Sanggon Lee

Orcid: 0000-0002-6678-0500

According to our database1, Sanggon Lee authored at least 56 papers between 2005 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Distributed Data Integrity Verification Scheme in Multi-Cloud Environment.
Sensors, February, 2023

Correction: Witanto et al. Distributed Data Integrity Verification Scheme in Multi-Cloud Environment. Sensors 2023, 23, 1623.
Sensors, 2023

Blockchain-Based Federated Learning System: A Survey on Design Choices.
Sensors, 2023

2022
Toward Data Integrity Architecture for Cloud-Based AI Systems.
Symmetry, 2022

Building Trusted Federated Learning on Blockchain.
Symmetry, 2022

2021
Secure and Efficient High Throughput Medium Access Control for Vehicular Ad-Hoc Network.
Sensors, 2021

Malicious URL Detection Based on Associative Classification.
Entropy, 2021

BorderChain: Blockchain-Based Access Control Framework for the Internet of Things Endpoint.
IEEE Access, 2021

2019
Blockchain-based OCF Firmware Update.
Proceedings of the 2019 International Conference on Information and Communication Technology Convergence, 2019

ISP Network Bandwidth Management: Using Blockchain and SDN.
Proceedings of the 2019 International Conference on Information and Communication Technology Convergence, 2019

BlockSubPay - A Blockchain Framework for Subscription-Based Payment in Cloud Service.
Proceedings of the 21st International Conference on Advanced Communication Technology, 2019

2018
OAuthkeeper: An Authorization Framework for Software Defined Network.
J. Netw. Syst. Manag., 2018

Design, implementation, and performance evaluation of identity-based cryptography in ONOS.
Int. J. Netw. Manag., 2018

2017
Distributed SDN controller system: A survey on design choice.
Comput. Networks, 2017

Non-connection Wireless IoT Network Control Using WiFi and Bluetooth Beacon.
Proceedings of the Eighth International Symposium on Information and Communication Technology, 2017

2016
Securing SDN Southbound and Data Plane Communication with IBC.
Mob. Inf. Syst., 2016

2015
A Secure Routing Protocol for Wireless Sensor Networks Considering Secure Data Aggregation.
Sensors, 2015

Secure your Northbound SDN API.
Proceedings of the Seventh International Conference on Ubiquitous and Future Networks, 2015

Securing distributed SDN with IBC.
Proceedings of the Seventh International Conference on Ubiquitous and Future Networks, 2015

A Privacy Preserving Security Protocol-Based Application for Wireless Communication System.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

2014
Delegation-based robust authentication model for wireless roaming using portable communication devices.
IEEE Trans. Consumer Electron., 2014

Security Analysis and Improvements of Authentication and Access Control in the Internet of Things.
Sensors, 2014

An Efficient and Adaptive Mutual Authentication Framework for Heterogeneous Wireless Sensor Network-Based Applications.
Sensors, 2014

Security Framework for Hybrid Wireless Mesh Protocol in Wireless Mesh Networks.
KSII Trans. Internet Inf. Syst., 2014

Mitigating Denial of Service (DoS) attacks in OpenFlow networks.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2014

2013
A Security Analysis of the 802.11s Wireless Mesh Network Routing Protocol and Its Secure Routing Protocols.
Sensors, 2013

2012
Performance Evaluation of Multi-Channel Wireless Mesh Networks with Embedded Systems.
Sensors, 2012

E-SAP: Efficient-Strong Authentication Protocol for Healthcare Applications Using Wireless Medical Sensor Networks.
Sensors, 2012

Multi-channel Wireless Mesh Networks Test-Bed with Embedded Systems.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

2011
RUASN: A Robust User Authentication Framework for Wireless Sensor Networks.
Sensors, 2011

Performance of Mobility Models for Routing Protocol in Wireless Ad-hoc Networks.
J. Inform. and Commun. Convergence Engineering, 2011

Cryptanalysis of Multiple-Server Password-Authenticated Key Agreement Schemes Using Smart Cards.
J. Inform. and Commun. Convergence Engineering, 2011

An Analysis of Group Key Agreement Schemes based on the Bellare-Rogaway Model in Multi-party Setting.
KSII Trans. Internet Inf. Syst., 2011

Throughput Analysis of Wireless Mesh Network Test-Bed.
Proceedings of the Convergence and Hybrid Information Technology, 2011

A User Authentication for Healthcare Application Using Wireless Medical Sensor Networks.
Proceedings of the 13th IEEE International Conference on High Performance Computing & Communication, 2011

2010
Practical Attacks on Hybrid Group Key Management for SOHAN.
J. Inform. and Commun. Convergence Engineering, 2010

Addressing secure data routing scheme for heterogeneous sensor networks.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2010

2009
Cryptanalysis of Hu-Niu-Yang's Multi-server Password Authenticated Key Agreement Schemes Using Smart Card.
J. Inform. and Commun. Convergence Engineering, 2009

An Implementation of Project-Based Learning for Routing Design Course.
J. Inform. and Commun. Convergence Engineering, 2009

Cryptanalysis of Multiple-Server Password-Authenticated Key.
IACR Cryptol. ePrint Arch., 2009

A Ping Pong Based One-Time-Passwords Authentication System.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009

Decentralized Hybrid Wireless Mesh Protocol.
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, 2009

2008
A Secure and Efficient Three-Pass Authenticated Key Agreement Protocol Based on Elliptic Curves.
Proceedings of the NETWORKING 2008, Ad Hoc and Sensor Networks, Wireless Networks, 2008

An Improved Variant of Wang-Cao's Certificate-Based Authenticated Key Agreement Protocol.
Proceedings of the NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008, 2008

Secure Hybrid Group Key Management for Hierarchical Self-Organizing Sensor Network.
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008

2007
Secure Route Discovery Protocol for Ad Hoc Networks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007

Secure Deniable Authenticated Key Establishment for Internet Protocols.
IACR Cryptol. ePrint Arch., 2007

An Enhanced One-round Pairing-based Tripartite Authenticated Key Agreement Protocol.
IACR Cryptol. ePrint Arch., 2007

An Enhanced ID-based Deniable Authentication Protocol on Pairings.
IACR Cryptol. ePrint Arch., 2007

Cryptanalytic Flaws in Oh et al.'s ID-Based Authenticated Key Agreement Protocol.
IACR Cryptol. ePrint Arch., 2007

Cryptanalysis on Improved One-round Lin-Li's Tripartite Key Agreement Protocol.
IACR Cryptol. ePrint Arch., 2007

Cryptanalysis on Improved Chou et al.'s ID-Based Deniable Authentication Protocol.
IACR Cryptol. ePrint Arch., 2007

An Improved One-Round ID-Based Tripartite Authenticated Key Agreement Protocol.
IACR Cryptol. ePrint Arch., 2007

Cryptanalysis of Tso et al.'s ID-Based Tripartite Authenticated Key Agreement Protocol.
Proceedings of the Information Systems Security, Third International Conference, 2007

A Secure DRM Framework for User's Domain and Key Management.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007

2005
Provably Secure Tripartite Password Protected Key Exchange Protocol Based on Elliptic Curves.
Proceedings of the Selected Areas in Cryptography, 12th International Workshop, 2005


  Loading...