Security issues in healthcare applications using wireless medical sensor networks: A survey P Kumar, HJ Lee sensors 12 (1), 55-91, 2011 | 532 | 2011 |
E-SAP: Efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks P Kumar, SG Lee, HJ Lee Sensors 12 (2), 1625-1647, 2012 | 250 | 2012 |
Distributed SDN controller system: A survey on design choice YE Oktian, SG Lee, HJ Lee, JH Lam computer networks 121, 100-111, 2017 | 233 | 2017 |
Secure storage and access of data in cloud computing A Kumar, BG Lee, HJ Lee, A Kumari 2012 International Conference on ICT Convergence (ICTC), 336-339, 2012 | 132 | 2012 |
Survey on security in Internet of Things: State of the art and challenges M Sain, YJ Kang, HJ Lee 2017 19th International conference on advanced communication technology …, 2017 | 125 | 2017 |
Security analysis and improvements of authentication and access control in the internet of things B Ndibanje, HJ Lee, SG Lee Sensors 14 (8), 14786-14805, 2014 | 118 | 2014 |
Online banking authentication system using mobile-OTP with QR-code YS Lee, NH Kim, H Lim, HK Jo, HJ Lee 5th International Conference on Computer Sciences and Convergence …, 2010 | 117 | 2010 |
Indoor location tracking using received signal strength indicator CC Pu, CH Pu, HJ Lee Emerging communications for wireless sensor networks, 229-255, 2011 | 94 | 2011 |
Dragon: A fast word based stream cipher K Chen, M Henricksen, W Millan, J Fuller, L Simpson, E Dawson, HJ Lee, ... Information Security and Cryptology–ICISC 2004: 7th International Conference …, 2005 | 85 | 2005 |
Cryptanalysis on two user authentication protocols using smart card for wireless sensor networks P Kumar, HJ Lee 2011 Wireless Advanced, 241-245, 2011 | 80 | 2011 |
Secure key management scheme based on ECC algorithm for patient's medical information in healthcare system YS Lee, E Alasaarela, HJ Lee The International Conference on Information Networking 2014 (ICOIN2014), 453-457, 2014 | 73 | 2014 |
Moving ad hoc networks—A comparative study MA Al-Absi, AA Al-Absi, M Sain, H Lee Sustainability 13 (11), 6187, 2021 | 67 | 2021 |
The LILI-II keystream generator A Clark, E Dawson, J Fuller, J Golić, HJ Lee, W Millan, SJ Moon, ... Information Security and Privacy: 7th Australasian Conference, ACISP 2002 …, 2002 | 63 | 2002 |
Two factor authentication for cloud computing S Lee, I Ong, HT Lim, HJ Lee Journal of information and communication convergence engineering 8 (4), 427-432, 2010 | 62 | 2010 |
Deep learning-based drone classification using radar cross section signatures at mmwave frequencies R Fu, MA Al-Absi, KH Kim, YS Lee, AA Al-Absi, HJ Lee IEEE Access 9, 161431-161444, 2021 | 58 | 2021 |
Mutual authentication in wireless body sensor networks (WBSN) based on physical unclonable function (PUF) YS Lee, HJ Lee, E Alasaarela 2013 9th International wireless communications and mobile computing …, 2013 | 58 | 2013 |
Cross-method-based analysis and classification of malicious behavior by api calls extraction B Ndibanje, KH Kim, YJ Kang, HH Kim, TY Kim, HJ Lee Applied Sciences 9 (2), 239, 2019 | 57 | 2019 |
On an improved summation generator with 2-bit memory HJ Lee, SJ Moon Signal Processing 80 (1), 211-217, 2000 | 56 | 2000 |
RUASN: a robust user authentication framework for wireless sensor networks P Kumar, AJ Choudhury, M Sain, SG Lee, HJ Lee Sensors 11, 5020-5046, 2011 | 52 | 2011 |
Securing distributed SDN with IBC JH Lam, SG Lee, HJ Lee, YE Oktian 2015 Seventh International Conference on Ubiquitous and Future Networks, 921-925, 2015 | 49 | 2015 |