Hoonjae Lee
Orcid: 0000-0002-2869-7650Affiliations:
- Dongseo University, Department of Computer Engineering, Busan, South Korea
According to our database1,
Hoonjae Lee
authored at least 130 papers
between 2000 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2023
Proceedings of the Intelligent Human Computer Interaction - 15th International Conference, 2023
2022
Proceedings of the 24th International Conference on Advanced Communication Technology, 2022
2021
Sensors, 2021
Secure and Efficient High Throughput Medium Access Control for Vehicular Ad-Hoc Network.
Sensors, 2021
Deep Learning-Based Drone Classification Using Radar Cross Section Signatures at mmWave Frequencies.
IEEE Access, 2021
2020
A Secure Enhanced Non-Cooperative Cognitive Division Multiple Access for Vehicle-to-Vehicle Communication.
Sensors, 2020
Varied density of vehicles under city, highway and rural environments in V2V communication.
Int. J. Sens. Networks, 2020
Proceedings of the Intelligent Human Computer Interaction, 2020
AI-Based Voice Assistants Technology Comparison in Term of Conversational and Response Time.
Proceedings of the Intelligent Human Computer Interaction - 12th International Conference, 2020
Proceedings of the 22nd International Conference on Advanced Communication Technology, 2020
Conservation Genetic Algorithm to Solve the E-commerce Environment Logistics Distribution Path Optimization Problem.
Proceedings of the 22nd International Conference on Advanced Communication Technology, 2020
Proceedings of the 22nd International Conference on Advanced Communication Technology, 2020
Classify and Analyze the Security Issues and Challenges in Mobile banking in Uzbekistan.
Proceedings of the 22nd International Conference on Advanced Communication Technology, 2020
2019
Performance Enriching Channel Allocation Algorithm for Vehicle-to-Vehicle City, Highway and Rural Network.
Sensors, 2019
Proceedings of the 2019 International Conference on Information and Communication Technology Convergence, 2019
Proceedings of the 2019 International Conference on Information and Communication Technology Convergence, 2019
Security Enhancement for Access Control Mechanism in Real-time Wireless Sensor Network.
Proceedings of the 21st International Conference on Advanced Communication Technology, 2019
Proceedings of the 21st International Conference on Advanced Communication Technology, 2019
Proceedings of the 21st International Conference on Advanced Communication Technology, 2019
Proceedings of the 21st International Conference on Advanced Communication Technology, 2019
A Conservation Genetic Algorithm for Optimization of the E-commerce Logistics Distribution Path.
Proceedings of the 21st International Conference on Advanced Communication Technology, 2019
Security Challenge and Issue of Mobile Banking in Republic of Uzbekistan: A State of Art Survey.
Proceedings of the 21st International Conference on Advanced Communication Technology, 2019
An Improved Two Factor User Authentication Framework Based on CAPTCHA and Visual Secret Sharing.
Proceedings of the 2019 IEEE International Conference on Computational Science and Engineering, 2019
2018
Design, implementation, and performance evaluation of identity-based cryptography in ONOS.
Int. J. Netw. Manag., 2018
An environmental channel throughput and radio propagation modeling for vehicle-to-vehicle communication.
Int. J. Distributed Sens. Networks, 2018
Performance Analysis for City, Highway, and Rural Area in Vehicle-to-Vehicle Network.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2018
Proceedings of the 20th International Conference on Advanced Communication Technology, 2018
Obstacles effects on signal attenuation in line of sight for different environments in V2V communication.
Proceedings of the 20th International Conference on Advanced Communication Technology, 2018
2017
V2V communication modeling for environmental channel throughput and radio propagation.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2017
2016
An Improved Square-always Exponentiation Resistant to Side-channel Attacks on RSA Implementation.
Intell. Autom. Soft Comput., 2016
2015
A Secure Routing Protocol for Wireless Sensor Networks Considering Secure Data Aggregation.
Sensors, 2015
J. Inform. and Commun. Convergence Engineering, 2015
Proceedings of the Seventh International Conference on Ubiquitous and Future Networks, 2015
Proceedings of the Seventh International Conference on Ubiquitous and Future Networks, 2015
A Privacy Preserving Security Protocol-Based Application for Wireless Communication System.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015
An Effective and Secure User Authentication and Key Agreement Scheme in m-Healthcare Systems.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015
An Approach to Designing a Network Security-based Application for Communications Safety.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015
Performance Comparison Between RSA and Elliptic Curve Cryptography-Based QR Code Authentication.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015
An Efficient and Provable Secret Shared Key Computation for Cryptographic Protocol Across Insecure Channel.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015
On Modeling Protocol-Based Clustering Tag in RFID Systems with Formal Security Analysis.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015
2014
Security Analysis and Improvements of Authentication and Access Control in the Internet of Things.
Sensors, 2014
An Efficient and Adaptive Mutual Authentication Framework for Heterogeneous Wireless Sensor Network-Based Applications.
Sensors, 2014
Leveraging client-side storage techniques for enhanced use of multiple consumer cloud storage services on resource-constrained mobile devices.
J. Netw. Comput. Appl., 2014
J. Internet Serv. Inf. Secur., 2014
Higher-Order Countermeasures against Side-Channel Cryptanalysis on Rabbit Stream Cipher.
J. Inform. and Commun. Convergence Engineering, 2014
An effective framework of behavior detection-advanced static analysis for malware detection.
Proceedings of the 14th International Symposium on Communications and Information Technologies, 2014
Proceedings of the International Conference on Information and Communication Technology Convergence, 2014
Proceedings of the International Conference on Information and Communication Technology Convergence, 2014
Anonymization algorithm for security and confidentiality of health data set across social network.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2014
Cryptographic computation of private shared key based mutual authentication protocol: Simulation and modeling over wireless networks.
Proceedings of the International Conference on Information Networking 2014, 2014
Secure key management scheme based on ECC algorithm for patient's medical information in healthcare system.
Proceedings of the International Conference on Information Networking 2014, 2014
Proceedings of the IEEE 3rd Global Conference on Consumer Electronics, 2014
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014
Proceedings of the Ninth Asia Joint Conference on Information Security, 2014
Proceedings of the Ninth Asia Joint Conference on Information Security, 2014
2013
Algebraic Countermeasure to Enhance the Improved Summation Generator with 2-Bit Memory.
J. Networks, 2013
Improved Security Patch on Secure Communication among Cell Phones and Sensor Networks.
Int. J. Distributed Sens. Networks, 2013
Empirical analysis of the reliability of low-rate wireless u-healthcare monitoring applications.
Int. J. Commun. Syst., 2013
Mutual authentication in wireless body sensor networks (WBSN) based on Physical Unclonable Function (PUF).
Proceedings of the 2013 9th International Wireless Communications and Mobile Computing Conference, 2013
Proceedings of the International Conference on Information and Communication Technology Convergence, 2013
A hybrid and fast authentication protocol for handoff support in e-healthcare systems among WSNs.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2013
Proceedings of the 6th ACM India Computing Convention, 2013
2012
E-SAP: Efficient-Strong Authentication Protocol for Healthcare Applications Using Wireless Medical Sensor Networks.
Sensors, 2012
Security Issues in Healthcare Applications Using Wireless Medical Sensor Networks: A Survey.
Sensors, 2012
Int. J. Inf. Comput. Secur., 2012
Proceedings of the Computer Applications for Communication, Networking, and Digital Contents, 2012
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012
Proceedings of the IEEE 26th International Conference on Advanced Information Networking and Applications, 2012
2011
Sensors, 2011
J. Inform. and Commun. Convergence Engineering, 2011
J. Inform. and Commun. Convergence Engineering, 2011
Development and Modelling of High-Efficiency Computing Structure for Digital Signal Processing
CoRR, 2011
Power analysis attack and countermeasure on the Rabbit Stream Cipher (position paper).
Proceedings of the 7th International Workshop on Software Engineering for Secure Systems, 2011
Proceedings of the Convergence and Hybrid Information Technology, 2011
Proceedings of the Convergence and Hybrid Information Technology, 2011
Proceedings of the Convergence and Hybrid Information Technology, 2011
A User Authentication for Healthcare Application Using Wireless Medical Sensor Networks.
Proceedings of the 13th IEEE International Conference on High Performance Computing & Communication, 2011
Proceedings of the 2011 IEEE Asia-Pacific Services Computing Conference, 2011
2010
J. Inform. and Commun. Convergence Engineering, 2010
J. Inform. and Commun. Convergence Engineering, 2010
J. Inform. and Commun. Convergence Engineering, 2010
J. Inform. and Commun. Convergence Engineering, 2010
TriSec: A Secure Data Framework for Wireless Sensor Networks Using Authenticated Encryption.
J. Inform. and Commun. Convergence Engineering, 2010
Int. J. Heal. Inf. Syst. Informatics, 2010
Piecewise-quadratic Harmut basis functions and their application to problems in digital signal processing.
Int. J. Commun. Syst., 2010
An efficient key pre-distribution scheme for wireless sensor network using public key cryptography.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2010
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2010
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2010
2009
Cryptanalysis of Hu-Niu-Yang's Multi-server Password Authenticated Key Agreement Schemes Using Smart Card.
J. Inform. and Commun. Convergence Engineering, 2009
Development of a Cryptographic Dongle for Secure Voice Encryption over GSM Voice Channel.
J. Inform. and Commun. Convergence Engineering, 2009
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, 2009
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, 2009
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, 2009
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, 2009
Proceedings of the 2009 International Conference on Hybrid Information Technology, 2009
Proceedings of the Communication and Networking, 2009
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009
2008
Cybern. Syst., 2008
Proceedings of the Ninth ACIS International Conference on Software Engineering, 2008
A Secure and Efficient Three-Pass Authenticated Key Agreement Protocol Based on Elliptic Curves.
Proceedings of the NETWORKING 2008, Ad Hoc and Sensor Networks, Wireless Networks, 2008
An Improved Variant of Wang-Cao's Certificate-Based Authenticated Key Agreement Protocol.
Proceedings of the NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008, 2008
Proceedings of the 2008 International Conference on Multimedia and Ubiquitous Engineering (MUE 2008), 2008
Proceedings of the Agent and Multi-Agent Systems: Technologies and Applications, 2008
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008
2007
IACR Cryptol. ePrint Arch., 2007
IACR Cryptol. ePrint Arch., 2007
IACR Cryptol. ePrint Arch., 2007
IACR Cryptol. ePrint Arch., 2007
IACR Cryptol. ePrint Arch., 2007
IACR Cryptol. ePrint Arch., 2007
A Relay-Transmission of the RFID Tag ID over the Wireless and TCP/IP with a Security Agent.
Proceedings of the Agent and Multi-Agent Systems: Technologies and Applications, 2007
2006
An Implementation of a RFID Tag ID Relay-Transmission over the Wireless and TCP/IP.
J. Convergence Inf. Technol., 2006
Proceedings of the Computational Science and Its Applications, 2006
Proceedings of the Computational Science and Its Applications, 2006
A Differential Power Analysis Attack of Block Cipher Based on the Hamming Weight of Internal Operation Unit.
Proceedings of the Computational Intelligence and Security, International Conference, 2006
2004
Proceedings of the Information Security and Cryptology, 2004
Proceedings of the Computational Science and Its Applications, 2004
2003
Proceedings of the Computational Science and Its Applications, 2003
2002
Proceedings of the Mobile Communications, 7th CDMA International Conference, CIC 2002, Seoul, Korea, October 29, 2002
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002
2000