Security issues in healthcare applications using wireless medical sensor networks: A survey P Kumar, HJ Lee sensors 12 (1), 55-91, 2012 | 380 | 2012 |
E-SAP: efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks P Kumar, SG Lee, HJ Lee Sensors 12 (2), 1625-1647, 2012 | 152 | 2012 |
Distributed SDN controller system: A survey on design choice YE Oktian, SG Lee, HJ Lee, JH Lam computer networks 121, 100-111, 2017 | 105 | 2017 |
High-power broadband organic THz generator JH Jeong, BJ Kang, JS Kim, M Jazbinsek, SH Lee, SC Lee, IH Baek, ... Scientific reports 3 (1), 1-8, 2013 | 98 | 2013 |
Secure storage and access of data in cloud computing A Kumar, BG Lee, HJ Lee, A Kumari 2012 International Conference on ICT Convergence (ICTC), 336-339, 2012 | 92 | 2012 |
Online banking authentication system using mobile-OTP with QR-code YS Lee, NH Kim, H Lim, HK Jo, HJ Lee 5th International Conference on Computer Sciences and Convergence …, 2010 | 86 | 2010 |
Dragon: A fast word based stream cipher K Chen, M Henricksen, W Millan, J Fuller, L Simpson, E Dawson, HJ Lee, ... International Conference on Information Security and Cryptology, 33-50, 2004 | 76 | 2004 |
Security analysis and improvements of authentication and access control in the internet of things B Ndibanje, HJ Lee, SG Lee Sensors 14 (8), 14786-14805, 2014 | 74 | 2014 |
Indoor location tracking using received signal strength indicator CC Pu, CH Pu, HJ Lee Emerging communications for wireless sensor networks, 11, 2011 | 67 | 2011 |
Survey on security in Internet of Things: State of the art and challenges M Sain, YJ Kang, HJ Lee 2017 19th International conference on advanced communication technology …, 2017 | 62 | 2017 |
Cryptanalysis on two user authentication protocols using smart card for wireless sensor networks P Kumar, HJ Lee 2011 Wireless Advanced, 241-245, 2011 | 62 | 2011 |
The LILI-II keystream generator A Clark, E Dawson, J Fuller, J Golić, HJ Lee, W Millan, SJ Moon, ... Australasian Conference on Information Security and Privacy, 25-39, 2002 | 62 | 2002 |
On an improved summation generator with 2-bit memory HJ Lee, SJ Moon Signal Processing 80 (1), 211-217, 2000 | 53 | 2000 |
Two factor authentication for cloud computing S Lee, I Ong, HT Lim, HJ Lee Journal of information and communication convergence engineering 8 (4), 427-432, 2010 | 51 | 2010 |
Secure key management scheme based on ECC algorithm for patient's medical information in healthcare system YS Lee, E Alasaarela, HJ Lee The International Conference on Information Networking 2014 (ICOIN2014), 453-457, 2014 | 50 | 2014 |
RUASN: a robust user authentication framework for wireless sensor networks P Kumar, AJ Choudhury, M Sain, SG Lee, HJ Lee Sensors 11 (5), 5020-5046, 2011 | 44 | 2011 |
Mutual authentication in wireless body sensor networks (WBSN) based on physical unclonable function (PUF) YS Lee, HJ Lee, E Alasaarela 2013 9th International Wireless Communications and Mobile Computing …, 2013 | 41 | 2013 |
Parallel stream cipher for secure high-speed communications H Lee, S Moon Signal Processing 82 (2), 259-265, 2002 | 40 | 2002 |
Secure health monitoring using medical wireless sensor networks P Kumar, YD Lee, HJ Lee The 6th International Conference on Networked Computing and Advanced …, 2010 | 39 | 2010 |
A strong authentication scheme with user privacy for wireless sensor networks P Kumar, A Gurtov, M Ylianttila, SG Lee, HJ Lee ETRI journal 35 (5), 889-899, 2013 | 38 | 2013 |