Lee HoonJae
Lee HoonJae
Prof. of Dept. Information Security, Dongseo Univ.
Verified email at
Cited by
Cited by
Security issues in healthcare applications using wireless medical sensor networks: A survey
P Kumar, HJ Lee
sensors 12 (1), 55-91, 2011
E-SAP: Efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks
P Kumar, SG Lee, HJ Lee
Sensors 12 (2), 1625-1647, 2012
Distributed SDN controller system: A survey on design choice
YE Oktian, SG Lee, HJ Lee, JH Lam
computer networks 121, 100-111, 2017
Secure storage and access of data in cloud computing
A Kumar, BG Lee, HJ Lee, A Kumari
2012 International Conference on ICT Convergence (ICTC), 336-339, 2012
Survey on security in Internet of Things: State of the art and challenges
M Sain, YJ Kang, HJ Lee
2017 19th International conference on advanced communication technology …, 2017
Security analysis and improvements of authentication and access control in the internet of things
B Ndibanje, HJ Lee, SG Lee
Sensors 14 (8), 14786-14805, 2014
Online banking authentication system using mobile-OTP with QR-code
YS Lee, NH Kim, H Lim, HK Jo, HJ Lee
5th International Conference on Computer Sciences and Convergence …, 2010
Indoor location tracking using received signal strength indicator
CC Pu, CH Pu, HJ Lee
Emerging communications for wireless sensor networks, 229-255, 2011
Dragon: A fast word based stream cipher
K Chen, M Henricksen, W Millan, J Fuller, L Simpson, E Dawson, HJ Lee, ...
Information Security and Cryptology–ICISC 2004: 7th International Conference …, 2005
Cryptanalysis on two user authentication protocols using smart card for wireless sensor networks
P Kumar, HJ Lee
2011 Wireless Advanced, 241-245, 2011
Secure key management scheme based on ECC algorithm for patient's medical information in healthcare system
YS Lee, E Alasaarela, HJ Lee
The International Conference on Information Networking 2014 (ICOIN2014), 453-457, 2014
Moving ad hoc networks—A comparative study
MA Al-Absi, AA Al-Absi, M Sain, H Lee
Sustainability 13 (11), 6187, 2021
The LILI-II keystream generator
A Clark, E Dawson, J Fuller, J Golić, HJ Lee, W Millan, SJ Moon, ...
Information Security and Privacy: 7th Australasian Conference, ACISP 2002 …, 2002
Two factor authentication for cloud computing
S Lee, I Ong, HT Lim, HJ Lee
Journal of information and communication convergence engineering 8 (4), 427-432, 2010
Mutual authentication in wireless body sensor networks (WBSN) based on physical unclonable function (PUF)
YS Lee, HJ Lee, E Alasaarela
2013 9th International wireless communications and mobile computing …, 2013
On an improved summation generator with 2-bit memory
HJ Lee, SJ Moon
Signal Processing 80 (1), 211-217, 2000
Cross-method-based analysis and classification of malicious behavior by api calls extraction
B Ndibanje, KH Kim, YJ Kang, HH Kim, TY Kim, HJ Lee
Applied Sciences 9 (2), 239, 2019
RUASN: a robust user authentication framework for wireless sensor networks
P Kumar, AJ Choudhury, M Sain, SG Lee, HJ Lee
Sensors 11, 5020-5046, 2011
Securing distributed SDN with IBC
JH Lam, SG Lee, HJ Lee, YE Oktian
2015 Seventh International Conference on Ubiquitous and Future Networks, 921-925, 2015
Mitigating denial of service (dos) attacks in openflow networks
YE Oktian, SG Lee, HJ Lee
2014 International Conference on Information and Communication Technology …, 2014
The system can't perform the operation now. Try again later.
Articles 1–20