The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Hyung-Woo Lee: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Hyung-Woo Lee
    Advanced Packet Marking Mechanism with Pushback for IP Traceback. [Citation Graph (0, 0)][DBLP]
    ACNS, 2004, pp:426-438 [Conf]
  2. Hyung-Woo Lee, Taekyoung Kwon, Hyung-Jong Kim
    NS-2 Based IP Traceback Simulation Against Reflector Based DDoS Attack. [Citation Graph (0, 0)][DBLP]
    AIS, 2004, pp:90-99 [Conf]
  3. Sung-Min Lee, Hyung-Woo Lee, Tai-Yun Kim
    A Secure Electronic Software Distribution (ESD) Protocol Based on PKC. [Citation Graph (0, 0)][DBLP]
    EC-Web, 2000, pp:63-71 [Conf]
  4. Hyung-Woo Lee, Sung-Min Lee, Im-Yeong Lee
    Secure Electronic Copyright Distribution with Public Key Based Traitor Tracing. [Citation Graph (0, 0)][DBLP]
    EC-Web, 2002, pp:324-332 [Conf]
  5. Hyung-Woo Lee, Im-Yeong Lee, Dong-Ik Oh
    Smart Card Based Mobile Payment with Fairness Revocation Mechanism. [Citation Graph (0, 0)][DBLP]
    EC-Web, 2003, pp:62-71 [Conf]
  6. Hyung-Woo Lee, Im-Yeong Lee
    Designated Verification of Digital Watermark for Network Based Image Distribution. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science, 2003, pp:1069-1078 [Conf]
  7. Gil-Han Kim, Hyung-Woo Lee
    SVM Based False Alarm Minimization Scheme on Intrusion Prevention System. [Citation Graph (0, 0)][DBLP]
    ICCSA (5), 2006, pp:284-293 [Conf]
  8. Sung-il Kim, Sung-Hyun Yun, Mi-sun Yoon, Yeon-hee So, Won-Sik Kim, Myung-Jin Lee, Dong-Seong Choi, Hyung-Woo Lee
    Design and Implementation of the KORI: Intelligent Teachable Agent and Its Application to Education. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2005, pp:62-71 [Conf]
  9. Hyung-Woo Lee
    Lightweight Wireless Intrusion Detection Systems Against DDoS Attack. [Citation Graph (0, 0)][DBLP]
    ICCSA (5), 2006, pp:294-302 [Conf]
  10. Hyung-Woo Lee, Min-goo Kang, Chang-Won Choi
    PTrace: Pushback/SVM Based ICMP Traceback Mechanism against DDoS Attack. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:302-309 [Conf]
  11. Hyung-Woo Lee, Sung-Hyun Yun, Jae-Sung Kim, Nam-Ho Oh, Do-Hyung Kim
    IPv6/IPsec Conformance Test Management System with Formal Description Technique. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:401-410 [Conf]
  12. Young-Hwan You, Taewon Jang, Min-goo Kang, Hyung-Woo Lee, Hwa-Seop Lim, Yong-Soo Choi, Hyoung-Kyu Song
    Performance Limitation of STBC OFDM-CDMA Systems in Mobile Fading Channels. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:386-393 [Conf]
  13. Sung-Hyun Yun, Hyung-Woo Lee
    The Large Scale Electronic Voting Scheme Based on Undeniable Multi-signature Scheme. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:391-400 [Conf]
  14. Hyung-Woo Lee, Sung-Hyun Yun, Taekyoung Kwon, Jae-Sung Kim, Hee-Un Park, Nam-Ho Oh
    Reflector Attack Traceback System with Pushback Based iTrace Mechanism. [Citation Graph (0, 0)][DBLP]
    ICICS, 2004, pp:236-248 [Conf]
  15. Hyung-Woo Lee
    SVM Based Packet Marking Technique for Traceback on Malicious DDoS Traffic. [Citation Graph (0, 0)][DBLP]
    ICOIN, 2006, pp:754-763 [Conf]
  16. Yong-Ho Lee, Im-Yeong Lee, Hyung-Woo Lee
    New WAKE Key Recovery Protocol on M-commerce. [Citation Graph (0, 0)][DBLP]
    ICWE, 2003, pp:279-280 [Conf]
  17. Yong-Ho Lee, Im-Yeong Lee, Hyung-Woo Lee
    New Identity Escrow Scheme for Anonymity Authentication. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2002, pp:382-394 [Conf]
  18. Hyung-Woo Lee, Jung-Eun Kim, Tai-Yun Kim
    Non-interactive Cryptosystem for Entity Authentication. [Citation Graph (0, 0)][DBLP]
    ISW, 1999, pp:72-84 [Conf]
  19. Hyung-Woo Lee
    Arbitrated Verifier Signature with Message Recovery for Proof of Ownership. [Citation Graph (0, 0)][DBLP]
    KES (1), 2005, pp:504-510 [Conf]
  20. Hyung-Woo Lee, Sung-Hyun Yun
    Authenticated IPv6 Packet Traceback Against Reflector Based Packet Flooding Attack. [Citation Graph (0, 0)][DBLP]
    KES (1), 2005, pp:1118-1124 [Conf]
  21. Sung-Hyun Yun, Hyung-Woo Lee
    The Efficient Multipurpose Convertible Undeniable Signature Scheme. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:325-331 [Conf]
  22. Sung-Hyun Yun, Hyung-Woo Lee
    The Undeniable Multi-signature Scheme Suitable for Joint Copyright Protection on Digital Contents. [Citation Graph (0, 0)][DBLP]
    PCM (3), 2004, pp:402-409 [Conf]
  23. Hyung-Woo Lee, Tai-Yun Kim
    Message Recovery Fair Blind Signature. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 1999, pp:97-111 [Conf]
  24. Hyung-Woo Lee, Taekyoung Kwon
    Biometric Digital Key Mechanisms for Telebiometric Authentication Based on Biometric Certificate. [Citation Graph (0, 0)][DBLP]
    HCI (5), 2007, pp:428-437 [Conf]
  25. Hyung-Woo Lee
    Secure Authentication and Accounting Mechanism on WLAN with Interaction of Mobile Message Service. [Citation Graph (0, 0)][DBLP]
    HCI (6), 2007, pp:122-131 [Conf]
  26. Je-Gyeong Jo, Jong-Won Seo, Hyung-Woo Lee
    Biometric Digital Signature Key Generation and Cryptography Communication Based on Fingerprint. [Citation Graph (0, 0)][DBLP]
    FAW, 2007, pp:38-49 [Conf]

  27. An Enhanced RFID Multiple Access Protocol for Fast Inventory. [Citation Graph (, )][DBLP]


  28. Biometric Certificate Based Biometric Digital Key Generation with Protection Mechanism. [Citation Graph (, )][DBLP]


  29. Developing a Multi-Protocol Mobility Manager for SIP/SS7 Networks. [Citation Graph (, )][DBLP]


  30. Multi-protocol authentication for SIP/SS7 mobile network. [Citation Graph (, )][DBLP]


  31. Security in Wireless Sensor Networks: Issues and Challenges [Citation Graph (, )][DBLP]


  32. Smartening the Environment using Wireless Sensor Networks in a Developing Country [Citation Graph (, )][DBLP]


Search in 0.044secs, Finished in 0.045secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002