Follow
Hyotaek Lim
Hyotaek Lim
Professor, Division of Computer Engineering, Dongseo University
Verified email at dongseo.ac.kr - Homepage
Title
Cited by
Cited by
Year
Hand tracking and gesture recognition system for human-computer interaction using low-cost hardware
HS Yeo, BG Lee, H Lim
Multimedia Tools and Applications 74, 2687-2715, 2015
2082015
A strong user authentication framework for cloud computing
AJ Choudhury, P Kumar, M Sain, H Lim, H Jae-Lee
2011 IEEE Asia-Pacific Services Computing Conference, 110-115, 2011
2072011
Online banking authentication system using mobile-OTP with QR-code
YS Lee, NH Kim, H Lim, HK Jo, HJ Lee
5th International Conference on Computer Sciences and Convergence …, 2010
1052010
Two factor authentication for cloud computing
S Lee, I Ong, HT Lim, HJ Lee
Journal of information and communication convergence engineering 8 (4), 427-432, 2010
642010
Adaptive selection of dynamic VM consolidation algorithm using neural network for cloud resource management
JN Witanto, H Lim, M Atiquzzaman
Future generation computer systems 87, 35-42, 2018
562018
A new content-defined chunking algorithm for data deduplication in cloud storage
RNS Widodo, H Lim, M Atiquzzaman
Future Generation Computer Systems 71, 145-156, 2017
472017
Homomorphic encryption in mobile multi cloud computing
M Louk, H Lim
2015 international conference on information networking (ICOIN), 493-497, 2015
362015
Smart government framework with geo-crowdsourcing and social media analysis
JN Witanto, H Lim, M Atiquzzaman
Future Generation Computer Systems 89, 1-9, 2018
322018
Leveraging client-side storage techniques for enhanced use of multiple consumer cloud storage services on resource-constrained mobile devices
HS Yeo, XS Phang, HJ Lee, H Lim
Journal of Network and Computer Applications 43, 142-156, 2014
292014
e2Home: A lightweight smart home management system
CM Yeoh, HY Tan, CK Kok, HJ Lee, H Lim
2008 Third International Conference on Convergence and Hybrid Information …, 2008
252008
One-time knocking framework using SPA and IPsec
JH Liew, S Lee, I Ong, HJ Lee, H Lim
2010 2nd International Conference on Education Technology and Computer 5, V5 …, 2010
242010
An efficient online signature verification scheme using dynamic programming of string matching
AG Reza, H Lim, MJ Alam
Convergence and Hybrid Information Technology: 5th International Conference …, 2011
232011
A Ping Pong based one-time-passwords authentication system
B Davaanaym, YS Lee, HJ Lee, SG Lee, HT Lim
2009 Fifth International Joint Conference on INC, IMS and IDC, 574-579, 2009
212009
SDM: Smart deduplication for mobile cloud storage
RNS Widodo, H Lim, M Atiquzzaman
Future Generation Computer Systems 70, 64-73, 2017
202017
An analysis of security system for intrusion in smartphone environment
M Louk, H Lim, HJ Lee
The Scientific World Journal 2014, 2014
182014
A comparative study of tree-based and mesh-based overlay p2p media streaming
CY Goh, HS Yeo, H Lim, PK Hoong, JWY Lim, IKT Tan
International Journal of Multimedia and Ubiquitous Engineering 8 (4), 97-105, 2013
182013
A secure and efficient three-pass authenticated key agreement protocol based on elliptic curves
MH Lim, CM Yeoh, S Lee, H Lim, H Lee
NETWORKING 2008 Ad Hoc and Sensor Networks, Wireless Networks, Next …, 2008
162008
Dragon-MAC: Securing wireless sensor networks with authenticated encryption
SY Lim, CC Pu, HT Lim, HJ Lee
Cryptology ePrint Archive, 2007
162007
Cell loss recovery method in B-ISDN/ATM networks
H TaekLim, J SeokSong
Electronics Letters 31 (11), 849-851, 1995
161995
Security system for healthcare data in cloud computing
M Louk, H Lim, HJ Lee
International Journal of Security and Its Applications 8 (3), 241-248, 2014
152014
The system can't perform the operation now. Try again later.
Articles 1–20