Jong-Hyouk Lee

Orcid: 0000-0002-1753-1284

Affiliations:
  • Sejong University, Seoul, South Korea
  • Sangmyung University, Cheonan Campus, South Korea (2013 - 2020)
  • TELECOM Bretagne, France (2012 - 2013)
  • INRIA, France (2009 - 2012)
  • Sungkyunkwan University, Suwon, South Korea (PhD 2009)


According to our database1, Jong-Hyouk Lee authored at least 164 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A CNN-Based SIA Screenshot Method to Visually Identify Phishing Websites.
J. Netw. Syst. Manag., March, 2024

Decentralized identifier based illegal digital content distribution tracking system using the format-preserving encryption algorithm.
Softw. Pract. Exp., 2024

2023
Provably secure signature-based anonymous user authentication protocol in an Internet of Things-enabled intelligent precision agricultural environment.
Concurr. Comput. Pract. Exp., 2023

Decentralized Identifier System for Software Copyright Transfer and License Management.
Proceedings of the IEEE International Conference on Metaverse Computing, 2023

Copyright and License Agreement History Management Framework for Outsourced Software.
Proceedings of the IEEE International Conference on Metaverse Computing, 2023

UCI and EICN Integrated Model for Copyright Distribution Management.
Proceedings of the IEEE International Conference on Metaverse Computing, 2023

Holographic Multi-Channel QR Code based Copyright Distribution Management System.
Proceedings of the IEEE International Conference on Metaverse Computing, 2023

Proposal of Docker and Kubernetes Direction through the Event Timeline of Kubernetes.
Proceedings of the International Conference on Artificial Intelligence in Information and Communication, 2023

Illegal 3D Content Distribution Tracking System based on DNN Forensic Watermarking.
Proceedings of the International Conference on Artificial Intelligence in Information and Communication, 2023

Analysis of Recent IIoT Security Technology Trends in a Smart Factory Environment.
Proceedings of the International Conference on Artificial Intelligence in Information and Communication, 2023

Simulation of Data Hijacking Attacks for a 5G-Advanced Core Network.
Proceedings of the 2023 Joint European Conference on Networks and Communications & 6G Summit, 2023

2022
CFLedger: Preventing chargeback fraud with blockchain.
ICT Express, 2022

2021
BGPChain: Constructing a secure, smart, and agile routing infrastructure based on blockchain.
ICT Express, 2021

Extended Kalman Filter-based localization algorithm by edge computing in Wireless Sensor Networks.
Digit. Commun. Networks, 2021

Protocol fuzzing to find security vulnerabilities of RabbitMQ.
Concurr. Comput. Pract. Exp., 2021

Mitigations on Sybil-Based Double-Spend Attacks in Bitcoin.
IEEE Consumer Electron. Mag., 2021

Optimized video content delivery for mobile networks using the transformative computing model.
Appl. Soft Comput., 2021

2020
Distributed Mobility Anchoring.
RFC, October, 2020

Ethereum smart contract-based automated power trading algorithm in a microgrid environment.
J. Supercomput., 2020

A Group Signature and Authentication Scheme for Blockchain-Based Mobile-Edge Computing.
IEEE Internet Things J., 2020

Analysis of the main consensus protocols of blockchain.
ICT Express, 2020

Comparison of Linux virtual machines and containers for a service migration in 5G multi-access edge computing.
ICT Express, 2020

The road to DNS privacy.
Future Gener. Comput. Syst., 2020

Design of a blind quantization-based audio watermarking scheme using singular value decomposition.
Concurr. Comput. Pract. Exp., 2020

CNN Based Malicious Website Detection by Invalidating Multiple Web Spams.
IEEE Access, 2020

DIVDS: Docker Image Vulnerability Diagnostic System.
IEEE Access, 2020

Blockchain-Based Distributed Firmware Update Architecture for IoT Devices.
IEEE Access, 2020

IEEE Access Special Section Editorial: Artificial Intelligence in Cybersecurity.
IEEE Access, 2020

Machine Learning based Malware Detection with the 2019 KISA Data Challenge Dataset.
Proceedings of the ACM ICEA '20: 2020 ACM International Conference on Intelligent Computing and its Emerging Applications, GangWon Republic of Korea, December 12, 2020

Automatic Seed Generation based Hybrid Fuzzing for Code Coverage Efficiency.
Proceedings of the ACM ICEA '20: 2020 ACM International Conference on Intelligent Computing and its Emerging Applications, GangWon Republic of Korea, December 12, 2020

2019
Basic Support for IPv6 Networks Operating Outside the Context of a Basic Service Set over IEEE Std 802.11.
RFC, December, 2019

Secure and efficient binding updates in host-based distributed mobility management.
Wirel. Networks, 2019

Double-Spending With a Sybil Attack in the Bitcoin Decentralized Network.
IEEE Trans. Ind. Informatics, 2019

User authentication in a tactile internet based remote surgery environment: Security issues, challenges, and future research directions.
Pervasive Mob. Comput., 2019

Mobility capability negotiation for IPv6 based ubiquitous mobile Internet.
Comput. Networks, 2019

Rise of Anonymous Cryptocurrencies: Brief Introduction.
IEEE Consumer Electron. Mag., 2019

An Efficient Antiphishing Method to Secure eConsume.
IEEE Consumer Electron. Mag., 2019

Smart Contract-Based Secure Model for Miner Registration and Block Validation.
IEEE Access, 2019

Analysis of Botnet Domain Names for IoT Cybersecurity.
IEEE Access, 2019

A Mean Quantization Watermarking Scheme for Audio Signals Using Singular-Value Decomposition.
IEEE Access, 2019

A Group Signature Scheme for Securing Blockchain-Based Mobile Edge Computing.
Proceedings of the Wireless Internet - 12th EAI International Conference, 2019

A Technical Survey on Methods for Detecting Rogue Access Points.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2019

DNS based Neighbor Discovery in ITS.
Proceedings of the IEEE International Conference on Consumer Electronics, 2019

Smart Contract-based Miner Registration and Block Validation.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

Eclipse-based Stake-Bleeding Attacks in PoS Blockchain Systems.
Proceedings of the 2019 ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2019

Session details: Session 4: Short Paper Session.
Proceedings of the 2019 ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2019

2018
TEE based session key establishment protocol for secure infotainment systems.
Des. Autom. Embed. Syst., 2018

Blockchain Technologies: Blockchain Use Cases for Consumer Electronics.
IEEE Consumer Electron. Mag., 2018

Secure and Fault-Tolerant Distributed Location Management for Intelligent 5G Wireless Networks.
IEEE Access, 2018

BIDaaS: Blockchain Based ID As a Service.
IEEE Access, 2018

2017
Home Network Prefix Renumbering in Proxy Mobile IPv6 (PMIPv6).
RFC, August, 2017

Mobile Access Gateway Configuration Parameters Controlled by the Local Mobility Anchor.
RFC, August, 2017

Efficient RFID Authentication Using Elliptic Curve Cryptography for the Internet of Things.
Wirel. Pers. Commun., 2017

Blockchain-based secure firmware update for embedded devices in an Internet of Things environment.
J. Supercomput., 2017

Anonymous Authentication for Wireless Body Area Networks With Provable Security.
IEEE Syst. J., 2017

DLM: Delayed location management in network mobility (NEMO)-based public transportation systems.
J. Netw. Comput. Appl., 2017

SPFP: Ticket-based secure handover for fast proxy mobile IPv6 in 5G networks.
Comput. Networks, 2017

How the Blockchain Revolution Will Reshape the Consumer Electronics Industry [Future Directions].
IEEE Consumer Electron. Mag., 2017

Security and Privacy Challenges in the Internet of Things [Security and Privacy Matters].
IEEE Consumer Electron. Mag., 2017

Black Hat: Knowledge Resource for Cybersecurity [Society News].
IEEE Consumer Electron. Mag., 2017

2016
Distributed proxies with fast handover support for a PURSUIT based networking architecture.
Wirel. Networks, 2016

Privacy-preserving data aggregation scheme against internal attackers in smart grids.
Wirel. Networks, 2016

Secure authentication with dynamic tunneling in distributed IP mobility management.
IEEE Wirel. Commun., 2016

Bayesian Coalition Negotiation Game as a Utility for Secure Energy Management in a Vehicles-to-Grid Environment.
IEEE Trans. Dependable Secur. Comput., 2016

Secure firmware validation and update for consumer devices in home networking.
IEEE Trans. Consumer Electron., 2016

Energy-Efficient Multimedia Data Dissemination in Vehicular Clouds: Stochastic-Reward-Nets-Based Coalition Game Approach.
IEEE Syst. J., 2016

Wireless and Mobile Technologies for the Internet of Things.
Mob. Inf. Syst., 2016

One-to-many authentication for access control in mobile pay-TV systems.
Sci. China Inf. Sci., 2016

Localized paging in proxy mobile IPv6 networks.
Ann. des Télécommunications, 2016

A Novel DMM Architecture Based on NDN.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Networks, 2016

Group Key Based Session Key Establishment Protocol for a Vehicle Diagnostic.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Networks, 2016

Firmware Verification of Embedded Devices Based on a Blockchain.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Networks, 2016

Delayed Location Management in Network Mobility Environments.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Networks, 2016

A systematic classification of distributed IP mobility.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016

2015
Utilizing the Domain Name System for Scalable and Secure Named Data Networking.
Wirel. Pers. Commun., 2015

Playing the Smart Grid Game: Performance Analysis of Intelligent Energy Harvesting and Traffic Flow Forecasting for Plug-In Electric Vehicles.
IEEE Veh. Technol. Mag., 2015

Intelligent Mobile Video Surveillance System as a Bayesian Coalition Game in Vehicular Sensor Networks: Learning Automata Approach.
IEEE Trans. Intell. Transp. Syst., 2015

Secure pseudonym-based near field communication protocol for the consumer internet of things.
IEEE Trans. Consumer Electron., 2015

Collaborative-Learning-Automata-Based Channel Assignment With Topology Preservation for Wireless Mesh Networks Under QoS Constraints.
IEEE Syst. J., 2015

Efficient provably secure password-based explicit authenticated key agreement.
Pervasive Mob. Comput., 2015

Privacy Enhancing Factors in People-Nearby Applications.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2015

Guest Editorial - Special Issue on Frontiers of Computing and Communications.
J. Commun., 2015

Pseudonyms in IPv6 ITS Communications: Use of Pseudonyms, Performance Degradation, and Optimal Pseudonym Change.
Int. J. Distributed Sens. Networks, 2015

Load control scheme to preserve processing capacity for emergency biometric data.
Proceedings of the 11th International Conference on Heterogeneous Networking for Quality, 2015

2014
Enhanced three-factor security protocol for consumer USB mass storage devices.
IEEE Trans. Consumer Electron., 2014

Peer-to-Peer Cooperative Caching for Data Dissemination in Urban Vehicular Communications.
IEEE Syst. J., 2014

Editorial.
IEEE Syst. J., 2014

Performance analysis of secure beaconing messages for GeoNetworking.
Secur. Commun. Networks, 2014

Performance analysis of distributed mapping system in ID/locator separation architectures.
J. Netw. Comput. Appl., 2014

Lightweight ECC Based RFID Authentication Integrated with an ID Verifier Transfer Protocol.
J. Medical Syst., 2014

Mobile Data Offloading: A Host-Based Distributed Mobility Management Approach.
IEEE Internet Comput., 2014

2013
Distributed IP mobility management from the perspective of the IETF: motivations, requirements, approaches, comparison, and challenges.
IEEE Wirel. Commun., 2013

Novel Branching-Router-Based Multicast Routing Protocol with Mobility Support.
IEEE Trans. Parallel Distributed Syst., 2013

Comparative Handover Performance Analysis of IPv6 Mobility Management Protocols.
IEEE Trans. Ind. Electron., 2013

Anonymous two-factor authentication for consumer roaming service in global mobility networks.
IEEE Trans. Consumer Electron., 2013

State-Aware Pointer Forwarding Scheme With Fast Handover Support in a PMIPv6 Domain.
IEEE Syst. J., 2013

Performance Modeling and Simulation for Future Mobile Networks.
Math. Comput. Model., 2013

UBMR-CA: Utility-based multicast routing and channel assignment with varying traffic demands in multi-radio multi-channel wireless mesh networks.
Math. Comput. Model., 2013

A dynamic N threshold prolong lifetime method for wireless sensor nodes.
Math. Comput. Model., 2013

HOTA: Handover optimized ticket-based authentication in network-based mobility management.
Inf. Sci., 2013

IPv6 Security Issues in Cooperative Intelligent Transportation Systems.
Comput. J., 2013

Distributed Local Mobility Anchor architecture for large scale mobility management.
Proceedings of the 24th IEEE Annual International Symposium on Personal, 2013

Dynamic tunneling for network-based distributed mobility management coexisting with PMIPv6.
Proceedings of the 24th IEEE Annual International Symposium on Personal, 2013

Localized Paging Scheme in PMIPv6.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

Dynamic proxy based distributed mobility management in PURSUIT.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2013

Host-based distributed mobility management: Example of traffic offloading.
Proceedings of the 10th IEEE Consumer Communications and Networking Conference, 2013

2012
Performance Analysis of PMIPv6-Based NEtwork MObility for Intelligent Transportation Systems.
IEEE Trans. Veh. Technol., 2012

Distributed context aware collaborative filtering approach for P2P service selection and recovery in wireless mesh networks.
Peer-to-Peer Netw. Appl., 2012

Securing mobile network prefix provisioning for NEMO based vehicular networks.
Math. Comput. Model., 2012

NGMIP: network-based global mobility support.
Int. J. Internet Protoc. Technol., 2012

DSSH: Digital signature based secure handover for network-based mobility management.
Comput. Syst. Sci. Eng., 2012

A novel minimum delay maximum flow multicast algorithm to construct a multicast tree in wireless mesh networks.
Comput. Math. Appl., 2012

MNPP: Mobile Network Prefix Provisioning for Enabling Route Optimization in Geographic Vehicular Networks.
Ad Hoc Sens. Wirel. Networks, 2012

Host-based distributed mobility management support protocol for IPv6 mobile networks.
Proceedings of the 8th IEEE International Conference on Wireless and Mobile Computing, 2012

A Sparse Clustering Model of Wireless Communication Networks.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

Comparative study of centralized mobility management and distributed mobility management on ID/locator separation architectures.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2012

2011
Enhancing QoS of Mobile Devices by a New Handover Process in PMIPv6 Networks.
Wirel. Pers. Commun., 2011

Tunnel Restraint to Prevent Out-of-Order Packets for Route Optimization in Proxy Mobile IPv6.
Wirel. Pers. Commun., 2011

Secure handover for Proxy Mobile IPv6 in next-generation communications: scenarios and performance.
Wirel. Commun. Mob. Comput., 2011

Reducing Communication Overhead for Nested NEMO Networks: Roaming Authentication and Access Control Structure.
IEEE Trans. Veh. Technol., 2011

Lightweight NEtwork MObility Within PMIPv6 for Transportation Systems.
IEEE Syst. J., 2011

Enhancing MISP with Fast Mobile IPv6 Security.
Mob. Inf. Syst., 2011

Improved PMIPv6 handover procedure for consumer multicast traffic.
IET Commun., 2011

Fast PMIPv6 Multicast Handover Procedure for Mobility-Unaware Mobile Nodes.
Proceedings of the 73rd IEEE Vehicular Technology Conference, 2011

Security issues of IPv6 communications in Cooperative Intelligent Transportation Systems (poster).
Proceedings of the 2011 IEEE Vehicular Networking Conference, 2011

Overhead analysis on secure beaconing for GeoNetworking.
Proceedings of the IEEE Intelligent Vehicles Symposium (IV), 2011

2010
Cost analysis of IP mobility management protocols for consumer mobile devices.
IEEE Trans. Consumer Electron., 2010

Diffie-Hellman key based authentication in proxy mobile IPv6.
Mob. Inf. Syst., 2010

Guest Editorial: Advances in Wireless Mobile and Sensor Technologies.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2010

caTBUA: Context-aware ticket-based binding update authentication protocol for trust-enabled mobile networks.
Int. J. Commun. Syst., 2010

ESS-FH: Enhanced Security Scheme for Fast Handover in Hierarchical Mobile IPv6.
IEICE Trans. Inf. Syst., 2010

Adaptive Authentication And Registration Key Management Scheme Based On AAA Architecture.
Intell. Autom. Soft Comput., 2010

How much do we gain by introducing route optimization in Proxy Mobile IPv6 networks?
Ann. des Télécommunications, 2010

Enhanced Handover Process for Proxy Mobile IPv6.
Proceedings of the 4th International Conference on Multimedia and Ubiquitous Engineering, 2010

Comments on a One-Way Hash Chain Based Authentication for FMIPv6.
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010

2009
Route Optimization in Nested NEMO: Classification, Evaluation, and Analysis from NEMO Fringe Stub Perspective.
IEEE Trans. Mob. Comput., 2009

A comparative performance analysis on Hierarchical Mobile IPv6 and Proxy Mobile IPv6.
Telecommun. Syst., 2009

Optimizing Access Point Allocation Using Genetic Algorithmic Approach for Smart Home Environments.
Comput. J., 2009

Secure Fast Handover Scheme of Proxy Mobile IPv6.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009

Authentication Scheme Based on Trust and Clustering Using Fuzzy Control in Wireless Ad-Hoc Networks.
Proceedings of the Computational Science and Its Applications, 2009

Authentication Analysis Based on Certificate for Proxy Mobile IPv6 Environment.
Proceedings of the Computational Science and Its Applications, 2009

A Performance Analysis on Route Optimization for Proxy Mobile IPv6.
Proceedings of IEEE International Conference on Communications, 2009

2008
A comparative signaling cost analysis of Hierarchical Mobile IPv6 and Proxy Mobile IPv6.
Proceedings of the IEEE 19th International Symposium on Personal, 2008

Hybrid PMIPv6 indication mechanism for interaction between MIPv6 and PMIPv6.
Proceedings of the 5th International Conference on Mobile Technology, 2008

Ticket-Based Authentication Mechanism for Proxy Mobile IPv6 Environment.
Proceedings of the 3rd International Conference on Systems and Networks Communications, 2008

Performance Analysis of Route Optimization on Proxy Mobile IPv6.
Proceedings of the 3rd International Conference on Systems and Networks Communications, 2008

PMIPv6 Route Optimization Mechanism Using the Routing Table of MAG.
Proceedings of the 3rd International Conference on Systems and Networks Communications, 2008

Group Key Locking Scheme in Mobile Multicast Environments with Modified MLDs.
Proceedings of the Challenges for Next Generation Network Operations and Service Management, 2008

Preventing Out-of-Sequence Packets on the Route Optimization Procedure in Proxy Mobile IPv6.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

An Investigation of Distance-Based Proxy Mobile Client Selection Schemes for NetLMM.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

2007
Performance evaluation of distributed multiple home agents with HAHA protocol.
Int. J. Netw. Manag., 2007

A Novel Inter-LMD Handoff Mechanism for Network-Based Localized Mobility Management.
Proceedings of the Next Generation Teletraffic and Wired/Wireless Advanced Networking, 2007

Local Authentication Scheme Based on AAA in Mobile IPv6 Networks.
Proceedings of the Advances in Multimedia Modeling, 2007

PKG-MIB: Private-Mib for Package-Based Linux Systems in a Large Scale Management Domain.
Proceedings of the Agent and Multi-Agent Systems: Technologies and Applications, 2007

MANET ID : Improvement on Group Communications and ZRP.
Proceedings of the Second International Conference on Systems and Networks Communications (ICSNC 2007), 2007

A Scheme to reduce the handoff latency using mSCTP in Fast Mobile IPv6.
Proceedings of the Second International Conference on Systems and Networks Communications (ICSNC 2007), 2007

An Adaptive Inter-Mobility Supports Scheme for NetLMM.
Proceedings of the Second International Conference on Systems and Networks Communications (ICSNC 2007), 2007

An Optimal Access Points Allocation Scheme Based on Genetic Algorithm.
Proceedings of the Future Generation Communication and Networking, 2007

2006
Session Key Forwarding Scheme Based on AAA Architecture in Wireless Networks.
Proceedings of the Parallel and Distributed Processing and Applications, 2006

Performance Evaluation of Dual Authentication Scheme in Mobile IPv6 Networks.
Proceedings of the International Conference on Systems and Networks Communications (ICSNC 2006), October 29, 2006

Experimental Performance Evaluation of Mobile IPv6 Handovers over Wireless LAN.
Proceedings of the International Conference on Systems and Networks Communications (ICSNC 2006), October 29, 2006

2005
Policy Based Handoff in MIPv6 Networks.
Proceedings of the Computational Science and Its Applications, 2005

New Binding Update Method using GDMHA in Hierarchical Mobile IPv6.
Proceedings of the Computational Science and Its Applications, 2005

Distributing Multiple Home Agents in MIPv6 Networks.
Proceedings of the High Performance Computing and Communications, 2005


  Loading...