeer-review

    7 Citations (Scopus)
  • The design of framework for detecting an insider's leak of confidential information

    Baek, E., Kim, Y., Sung, J. & Lee, S., 2008 Jan 21, e-Forensics 2008 - Proceedings of the 1st International Conference on Forensic Applications and Techniques in Telecommunications, Information, and Multimedia and Workshop. Association for Computing Machinery, Inc, 1363236. (e-Forensics 2008 - Proceedings of the 1st International Conference on Forensic Applications and Techniques in Telecommunications, Information, and Multimedia and Workshop).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • USBPassOn: Secure USB Thumb Drive forensic toolkit

    Lee, K. G., Lee, H. W., Park, C. W., Bang, J. W., Kim, K. Y. & Lee, S., 2008, Proceedings of the 2008 2nd International Conference on Future Generation Communication and Networking, FGCN 2008. p. 279-282 4 p. 4734222. (Proceedings of the 2008 2nd International Conference on Future Generation Communication and Networking, FGCN 2008; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Citations (Scopus)
  • User authentication mechanism using java card for personalized IPTV services

    Park, Y. K., Lim, S. H., Yi, O., Lee, S. & Kim, S. H., 2008, Proceedings - 2008 International Conference on Convergence and Hybrid Information Technology, ICHIT 2008. p. 618-626 9 p. 4622895. (Proceedings - 2008 International Conference on Convergence and Hybrid Information Technology, ICHIT 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • 2007

    A field guide to hidden accounting information detection

    Kim, Y., Bang, J., Lee, G. T., Lee, S. J. & Lim, J., 2007, Proceedings of Future Generation Communication and Networking, FGCN 2007. Institute of Electrical and Electronics Engineers Inc., p. 146-150 5 p. 4426220. (Proceedings of Future Generation Communication and Networking, FGCN 2007; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Design and implementation of the UsMSS: User-centric secure multimedia service system in intelligent home

    Park, J. H., Lee, S., Lee, D. H., Lim, J., Hong, I. H. & Yang, L. T., 2007, Proceedings - 21st International Conference on Advanced Information Networking and Applications, AINA 2007. p. 311-316 6 p. 4220909. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Design and implementation of the UsMSS: User-centric secure multimedia service system in intelligent home

    Park, J. H., Lee, S., Lee, D. H., Lim, J., Hong, I. H. & Yang, L. T., 2007, Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007. p. 1233-1238 6 p. 4197448. (Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Design and implementation of unified hardware for 128-bit block ciphers ARIA and AES

    Koo, B., Ryu, G., Chang, T. & Lee, S., 2007 Dec, In: ETRI Journal. 29, 6, p. 820-822 3 p.

    Research output: Contribution to journalArticlepeer-review

    8 Citations (Scopus)
  • Discovering methodology and scenario to detect covert database system

    Lee, G. T., Lee, S., Tsomko, E. & Lee, S., 2007, Proceedings of Future Generation Communication and Networking, FGCN 2007. Institute of Electrical and Electronics Engineers Inc., p. 130-135 6 p. 4426217. (Proceedings of Future Generation Communication and Networking, FGCN 2007; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    13 Citations (Scopus)
  • Generalised category attack-improving histogram-based attack on JPEG LSB embedding

    Lee, K., Westfeld, A. & Lee, S., 2007, Information Hiding - 9th International Workshop, IH 2007, Revised Selected Papers. p. 378-391 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4567 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    24 Citations (Scopus)
  • Password recovery using an evidence collection tool and countermeasures

    Lee, S., Savoldi, A., Lee, S. & Lim, J., 2007, Proceedings - 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2007.. p. 97-102 6 p. 4457662. (Proceedings - 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2007.; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    11 Citations (Scopus)
  • Preimage attack on the parallel FFT-hashing function

    Donghoon, C., Moti, Y., Jaechul, S., Seokhie, H. & Sangjin, L., 2007, Information Security and Privacy - 12th Australasian Conference, ACISP 2007, Proceedings. p. 59-67 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4586 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Windows pagefile collection and analysis for a live forensics context

    Lee, S., Savoldi, A., Lee, S. & Lim, J., 2007, Proceedings of Future Generation Communication and Networking, FGCN 2007. Institute of Electrical and Electronics Engineers Inc., p. 97-101 5 p. 4426211. (Proceedings of Future Generation Communication and Networking, FGCN 2007; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • 2006

    A DRBAC model based on context for smart and secure services in intelligent ubiquitous home

    Park, J. H., Park, J. S., Lee, S. J. & Koh, B. S., 2006, Ubiquitous Intelligence and Computing - Third International Conference, UIC 2006, Proceedings. Springer Verlag, p. 893-901 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4159 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • A flexible DRM system considering ubiquitous environment

    Park, J. H., Lee, S. & Koh, B. S., 2006, In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3983 LNCS, p. 236-244 9 p.

    Research output: Contribution to journalConference articlepeer-review

  • A new dedicated 256-bit hash function: FORK-256

    Hong, D., Chang, D., Sung, J., Lee, S., Hong, S., Lee, J., Moon, D. & Chee, S., 2006, Fast Software Encryption - 13th International Workshop, FSE 2006, Revised Selected Papers. Springer Verlag, p. 195-209 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4047 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    13 Citations (Scopus)
  • Attack on JPEG2000 steganography using LRCA

    Oh, H., Lee, K. & Lee, S., 2006, Digital Watermarking - 5th International Workshop, IWDW 2006, Proceedings. Springer Verlag, p. 268-281 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4283 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Category attack for LSB steganalysis of JPEG images

    Kwangsoo, L., Westfeld, A. & Sangjin, L., 2006, Digital Watermarking - 5th International Workshop, IWDW 2006, Proceedings. Springer Verlag, p. 35-48 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4283 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    19 Citations (Scopus)
  • C-iUMS: Context based smart and secure multimedia service in intelligent ubiquitous home

    Park, J. H., Lee, S. & Hong, S. H., 2006, Emerging Directions in Embedded and Ubiquitous Computing - EUC 2006 Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Proceedings. Zhou, X., Sokolsky, O., Yan, L., Yan, L., Jung, E-S., Shao, Z., Mu, Y., Lee, D-C., Kim, D., Jeong, Y-S. & Xu, C-Z. (eds.). Springer Verlag, p. 660-670 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4097 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    2 Citations (Scopus)
  • DRBAC model using a WSNM for services in i-Home

    Park, J. H., Lee, S. & Hong, I. H., 2006 Dec, In: IEICE Transactions on Information and Systems. E89-D, 12, p. 2831-2837 7 p.

    Research output: Contribution to journalArticlepeer-review

    3 Citations (Scopus)
  • Forgery and key recovery attacks on PMAC and Mitchell's TMAC variant

    Lee, C., Kim, J., Sung, J., Hong, S. & Lee, S., 2006, Information Security and Privacy: 11th Australasian Conference, ACISP 2006, Proceedings. Springer Verlag, p. 421-431 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4058 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)