Security issues in healthcare applications using wireless medical sensor networks: A survey P Kumar, HJ Lee sensors 12 (1), 55-91, 2011 | 517 | 2011 |
E-SAP: Efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks P Kumar, SG Lee, HJ Lee Sensors 12 (2), 1625-1647, 2012 | 238 | 2012 |
Distributed SDN controller system: A survey on design choice YE Oktian, SG Lee, HJ Lee, JH Lam computer networks 121, 100-111, 2017 | 224 | 2017 |
Secure storage and access of data in cloud computing A Kumar, BG Lee, HJ Lee, A Kumari 2012 International Conference on ICT Convergence (ICTC), 336-339, 2012 | 129 | 2012 |
Survey on security in Internet of Things: State of the art and challenges M Sain, YJ Kang, HJ Lee 2017 19th International conference on advanced communication technology …, 2017 | 120 | 2017 |
Security analysis and improvements of authentication and access control in the internet of things B Ndibanje, HJ Lee, SG Lee Sensors 14 (8), 14786-14805, 2014 | 113 | 2014 |
Online banking authentication system using mobile-OTP with QR-code YS Lee, NH Kim, H Lim, HK Jo, HJ Lee 5th International Conference on Computer Sciences and Convergence …, 2010 | 113 | 2010 |
Indoor location tracking using received signal strength indicator CC Pu, CH Pu, HJ Lee Emerging communications for wireless sensor networks, 11, 2011 | 100 | 2011 |
Dragon: A fast word based stream cipher K Chen, M Henricksen, W Millan, J Fuller, L Simpson, E Dawson, HJ Lee, ... Information Security and Cryptology–ICISC 2004: 7th International Conference …, 2005 | 85 | 2005 |
Cryptanalysis on two user authentication protocols using smart card for wireless sensor networks P Kumar, HJ Lee 2011 Wireless Advanced, 241-245, 2011 | 76 | 2011 |
Secure key management scheme based on ECC algorithm for patient's medical information in healthcare system YS Lee, E Alasaarela, HJ Lee The International Conference on Information Networking 2014 (ICOIN2014), 453-457, 2014 | 68 | 2014 |
Two factor authentication for cloud computing S Lee, I Ong, HT Lim, HJ Lee Journal of information and communication convergence engineering 8 (4), 427-432, 2010 | 63 | 2010 |
The LILI-II keystream generator A Clark, E Dawson, J Fuller, J Golić, HJ Lee, W Millan, SJ Moon, ... Information Security and Privacy: 7th Australasian Conference, ACISP 2002 …, 2002 | 63 | 2002 |
Moving ad hoc networks—A comparative study MA Al-Absi, AA Al-Absi, M Sain, H Lee Sustainability 13 (11), 6187, 2021 | 58 | 2021 |
On an improved summation generator with 2-bit memory HJ Lee, SJ Moon Signal Processing 80 (1), 211-217, 2000 | 57 | 2000 |
Mutual authentication in wireless body sensor networks (WBSN) based on physical unclonable function (PUF) YS Lee, HJ Lee, E Alasaarela 2013 9th International wireless communications and mobile computing …, 2013 | 56 | 2013 |
RUASN: a robust user authentication framework for wireless sensor networks P Kumar, AJ Choudhury, M Sain, SG Lee, HJ Lee Sensors 11, 5020-5046, 2011 | 52 | 2011 |
Cross-method-based analysis and classification of malicious behavior by api calls extraction B Ndibanje, KH Kim, YJ Kang, HH Kim, TY Kim, HJ Lee Applied Sciences 9 (2), 239, 2019 | 50 | 2019 |
A strong authentication scheme with user privacy for wireless sensor networks P Kumar, A Gurtov, M Ylianttila, SG Lee, HJ Lee ETRI journal 35 (5), 889-899, 2013 | 47 | 2013 |
Mitigating denial of service (dos) attacks in openflow networks YE Oktian, SG Lee, HJ Lee 2014 International Conference on Information and Communication Technology …, 2014 | 46 | 2014 |