Follow
HyunHo Kim
HyunHo Kim
Dongseo University
Verified email at gdsu.dongseo.ac.kr
Title
Cited by
Cited by
Year
Cross-method-based analysis and classification of malicious behavior by api calls extraction
B Ndibanje, KH Kim, YJ Kang, HH Kim, TY Kim, HJ Lee
Applied Sciences 9 (2), 239, 2019
502019
EnCase forensic technology for decrypting stenography algorithm applied in the PowerPoint file
HH Kim, N Bruce, SH Park, HJ Lee
2016 18th International Conference on Advanced Communication Technology …, 2016
92016
Side channel attacks on cryptographic module: EM and PA attacks accuracy analysis
HH Kim, N Bruce, HJ Lee, YJ Choi, D Choi
Information Science and Applications, 509-516, 2015
92015
On modeling protocol-based clustering tag in RFID systems with formal security analysis
N Bruce, H Kim, Y Kang, Y Lee, H Lee
2015 IEEE 29th International Conference on Advanced Information Networking …, 2015
52015
Detects abnormal behavior using motor power consumption
KH Kim, SM Ryu, MK Kim, YJ Kang, HH Kim, HJ Lee, JH Lee
Journal of The Korea Society of Computer and Information 23 (10), 65-72, 2018
32018
Correlation Power Analysis Attack on the Ping Pong-128 Key Stream Generator
YJ Kang, HH Kim, N Bruce, YG Park, H Lee
2015 IEEE 29th International Conference on Advanced Information Networking …, 2015
32015
Practical access control protocols (PACPs) for wireless sensor networks: Analysis of security pitfalls
M Sain, HH Kim, HJ Lee
2017 19th International Conference on Advanced Communication Technology …, 2017
12017
Technology Trends Analysis of Airbone Network
KH Kim, HH Kim, SG Lee, HJ Lee, YJ Ryu
International Journal of Future Generation Communication and Networking 9 …, 2016
12016
Smartphone-Based Secure Access Control in Wireless Network Analysis
H Kim, YJ Kang, N Bruce, S Park, H Lee
2015 IEEE 29th International Conference on Advanced Information Networking …, 2015
12015
Modeling and Simulation of Identification Protocol for Wireless Medical Devices in Healthcare System Communication
HH Kim, N Bruce, SH Park, JB Jo, HJ Lee
Information Science and Applications, 533-540, 2015
12015
Protecting cloud-based home e-healthcare with cryptographic scheme
N Bruce, HH Kim, M Sain, HJ Lee
Ubiquitous Information Technologies and Applications: CUTE 2013, 751-761, 2014
12014
Simulation and evaluation of the authentication and session-key establishement protocol in wireless sensor networks
HH Kim, N Bruce, M Sain, SH Park, HJ Lee
2015 IEEE Conference on Wireless Sensors (ICWiSe), 7-11, 2015
2015
An Efficient and Provable Secret Shared Key Computation for Cryptographic Protocol Across Insecure Channel
N Bruce, H Kim, S Park, H Lee
2015 IEEE 29th International Conference on Advanced Information Networking …, 2015
2015
The Study on Fault Injection Attack: The analysis and improvement of the experimental precision indicators
HH Kim, YJ Kang, YS Lee, JH Park, CK Kim, HJ Lee
Journal of the Korea Institute of Information Security & Cryptology 24 (2 …, 2014
2014
Security Concerns on e-Healthcare System with Countermeasures Applied
N Bruce, HH Kim, JH Park, CK Kim, HJ Lee
Proceedings of the Korean Institute of Information and Commucation Sciences …, 2013
2013
The system can't perform the operation now. Try again later.
Articles 1–15