Security issues in healthcare applications using wireless medical sensor networks: A survey P Kumar, HJ Lee sensors 12 (1), 55-91, 2011 | 538 | 2011 |
E-SAP: Efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks P Kumar, SG Lee, HJ Lee Sensors 12 (2), 1625-1647, 2012 | 250 | 2012 |
Distributed SDN controller system: A survey on design choice YE Oktian, SG Lee, HJ Lee, JH Lam computer networks 121, 100-111, 2017 | 239 | 2017 |
Secure storage and access of data in cloud computing A Kumar, BG Lee, HJ Lee, A Kumari 2012 International Conference on ICT Convergence (ICTC), 336-339, 2012 | 130 | 2012 |
Survey on security in Internet of Things: State of the art and challenges M Sain, YJ Kang, HJ Lee 2017 19th International conference on advanced communication technology …, 2017 | 124 | 2017 |
Security analysis and improvements of authentication and access control in the internet of things B Ndibanje, HJ Lee, SG Lee Sensors 14 (8), 14786-14805, 2014 | 115 | 2014 |
Online banking authentication system using mobile-OTP with QR-code YS Lee, NH Kim, H Lim, HK Jo, HJ Lee 5th International Conference on Computer Sciences and Convergence …, 2010 | 115 | 2010 |
Indoor location tracking using received signal strength indicator CC Pu, CH Pu, HJ Lee Emerging communications for wireless sensor networks, 229-255, 2011 | 98 | 2011 |
Dragon: A fast word based stream cipher K Chen, M Henricksen, W Millan, J Fuller, L Simpson, E Dawson, HJ Lee, ... Information Security and Cryptology–ICISC 2004: 7th International Conference …, 2005 | 86 | 2005 |
Cryptanalysis on two user authentication protocols using smart card for wireless sensor networks P Kumar, HJ Lee 2011 Wireless advanced, 241-245, 2011 | 83 | 2011 |
Moving ad hoc networks—a comparative study MA Al-Absi, AA Al-Absi, M Sain, H Lee Sustainability 13 (11), 6187, 2021 | 73 | 2021 |
Secure key management scheme based on ECC algorithm for patient's medical information in healthcare system YS Lee, E Alasaarela, HJ Lee The International Conference on Information Networking 2014 (ICOIN2014), 453-457, 2014 | 69 | 2014 |
Cross-method-based analysis and classification of malicious behavior by api calls extraction B Ndibanje, KH Kim, YJ Kang, HH Kim, TY Kim, HJ Lee Applied Sciences 9 (2), 239, 2019 | 65 | 2019 |
Deep learning-based drone classification using radar cross section signatures at mmwave frequencies R Fu, MA Al-Absi, KH Kim, YS Lee, AA Al-Absi, HJ Lee IEEE Access 9, 161431-161444, 2021 | 63 | 2021 |
The LILI-II keystream generator A Clark, E Dawson, J Fuller, J Golić, HJ Lee, W Millan, SJ Moon, ... Information Security and Privacy: 7th Australasian Conference, ACISP 2002 …, 2002 | 62 | 2002 |
Two factor authentication for cloud computing S Lee, I Ong, HT Lim, HJ Lee Journal of information and communication convergence engineering 8 (4), 427-432, 2010 | 60 | 2010 |
Methods and systems for ball game analytics with a mobile device KF Lee, TY Lam, WH Chan, Q Zhang, OL Sung, MH Chan US Patent 10,489,656, 2019 | 59 | 2019 |
Mutual authentication in wireless body sensor networks (WBSN) based on physical unclonable function (PUF) YS Lee, HJ Lee, E Alasaarela 2013 9th International wireless communications and mobile computing …, 2013 | 59 | 2013 |
On an improved summation generator with 2-bit memory HJ Lee, SJ Moon Signal Processing 80 (1), 211-217, 2000 | 57 | 2000 |
RUASN: a robust user authentication framework for wireless sensor networks P Kumar, AJ Choudhury, M Sain, SG Lee, HJ Lee Sensors 11, 5020-5046, 2011 | 53 | 2011 |