Jung-San Lee

Orcid: 0000-0001-7030-2985

According to our database1, Jung-San Lee authored at least 73 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Log Preservation in Custody Dual Blockchain With Energy Regime and Obfuscation Shuffle.
IEEE Trans. Netw. Sci. Eng., 2024

Lawful Remote Forensics Mechanism With Admissibility of Evidence in Stochastic and Unpredictable Transnational Crime.
IEEE Trans. Inf. Forensics Secur., 2024

Preserving manipulated and synthetic Deepfake detection through face texture naturalness.
J. Inf. Secur. Appl., 2024

Enhancing Data Embedding Capacity in Encrypted Images via Adaptive MSB Prediction.
Proceedings of the 2024 6th International Conference on Image, Video and Signal Processing, 2024

2023
Constructing gene features for robust 3D mesh zero-watermarking.
J. Inf. Secur. Appl., March, 2023

Preserving friendly stacking and weighted shadows in selective scalable secret image sharing.
Multim. Tools Appl., 2023

2022
Blockchain-Based WDP Solution for Real-Time Heterogeneous Computing Resource Allocation.
IEEE Trans. Netw. Serv. Manag., December, 2022

Medical blockchain: Data sharing and privacy preserving of EHR based on smart contract.
J. Inf. Secur. Appl., 2022

CoNN-IDS: Intrusion detection system based on collaborative neural networks and agile training.
Comput. Secur., 2022

Preserving Collusion-Free and Traceability in Car-Sharing System Based on Blockchain.
Proceedings of the New Trends in Computer Technologies and Applications, 2022

2021
Preserving Liberty and Fairness in Combinatorial Double Auction Games Based on Blockchain.
IEEE Syst. J., 2021

Robust 3D mesh zero-watermarking based on spherical coordinate and Skewness measurement.
Multim. Tools Appl., 2021

Secure session between an IoT device and a cloud server based on elliptic curve cryptosystem.
Int. J. Inf. Comput. Secur., 2021

Preserving indomitable DDoS vitality through resurrection social hybrid botnet.
Comput. Secur., 2021

2020
Learning salient seeds refer to the manifold ranking and background-prior strategy.
Multim. Tools Appl., 2020

Biometric-based key management for satisfying patient's control over health information in the HIPAA regulations.
KSII Trans. Internet Inf. Syst., 2020

Towards Accurate and Efficient Classification of Power System Contingencies and Cyber-Attacks Using Recurrent Neural Networks.
IEEE Access, 2020

Achieve Thumbnail Preserving Encryption by Sum Preserving Approaches for Images.
Proceedings of the ICFET 2020, 2020

2019
Visibility dehazing based on channel-weighted analysis and illumination tuning.
Multim. Tools Appl., 2019

AAVSS: Auxiliary Authorization Mechanism Based on Arbitrary-Angle VSS.
Int. J. Netw. Secur., 2019

2018
Refining irregular image illumination with concurrent ownership embedding.
Multim. Tools Appl., 2018

Selective scalable secret image sharing with adaptive pixel-embedding technique.
Multim. Tools Appl., 2018

2017
Image structure rebuilding technique using fractal dimension on the best match patch searching.
Multim. Tools Appl., 2017

Selective scalable secret image sharing with verification.
Multim. Tools Appl., 2017

SMP: Scalable Multicast Protocol for Granting Authority in Heterogeneous Networks.
Int. J. Netw. Secur., 2017

2016
Renovating Contaminative Image Archives Based on Patch Propagation and Adaptive Confidence Collation.
IEEE Trans. Circuits Syst. Video Technol., 2016

Tele-micropayment scam prevention based on visual secret sharing technique.
Multim. Tools Appl., 2016

Provable Secure Brand-new Multi-auction Mechanism with Dynamic Identity.
KSII Trans. Internet Inf. Syst., 2016

2015
Stable watermarking technique based on XNOR operation and scale relationship.
Multim. Tools Appl., 2015

Enhancing the Security of Credit Card Transaction based on Visual DSC.
KSII Trans. Internet Inf. Syst., 2015

Preserving user-friendly shadow and high-contrast quality for multiple visual secret sharing technique.
Digit. Signal Process., 2015

2014
Fast authentication mechanism with provable correctness for cluster-based VANETs.
Secur. Commun. Networks, 2014

Self-Recognized Image Protection Technique that Resists Large-Scale Cropping.
IEEE Multim., 2014

2013
A wide-adapted bantam protocol for roaming across wireless areas.
Wirel. Networks, 2013

HORME: hierarchical-object-relational medical management for electronic record.
Secur. Commun. Networks, 2013

Notes on "Authentication protocol using an identifier in an ad hoc network environment".
Math. Comput. Model., 2013

RII: Renovating the irregular illumination of digital image archives.
J. Vis. Commun. Image Represent., 2013

Contrast-Adaptive Removable Visible Watermarking (CARVW) mechanism.
Image Vis. Comput., 2013

Provably Secure Conference Key Distribution Mechanism Preserving the Forward and Backward Secrecy.
Int. J. Netw. Secur., 2013

Preserving user-participation for insecure network communications with CAPTCHA and visual secret sharing technique.
IET Networks, 2013

Aryabhata remainder theorem-based non-iterative electronic lottery mechanism with robustness.
IET Inf. Secur., 2013

An innovative electronic group-buying system for mobile commerce.
Electron. Commer. Res. Appl., 2013

2012
A robust e-commerce service: Light-weight secure mail-order mechanism.
Electron. Commer. Res. Appl., 2012

2011
Protecting the content integrity of digital imagery with fidelity preservation.
ACM Trans. Multim. Comput. Commun. Appl., 2011

An interactive mobile SMS confirmation method using secret sharing technique.
Comput. Secur., 2011

2010
Lightweight Secure Roaming Mechanism Between GPRS/UMTS and Wireless LANs.
Wirel. Pers. Commun., 2010

Hybrid wet paper coding mechanism for steganography employing n-indicator and fuzzy edge detector.
Digit. Signal Process., 2010

2009
Dual Digital Watermarking for Internet Media Based on Hybrid Strategies.
IEEE Trans. Circuits Syst. Video Technol., 2009

A Novel Illumination-Balance Technique for Improving the Quality of Degraded Text-Photo Images.
IEEE Trans. Circuits Syst. Video Technol., 2009

Distortion-free secret image sharing mechanism using modulus operator.
Pattern Recognit., 2009

Robust t-out-of-n oblivious transfer mechanism based on CRT.
J. Netw. Comput. Appl., 2009

Non-iterative privacy preservation for online lotteries.
IET Inf. Secur., 2009

A Secure Multicast Framework in Large and High-Mobility Network Groups.
IEICE Trans. Commun., 2009

Design of electronic t-out-of-n lotteries on the Internet.
Comput. Stand. Interfaces, 2009

An on-line electronic check system with mutual authentication.
Comput. Electr. Eng., 2009

Hybrid (2, n) Visual Secret Sharing Scheme for Color Images.
Proceedings of the 2009 IEEE International Conference on Computing and Communication Technologies, 2009

A Brand-New Mobile Value-Added Service: M-Check.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009

A Self-Reference Watermarking Scheme Based on Wet Paper Coding.
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009

2008
Preserving data integrity in mobile <i>ad hoc</i> networks with variant Diffie-Hellman protocol.
Secur. Commun. Networks, 2008

Security Enhancement of Ku-Wang Authenticated Key Agreement Protocol.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

Preserving PHI in Compliance with HIPAA Privacy/Security Regulations Using Cryptographic Techniques.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Security design for three-party encrypted key exchange protocol using smart cards.
Proceedings of the 2nd International Conference on Ubiquitous Information Management and Communication, 2008

2007
Secure communications for cluster-based ad hoc networks using node identities.
J. Netw. Comput. Appl., 2007

Anonymous authentication scheme for wireless communications.
Int. J. Mob. Commun., 2007

Security enhancement of an IC-card-based remote login mechanism.
Comput. Networks, 2007

2006
A secure and efficient authentication scheme for mobile users.
Int. J. Mob. Commun., 2006

An anonymous voting mechanism based on the key exchange protocol.
Comput. Secur., 2006

2005
Efficient authentication protocols of GSM.
Comput. Commun., 2005

An Efficient Algorithm for Incremental Mining of Association Rules.
Proceedings of the 15th International Workshop on Research Issues in Data Engineering (RIDE-SDMA 2005), 2005

Time-bounded Based Password Authentication Scheme.
Proceedings of the 4th International Conference on Cyberworlds (CW 2005), 2005

Improvement on an Optimized Protocol for Mobile Network Authentication and Security.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

On the Forward and Backward Secrecy of HLL Group Key Exchange Mechanism.
Proceedings of the Fifth International Conference on Computer and Information Technology (CIT 2005), 2005

2004
An Efficient and Secure Multi-Server Password Authentication Scheme using Smart Cards.
Proceedings of the 3rd International Conference on Cyberworlds (CW 2004), 2004


  Loading...