Hoon-Jae Lee
According to our database1,
Hoon-Jae Lee
authored at least 70 papers
between 2002 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
Proceedings of the Intelligent Human Computer Interaction - 15th International Conference, 2023
2022
Proceedings of the 24th International Conference on Advanced Communication Technology, 2022
2020
Proceedings of the Intelligent Human Computer Interaction, 2020
AI-Based Voice Assistants Technology Comparison in Term of Conversational and Response Time.
Proceedings of the Intelligent Human Computer Interaction - 12th International Conference, 2020
Proceedings of the 22nd International Conference on Advanced Communication Technology, 2020
Conservation Genetic Algorithm to Solve the E-commerce Environment Logistics Distribution Path Optimization Problem.
Proceedings of the 22nd International Conference on Advanced Communication Technology, 2020
Proceedings of the 22nd International Conference on Advanced Communication Technology, 2020
Classify and Analyze the Security Issues and Challenges in Mobile banking in Uzbekistan.
Proceedings of the 22nd International Conference on Advanced Communication Technology, 2020
2019
Proceedings of the 2019 International Conference on Information and Communication Technology Convergence, 2019
Proceedings of the 2019 International Conference on Information and Communication Technology Convergence, 2019
Security Enhancement for Access Control Mechanism in Real-time Wireless Sensor Network.
Proceedings of the 21st International Conference on Advanced Communication Technology, 2019
Proceedings of the 21st International Conference on Advanced Communication Technology, 2019
Proceedings of the 21st International Conference on Advanced Communication Technology, 2019
Proceedings of the 21st International Conference on Advanced Communication Technology, 2019
A Conservation Genetic Algorithm for Optimization of the E-commerce Logistics Distribution Path.
Proceedings of the 21st International Conference on Advanced Communication Technology, 2019
Security Challenge and Issue of Mobile Banking in Republic of Uzbekistan: A State of Art Survey.
Proceedings of the 21st International Conference on Advanced Communication Technology, 2019
An Improved Two Factor User Authentication Framework Based on CAPTCHA and Visual Secret Sharing.
Proceedings of the 2019 IEEE International Conference on Computational Science and Engineering, 2019
2018
Performance Analysis for City, Highway, and Rural Area in Vehicle-to-Vehicle Network.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2018
Obstacles effects on signal attenuation in line of sight for different environments in V2V communication.
Proceedings of the 20th International Conference on Advanced Communication Technology, 2018
2017
V2V communication modeling for environmental channel throughput and radio propagation.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2017
2015
A Privacy Preserving Security Protocol-Based Application for Wireless Communication System.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015
An Effective and Secure User Authentication and Key Agreement Scheme in m-Healthcare Systems.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015
An Approach to Designing a Network Security-based Application for Communications Safety.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015
Performance Comparison Between RSA and Elliptic Curve Cryptography-Based QR Code Authentication.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015
An Efficient and Provable Secret Shared Key Computation for Cryptographic Protocol Across Insecure Channel.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015
On Modeling Protocol-Based Clustering Tag in RFID Systems with Formal Security Analysis.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015
2014
An effective framework of behavior detection-advanced static analysis for malware detection.
Proceedings of the 14th International Symposium on Communications and Information Technologies, 2014
Proceedings of the International Conference on Information and Communication Technology Convergence, 2014
Anonymization algorithm for security and confidentiality of health data set across social network.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2014
Cryptographic computation of private shared key based mutual authentication protocol: Simulation and modeling over wireless networks.
Proceedings of the International Conference on Information Networking 2014, 2014
Secure key management scheme based on ECC algorithm for patient's medical information in healthcare system.
Proceedings of the International Conference on Information Networking 2014, 2014
Proceedings of the IEEE 3rd Global Conference on Consumer Electronics, 2014
2013
Mutual authentication in wireless body sensor networks (WBSN) based on Physical Unclonable Function (PUF).
Proceedings of the 2013 9th International Wireless Communications and Mobile Computing Conference, 2013
Proceedings of the International Conference on Information and Communication Technology Convergence, 2013
A hybrid and fast authentication protocol for handoff support in e-healthcare systems among WSNs.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2013
Proceedings of the 6th ACM India Computing Convention, 2013
2012
Proceedings of the Computer Applications for Communication, Networking, and Digital Contents, 2012
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012
Proceedings of the IEEE 26th International Conference on Advanced Information Networking and Applications, 2012
2011
Power analysis attack and countermeasure on the Rabbit Stream Cipher (position paper).
Proceedings of the 7th International Workshop on Software Engineering for Secure Systems, 2011
Proceedings of the Convergence and Hybrid Information Technology, 2011
Proceedings of the Convergence and Hybrid Information Technology, 2011
A User Authentication for Healthcare Application Using Wireless Medical Sensor Networks.
Proceedings of the 13th IEEE International Conference on High Performance Computing & Communication, 2011
Proceedings of the 2011 IEEE Asia-Pacific Services Computing Conference, 2011
2010
An efficient key pre-distribution scheme for wireless sensor network using public key cryptography.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2010
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2010
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2010
2009
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, 2009
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, 2009
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, 2009
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, 2009
Proceedings of the 2009 International Conference on Hybrid Information Technology, 2009
Proceedings of the Communication and Networking, 2009
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009
2008
An Improved Variant of Wang-Cao's Certificate-Based Authenticated Key Agreement Protocol.
Proceedings of the NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008, 2008
Proceedings of the Agent and Multi-Agent Systems: Technologies and Applications, 2008
2007
A Relay-Transmission of the RFID Tag ID over the Wireless and TCP/IP with a Security Agent.
Proceedings of the Agent and Multi-Agent Systems: Technologies and Applications, 2007
2006
Proceedings of the Computational Science and Its Applications, 2006
Proceedings of the Computational Science and Its Applications, 2006
A Differential Power Analysis Attack of Block Cipher Based on the Hamming Weight of Internal Operation Unit.
Proceedings of the Computational Intelligence and Security, International Conference, 2006
2004
Proceedings of the Information Security and Cryptology, 2004
Proceedings of the Computational Science and Its Applications, 2004
2003
Proceedings of the Computational Science and Its Applications, 2003
2002
Proceedings of the Mobile Communications, 7th CDMA International Conference, CIC 2002, Seoul, Korea, October 29, 2002
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002