Hyung-Woo Lee

Orcid: 0000-0002-7148-9187

According to our database1, Hyung-Woo Lee authored at least 46 papers between 1999 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Design Approach of Planar Transformer-Based 2-TR Phase-Shift Full-Bridge Converter for High Efficiency and High Power Density in LDC.
IEEE Access, 2024

Model Predictive Control With Space Vector Modulation Based on a Voltage Angle for Driving Open-End Winding IPMSM.
IEEE Access, 2024

Malware Attack Indicators of Compromise Generation and Sharing Mechanism for Cyber Threat Intelligence.
Proceedings of the 13th International Conference on Software and Computer Applications, 2024

2023
Advanced DPWM Method for Switching Loss Reduction in Isolated DC Type Dual Inverter With Open-End Winding IPMSM.
IEEE Access, 2023

Analysis of Optimal Rotors Skew to Improve the Total Harmonic Distortion of Back Electromotive Force in MG-PMSM for Traction.
IEEE Access, 2023

Transient Thermal Analysis of Totally Enclosed Railway Traction Motor with high power density.
Proceedings of the 32nd IEEE International Symposium on Industrial Electronics, 2023

Analysis of Digital Forensic Artifacts Data Enrichment Mechanism for Cyber Threat Intelligence.
Proceedings of the 12th International Conference on Software and Computer Applications, 2023

2020
New Approach on Steganalysis: Reverse-Engineering based Steganography SW Analysis.
Proceedings of the 9th International Conference on Software and Computer Applications, 2020

2019
Open-Circuit Switch-Fault Tolerant Control of a Modified Boost DC-DC Converter for Alternative Energy Systems.
IEEE Access, 2019

2017
Detection of metamorphic malicious mobile code on android-based smartphones.
Int. J. Adv. Media Commun., 2017

2014
Underwater communication with amplitude-hyperbolic frequency modulation.
Proceedings of the Sixth International Conference on Ubiquitous and Future Networks, 2014

2013
DroidVulMon - Android Based Mobile Device Vulnerability Analysis and Monitoring System.
Proceedings of the Seventh International Conference on Next Generation Mobile Apps, 2013

2011
User-Oriented Pseudo Biometric Image Based One-Time Password Mechanism on Smart Phone.
Proceedings of the Information Security and Assurance - International Conference, 2011

2009
Stateful Virtual Proxy for SIP Message Flooding Attack Detection.
KSII Trans. Internet Inf. Syst., 2009

Developing a Multi-Protocol Mobility Manager for SIP/SS7 Networks.
Proceedings of the 2009 International Conference on Complex, 2009

2008
Multi-protocol authentication for SIP/SS7 mobile network.
Comput. Commun., 2008

2007
A Practical Method for Generating Digital Signatures Using Biometrics.
IEICE Trans. Commun., 2007

Smartening the Environment using Wireless Sensor Networks in a Developing Country
CoRR, 2007

Security in Wireless Sensor Networks: Issues and Challenges
CoRR, 2007

Biometric Digital Key Mechanisms for Telebiometric Authentication Based on Biometric Certificate.
Proceedings of the Universal Access in Human Computer Interaction. Coping with Diversity, 2007

Secure Authentication and Accounting Mechanism on WLAN with Interaction of Mobile Message Service.
Proceedings of the Universal Access in Human-Computer Interaction. Ambient Interaction, 2007

Biometric Certificate Based Biometric Digital Key Generation with Protection Mechanism.
Proceedings of the Frontiers in the Convergence of Bioscience and Information Technologies 2007, 2007

Biometric Digital Signature Key Generation and Cryptography Communication Based on Fingerprint.
Proceedings of the Frontiers in Algorithmics, First Annual International Workshop, 2007

2006
SVM Based Packet Marking Technique for Traceback on Malicious DDoS Traffic.
Proceedings of the Information Networking, 2006

Lightweight Wireless Intrusion Detection Systems Against DDoS Attack.
Proceedings of the Computational Science and Its Applications, 2006

SVM Based False Alarm Minimization Scheme on Intrusion Prevention System.
Proceedings of the Computational Science and Its Applications, 2006

2005
The Efficient Multipurpose Convertible Undeniable Signature Scheme.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

Authenticated IPv6 Packet Traceback Against Reflector Based Packet Flooding Attack.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

Arbitrated Verifier Signature with Message Recovery for Proof of Ownership.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

The Large Scale Electronic Voting Scheme Based on Undeniable Multi-signature Scheme.
Proceedings of the Computational Science and Its Applications, 2005

IPv6/IPsec Conformance Test Management System with Formal Description Technique.
Proceedings of the Computational Science and Its Applications, 2005

Design and Implementation of the KORI: Intelligent Teachable Agent and Its Application to Education.
Proceedings of the Computational Science and Its Applications, 2005

2004
The Undeniable Multi-signature Scheme Suitable for Joint Copyright Protection on Digital Contents.
Proceedings of the Advances in Multimedia Information Processing - PCM 2004, 5th Pacific Rim Conference on Multimedia, Tokyo, Japan, November 30, 2004

Reflector Attack Traceback System with Pushback Based iTrace Mechanism.
Proceedings of the Information and Communications Security, 6th International Conference, 2004

Performance Limitation of STBC OFDM-CDMA Systems in Mobile Fading Channels.
Proceedings of the Computational Science and Its Applications, 2004

PTrace: Pushback/SVM Based ICMP Traceback Mechanism against DDoS Attack.
Proceedings of the Computational Science and Its Applications, 2004

NS-2 Based IP Traceback Simulation Against Reflector Based DDoS Attack.
Proceedings of the Artificial Intelligence and Simulation, 2004

Advanced Packet Marking Mechanism with Pushback for IP Traceback.
Proceedings of the Applied Cryptography and Network Security, 2004

2003
New WAKE Key Recovery Protocol on M-commerce.
Proceedings of the Web Engineering, International Conference, 2003

Designated Verification of Digital Watermark for Network Based Image Distribution.
Proceedings of the Computational Science - ICCS 2003, 2003

Smart Card Based Mobile Payment with Fairness Revocation Mechanism.
Proceedings of the E-Commerce and Web Technologies, 4th International Conference, 2003

2002
New Identity Escrow Scheme for Anonymity Authentication.
Proceedings of the Progress in Cryptology, 2002

Secure Electronic Copyright Distribution with Public Key Based Traitor Tracing.
Proceedings of the E-Commerce and Web Technologies, Third International Conference, 2002

2000
A Secure Electronic Software Distribution (ESD) Protocol Based on PKC.
Proceedings of the Electronic Commerce and Web Technologies, 2000

1999
Message Recovery Fair Blind Signature.
Proceedings of the Public Key Cryptography, 1999

Non-interactive Cryptosystem for Entity Authentication.
Proceedings of the Information Security, Second International Workshop, 1999


  Loading...