Hyotaek Lim

According to our database1, Hyotaek Lim
  • authored at least 36 papers between 2001 and 2017.
  • has a "Dijkstra number"2 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2017
A new content-defined chunking algorithm for data deduplication in cloud storage.
Future Generation Comp. Syst., 2017

SDM: Smart deduplication for mobile cloud storage.
Future Generation Comp. Syst., 2017

2015
Hand tracking and gesture recognition system for human-computer interaction using low-cost hardware.
Multimedia Tools Appl., 2015

The Design of an Efficient Proxy-Based Framework for Mobile Cloud Computing.
J. Inform. and Commun. Convergence Engineering, 2015

Homomorphic encryption in mobile multi cloud computing.
Proceedings of the 2015 International Conference on Information Networking, 2015

2014
Leveraging client-side storage techniques for enhanced use of multiple consumer cloud storage services on resource-constrained mobile devices.
J. Network and Computer Applications, 2014

An effective framework of behavior detection-advanced static analysis for malware detection.
Proceedings of the 14th International Symposium on Communications and Information Technologies, 2014

2012
An efficient model for dimensioning an ATA-based virtual storage system.
Computers & Electrical Engineering, 2012

An Efficient FPGA Design of PingPong-128 Stream Cipher for Secure Computing.
Proceedings of the IEEE 26th International Conference on Advanced Information Networking and Applications, 2012

2011
Performance of two-stage shared fiber delay line optical packet switch under bursty traffic.
Photonic Network Communications, 2011

Dynamic Load Balancing and Network Adaptive Virtual Storage Service for Mobile Appliances.
JIPS, 2011

Comparative Performance Study of WDM Packet Switch for Different Traffic Arrival Approach.
J. Inform. and Commun. Convergence Engineering, 2011

Unicode Canonical Decomposition for Hangeul Syllables in Regular Expression.
IEICE Transactions, 2011

Throughput and delay performance analysis of feed-forward and feedback shared fiber delay line based hybrid buffering optical packet switch.
Proceedings of the 2011 International Conference on Information Networking, 2011

An Efficient Online Signature Verification Scheme Using Dynamic Programming of String Matching.
Proceedings of the Convergence and Hybrid Information Technology, 2011

An Efficient Hardware Countermeasure against Differential Power Analysis Attack.
Proceedings of the Convergence and Hybrid Information Technology, 2011

A Strong User Authentication Framework for Cloud Computing.
Proceedings of the 2011 IEEE Asia-Pacific Services Computing Conference, 2011

Performance and Optical Cost Analysis of Shared Fiber Delay Line Based Two-Stage Optical Packet Switch.
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications, 2011

2010
Mutual Authentication and Secure Session Termination Scheme in iATA Protocol.
J. Inform. and Commun. Convergence Engineering, 2010

Practical Attacks on Hybrid Group Key Management for SOHAN.
J. Inform. and Commun. Convergence Engineering, 2010

Two Factor Authentication for Cloud Computing.
J. Inform. and Commun. Convergence Engineering, 2010

Dynamic Load Balancing and Network Monitoring in iATA Protocol for Mobile Appliances.
Proceedings of the 4th International Conference on Multimedia and Ubiquitous Engineering, 2010

2009
A Ping Pong Based One-Time-Passwords Authentication System.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009

2008
Multicasting Support for NEMO based on ODMRP.
Proceedings of the Ninth ACIS International Conference on Software Engineering, 2008

A Secure and Efficient Three-Pass Authenticated Key Agreement Protocol Based on Elliptic Curves.
Proceedings of the NETWORKING 2008, Ad Hoc and Sensor Networks, Wireless Networks, 2008

Design and Implementation of ATA-Based Virtual Storage System for Mobile Device.
Proceedings of the 2008 International Conference on Multimedia and Ubiquitous Engineering (MUE 2008), 2008

2007
Indoor Passive Location Tracking and Activity Monitoring using WSN for Ubiquitous Healthcare.
J. Inform. and Commun. Convergence Engineering, 2007

Dragon-MAC: Securing Wireless Sensor Networks with Authenticated Encryption.
IACR Cryptology ePrint Archive, 2007

2006
Passive and Cost Effective People Indoor Location Tracking System for Ubiquitous Healthcare.
Proceedings of the Sixth IASTED International Multi-Conference on Wireless and Optical Communications: Conference on Communication Systems and Applications, 2006

Distributed Certificate Authority Under the GRID-Location Aided Routing Protocol.
Proceedings of the Computational Science and Its Applications, 2006

Fair Reputation Evaluating Protocol for Mobile Ad Hoc Network.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

2005
Design of Healthcare System for Disabled Person Using Eye Blinking.
Proceedings of the 4th Annual ACIS International Conference on Computer and Information Science (ICIS 2005), 2005

2004
An Efficient Video Prefix-Caching Scheme in Wide Area Networks.
Proceedings of the Information Networking, 2004

2003
Design Considerations for Hierarchical Web Proxy Server Using iSCS.
Proceedings of the 2003 Symposium on Applications and the Internet (SAINT 2003), 27-31 January 2003, 2003

A New Cell Loss Recovery Scheme for Data Services in B-ISDN.
Proceedings of the Information Networking, 2003

2001
TCP Pre-Connection for Prefix-Caching Video Proxy in Wide Area Networks.
Proceedings of the International Conference on Internet Computing, 2001


  Loading...