Sangjin Lee
Orcid: 0000-0002-6809-5179Affiliations:
- Korea University, School of Cybersecurity, Seoul, South Korea
According to our database1,
Sangjin Lee
authored at least 183 papers
between 1999 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
IEEE Access, 2024
2023
Forensic Sci. Int. Digit. Investig., October, 2023
Forensic Sci. Int. Digit. Investig., October, 2023
Forensic Sci. Int. Digit. Investig., October, 2023
Data reconstruction and recovery of deduplicated files having non-resident attributes in NTFS volume.
Forensic Sci. Int. Digit. Investig., September, 2023
Forensic Sci. Int. Digit. Investig., March, 2023
Discovering spoliation of evidence through identifying traces on deleted files in macOS.
Forensic Sci. Int. Digit. Investig., March, 2023
2022
A Study on the Processing of Timestamps in the Creation of Multimedia Files on Mobile Devices.
J. Inf. Process. Syst., 2022
Characterizing client-side caches of audiovisual content sharing services: Findings and suggestions for forensics.
J. Inf. Secur. Appl., 2022
Digit. Investig., 2022
DiagAnalyzer: User behavior analysis and visualization using Windows Diagnostics logs.
Digit. Investig., 2022
Vision: An empirical framework for examiners to accessing password-protected resources for on-the-scene digital investigations.
Digit. Investig., 2022
IEEE Access, 2022
2021
User profiling via application usage pattern on digital devices for digital forensics.
Expert Syst. Appl., 2021
Digit. Investig., 2021
Digit. Investig., 2021
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021
2020
Automated analysis with Apriori algorithm: deriving guidance for working-level cybersecurity curricula.
Inroads, 2020
Study of identifying and managing the potential evidence for effective Android forensics.
Digit. Investig., 2020
5W1H-based Expression for the Effective Sharing of Information in Digital Forensic Investigations.
CoRR, 2020
2019
Forensic signature for tracking storage devices: Analysis of UEFI firmware image, disk signature and windows artifacts.
Digit. Investig., 2019
High-Speed Searching Target Data Traces Based on Statistical Sampling for Digital Forensics.
IEEE Access, 2019
2018
Mobile forensic reference set (MFReS) and mobile forensic investigation for android devices.
J. Supercomput., 2018
Abnormal Behavior Detection to Identify Infected Systems Using the<i> APChain</i> Algorithm and Behavioral Profiling.
Secur. Commun. Networks, 2018
2017
Digit. Investig., 2017
2016
Secur. Commun. Networks, 2016
J. Digit. Forensics Secur. Law, 2016
Forensic investigation framework for the document store NoSQL DBMS: MongoDB as a case study.
Digit. Investig., 2016
Digit. Investig., 2016
2015
Multim. Tools Appl., 2015
J. Appl. Math., 2015
Proceedings of the Digital Forensics and Cyber Crime - 7th International Conference, 2015
2014
Secur. Commun. Networks, 2014
J. Intell. Manuf., 2014
Int. J. Distributed Sens. Networks, 2014
Digit. Investig., 2014
2013
Digit. Investig., 2013
A new triage model conforming to the needs of selective search and seizure of electronic evidence.
Digit. Investig., 2013
Comput. Math. Appl., 2013
2012
Secur. Commun. Networks, 2012
Pers. Ubiquitous Comput., 2012
A research on the investigation method of digital forensics for a VMware Workstation's virtual machine.
Math. Comput. Model., 2012
Math. Comput. Model., 2012
Digit. Investig., 2012
Proceedings of the Information Security Applications - 13th International Workshop, 2012
Proceedings of the Information Technology Convergence, Secure and Trust Computing, and Data Management, 2012
Proceedings of the Information Technology Convergence, Secure and Trust Computing, and Data Management, 2012
Proceedings of the Information Technology Convergence, Secure and Trust Computing, and Data Management, 2012
2011
Digit. Investig., 2011
Digit. Investig., 2011
The Method of Database Server Detection and Investigation in the Enterprise Environment.
Proceedings of the Secure and Trust Computing, Data Management and Applications, 2011
2010
Security analysis of pure DDP-based cipher proper for multimedia and ubiquitous device.
Telecommun. Syst., 2010
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010
Intell. Autom. Soft Comput., 2010
Comput. Stand. Interfaces, 2010
Comput. Math. Appl., 2010
2009
J. Intell. Manuf., 2009
Digit. Investig., 2009
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009
Research about extracting and analyzing accounting data of company to detect financial fraud.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2009
2008
Performance Enhancement of Differential Power Analysis Attacks With Signal Companding Methods.
IEEE Signal Process. Lett., 2008
Seven New Block Cipher Structures with Provable Security against Differential Cryptanalysis.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
Indifferentiable Security Analysis of choppfMD, chopMD, a chopMDP, chopWPH, chopNI, chopEMD, chopCS, and chopESh Hash Domain Extensions.
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
Various Security Analysis of a pfCM-MD Hash Domain Extension and Applications based on the Extension.
IACR Cryptol. ePrint Arch., 2008
Extraction of Residual Information in the Microsoft PowerPoint file from the Viewpoint of Digital Forensics considering PerCom Environment.
Proceedings of the Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2008), 2008
Proceedings of the 2008 International Conference on Multimedia and Ubiquitous Engineering (MUE 2008), 2008
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
Proceedings of the Second International Conference on Future Generation Communication and Networking, 2008
Proceedings of the Second International Conference on Future Generation Communication and Networking, 2008
Proceedings of the 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, 2008
2007
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007
Generalised Category Attack - Improving Histogram-Based Attack on JPEG LSB Embedding.
Proceedings of the Information Hiding, 9th International Workshop, 2007
Proceedings of the Future Generation Communication and Networking, 2007
Proceedings of the Future Generation Communication and Networking, 2007
Proceedings of the Future Generation Communication and Networking, 2007
Design and Implementation of the UsMSS : User-centric secure Multimedia Service System in Intelligent Home.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007
2006
Known-IV, Known-in-Advance-IV, and Replayed-and-Known-IV Attacks on Multiple Modes of Operation of Block Ciphers.
J. Cryptol., 2006
IEICE Trans. Inf. Syst., 2006
Proceedings of the Progressin Cryptology, 2006
A DRBAC Model Based on Context for Smart and Secure Services in Intelligent Ubiquitous Home.
Proceedings of the Ubiquitous Intelligence and Computing, Third International Conference, 2006
<i>ui</i>H-PMAC Model Suitable for Ubi-Home Gateway in Ubiquitous Intelligent Environment.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2006
Proceedings of the Digital Watermarking, 5th International Workshop, 2006
Proceedings of the Digital Watermarking, 5th International Workshop, 2006
High-Speed RSA Crypto-processor with Radix-4 Modular Multiplication and Chinese Remainder Theorem.
Proceedings of the Information Security and Cryptology - ICISC 2006, 9th International Conference, Busan, Korea, November 30, 2006
Proceedings of the Computational Science and Its Applications, 2006
Proceedings of the Computational Science and Its Applications, 2006
Provable Security for an RC6-like Structure and a MISTY-FO-like Structure Against Differential Cryptanalysis.
Proceedings of the Computational Science and Its Applications, 2006
Proceedings of the Fast Software Encryption, 13th International Workshop, 2006
<i>C-i</i>UMS: Context Based Smart and Secure Multimedia Service in Intelligent Ubiquitous Home.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006
Proceedings of the Cryptographic Hardware and Embedded Systems, 2006
Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free Padding.
Proceedings of the Advances in Cryptology, 2006
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006
2005
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005
IACR Cryptol. ePrint Arch., 2005
Proceedings of the First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2005), 2005
A Watermarking Method Using Quantization and Statistical Characteristics of Wavelet Transform.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005
Proceedings of the Progress in Cryptology, 2005
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005
Proceedings of the Progress in Cryptology, 2005
Proceedings of the Cryptography and Coding, 2005
New Steganalysis Methodology: LR Cube Analysis for the Detection of LSB Steganography.
Proceedings of the Information Hiding, 7th International Workshop, 2005
Proceedings of the Computational Science and Its Applications, 2005
Proceedings of the Computational Science and Its Applications, 2005
Design and Implementation of the IMS-IPMP System in Convergence Home-Network Environment.
Proceedings of the Digital Libraries: Implementing Strategies and Sharing Experiences, 2005
Security Analysis of a 2/3-Rate Double Length Compression Function in the Black-Box Model.
Proceedings of the Fast Software Encryption: 12th International Workshop, 2005
Proceedings of the Fast Software Encryption: 12th International Workshop, 2005
Proceedings of the Communications and Multimedia Security, 2005
User-Oriented Multimedia Service Using Smart Sensor Agent Module in the Intelligent Home.
Proceedings of the Computational Intelligence and Security, International Conference, 2005
2004
IACR Cryptol. ePrint Arch., 2004
Proceedings of the Digital Watermarking, Third InternationalWorkshop, 2004
Proceedings of the Digital Watermarking, Third InternationalWorkshop, 2004
Proceedings of the Progress in Cryptology, 2004
Proceedings of the Progress in Cryptology, 2004
Impossibility of Construction of OWHF and UOWHF from PGV Model Based on Block Cipher Secure Against ACPCA.
Proceedings of the Progress in Cryptology, 2004
Proceedings of the Information Security and Cryptology, 2004
Proceedings of the Information Security and Cryptology, 2004
Proceedings of the Information Security and Cryptology, 2004
Proceedings of the Fast Software Encryption, 11th International Workshop, 2004
Proceedings of the Advances in Cryptology, 2004
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004
2003
Proceedings of the Computer Network Security, 2003
Proceedings of the Digital Watermarking, Second International Workshop, 2003
Proceedings of the Digital Watermarking, Second International Workshop, 2003
Proceedings of the Information Security, 6th International Conference, 2003
Proceedings of the Computer and Information Sciences, 2003
Proceedings of the Progress in Cryptology, 2003
Proceedings of the Progress in Cryptology, 2003
Proceedings of the Information Security and Cryptology, 2003
Proceedings of the Information Security and Cryptology, 2003
Improving the Upper Bound on the Maximum Differential and the Maximum Linear Hull Probability for SPN Structures and AES.
Proceedings of the Fast Software Encryption, 10th International Workshop, 2003
Proceedings of the Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30, 2003
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003
2002
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002
Proceedings of the Security and Watermarking of Multimedia Contents IV, 2002
Full-Round Differential Attack on the Original Version of the Hash Function Proposed at PKC'98.
Proceedings of the Selected Areas in Cryptography, 2002
Proceedings of the Public Key Cryptography, 2002
Proceedings of the Information and Communications Security, 4th International Conference, 2002
Proceedings of the Fast Software Encryption, 9th International Workshop, 2002
Proceedings of the Fast Software Encryption, 9th International Workshop, 2002
Proceedings of the Advances in Cryptology, 2002
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002
2001
Proceedings of the Information Security and Cryptology, 2001
Proceedings of the Information Security and Cryptology, 2001
Proceedings of the Information Security and Cryptology, 2001
Proceedings of the Advances in Cryptology, 2001
2000
Proceedings of the Progress in Cryptology, 2000
Proceedings of the Information Security and Cryptology, 2000
Provable Security against Differential and Linear Cryptanalysis for the SPN Structure.
Proceedings of the Fast Software Encryption, 7th International Workshop, 2000
Provable Security for the Skipjack-like Structure against Differential Cryptanalysis and Linear Cryptanalysis.
Proceedings of the Advances in Cryptology, 2000
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000
1999
On the Optimal Diffusion Layers with Practical Security against Differential and Linear Cryptanalysis.
Proceedings of the Information Security and Cryptology, 1999