Improvement of Das's two-factor authentication protocol in wireless sensor networks DH Nyang, MK Lee Cryptology EPrint Archive, 2009 | 131 | 2009 |
Security notions and advanced method for human shoulder-surfing resistant PIN-entry MK Lee IEEE transactions on information forensics and security 9 (4), 695-708, 2014 | 110 | 2014 |
Privacy-preserving peer-to-peer energy trading in blockchain-enabled smart grids using functional encryption YB Son, JH Im, HY Kwon, SY Jeon, MK Lee Energies 13 (6), 1321, 2020 | 86 | 2020 |
Dictionary attack on functional transform‐based cancelable fingerprint templates SW Shin, MK Lee, D Moon, K Moon ETRI journal 31 (5), 628-630, 2009 | 81 | 2009 |
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface P Anthony, M Ishizuka, D Lukose Lecture Notes in Computer Science (including subseries Lecture Notes in …, 2012 | 71 | 2012 |
Countermeasures against power analysis attacks for the NTRU public key cryptosystem MK Lee, JE Song, D Choi, DG Han IEICE transactions on fundamentals of electronics, communications and …, 2010 | 57 | 2010 |
Practical privacy-preserving face authentication for smartphones secure against malicious clients JH Im, SY Jeon, MK Lee IEEE Transactions on Information Forensics and Security 15, 2386-2401, 2020 | 50 | 2020 |
Security analysis and improvement of fingerprint authentication for smartphones YH Jo, SY Jeon, JH Im, MK Lee Mobile Information Systems 2016 (1), 8973828, 2016 | 50 | 2016 |
Low-complexity elliptic curve cryptography processor based on configurable partial modular reduction over NIST prime fields P Choi, MK Lee, JH Kim, DK Kim IEEE Transactions on Circuits and Systems II: Express Briefs 65 (11), 1703-1707, 2017 | 47 | 2017 |
Advanced intrusion detection combining signature-based and behavior-based detection methods HY Kwon, T Kim, MK Lee Electronics 11 (6), 867, 2022 | 45 | 2022 |
Toward quantum secured distributed energy resources: Adoption of post-quantum cryptography (pqc) and quantum key distribution (qkd) J Ahn, HY Kwon, B Ahn, K Park, T Kim, MK Lee, J Kim, J Chung Energies 15 (3), 714, 2022 | 39 | 2022 |
Secure bimodal PIN-entry method using audio signals MK Lee, H Nam, DK Kim Computers & Security 56, 140-150, 2016 | 38 | 2016 |
Two-thumbs-up: Physical protection for pin entry secure against recording attacks DH Nyang, H Kim, W Lee, S Kang, G Cho, MK Lee, A Mohaisen computers & security 78, 1-15, 2018 | 34 | 2018 |
Efficient and privacy-preserving energy trading on blockchain using dual binary encoding for inner product encryption T Gaybullaev, HY Kwon, T Kim, MK Lee Sensors 21 (6), 2024, 2021 | 33 | 2021 |
Authentication of a smart phone user using audio frequency analysis JB Kim, JE Song, MK Lee Journal of the Korea Institute of Information Security & Cryptology 22 (2 …, 2012 | 32 | 2012 |
HETAL: efficient privacy-preserving transfer learning with homomorphic encryption S Lee, G Lee, JW Kim, J Shin, MK Lee International Conference on Machine Learning, 19010-19035, 2023 | 30 | 2023 |
Secure and user friendly PIN entry method CS Kim, MK Lee 2010 Digest of Technical Papers International Conference on Consumer …, 2010 | 24 | 2010 |
Sliding window method for NTRU MK Lee, JW Kim, JE Song, K Park International Conference on Applied Cryptography and Network Security, 432-442, 2007 | 24 | 2007 |
Privacy-preserving palm print authentication using homomorphic encryption JH Im, JC Choi, DH Nyang, MK Lee 2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th …, 2016 | 20 | 2016 |
Improved cancelable fingerprint templates using minutiae‐based functional transform D Moon, JH Yoo, MK Lee Security and Communication Networks 7 (10), 1543-1551, 2014 | 19 | 2014 |