Security issues in healthcare applications using wireless medical sensor networks: A survey P Kumar, HJ Lee sensors 12 (1), 55-91, 2011 | 473 | 2011 |
E-SAP: Efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks P Kumar, SG Lee, HJ Lee Sensors 12 (2), 1625-1647, 2012 | 211 | 2012 |
Distributed SDN controller system: A survey on design choice YE Oktian, SG Lee, HJ Lee, JH Lam computer networks 121, 100-111, 2017 | 190 | 2017 |
Secure storage and access of data in cloud computing A Kumar, BG Lee, HJ Lee, A Kumari 2012 International Conference on ICT Convergence (ICTC), 336-339, 2012 | 120 | 2012 |
Online banking authentication system using mobile-OTP with QR-code YS Lee, NH Kim, H Lim, HK Jo, HJ Lee 5th International Conference on Computer Sciences and Convergence …, 2010 | 106 | 2010 |
Security analysis and improvements of authentication and access control in the internet of things B Ndibanje, HJ Lee, SG Lee Sensors 14 (8), 14786-14805, 2014 | 104 | 2014 |
Survey on security in Internet of Things: State of the art and challenges M Sain, YJ Kang, HJ Lee 2017 19th International conference on advanced communication technology …, 2017 | 98 | 2017 |
Indoor location tracking using received signal strength indicator CC Pu, CH Pu, HJ Lee Emerging communications for wireless sensor networks, 11, 2011 | 85 | 2011 |
Dragon: A fast word based stream cipher K Chen, M Henricksen, W Millan, J Fuller, L Simpson, E Dawson, HJ Lee, ... Information Security and Cryptology–ICISC 2004: 7th International Conference …, 2005 | 81 | 2005 |
Cryptanalysis on two user authentication protocols using smart card for wireless sensor networks P Kumar, HJ Lee 2011 Wireless Advanced, 241-245, 2011 | 72 | 2011 |
Two factor authentication for cloud computing S Lee, I Ong, HT Lim, HJ Lee Journal of information and communication convergence engineering 8 (4), 427-432, 2010 | 64 | 2010 |
Secure key management scheme based on ECC algorithm for patient's medical information in healthcare system YS Lee, E Alasaarela, HJ Lee The International Conference on Information Networking 2014 (ICOIN2014), 453-457, 2014 | 63 | 2014 |
The LILI-II keystream generator A Clark, E Dawson, J Fuller, J Golić, HJ Lee, W Millan, SJ Moon, ... Information Security and Privacy: 7th Australasian Conference, ACISP 2002 …, 2002 | 60 | 2002 |
On an improved summation generator with 2-bit memory HJ Lee, SJ Moon Signal Processing 80 (1), 211-217, 2000 | 57 | 2000 |
Mutual authentication in wireless body sensor networks (WBSN) based on physical unclonable function (PUF) YS Lee, HJ Lee, E Alasaarela 2013 9th International wireless communications and mobile computing …, 2013 | 48 | 2013 |
RUASN: a robust user authentication framework for wireless sensor networks P Kumar, AJ Choudhury, M Sain, SG Lee, HJ Lee Sensors 11, 5020-5046, 2011 | 48 | 2011 |
Mitigating denial of service (dos) attacks in openflow networks YE Oktian, SG Lee, HJ Lee 2014 International Conference on Information and Communication Technology …, 2014 | 44 | 2014 |
Symmetric encryption in RFID authentication protocol for strong location privacy and forward-security HW Kim, SY Lim, HJ Lee 2006 International Conference on Hybrid Information Technology 2, 718-723, 2006 | 43 | 2006 |
Parallel stream cipher for secure high-speed communications H Lee, S Moon Signal Processing 82 (2), 259-265, 2002 | 43 | 2002 |
A strong authentication scheme with user privacy for wireless sensor networks P Kumar, A Gurtov, M Ylianttila, SG Lee, HJ Lee ETRI journal 35 (5), 889-899, 2013 | 42 | 2013 |