Donghoon Lee

Affiliations:
  • Sungkyunkwan University, Department of Electrical and Computer Engineering, Suwon, Korea


According to our database1, Donghoon Lee authored at least 22 papers between 2014 and 2017.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2017
Improving Biometric-Based Authentication Schemes with Smart Card Revocation/Reissue for Wireless Sensor Networks.
Sensors, 2017

Efficient and Security Enhanced Anonymous Authentication with Key Agreement Scheme in Wireless Sensor Networks.
Sensors, 2017

Software Birthmark Method Using Combined Structure-Based and API-Based.
J. Softw., 2017

Improvement of Efficient and Secure Smart Card Based Password Authentication Scheme.
Int. J. Netw. Secur., 2017

Cryptanalysis and improvement of a biometric and smart card based remote user authentication scheme.
Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, 2017

Cryptanalysis and improvement of robust authentication scheme for telecare medicine information systems.
Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, 2017

Cryptanalysis of Chaos-Based 2-Party Key Agreement Protocol with Provable Security.
Proceedings of the Advances in Human Factors in Cybersecurity, 2017

Security Enhancement of Robust Anonymous Two-Factor Authenticated Key Exchange Scheme for Mobile Client-Server Environment.
Proceedings of the 4th Intl Conf on Applied Computing and Information Technology/3rd Intl Conf on Computational Science/Intelligence and Applied Informatics/1st Intl Conf on Big Data, 2017

2016
Efficient and robust user authentication scheme that achieve user anonymity with a Markov chain.
Secur. Commun. Networks, 2016

API-Based Software Birthmarking Method Using Fuzzy Hashing.
IEICE Trans. Inf. Syst., 2016

Improvement and Weakness of <i>Zero-Sum Defender</i> against Return-Oriented Programming Attacks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016

Performance and security enhanced authentication and key agreement protocol for SAE/LTE network.
Comput. Networks, 2016

Cryptanalysis and Improvement of Efficient Password-Based User Authentication Scheme using Hash Function.
Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication, 2016

Cryptanalysis and Improvement User Authentication Scheme for Multi-server Environment.
Proceedings of the Computational Science and Its Applications - ICCSA 2016, 2016

2015
Cryptanalysis of biometric-based multi-server authentication scheme using smart card.
Proceedings of the 11th International Conference on Heterogeneous Networking for Quality, 2015

Security Improvement of Portable Key Management Using a Mobile Phone.
Proceedings of the Computational Science and Its Applications - ICCSA 2015, 2015

Cryptanalysis of User Authentication Scheme Preserving Anonymity for Ubiquitous Devices.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2015

Cryptanalysis of Dynamic ID-Based User Authentication Scheme Using Smartcards Without Verifier Tables.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2015

2014
Security Analysis and Improvements of Two-Factor Mutual Authentication with Key Agreement in Wireless Sensor Networks.
Sensors, 2014

Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography.
Sensors, 2014

Password-based single-file encryption and secure data deletion for solid-state drive.
Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, 2014

A new synchronization sequence generation and correlation output calculation method for heterogeneous network.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2014


  Loading...