Jongin Lim
Affiliations:- Korea University, Graduate School of Information Security, CIST, Seoul, South Korea
According to our database1,
Jongin Lim
authored at least 136 papers
between 1995 and 2019.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2019
Proceedings of the 11th International Conference on Cyber Conflict, 2019
2018
De-identification policy and risk distribution framework for securing personal information.
Inf. Polity, 2018
2017
National cyber security enhancement scheme for intelligent surveillance capacity with public IoT environment.
J. Supercomput., 2017
A Study on the Impact Analysis of Security Flaws between Security Controls: An Empirical Analysis of K-ISMS using Case-Control Study.
KSII Trans. Internet Inf. Syst., 2017
Measures for Automaker's Legal Risks from Security Threats in Connected Car Development Lifecycle.
KSII Trans. Internet Inf. Syst., 2017
Legal Consideration on the Use of Artificial Intelligence Technology and Self-regulation in Financial Sector: Focused on Robo-Advisors.
Proceedings of the Information Security Applications - 18th International Conference, 2017
Proceedings of the IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2017
2016
The Reality and Response of Cyber Threats to Critical Infrastructure: A Case Study of the Cyber-terror Attack on the Korea Hydro & Nuclear Power Co., Ltd..
KSII Trans. Internet Inf. Syst., 2016
2015
Weakness of lightweight block ciphers mCrypton and LED against biclique cryptanalysis.
Peer-to-Peer Netw. Appl., 2015
Multim. Tools Appl., 2015
Int. J. Distributed Sens. Networks, 2015
Changes of Cybersecurity Legal System in East Asia: Focusing on Comparison Between Korea and Japan.
Proceedings of the Information Security Applications - 16th International Workshop, 2015
Proceedings of the 5th International Conference on IT Convergence and Security, 2015
Proceedings of the 17th Asia-Pacific Network Operations and Management Symposium, 2015
2013
A study of the security of Internet banking and financial private information in South Korea.
Math. Comput. Model., 2013
2012
IEICE Trans. Inf. Syst., 2012
2011
Proceedings of the Digital Enterprise and Information Systems - International Conference, 2011
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28, 2011
2010
A statistical model for network data analysis: KDD CUP 99' data evaluation and its comparing with MIT Lincoln Laboratory network data.
Simul. Model. Pract. Theory, 2010
Improved Delegation-Based Authentication Protocol for Secure Roaming Service with Unlinkability.
IEEE Commun. Lett., 2010
Comput. Math. Appl., 2010
2009
J. Intell. Manuf., 2009
Formalizing the design, evaluation, and analysis of quality of protection in wireless networks.
J. Commun. Networks, 2009
Technical Protection Measures for Personal Information in Each Processing Phase in the Korean Public Sector .
KSII Trans. Internet Inf. Syst., 2009
IEICE Trans. Inf. Syst., 2009
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
Weaknesses in an anonymous authentication scheme for roaming service in global mobility networks.
IEEE Commun. Lett., 2009
Comput. Stand. Interfaces, 2009
Proceedings of the 2009 International Conference on Hybrid Information Technology, 2009
2008
Inf. Process. Lett., 2008
Efficient Flexible Batch Signing Techniques for Imbalanced Communication Applications.
IEICE Trans. Inf. Syst., 2008
Weak-Key Classes of 7-Round MISTY 1 and 2 for Related-Key Amplified Boomerang Attacks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
Seven New Block Cipher Structures with Provable Security against Differential Cryptanalysis.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
IEICE Trans. Commun., 2008
Compression Function Design Principles Supporting Variable Output Lengths from a Single Small Function.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
A Regression Method to Compare Network Data and Modeling Data Using Generalized Additive Model.
Proceedings of the Information Security Applications, 9th International Workshop, 2008
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
Proceedings of the Distributed Computing and Networking, 9th International Conference, 2008
2007
Inf. Sci., 2007
Proceedings of the Wired/Wireless Internet Communications, 5th International Conference, 2007
Proceedings of the Information Security Theory and Practices. Smart Cards, 2007
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007
Proceedings of the Third International Workshop on Security, 2007
Proceedings of the Emerging Technologies in Knowledge Discovery and Data Mining, 2007
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2007
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2007
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007
Proceedings of the Information Security Practice and Experience, 2007
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007
Proceedings of the 14th IEEE International Conference on Electronics, 2007
Proceedings of the Computational Science and Its Applications, 2007
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007
Proceedings of the Future Generation Communication and Networking, 2007
Proceedings of the Future Generation Communication and Networking, 2007
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007
P-IDC: Information Security and Consideration in Building Internet Data Centers for Pervasive Environment.
Proceedings of the Advances in Web and Network Technologies, and Information Management, 2007
Proceedings of the Advances in Web and Network Technologies, and Information Management, 2007
Design and Implementation of the UsMSS : User-centric secure Multimedia Service System in Intelligent Home.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007
2006
Known-IV, Known-in-Advance-IV, and Replayed-and-Known-IV Attacks on Multiple Modes of Operation of Block Ciphers.
J. Cryptol., 2006
Security analysis and improvement of a gateway-oriented password-based authenticated key exchange protocol.
IEEE Commun. Lett., 2006
Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields.
IACR Cryptol. ePrint Arch., 2006
Proceedings of the Progressin Cryptology, 2006
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006
Proceedings of the Information Security Practice and Experience, 2006
Proceedings of the Personal Wireless Communications, 2006
Proceedings of the Public Key Infrastructure, 2006
Proceedings of the Database and Expert Systems Applications, 17th International Conference, 2006
Modeling and Simulation for Security Risk Propagation in Critical Information Systems.
Proceedings of the Computational Intelligence and Security, International Conference, 2006
Proceedings of the Cryptographic Hardware and Embedded Systems, 2006
Generic Cryptanalysis of Combined Countermeasures with Randomized BSD Representations.
Proceedings of the Smart Card Research and Advanced Applications, 2006
Proceedings of the Frontiers of WWW Research and Development, 2006
2005
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005
Proceedings of the Information Security Applications, 6th International Workshop, 2005
Sinusoidal Modeling Using Wavelet Packet Transform Applied to the Analysis and Synthesis of Speech Signals.
Proceedings of the Text, Speech and Dialogue, 8th International Conference, 2005
Proceedings of the First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2005), 2005
An Efficient Public Key Cryptosystem with a Privacy Enhanced Double Decryption Mechanism.
Proceedings of the Selected Areas in Cryptography, 12th International Workshop, 2005
Proceedings of the Testing of Communicating Systems, 2005
Efficient Revocation of Security Capability in Certificateless Public Key Cryptography.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005
Proceedings of the Information Security, 8th International Conference, 2005
New Steganalysis Methodology: LR Cube Analysis for the Detection of LSB Steganography.
Proceedings of the Information Hiding, 7th International Workshop, 2005
Analysis/Synthesis of Speech Signals Based on AbS/OLA Sinusoidal Modeling Using Elliptic Filter.
Proceedings of the Intelligent Data Engineering and Automated Learning, 2005
Proceedings of the Computational Science and Its Applications, 2005
Proceedings of the Computational Science and Its Applications, 2005
Proceedings of the Computational Science and Its Applications, 2005
Fine Grained Control of Security Capability and Forward Security in a Pairing Based Signature Scheme.
Proceedings of the Computational Science and Its Applications, 2005
Proceedings of the Computational Science and Its Applications, 2005
Proceedings of the Euro-Par 2005, Parallel Processing, 11th International Euro-Par Conference, Lisbon, Portugal, August 30, 2005
Proceedings of the Distributed Applications and Interoperable Systems, 2005
Proceedings of the Advances in Cryptology, 2005
Proceedings of the Communications and Multimedia Security, 2005
A Fast Inversion Algorithm and Low-Complexity Architecture over <i>GF</i>(2<sup><i>m</i></sup>).
Proceedings of the Computational Intelligence and Security, International Conference, 2005
Proceedings of the Computational Intelligence and Security, International Conference, 2005
2004
IACR Cryptol. ePrint Arch., 2004
Proceedings of the Progress in Cryptology, 2004
Proceedings of the Information Security and Cryptology, 2004
Proceedings of the Information Security and Cryptology, 2004
Proceedings of the Information and Communications Security, 6th International Conference, 2004
Digitalevidence Integrated Management System.
Proceedings of the 2nd Australian Computer Network & Information Forensics Conference, November 25th 2004, Perth, Western Australia, Forensic Computing, 2004
2003
Proceedings of the Computer Network Security, 2003
Proceedings of the Information Security, 6th International Conference, 2003
Proceedings of the Computer and Information Sciences, 2003
Improving the Upper Bound on the Maximum Differential and the Maximum Linear Hull Probability for SPN Structures and AES.
Proceedings of the Fast Software Encryption, 10th International Workshop, 2003
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003
2002
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002
Proceedings of the Security and Watermarking of Multimedia Contents IV, 2002
Proceedings of the Selected Areas in Cryptography, 2002
Full-Round Differential Attack on the Original Version of the Hash Function Proposed at PKC'98.
Proceedings of the Selected Areas in Cryptography, 2002
Proceedings of the Public Key Cryptography, 2002
An Alternate Decomposition of an Integer for Faster Point Multiplication on Certain Elliptic Curves.
Proceedings of the Public Key Cryptography, 2002
Proceedings of the Information Security and Cryptology, 2002
Proceedings of the Information Security and Cryptology, 2002
Proceedings of the Information and Communications Security, 4th International Conference, 2002
Proceedings of the Fast Software Encryption, 9th International Workshop, 2002
Proceedings of the Fast Software Encryption, 9th International Workshop, 2002
Speeding Up Point Multiplication on Hyperelliptic Curves with Efficiently-Computable Endomorphisms.
Proceedings of the Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28, 2002
On the Security of Rijndael-Like Structures against Differential and Linear Cryptanalysis.
Proceedings of the Advances in Cryptology, 2002
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002
2001
Proceedings of the Information Security, 4th International Conference, 2001
Proceedings of the Information Security and Cryptology, 2001
Proceedings of the Information Security and Cryptology, 2001
Proceedings of the Information Security and Cryptology, 2001
Proceedings of the Advances in Cryptology, 2001
2000
Proceedings of the Progress in Cryptology, 2000
Proceedings of the Information Security and Cryptology, 2000
Provable Security against Differential and Linear Cryptanalysis for the SPN Structure.
Proceedings of the Fast Software Encryption, 7th International Workshop, 2000
Provable Security for the Skipjack-like Structure against Differential Cryptanalysis and Linear Cryptanalysis.
Proceedings of the Advances in Cryptology, 2000
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000
1999
Proceedings of the Public Key Cryptography, 1999
On the Optimal Diffusion Layers with Practical Security against Differential and Linear Cryptanalysis.
Proceedings of the Information Security and Cryptology, 1999
1998
Inf. Process. Lett., 1998
1995
J. Comput. Syst. Sci., 1995