Cross-method-based analysis and classification of malicious behavior by api calls extraction B Ndibanje, KH Kim, YJ Kang, HH Kim, TY Kim, HJ Lee Applied Sciences 9 (2), 239, 2019 | 50 | 2019 |
EnCase forensic technology for decrypting stenography algorithm applied in the PowerPoint file HH Kim, N Bruce, SH Park, HJ Lee 2016 18th International Conference on Advanced Communication Technology …, 2016 | 9 | 2016 |
Side channel attacks on cryptographic module: EM and PA attacks accuracy analysis HH Kim, N Bruce, HJ Lee, YJ Choi, D Choi Information Science and Applications, 509-516, 2015 | 9 | 2015 |
On modeling protocol-based clustering tag in RFID systems with formal security analysis N Bruce, H Kim, Y Kang, Y Lee, H Lee 2015 IEEE 29th International Conference on Advanced Information Networking …, 2015 | 5 | 2015 |
Detects abnormal behavior using motor power consumption KH Kim, SM Ryu, MK Kim, YJ Kang, HH Kim, HJ Lee, JH Lee Journal of The Korea Society of Computer and Information 23 (10), 65-72, 2018 | 3 | 2018 |
Correlation Power Analysis Attack on the Ping Pong-128 Key Stream Generator YJ Kang, HH Kim, N Bruce, YG Park, H Lee 2015 IEEE 29th International Conference on Advanced Information Networking …, 2015 | 3 | 2015 |
Practical access control protocols (PACPs) for wireless sensor networks: Analysis of security pitfalls M Sain, HH Kim, HJ Lee 2017 19th International Conference on Advanced Communication Technology …, 2017 | 1 | 2017 |
Technology Trends Analysis of Airbone Network KH Kim, HH Kim, SG Lee, HJ Lee, YJ Ryu International Journal of Future Generation Communication and Networking 9 …, 2016 | 1 | 2016 |
Smartphone-Based Secure Access Control in Wireless Network Analysis H Kim, YJ Kang, N Bruce, S Park, H Lee 2015 IEEE 29th International Conference on Advanced Information Networking …, 2015 | 1 | 2015 |
Modeling and Simulation of Identification Protocol for Wireless Medical Devices in Healthcare System Communication HH Kim, N Bruce, SH Park, JB Jo, HJ Lee Information Science and Applications, 533-540, 2015 | 1 | 2015 |
Protecting cloud-based home e-healthcare with cryptographic scheme N Bruce, HH Kim, M Sain, HJ Lee Ubiquitous Information Technologies and Applications: CUTE 2013, 751-761, 2014 | 1 | 2014 |
Simulation and evaluation of the authentication and session-key establishement protocol in wireless sensor networks HH Kim, N Bruce, M Sain, SH Park, HJ Lee 2015 IEEE Conference on Wireless Sensors (ICWiSe), 7-11, 2015 | | 2015 |
An Efficient and Provable Secret Shared Key Computation for Cryptographic Protocol Across Insecure Channel N Bruce, H Kim, S Park, H Lee 2015 IEEE 29th International Conference on Advanced Information Networking …, 2015 | | 2015 |
The Study on Fault Injection Attack: The analysis and improvement of the experimental precision indicators HH Kim, YJ Kang, YS Lee, JH Park, CK Kim, HJ Lee Journal of the Korea Institute of Information Security & Cryptology 24 (2 …, 2014 | | 2014 |
Security Concerns on e-Healthcare System with Countermeasures Applied N Bruce, HH Kim, JH Park, CK Kim, HJ Lee Proceedings of the Korean Institute of Information and Commucation Sciences …, 2013 | | 2013 |