The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Sang-Ho Lee: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Taenam Cho, Sang-Ho Lee
    A Key Recovery Mechanism for Reliable Group Key Management. [Citation Graph (0, 0)][DBLP]
    ACNS, 2003, pp:372-386 [Conf]
  2. Sang-Ho Lee, Ho-Jin Shin, Dong Ryeol Shin
    Pipelined Scheduling Algorithm for an Input Buffered Switch. [Citation Graph (0, 0)][DBLP]
    Communications in Computing, 2003, pp:93-96 [Conf]
  3. Sang-goo Lee, Dong-Hoon Choi, Sang-Ho Lee
    A Logic Database System with Extended Functionality. [Citation Graph (0, 0)][DBLP]
    COMPSAC, 1996, pp:414-419 [Conf]
  4. Hye-Sung Yoon, Sang-Ho Lee, Sung-Bum Cho, Ju Han Kim
    A Novel Framework for Discovering Robust Cluster Results. [Citation Graph (0, 0)][DBLP]
    Discovery Science, 2006, pp:373-377 [Conf]
  5. Seunglim Yong, Sang-Ho Lee
    An Efficient Fingerprinting Scheme with Secret Sharing. [Citation Graph (0, 0)][DBLP]
    DRMTICS, 2005, pp:192-202 [Conf]
  6. So-Young Park, Sang-Ho Lee
    ID-Based Access Control and Authority Delegations. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:884-893 [Conf]
  7. Seung-Hyun Seo, Sang-Ho Lee
    A Secure Mobile Agent System Using Multi-signature Scheme in Electronic Commerce. [Citation Graph (0, 0)][DBLP]
    Human.Society@Internet 2003, 2003, pp:527-536 [Conf]
  8. So-Young Park, Sang-Ho Lee
    Multi-proxy Signatures Based on Diffie-Hellman Problems Allowing Repeated Delegations. [Citation Graph (0, 0)][DBLP]
    Human.Society@Internet, 2005, pp:340-344 [Conf]
  9. Sang-Choon Kim, Yong-Ju Yi, Sang-Ho Lee
    A Contract Signing Protocol in the Internet. [Citation Graph (0, 0)][DBLP]
    International Conference on Internet Computing, 2000, pp:473-0 [Conf]
  10. Yong Ju Yis, Sang-Choon Kim, Sang-Ho Lee
    How To Exchange Secrets By OT. [Citation Graph (0, 0)][DBLP]
    International Conference on Internet Computing, 2000, pp:239-244 [Conf]
  11. Sang-Ho Lee, Ho-Yon Kim, Kil-Taek Lim, Yun-Seok Nam
    Design of a New Feature Based on Direction Angel Histogram and its Application to Recognition of Handwritten Numerals. [Citation Graph (0, 0)][DBLP]
    IC-AI, 2002, pp:733-737 [Conf]
  12. Yang-Seo Choi, Dong-il Seo, Sung Won Sohn, Sang-Ho Lee
    Network-Based Real-Time Connection Traceback System (NRCTS) with Packet Marking Technology. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2003, pp:31-40 [Conf]
  13. Seung-Hyun Seo, Sang-Ho Lee
    A Secure and Flexible Multi-signcryption Scheme. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:689-697 [Conf]
  14. Sang-Ho Lee, Dong-Soo Jung, Sung-Woo Park
    Bandwidth Management for QoS Support in Mobile Networks. [Citation Graph (0, 0)][DBLP]
    ICN (1), 2001, pp:1-11 [Conf]
  15. Hye-Sung Yoon, Sang-Ho Lee, Ju Han Kim
    Application of Emerging Patterns for Multi-source Bio-Data Classification and Analysis. [Citation Graph (0, 0)][DBLP]
    ICNC (1), 2005, pp:965-974 [Conf]
  16. Ho-Jin Park, Hwa-sung Kim, Sang-Ho Lee, Young-Jin Kim
    Handover Mechanism for Differentiated QoS in High-Speed Portable Internet. [Citation Graph (0, 0)][DBLP]
    ICOIN, 2005, pp:904-911 [Conf]
  17. Seung-Hyun Seo, Taenam Cho, Sang-Ho Lee
    A Secure Mobile Agent Protocol for AMR Systems in Home Network Environments. [Citation Graph (0, 0)][DBLP]
    ICOIN, 2005, pp:814-823 [Conf]
  18. Hong-ju Yeom, Hwa-sung Kim, Sang-Ho Lee
    A Reliable Multicast Routing Scheme in Mobile IP Networks. [Citation Graph (0, 0)][DBLP]
    ICOIN, 2006, pp:92-101 [Conf]
  19. Sang-Ho Lee, Ho-Jin Shin, Dong Ryeol Shin
    Pipelined Scheduling Algorithm for an Input Buffered Switch. [Citation Graph (0, 0)][DBLP]
    International Conference on Wireless Networks, 2003, pp:269-274 [Conf]
  20. Sang-Ho Lee, S. H. Kim, Sung-Woo Park
    Call connection control in CDMA-based mobile networks with Multiple frequency assignments. [Citation Graph (0, 0)][DBLP]
    PICS, 1998, pp:295-306 [Conf]
  21. Sang-Ho Lee, Dong Ryeol Shin
    A Simple Pipelined Scheduling for Input-Queued Switches. [Citation Graph (0, 0)][DBLP]
    ISCIS, 2003, pp:844-851 [Conf]
  22. Hye-Sung Yoon, Sang-Ho Lee, Sung-Bum Cho, Ju Han Kim
    Integration Analysis of Diverse Genomic Data Using Multi-clustering Results. [Citation Graph (0, 0)][DBLP]
    ISBMDA, 2006, pp:37-48 [Conf]
  23. Saeran Kwon, Sang-Ho Lee
    An Efficient ID-Based Verifiably Encrypted Signature Scheme Based on Hess's Scheme. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2007, pp:93-104 [Conf]
  24. Seunglim Yong, Sang-Ho Lee
    An Efficient Fingerprinting Scheme with Symmetric and Commutative Encryption. [Citation Graph (0, 0)][DBLP]
    IWDW, 2005, pp:54-66 [Conf]
  25. Sang-Ho Lee, Dong Ryeol Shin, Hee Yong Youn
    Weighted Fair Scheduling Algorithm for QoS of Input-Queued Switches. [Citation Graph (0, 0)][DBLP]
    NPC, 2004, pp:366-373 [Conf]
  26. Hye-Sung Yoon, Sun-Young Ahn, Sang-Ho Lee, Sung-Bum Cho, Ju Han Kim
    Heterogeneous Clustering Ensemble Method for Combining Different Cluster Results. [Citation Graph (0, 0)][DBLP]
    BioDM, 2006, pp:82-92 [Conf]
  27. Seung-Hyun Seo, Kyung-Ah Shim, Sang-Ho Lee
    A Mediated Proxy Signature Scheme with Fast Revocation for Electronic Transactions. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2005, pp:216-225 [Conf]
  28. Saeran Kwon, Sang-Ho Lee
    Security Analysis and Improvement for Key Issuing Schemes in ID-Based Cryptography. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2006, pp:203-212 [Conf]
  29. Won Kim, Ki-Joon Chae, Dong-Sub Cho, Byoungju Choi, Anmo Jeong, Myung Kim, Kiho Lee, Meejeong Lee, Sang-Ho Lee, Seung-Soo Park, Hwan-Seung Yong
    The Chamois Component-Based Knowledge Engineering Framework. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2002, v:35, n:5, pp:46-54 [Journal]
  30. Sang-Ho Lee, Kim Palmö, Samuel Krimm
    New out-of-plane angle and bond angle internal coordinates and related potential energy functions for molecular mechanics and dynamics simulations. [Citation Graph (0, 0)][DBLP]
    Journal of Computational Chemistry, 1999, v:20, n:10, pp:1067-1084 [Journal]
  31. Taenam Cho, Sang-Ho Lee, Won Kim
    A group key recovery mechanism based on logical key hierarchy. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2004, v:12, n:5, pp:711-736 [Journal]
  32. Won Kim, Ki-Joon Chae, Dong-Sub Cho, Byoungju Choi, Anmo Jeong, Myung Kim, Kiho Lee, Meejeong Lee, Minsoo Lee, Sang-Ho Lee, Seung-Soo Park, Hwan-Seung Yong, Ho-Sook Kim, Jung-Won Lee, Wol-Young Lee
    The Chamois Reconfigurable Data-Mining Architecture. [Citation Graph (0, 0)][DBLP]
    Journal of Object Technology, 2002, v:1, n:2, pp:21-33 [Journal]
  33. Saeran Kwon, Sang-Ho Lee
    Identity-Based Key Issuing Without Secure Channel in a Broad Area. [Citation Graph (0, 0)][DBLP]
    WISA, 2006, pp:30-44 [Conf]
  34. Chi-Hyuck Jun, S. Balamurali, Sang-Ho Lee
    Variables sampling plans for Weibull distributed lifetimes under sudden death testing. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Reliability, 2006, v:55, n:1, pp:53-58 [Journal]

  35. A Lifetime Extended Routing Protocol Based on Data Threshold in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  36. Security Issues of Collaborative Review System. [Citation Graph (, )][DBLP]


  37. Non-Uniform Spectral Compression with the Formant-Emphasized Filterbank for Noisy Speech Recognition. [Citation Graph (, )][DBLP]


  38. Efficient Overlay Multicast Protocol in Mobile Ad hoc Networks. [Citation Graph (, )][DBLP]


  39. Efficient IMS Authentication Architecture based on Initial Access Authentication in WiBro-Evolution (WiBro-EVO) System. [Citation Graph (, )][DBLP]


  40. Efficient Authentication Architecture for Frequency Overlay in Mobile Broadband Wireless Access. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.306secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002