Sang Ho Lee

Orcid: 0000-0002-8445-6691

Affiliations:
  • Chungbuk National University, Department of Computer Science, Chungbuk, Korea


According to our database1, Sang Ho Lee authored at least 33 papers between 2004 and 2020.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2020
Blockchain-based reputation management for custom manufacturing service in the peer-to-peer networking environment.
Peer-to-Peer Netw. Appl., 2020

2019
Batch-Free Event Sequence Pattern Mining for Communication Stream Data with Instant and Persistent Events.
Wirel. Pers. Commun., 2019

Bucket-size balancing locality sensitive hashing using the map reduce paradigm.
Clust. Comput., 2019

Word recommendation for English composition using big corpus data processing.
Clust. Comput., 2019

2018
Remote data integrity check for remotely acquired and stored stream data.
J. Supercomput., 2018

2017
Density and Frequency-Aware Cluster Identification for Spatio-Temporal Sequence Data.
Wirel. Pers. Commun., 2017

An evaluation method for secure virtual network embedding algorithms.
J. Comput. Virol. Hacking Tech., 2017

2016
Efficient reconfigurable bandwidth allocation mechanism for virtual network.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2016

2014
Access Control Protocol Based on Privacy Property of Patient in m-Healthcare Emergency.
Wirel. Pers. Commun., 2014

2013
A Device Authentication Mechanism Reducing Performance Cost in Mobile P2P Networks.
KSII Trans. Internet Inf. Syst., 2013

2012
Node Classification Based on Functionality in Energy-Efficient and Reliable Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2012

2011
A Distributed Energy Efficient and Reliable Routing Protocol for Wireless Sensor Networks.
Proceedings of the 14th IEEE International Conference on Computational Science and Engineering, 2011

2010
A Key Establishment Protocol for RFID User in IPTV Environment.
IEICE Trans. Commun., 2010

IPTV Micropayment System Based on Hash Chain Using RFID-USB Module.
Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010

A Lifetime Extended Routing Protocol Based on Data Threshold in Wireless Sensor Networks.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
Design of sensor web condition using SMSC.
Proceedings of the 2009 International Conference on Hybrid Information Technology, 2009

2008
A Key Distribution method for Reducing Storage and Supporting High Level Security in the Large-scale WSN.
J. Digit. Content Technol. its Appl., 2008

A Design and Implementation of USN-Based Mobile Web Services Framework.
Proceedings of the Second International Conference on Future Generation Communication and Networking, 2008

An Integration Framework Based on Metadata and Identifier Management for Heterogeneous CMSs.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

2007
Hybrid Key Establishment Protocol Based on ECC for Wireless Sensor Network.
Proceedings of the Ubiquitous Intelligence and Computing, 4th International Conference, 2007

Security Evaluation for Information Assurance.
Proceedings of the Selected Papers of the Fifth International Conference on, 2007

Advanced Efficiency and Stability Combined Weight Based Distributed Clustering Algorithm in MANET.
Proceedings of the Future Generation Communication and Networking, 2007

CMS System of DRM Technology Base that Use Web Contents Certification Code.
Proceedings of the Computational Intelligence and Security, International Conference, 2007

2006
Secure Key Management Protocol in the Wireless Sensor Network.
J. Inf. Process. Syst., 2006

Efficient Unilateral Authentication Mechanism for MIPv6.
Proceedings of the Computational Science, 2006

Person-Wise Privacy Level Access Control for Personal Information Directory Services.
Proceedings of the Embedded and Ubiquitous Computing, International Conference, 2006

Low-Cost Authentication Protocol of the RFID System Using Partial ID.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

Security and Privacy on Authentication Protocol for Low-Cost RFID.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

An Efficient Device Authentication Protocol Using Bioinformatic.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

An Efficient Key Management Scheme for Secure Sensor Networks.
Proceedings of the Sixth International Conference on Computer and Information Technology (CIT 2006), 2006

2005
The Wearable Computer as a Personal Station.
Proceedings of the Embedded and Ubiquitous Computing, 2005

2004
Privacy-Preserving ID-Based Service Provision in Ubiquitous Computing Environments.
Proceedings of the On the Move to Meaningful Internet Systems 2004: OTM 2004 Workshops: OTM Confederated International Workshops and Posters, 2004

A Multiagent Architecture for Privacy-Preserving ID-Based Service in Ubiquitous Computing Environment.
Proceedings of the AI 2004: Advances in Artificial Intelligence, 2004


  Loading...