Yunho Lee

Orcid: 0000-0002-9113-9491

According to our database1, Yunho Lee authored at least 31 papers between 2005 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
System API Vectorization for Malware Detection.
IEEE Access, 2023

2022

2019
Enhancing Trust of Supply Chain Using Blockchain Platform with Robust Data Model and Verification Mechanisms.
Proceedings of the 2019 IEEE International Conference on Systems, Man and Cybernetics, 2019

2018
Mobile forensic reference set (MFReS) and mobile forensic investigation for android devices.
J. Supercomput., 2018

HERMES: GS1-based Smart City Service Intercommunity.
Proceedings of the IEEE International Smart Cities Conference, 2018

2014
A Novel Intrusion Tolerant System Using Live Migration.
IEICE Trans. Inf. Syst., 2014

2013
A study of user data integrity during acquisition of Android devices.
Digit. Investig., 2013

Development of Mobile Games for Rehabilitation Training for the Hearing Impaired.
Proceedings of the Multimedia and Ubiquitous Engineering, 2013

A secure user-friendly authentication scheme with anonymity for wireless communications.
Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, 2013

2012
An Efficient Detection And Management Of False Accusation Attacks In Hierarchical Ad-Hoc Networks.
KSII Trans. Internet Inf. Syst., 2012

Cryptanalysis and Improvement of a Biometrics-Based Multi-server Authentication with Key Agreement Scheme.
Proceedings of the Computational Science and Its Applications - ICCSA 2012, 2012

A Case Study on International Human Rights Restoration and Peace - (With Focus on the Problems Arising from the Japanese Military's Sex Slavery Practice).
Proceedings of the Computer Applications for Graphics, Grid Computing, and Industrial Environment, 2012

2011
Cryptanalysis and improvement of a biometrics-based multi-server authentication with key agreement scheme.
IACR Cryptol. ePrint Arch., 2011

Specification-Based Intrusion Detection System for WiBro.
Proceedings of the Convergence and Hybrid Information Technology, 2011

An improved key establishment scheme for wireless sensor network.
Proceedings of the 6th International Conference on Future Internet Technologies, 2011

2010
Towards trustworthy e-voting using paper receipts.
Comput. Stand. Interfaces, 2010

Enhancement of two-factor authenticated key exchange protocols in public wireless LANs.
Comput. Electr. Eng., 2010

Protection Profile for Secure E-Voting Systems.
Proceedings of the Information Security, 2010

2009
A New Efficient Key Management Protocol for Wireless Sensor and Actor Networks
CoRR, 2009

Off-Line Password-Guessing Attack to Yang's and Huang's Authentication Schemes for Session Initiation Protocol.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009

Security Specification for Conversion Technologies of Heterogeneous DRM Systems.
Proceedings of the Information Security Practice and Experience, 2009

A Practical Approach to a Reliable Electronic Election.
Proceedings of the Computational Science and Its Applications, 2009

2008
How to Trust DRE Voting Machines Preserving Voter Privacy.
Proceedings of the 2008 IEEE International Conference on e-Business Engineering, 2008

2007
Security Analysis on the Authentication Mechanisms of Korean Popular Messengers.
Proceedings of the Universal Access in Human Computer Interaction. Coping with Diversity, 2007

An Efficient and Secure Rights Sharing Method for DRM System Against Replay Attack.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007

2006
Weakness and Improvements of Yong-Lee's Anonymous Fingerprinting Protocol.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006

Towards Trustworthy e-Voting using Paper Receipts.
IACR Cryptol. ePrint Arch., 2006

Real-time analysis of intrusion detection alerts via correlation.
Comput. Secur., 2006

An Efficient Dispute Resolving Method for Digital Images.
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006

Channel Prediction with Cascade AR Modeling.
Proceedings of the Advanced International Conference on Telecommunications and International Conference on Internet and Web Applications and Services (AICT/ICIW 2006), 2006

2005
A Method for Deciding Quantization Steps in QIM Watermarking Schemes.
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005


  Loading...