Hoon-Jae Lee

According to our database1, Hoon-Jae Lee authored at least 70 papers between 2002 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A Closer Look at Attacks on Lightweight Cryptosystems: Threats and Countermeasures.
Proceedings of the Intelligent Human Computer Interaction - 15th International Conference, 2023

2022
APT attack response system through AM-HIDS.
Proceedings of the 24th International Conference on Advanced Communication Technology, 2022

2020
Voice Attacks to AI Voice Assistant.
Proceedings of the Intelligent Human Computer Interaction, 2020

AI-Based Voice Assistants Technology Comparison in Term of Conversational and Response Time.
Proceedings of the Intelligent Human Computer Interaction - 12th International Conference, 2020

Analysis and Protection of Computer Network Security Issues.
Proceedings of the 22nd International Conference on Advanced Communication Technology, 2020

Conservation Genetic Algorithm to Solve the E-commerce Environment Logistics Distribution Path Optimization Problem.
Proceedings of the 22nd International Conference on Advanced Communication Technology, 2020

Comparison between DSRC and other Short Range Wireless Communication Technologies.
Proceedings of the 22nd International Conference on Advanced Communication Technology, 2020

Classify and Analyze the Security Issues and Challenges in Mobile banking in Uzbekistan.
Proceedings of the 22nd International Conference on Advanced Communication Technology, 2020

2019
Introduce a Specific Process of Genetic Algorithm through an Example.
Proceedings of the 2019 International Conference on Information and Communication Technology Convergence, 2019

A Novel Throughput and Collision for City Environment in V2V Communication.
Proceedings of the 2019 International Conference on Information and Communication Technology Convergence, 2019

Security Enhancement for Access Control Mechanism in Real-time Wireless Sensor Network.
Proceedings of the 21st International Conference on Advanced Communication Technology, 2019

Proposal of PingPong-128 Countermeasure against Power Analysis Attack.
Proceedings of the 21st International Conference on Advanced Communication Technology, 2019

Smart Flying Umbrella Drone on Internet of Things: AVUS.
Proceedings of the 21st International Conference on Advanced Communication Technology, 2019

Multi-Factor Authentication in Cyber Physical System: A State of Art Survey.
Proceedings of the 21st International Conference on Advanced Communication Technology, 2019

A Conservation Genetic Algorithm for Optimization of the E-commerce Logistics Distribution Path.
Proceedings of the 21st International Conference on Advanced Communication Technology, 2019

Security Challenge and Issue of Mobile Banking in Republic of Uzbekistan: A State of Art Survey.
Proceedings of the 21st International Conference on Advanced Communication Technology, 2019

An Improved Two Factor User Authentication Framework Based on CAPTCHA and Visual Secret Sharing.
Proceedings of the 2019 IEEE International Conference on Computational Science and Engineering, 2019

2018
Performance Analysis for City, Highway, and Rural Area in Vehicle-to-Vehicle Network.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2018

Obstacles effects on signal attenuation in line of sight for different environments in V2V communication.
Proceedings of the 20th International Conference on Advanced Communication Technology, 2018

2017
V2V communication modeling for environmental channel throughput and radio propagation.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2017

2015
A Privacy Preserving Security Protocol-Based Application for Wireless Communication System.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

An Effective and Secure User Authentication and Key Agreement Scheme in m-Healthcare Systems.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

An Approach to Designing a Network Security-based Application for Communications Safety.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015

Performance Comparison Between RSA and Elliptic Curve Cryptography-Based QR Code Authentication.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015

Hybrid Cloud Service Based Healthcare Solutions.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015

Smartphone-Based Secure Access Control in Wireless Network Analysis.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015

An Efficient and Provable Secret Shared Key Computation for Cryptographic Protocol Across Insecure Channel.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015

On Modeling Protocol-Based Clustering Tag in RFID Systems with Formal Security Analysis.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015

2014
An effective framework of behavior detection-advanced static analysis for malware detection.
Proceedings of the 14th International Symposium on Communications and Information Technologies, 2014

PKI-based cryptography for secure cloud data storage using ECC.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2014

Anonymization algorithm for security and confidentiality of health data set across social network.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2014

Cryptographic computation of private shared key based mutual authentication protocol: Simulation and modeling over wireless networks.
Proceedings of the International Conference on Information Networking 2014, 2014

Secure key management scheme based on ECC algorithm for patient's medical information in healthcare system.
Proceedings of the International Conference on Information Networking 2014, 2014

An enhanced passivation layer for secure consumer integrated circuit devices.
Proceedings of the IEEE 3rd Global Conference on Consumer Electronics, 2014

2013
Mutual authentication in wireless body sensor networks (WBSN) based on Physical Unclonable Function (PUF).
Proceedings of the 2013 9th International Wireless Communications and Mobile Computing Conference, 2013

Threshold tuning for demand queue based Overload Control Module.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2013

A hybrid and fast authentication protocol for handoff support in e-healthcare systems among WSNs.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2013

Trends and research directions for privacy preserving approaches on the cloud.
Proceedings of the 6th ACM India Computing Convention, 2013

2012
Data Link Layer' Security Analysis for Wireless Sensor Networks.
Proceedings of the Computer Applications for Communication, Networking, and Digital Contents, 2012

Mutual Authentication Protocol for Enhanced RFID Security and Anti-counterfeiting.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

An Efficient FPGA Design of PingPong-128 Stream Cipher for Secure Computing.
Proceedings of the IEEE 26th International Conference on Advanced Information Networking and Applications, 2012

2011
Power analysis attack and countermeasure on the Rabbit Stream Cipher (position paper).
Proceedings of the 7th International Workshop on Software Engineering for Secure Systems, 2011

An Efficient Password Authentication Method Using CAPTCHA.
Proceedings of the Convergence and Hybrid Information Technology, 2011

An Efficient Hardware Countermeasure against Differential Power Analysis Attack.
Proceedings of the Convergence and Hybrid Information Technology, 2011

A User Authentication for Healthcare Application Using Wireless Medical Sensor Networks.
Proceedings of the 13th IEEE International Conference on High Performance Computing & Communication, 2011

A Strong User Authentication Framework for Cloud Computing.
Proceedings of the 2011 IEEE Asia-Pacific Services Computing Conference, 2011

2010
An efficient key pre-distribution scheme for wireless sensor network using public key cryptography.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2010

Addressing secure data routing scheme for heterogeneous sensor networks.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2010

Secure health monitoring using medical wireless sensor networks.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2010

2009
Personal Healthcare Information System.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009

A Secure Data Mechanism for Ubiquitous Sensor Network with Dragon Cipher.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009

A Ping Pong Based One-Time-Passwords Authentication System.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009

PingPong-MAC: secure ubiquitous sensor network with authenticated encryption.
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, 2009

An energy consumption technique for global healthcare monitoring applications.
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, 2009

Database design for global patient monitoring applications using WAP.
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, 2009

Middleware in ubiquitous computing system with MedRec architecture.
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, 2009

A secure ubiquitous sensor network with Dragon.
Proceedings of the 2009 International Conference on Hybrid Information Technology, 2009

Architecture of Personal Healthcare Information System in Ubiquitous Healthcare.
Proceedings of the Communication and Networking, 2009

Global Patient Monitoring System Using IP-Enabled Ubiquitous Sensor Network.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009

2008
An Improved Variant of Wang-Cao's Certificate-Based Authenticated Key Agreement Protocol.
Proceedings of the NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008, 2008

A Security Enhancement of the E0 Cipher in Bluetooth System.
Proceedings of the Agent and Multi-Agent Systems: Technologies and Applications, 2008

2007
A Relay-Transmission of the RFID Tag ID over the Wireless and TCP/IP with a Security Agent.
Proceedings of the Agent and Multi-Agent Systems: Technologies and Applications, 2007

2006
Highly Reliable Synchronous Stream Cipher System for Link Encryption.
Proceedings of the Computational Science and Its Applications, 2006

Experiments and Hardware Countermeasures on Power Analysis Attacks.
Proceedings of the Computational Science and Its Applications, 2006

A Differential Power Analysis Attack of Block Cipher Based on the Hamming Weight of Internal Operation Unit.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

2004
Dragon: A Fast Word Based Stream Cipher.
Proceedings of the Information Security and Cryptology, 2004

A Study on Smart Card Security Evaluation Criteria for Side Channel Attacks.
Proceedings of the Computational Science and Its Applications, 2004

2003
A Random M-ary Method Based Countermeasure against Side Channel Attacks.
Proceedings of the Computational Science and Its Applications, 2003

2002
A WTLS Handshake Protocol with User Anonymity and Forward Secrecy.
Proceedings of the Mobile Communications, 7th CDMA International Conference, CIC 2002, Seoul, Korea, October 29, 2002

The LILI-II Keystream Generator.
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002


  Loading...