The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Hoon Jae Lee: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Andrew Clark, Ed Dawson, Joanne Fuller, Jovan Dj. Golic, Hoon Jae Lee, William Millan, Sang-Jae Moon, Leone Simpson
    The LILI-II Keystream Generator. [Citation Graph (0, 0)][DBLP]
    ACISP, 2002, pp:25-39 [Conf]
  2. Dong Jin Kwak, JaeCheol Ha, Hoon Jae Lee, Hwankoo Kim, Sang-Jae Moon
    A WTLS Handshake Protocol with User Anonymity and Forward Secrecy. [Citation Graph (0, 0)][DBLP]
    CDMA International Conference, 2002, pp:219-230 [Conf]
  3. MahnKi Ahn, JaeCheol Ha, Hoon Jae Lee, Sang-Jae Moon
    A Random M-ary Method Based Countermeasure against Side Channel Attacks. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2003, pp:338-347 [Conf]
  4. ManKi Ahn, Hoon Jae Lee
    Experiments and Hardware Countermeasures on Power Analysis Attacks. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:48-53 [Conf]
  5. HoonJae Lee
    Highly Reliable Synchronous Stream Cipher System for Link Encryption. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:269-278 [Conf]
  6. Hoon Jae Lee, ManKi Ahn, Seongan Lim, Sang-Jae Moon
    A Study on Smart Card Security Evaluation Criteria for Side Channel Attacks. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:517-526 [Conf]
  7. Kevin Chen, Matthew Henricksen, William Millan, Joanne Fuller, Leonie Ruth Simpson, Ed Dawson, Hoon Jae Lee, Sang-Jae Moon
    Dragon: A Fast Word Based Stream Cipher. [Citation Graph (0, 0)][DBLP]
    ICISC, 2004, pp:33-50 [Conf]
  8. Hoon Jae Lee, Sang-Jae Moon
    On an improved summation generator with 2-bit memory. [Citation Graph (0, 0)][DBLP]
    Signal Processing, 2000, v:80, n:1, pp:211-217 [Journal]
  9. JeaHoon Park, Hoon Jae Lee, JaeCheol Ha, Yongje Choi, Howon Kim, Sang-Jae Moon
    A Differential Power Analysis Attack of Block Cipher Based on the Hamming Weight of Internal Operation Unit. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:417-426 [Conf]
  10. Heung-Kuk Jo, Hoon-Jae Lee
    A Relay-Transmission of the RFID Tag ID over the Wireless and TCP/IP with a Security Agent. [Citation Graph (0, 0)][DBLP]
    KES-AMSTA, 2007, pp:918-927 [Conf]

  11. A Security Enhancement of the E0 Cipher in Bluetooth System. [Citation Graph (, )][DBLP]


  12. A secure ubiquitous sensor network with Dragon. [Citation Graph (, )][DBLP]


  13. Global Patient Monitoring System Using IP-Enabled Ubiquitous Sensor Network. [Citation Graph (, )][DBLP]


  14. Middleware in ubiquitous computing system with MedRec architecture. [Citation Graph (, )][DBLP]


  15. PingPong-MAC: secure ubiquitous sensor network with authenticated encryption. [Citation Graph (, )][DBLP]


  16. Database design for global patient monitoring applications using WAP. [Citation Graph (, )][DBLP]


  17. An energy consumption technique for global healthcare monitoring applications. [Citation Graph (, )][DBLP]


  18. Personal Healthcare Information System. [Citation Graph (, )][DBLP]


  19. A Ping Pong Based One-Time-Passwords Authentication System. [Citation Graph (, )][DBLP]


  20. A Secure Data Mechanism for Ubiquitous Sensor Network with Dragon Cipher. [Citation Graph (, )][DBLP]


  21. An Improved Variant of Wang-Cao's Certificate-Based Authenticated Key Agreement Protocol. [Citation Graph (, )][DBLP]


  22. An efficient key pre-distribution scheme for wireless sensor network using public key cryptography. [Citation Graph (, )][DBLP]


  23. Secure health monitoring using medical wireless sensor networks. [Citation Graph (, )][DBLP]


  24. Addressing secure data routing scheme for heterogeneous sensor networks. [Citation Graph (, )][DBLP]


  25. An Intelligent Security Agent for a Reliable Cipher System Using Pingpong. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002