Search the dblp DataBase
Hyung-Woo Lee :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Hyung-Woo Lee Advanced Packet Marking Mechanism with Pushback for IP Traceback. [Citation Graph (0, 0)][DBLP ] ACNS, 2004, pp:426-438 [Conf ] Hyung-Woo Lee , Taekyoung Kwon , Hyung-Jong Kim NS-2 Based IP Traceback Simulation Against Reflector Based DDoS Attack. [Citation Graph (0, 0)][DBLP ] AIS, 2004, pp:90-99 [Conf ] Sung-Min Lee , Hyung-Woo Lee , Tai-Yun Kim A Secure Electronic Software Distribution (ESD) Protocol Based on PKC. [Citation Graph (0, 0)][DBLP ] EC-Web, 2000, pp:63-71 [Conf ] Hyung-Woo Lee , Sung-Min Lee , Im-Yeong Lee Secure Electronic Copyright Distribution with Public Key Based Traitor Tracing. [Citation Graph (0, 0)][DBLP ] EC-Web, 2002, pp:324-332 [Conf ] Hyung-Woo Lee , Im-Yeong Lee , Dong-Ik Oh Smart Card Based Mobile Payment with Fairness Revocation Mechanism. [Citation Graph (0, 0)][DBLP ] EC-Web, 2003, pp:62-71 [Conf ] Hyung-Woo Lee , Im-Yeong Lee Designated Verification of Digital Watermark for Network Based Image Distribution. [Citation Graph (0, 0)][DBLP ] International Conference on Computational Science, 2003, pp:1069-1078 [Conf ] Gil-Han Kim , Hyung-Woo Lee SVM Based False Alarm Minimization Scheme on Intrusion Prevention System. [Citation Graph (0, 0)][DBLP ] ICCSA (5), 2006, pp:284-293 [Conf ] Sung-il Kim , Sung-Hyun Yun , Mi-sun Yoon , Yeon-hee So , Won-Sik Kim , Myung-Jin Lee , Dong-Seong Choi , Hyung-Woo Lee Design and Implementation of the KORI: Intelligent Teachable Agent and Its Application to Education. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2005, pp:62-71 [Conf ] Hyung-Woo Lee Lightweight Wireless Intrusion Detection Systems Against DDoS Attack. [Citation Graph (0, 0)][DBLP ] ICCSA (5), 2006, pp:294-302 [Conf ] Hyung-Woo Lee , Min-goo Kang , Chang-Won Choi PTrace: Pushback/SVM Based ICMP Traceback Mechanism against DDoS Attack. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:302-309 [Conf ] Hyung-Woo Lee , Sung-Hyun Yun , Jae-Sung Kim , Nam-Ho Oh , Do-Hyung Kim IPv6/IPsec Conformance Test Management System with Formal Description Technique. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:401-410 [Conf ] Young-Hwan You , Taewon Jang , Min-goo Kang , Hyung-Woo Lee , Hwa-Seop Lim , Yong-Soo Choi , Hyoung-Kyu Song Performance Limitation of STBC OFDM-CDMA Systems in Mobile Fading Channels. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:386-393 [Conf ] Sung-Hyun Yun , Hyung-Woo Lee The Large Scale Electronic Voting Scheme Based on Undeniable Multi-signature Scheme. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:391-400 [Conf ] Hyung-Woo Lee , Sung-Hyun Yun , Taekyoung Kwon , Jae-Sung Kim , Hee-Un Park , Nam-Ho Oh Reflector Attack Traceback System with Pushback Based iTrace Mechanism. [Citation Graph (0, 0)][DBLP ] ICICS, 2004, pp:236-248 [Conf ] Hyung-Woo Lee SVM Based Packet Marking Technique for Traceback on Malicious DDoS Traffic. [Citation Graph (0, 0)][DBLP ] ICOIN, 2006, pp:754-763 [Conf ] Yong-Ho Lee , Im-Yeong Lee , Hyung-Woo Lee New WAKE Key Recovery Protocol on M-commerce. [Citation Graph (0, 0)][DBLP ] ICWE, 2003, pp:279-280 [Conf ] Yong-Ho Lee , Im-Yeong Lee , Hyung-Woo Lee New Identity Escrow Scheme for Anonymity Authentication. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2002, pp:382-394 [Conf ] Hyung-Woo Lee , Jung-Eun Kim , Tai-Yun Kim Non-interactive Cryptosystem for Entity Authentication. [Citation Graph (0, 0)][DBLP ] ISW, 1999, pp:72-84 [Conf ] Hyung-Woo Lee Arbitrated Verifier Signature with Message Recovery for Proof of Ownership. [Citation Graph (0, 0)][DBLP ] KES (1), 2005, pp:504-510 [Conf ] Hyung-Woo Lee , Sung-Hyun Yun Authenticated IPv6 Packet Traceback Against Reflector Based Packet Flooding Attack. [Citation Graph (0, 0)][DBLP ] KES (1), 2005, pp:1118-1124 [Conf ] Sung-Hyun Yun , Hyung-Woo Lee The Efficient Multipurpose Convertible Undeniable Signature Scheme. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:325-331 [Conf ] Sung-Hyun Yun , Hyung-Woo Lee The Undeniable Multi-signature Scheme Suitable for Joint Copyright Protection on Digital Contents. [Citation Graph (0, 0)][DBLP ] PCM (3), 2004, pp:402-409 [Conf ] Hyung-Woo Lee , Tai-Yun Kim Message Recovery Fair Blind Signature. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 1999, pp:97-111 [Conf ] Hyung-Woo Lee , Taekyoung Kwon Biometric Digital Key Mechanisms for Telebiometric Authentication Based on Biometric Certificate. [Citation Graph (0, 0)][DBLP ] HCI (5), 2007, pp:428-437 [Conf ] Hyung-Woo Lee Secure Authentication and Accounting Mechanism on WLAN with Interaction of Mobile Message Service. [Citation Graph (0, 0)][DBLP ] HCI (6), 2007, pp:122-131 [Conf ] Je-Gyeong Jo , Jong-Won Seo , Hyung-Woo Lee Biometric Digital Signature Key Generation and Cryptography Communication Based on Fingerprint. [Citation Graph (0, 0)][DBLP ] FAW, 2007, pp:38-49 [Conf ] An Enhanced RFID Multiple Access Protocol for Fast Inventory. [Citation Graph (, )][DBLP ] Biometric Certificate Based Biometric Digital Key Generation with Protection Mechanism. [Citation Graph (, )][DBLP ] Developing a Multi-Protocol Mobility Manager for SIP/SS7 Networks. [Citation Graph (, )][DBLP ] Multi-protocol authentication for SIP/SS7 mobile network. [Citation Graph (, )][DBLP ] Security in Wireless Sensor Networks: Issues and Challenges [Citation Graph (, )][DBLP ] Smartening the Environment using Wireless Sensor Networks in a Developing Country [Citation Graph (, )][DBLP ] Search in 0.002secs, Finished in 0.304secs