Hoonjae Lee

Orcid: 0000-0002-2869-7650

Affiliations:
  • Dongseo University, Department of Computer Engineering, Busan, South Korea


According to our database1, Hoonjae Lee authored at least 130 papers between 2000 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
A Closer Look at Attacks on Lightweight Cryptosystems: Threats and Countermeasures.
Proceedings of the Intelligent Human Computer Interaction - 15th International Conference, 2023

2022
APT attack response system through AM-HIDS.
Proceedings of the 24th International Conference on Advanced Communication Technology, 2022

2021
Channel Allocation for Connected Vehicles in Internet of Things Services.
Sensors, 2021

Secure and Efficient High Throughput Medium Access Control for Vehicular Ad-Hoc Network.
Sensors, 2021

Deep Learning-Based Drone Classification Using Radar Cross Section Signatures at mmWave Frequencies.
IEEE Access, 2021

2020
A Secure Enhanced Non-Cooperative Cognitive Division Multiple Access for Vehicle-to-Vehicle Communication.
Sensors, 2020

Varied density of vehicles under city, highway and rural environments in V2V communication.
Int. J. Sens. Networks, 2020

Voice Attacks to AI Voice Assistant.
Proceedings of the Intelligent Human Computer Interaction, 2020

AI-Based Voice Assistants Technology Comparison in Term of Conversational and Response Time.
Proceedings of the Intelligent Human Computer Interaction - 12th International Conference, 2020

Analysis and Protection of Computer Network Security Issues.
Proceedings of the 22nd International Conference on Advanced Communication Technology, 2020

Conservation Genetic Algorithm to Solve the E-commerce Environment Logistics Distribution Path Optimization Problem.
Proceedings of the 22nd International Conference on Advanced Communication Technology, 2020

Comparison between DSRC and other Short Range Wireless Communication Technologies.
Proceedings of the 22nd International Conference on Advanced Communication Technology, 2020

Classify and Analyze the Security Issues and Challenges in Mobile banking in Uzbekistan.
Proceedings of the 22nd International Conference on Advanced Communication Technology, 2020

2019
Performance Enriching Channel Allocation Algorithm for Vehicle-to-Vehicle City, Highway and Rural Network.
Sensors, 2019

Introduce a Specific Process of Genetic Algorithm through an Example.
Proceedings of the 2019 International Conference on Information and Communication Technology Convergence, 2019

A Novel Throughput and Collision for City Environment in V2V Communication.
Proceedings of the 2019 International Conference on Information and Communication Technology Convergence, 2019

Security Enhancement for Access Control Mechanism in Real-time Wireless Sensor Network.
Proceedings of the 21st International Conference on Advanced Communication Technology, 2019

Proposal of PingPong-128 Countermeasure against Power Analysis Attack.
Proceedings of the 21st International Conference on Advanced Communication Technology, 2019

Smart Flying Umbrella Drone on Internet of Things: AVUS.
Proceedings of the 21st International Conference on Advanced Communication Technology, 2019

Multi-Factor Authentication in Cyber Physical System: A State of Art Survey.
Proceedings of the 21st International Conference on Advanced Communication Technology, 2019

A Conservation Genetic Algorithm for Optimization of the E-commerce Logistics Distribution Path.
Proceedings of the 21st International Conference on Advanced Communication Technology, 2019

Security Challenge and Issue of Mobile Banking in Republic of Uzbekistan: A State of Art Survey.
Proceedings of the 21st International Conference on Advanced Communication Technology, 2019

An Improved Two Factor User Authentication Framework Based on CAPTCHA and Visual Secret Sharing.
Proceedings of the 2019 IEEE International Conference on Computational Science and Engineering, 2019

2018
Design, implementation, and performance evaluation of identity-based cryptography in ONOS.
Int. J. Netw. Manag., 2018

An environmental channel throughput and radio propagation modeling for vehicle-to-vehicle communication.
Int. J. Distributed Sens. Networks, 2018

Performance Analysis for City, Highway, and Rural Area in Vehicle-to-Vehicle Network.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2018

A study on detection of anomaly behavior in automation industry.
Proceedings of the 20th International Conference on Advanced Communication Technology, 2018

Obstacles effects on signal attenuation in line of sight for different environments in V2V communication.
Proceedings of the 20th International Conference on Advanced Communication Technology, 2018

2017
Distributed SDN controller system: A survey on design choice.
Comput. Networks, 2017

V2V communication modeling for environmental channel throughput and radio propagation.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2017

2016
Securing SDN Southbound and Data Plane Communication with IBC.
Mob. Inf. Syst., 2016

An Improved Square-always Exponentiation Resistant to Side-channel Attacks on RSA Implementation.
Intell. Autom. Soft Comput., 2016

2015
A Secure Routing Protocol for Wireless Sensor Networks Considering Secure Data Aggregation.
Sensors, 2015

The Design of an Efficient Proxy-Based Framework for Mobile Cloud Computing.
J. Inform. and Commun. Convergence Engineering, 2015

Secure your Northbound SDN API.
Proceedings of the Seventh International Conference on Ubiquitous and Future Networks, 2015

Securing distributed SDN with IBC.
Proceedings of the Seventh International Conference on Ubiquitous and Future Networks, 2015

A Privacy Preserving Security Protocol-Based Application for Wireless Communication System.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

An Effective and Secure User Authentication and Key Agreement Scheme in m-Healthcare Systems.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

An Approach to Designing a Network Security-based Application for Communications Safety.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015

Performance Comparison Between RSA and Elliptic Curve Cryptography-Based QR Code Authentication.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015

Hybrid Cloud Service Based Healthcare Solutions.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015

Smartphone-Based Secure Access Control in Wireless Network Analysis.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015

Correlation Power Analysis Attack on the Ping Pong-128 Key Stream Generator.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015

An Efficient and Provable Secret Shared Key Computation for Cryptographic Protocol Across Insecure Channel.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015

On Modeling Protocol-Based Clustering Tag in RFID Systems with Formal Security Analysis.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015

2014
Security Analysis and Improvements of Authentication and Access Control in the Internet of Things.
Sensors, 2014

An Efficient and Adaptive Mutual Authentication Framework for Heterogeneous Wireless Sensor Network-Based Applications.
Sensors, 2014

Leveraging client-side storage techniques for enhanced use of multiple consumer cloud storage services on resource-constrained mobile devices.
J. Netw. Comput. Appl., 2014

Power Analysis Attacks on the Right-to-Left Square-Always Exponentiation Algorithm.
J. Internet Serv. Inf. Secur., 2014

Higher-Order Countermeasures against Side-Channel Cryptanalysis on Rabbit Stream Cipher.
J. Inform. and Commun. Convergence Engineering, 2014

An effective framework of behavior detection-advanced static analysis for malware detection.
Proceedings of the 14th International Symposium on Communications and Information Technologies, 2014

PKI-based cryptography for secure cloud data storage using ECC.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2014

Mitigating Denial of Service (DoS) attacks in OpenFlow networks.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2014

Anonymization algorithm for security and confidentiality of health data set across social network.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2014

Cryptographic computation of private shared key based mutual authentication protocol: Simulation and modeling over wireless networks.
Proceedings of the International Conference on Information Networking 2014, 2014

Secure key management scheme based on ECC algorithm for patient's medical information in healthcare system.
Proceedings of the International Conference on Information Networking 2014, 2014

An enhanced passivation layer for secure consumer integrated circuit devices.
Proceedings of the IEEE 3rd Global Conference on Consumer Electronics, 2014

A Design of Elliptic Curve Cryptography-Based Authentication Using QR Code.
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014

Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security.
Proceedings of the Ninth Asia Joint Conference on Information Security, 2014

An Efficient Defense Scheme against SIP DoS Attack in SDN Using Cloud SFW.
Proceedings of the Ninth Asia Joint Conference on Information Security, 2014

2013
Algebraic Countermeasure to Enhance the Improved Summation Generator with 2-Bit Memory.
J. Networks, 2013

Improved Security Patch on Secure Communication among Cell Phones and Sensor Networks.
Int. J. Distributed Sens. Networks, 2013

Empirical analysis of the reliability of low-rate wireless u-healthcare monitoring applications.
Int. J. Commun. Syst., 2013

Mutual authentication in wireless body sensor networks (WBSN) based on Physical Unclonable Function (PUF).
Proceedings of the 2013 9th International Wireless Communications and Mobile Computing Conference, 2013

Threshold tuning for demand queue based Overload Control Module.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2013

A hybrid and fast authentication protocol for handoff support in e-healthcare systems among WSNs.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2013

Trends and research directions for privacy preserving approaches on the cloud.
Proceedings of the 6th ACM India Computing Convention, 2013

2012
E-SAP: Efficient-Strong Authentication Protocol for Healthcare Applications Using Wireless Medical Sensor Networks.
Sensors, 2012

Security Issues in Healthcare Applications Using Wireless Medical Sensor Networks: A Survey.
Sensors, 2012

On the algebraic attack against summation type keystream generators.
Int. J. Inf. Comput. Secur., 2012

Data Link Layer' Security Analysis for Wireless Sensor Networks.
Proceedings of the Computer Applications for Communication, Networking, and Digital Contents, 2012

Mutual Authentication Protocol for Enhanced RFID Security and Anti-counterfeiting.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

An Efficient FPGA Design of PingPong-128 Stream Cipher for Secure Computing.
Proceedings of the IEEE 26th International Conference on Advanced Information Networking and Applications, 2012

2011
RUASN: A Robust User Authentication Framework for Wireless Sensor Networks.
Sensors, 2011

Performance of Mobility Models for Routing Protocol in Wireless Ad-hoc Networks.
J. Inform. and Commun. Convergence Engineering, 2011

A Personalized Healthcare Analysis System in Ubiquitous Environment.
J. Inform. and Commun. Convergence Engineering, 2011

Development and Modelling of High-Efficiency Computing Structure for Digital Signal Processing
CoRR, 2011

Power analysis attack and countermeasure on the Rabbit Stream Cipher (position paper).
Proceedings of the 7th International Workshop on Software Engineering for Secure Systems, 2011

An Efficient Password Authentication Method Using CAPTCHA.
Proceedings of the Convergence and Hybrid Information Technology, 2011

Hardware Implementation and Performance Analysis of NLM-128 Stream Cipher.
Proceedings of the Convergence and Hybrid Information Technology, 2011

An Efficient Hardware Countermeasure against Differential Power Analysis Attack.
Proceedings of the Convergence and Hybrid Information Technology, 2011

A User Authentication for Healthcare Application Using Wireless Medical Sensor Networks.
Proceedings of the 13th IEEE International Conference on High Performance Computing & Communication, 2011

A Strong User Authentication Framework for Cloud Computing.
Proceedings of the 2011 IEEE Asia-Pacific Services Computing Conference, 2011

2010
Mutual Authentication and Secure Session Termination Scheme in iATA Protocol.
J. Inform. and Commun. Convergence Engineering, 2010

Practical Attacks on Hybrid Group Key Management for SOHAN.
J. Inform. and Commun. Convergence Engineering, 2010

Two Factor Authentication for Cloud Computing.
J. Inform. and Commun. Convergence Engineering, 2010

Reliable and Secure Voice Encryption over GSM Voice Channel.
J. Inform. and Commun. Convergence Engineering, 2010

TriSec: A Secure Data Framework for Wireless Sensor Networks Using Authenticated Encryption.
J. Inform. and Commun. Convergence Engineering, 2010

ECG Signal De-noising with Asynchronous Averaging and Filtering Algorithm.
Int. J. Heal. Inf. Syst. Informatics, 2010

Piecewise-quadratic Harmut basis functions and their application to problems in digital signal processing.
Int. J. Commun. Syst., 2010

An efficient key pre-distribution scheme for wireless sensor network using public key cryptography.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2010

Addressing secure data routing scheme for heterogeneous sensor networks.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2010

Secure health monitoring using medical wireless sensor networks.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2010

2009
Cryptanalysis of Hu-Niu-Yang's Multi-server Password Authenticated Key Agreement Schemes Using Smart Card.
J. Inform. and Commun. Convergence Engineering, 2009

Development of a Cryptographic Dongle for Secure Voice Encryption over GSM Voice Channel.
J. Inform. and Commun. Convergence Engineering, 2009

Personal Healthcare Information System.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009

A Secure Data Mechanism for Ubiquitous Sensor Network with Dragon Cipher.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009

A Ping Pong Based One-Time-Passwords Authentication System.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009

PingPong-MAC: secure ubiquitous sensor network with authenticated encryption.
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, 2009

An energy consumption technique for global healthcare monitoring applications.
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, 2009

Database design for global patient monitoring applications using WAP.
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, 2009

Middleware in ubiquitous computing system with MedRec architecture.
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, 2009

A secure ubiquitous sensor network with Dragon.
Proceedings of the 2009 International Conference on Hybrid Information Technology, 2009

Architecture of Personal Healthcare Information System in Ubiquitous Healthcare.
Proceedings of the Communication and Networking, 2009

Global Patient Monitoring System Using IP-Enabled Ubiquitous Sensor Network.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009

2008
An Intelligent Security Agent for a Reliable Cipher System Using Pingpong.
Cybern. Syst., 2008

Multicasting Support for NEMO based on ODMRP.
Proceedings of the Ninth ACIS International Conference on Software Engineering, 2008

A Secure and Efficient Three-Pass Authenticated Key Agreement Protocol Based on Elliptic Curves.
Proceedings of the NETWORKING 2008, Ad Hoc and Sensor Networks, Wireless Networks, 2008

An Improved Variant of Wang-Cao's Certificate-Based Authenticated Key Agreement Protocol.
Proceedings of the NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008, 2008

Design and Implementation of ATA-Based Virtual Storage System for Mobile Device.
Proceedings of the 2008 International Conference on Multimedia and Ubiquitous Engineering (MUE 2008), 2008

A Security Enhancement of the E0 Cipher in Bluetooth System.
Proceedings of the Agent and Multi-Agent Systems: Technologies and Applications, 2008

Secure Hybrid Group Key Management for Hierarchical Self-Organizing Sensor Network.
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008

2007
Dragon-MAC: Securing Wireless Sensor Networks with Authenticated Encryption.
IACR Cryptol. ePrint Arch., 2007

An Enhanced One-round Pairing-based Tripartite Authenticated Key Agreement Protocol.
IACR Cryptol. ePrint Arch., 2007

An Enhanced ID-based Deniable Authentication Protocol on Pairings.
IACR Cryptol. ePrint Arch., 2007

Cryptanalytic Flaws in Oh et al.'s ID-Based Authenticated Key Agreement Protocol.
IACR Cryptol. ePrint Arch., 2007

Cryptanalysis on Improved One-round Lin-Li's Tripartite Key Agreement Protocol.
IACR Cryptol. ePrint Arch., 2007

Cryptanalysis on Improved Chou et al.'s ID-Based Deniable Authentication Protocol.
IACR Cryptol. ePrint Arch., 2007

A Relay-Transmission of the RFID Tag ID over the Wireless and TCP/IP with a Security Agent.
Proceedings of the Agent and Multi-Agent Systems: Technologies and Applications, 2007

2006
An Implementation of a RFID Tag ID Relay-Transmission over the Wireless and TCP/IP.
J. Convergence Inf. Technol., 2006

Highly Reliable Synchronous Stream Cipher System for Link Encryption.
Proceedings of the Computational Science and Its Applications, 2006

Experiments and Hardware Countermeasures on Power Analysis Attacks.
Proceedings of the Computational Science and Its Applications, 2006

A Differential Power Analysis Attack of Block Cipher Based on the Hamming Weight of Internal Operation Unit.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

2004
Dragon: A Fast Word Based Stream Cipher.
Proceedings of the Information Security and Cryptology, 2004

A Study on Smart Card Security Evaluation Criteria for Side Channel Attacks.
Proceedings of the Computational Science and Its Applications, 2004

2003
A Random M-ary Method Based Countermeasure against Side Channel Attacks.
Proceedings of the Computational Science and Its Applications, 2003

2002
Parallel stream cipher for secure high-speed communications.
Signal Process., 2002

A WTLS Handshake Protocol with User Anonymity and Forward Secrecy.
Proceedings of the Mobile Communications, 7th CDMA International Conference, CIC 2002, Seoul, Korea, October 29, 2002

The LILI-II Keystream Generator.
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002

2000
On an improved summation generator with 2-bit memory.
Signal Process., 2000


  Loading...