Sanggon Lee
Orcid: 0000-0002-6678-0500
According to our database1,
Sanggon Lee
authored at least 56 papers
between 2005 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
Sensors, February, 2023
Correction: Witanto et al. Distributed Data Integrity Verification Scheme in Multi-Cloud Environment. Sensors 2023, 23, 1623.
Sensors, 2023
Sensors, 2023
2022
2021
Secure and Efficient High Throughput Medium Access Control for Vehicular Ad-Hoc Network.
Sensors, 2021
BorderChain: Blockchain-Based Access Control Framework for the Internet of Things Endpoint.
IEEE Access, 2021
2019
Proceedings of the 2019 International Conference on Information and Communication Technology Convergence, 2019
Proceedings of the 2019 International Conference on Information and Communication Technology Convergence, 2019
BlockSubPay - A Blockchain Framework for Subscription-Based Payment in Cloud Service.
Proceedings of the 21st International Conference on Advanced Communication Technology, 2019
2018
J. Netw. Syst. Manag., 2018
Design, implementation, and performance evaluation of identity-based cryptography in ONOS.
Int. J. Netw. Manag., 2018
2017
Proceedings of the Eighth International Symposium on Information and Communication Technology, 2017
2016
2015
A Secure Routing Protocol for Wireless Sensor Networks Considering Secure Data Aggregation.
Sensors, 2015
Proceedings of the Seventh International Conference on Ubiquitous and Future Networks, 2015
Proceedings of the Seventh International Conference on Ubiquitous and Future Networks, 2015
A Privacy Preserving Security Protocol-Based Application for Wireless Communication System.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015
2014
Delegation-based robust authentication model for wireless roaming using portable communication devices.
IEEE Trans. Consumer Electron., 2014
Security Analysis and Improvements of Authentication and Access Control in the Internet of Things.
Sensors, 2014
An Efficient and Adaptive Mutual Authentication Framework for Heterogeneous Wireless Sensor Network-Based Applications.
Sensors, 2014
KSII Trans. Internet Inf. Syst., 2014
Proceedings of the International Conference on Information and Communication Technology Convergence, 2014
2013
A Security Analysis of the 802.11s Wireless Mesh Network Routing Protocol and Its Secure Routing Protocols.
Sensors, 2013
2012
Performance Evaluation of Multi-Channel Wireless Mesh Networks with Embedded Systems.
Sensors, 2012
E-SAP: Efficient-Strong Authentication Protocol for Healthcare Applications Using Wireless Medical Sensor Networks.
Sensors, 2012
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012
2011
Sensors, 2011
J. Inform. and Commun. Convergence Engineering, 2011
Cryptanalysis of Multiple-Server Password-Authenticated Key Agreement Schemes Using Smart Cards.
J. Inform. and Commun. Convergence Engineering, 2011
An Analysis of Group Key Agreement Schemes based on the Bellare-Rogaway Model in Multi-party Setting.
KSII Trans. Internet Inf. Syst., 2011
Proceedings of the Convergence and Hybrid Information Technology, 2011
A User Authentication for Healthcare Application Using Wireless Medical Sensor Networks.
Proceedings of the 13th IEEE International Conference on High Performance Computing & Communication, 2011
2010
J. Inform. and Commun. Convergence Engineering, 2010
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2010
2009
Cryptanalysis of Hu-Niu-Yang's Multi-server Password Authenticated Key Agreement Schemes Using Smart Card.
J. Inform. and Commun. Convergence Engineering, 2009
J. Inform. and Commun. Convergence Engineering, 2009
IACR Cryptol. ePrint Arch., 2009
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, 2009
2008
A Secure and Efficient Three-Pass Authenticated Key Agreement Protocol Based on Elliptic Curves.
Proceedings of the NETWORKING 2008, Ad Hoc and Sensor Networks, Wireless Networks, 2008
An Improved Variant of Wang-Cao's Certificate-Based Authenticated Key Agreement Protocol.
Proceedings of the NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008, 2008
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008
2007
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007
IACR Cryptol. ePrint Arch., 2007
IACR Cryptol. ePrint Arch., 2007
IACR Cryptol. ePrint Arch., 2007
IACR Cryptol. ePrint Arch., 2007
IACR Cryptol. ePrint Arch., 2007
IACR Cryptol. ePrint Arch., 2007
IACR Cryptol. ePrint Arch., 2007
Cryptanalysis of Tso et al.'s ID-Based Tripartite Authenticated Key Agreement Protocol.
Proceedings of the Information Systems Security, Third International Conference, 2007
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007
2005
Provably Secure Tripartite Password Protected Key Exchange Protocol Based on Elliptic Curves.
Proceedings of the Selected Areas in Cryptography, 12th International Workshop, 2005