Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Yunho Lee
@article{DBLP:journals/access/ShinLLKL23, author = {Kyounga Shin and Yunho Lee and Jungho Lim and Honggoo Kang and Sangjin Lee}, title = {System {API} Vectorization for Malware Detection}, journal = {{IEEE} Access}, volume = {11}, pages = {53788--53805}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3276902}, doi = {10.1109/ACCESS.2023.3276902}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ShinLLKL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isscc/ParkCYBKYLCPLCM22, author = {Myeong{-}Jae Park and Ho Sung Cho and Tae{-}Sik Yun and Sangjin Byeon and Young Jun Koo and Sang{-}Sic Yoon and Dong{-}Uk Lee and Seokwoo Choi and Ji Hwan Park and Jinhyung Lee and Kyungjun Cho and Junil Moon and Byung Kuk Yoon and Young Jun Park and Sangmuk Oh and Chang Kwon Lee and Tae{-}Kyun Kim and Seong{-}Hee Lee and Hyun{-}Woo Kim and Yucheon Ju and Seung{-}Kyun Lim and Seung Geun Baek and Kyo Yun Lee and Sang Hun Lee and Woo Sung We and Seungchan Kim and Yongseok Choi and Seong{-}Hak Lee and Seung Min Yang and Gunho Lee and In{-}Keun Kim and Younghyun Jeon and Jae{-}Hyung Park and Jong Chan Yun and Chanhee Park and Sun{-}Yeol Kim and Sungjin Kim and Dong{-}Yeol Lee and Su{-}Hyun Oh and Taejin Hwang and Junghyun Shin and Yunho Lee and Hyunsik Kim and Jaeseung Lee and Youngdo Hur and Sangkwon Lee and Jieun Jang and Junhyun Chun and Joohwan Cho}, title = {A 192-Gb 12-High 896-GB/s {HBM3} {DRAM} with a {TSV} Auto-Calibration Scheme and Machine-Learning-Based Layout Optimization}, booktitle = {{IEEE} International Solid-State Circuits Conference, {ISSCC} 2022, San Francisco, CA, USA, February 20-26, 2022}, pages = {444--446}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ISSCC42614.2022.9731562}, doi = {10.1109/ISSCC42614.2022.9731562}, timestamp = {Mon, 21 Mar 2022 13:32:47 +0100}, biburl = {https://dblp.org/rec/conf/isscc/ParkCYBKYLCPLCM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smc/OhJYLKK19, author = {Byungsoo Oh and Tae Joon Jun and WonDeuk Yoon and Yunho Lee and Sangtae Kim and Daeyoung Kim}, title = {Enhancing Trust of Supply Chain Using Blockchain Platform with Robust Data Model and Verification Mechanisms}, booktitle = {2019 {IEEE} International Conference on Systems, Man and Cybernetics, {SMC} 2019, Bari, Italy, October 6-9, 2019}, pages = {3504--3511}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/SMC.2019.8913871}, doi = {10.1109/SMC.2019.8913871}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/smc/OhJYLKK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/KimLL18, author = {Dohyun Kim and Yunho Lee and Sangjin Lee}, title = {Mobile forensic reference set (MFReS) and mobile forensic investigation for android devices}, journal = {J. Supercomput.}, volume = {74}, number = {12}, pages = {6618--6632}, year = {2018}, url = {https://doi.org/10.1007/s11227-017-2205-5}, doi = {10.1007/S11227-017-2205-5}, timestamp = {Mon, 02 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tjs/KimLL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isc2/YoonLCSHLKK18, author = {WonDeuk Yoon and Yunho Lee and Hyangseok Chae and Sangwon Seo and Sehyeon Heo and Nakyung Lee and Kiwoong Kwon and Daeyoung Kim}, title = {{HERMES:} GS1-based Smart City Service Intercommunity}, booktitle = {{IEEE} International Smart Cities Conference, {ISC2} 2018, Kansas City, MO, USA, September 16-19, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ISC2.2018.8656925}, doi = {10.1109/ISC2.2018.8656925}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isc2/YoonLCSHLKK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/ShinSLY14, author = {Yongjoo Shin and Sihu Song and Yunho Lee and Hyunsoo Yoon}, title = {A Novel Intrusion Tolerant System Using Live Migration}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {97-D}, number = {4}, pages = {984--988}, year = {2014}, url = {https://doi.org/10.1587/transinf.E97.D.984}, doi = {10.1587/TRANSINF.E97.D.984}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/ShinSLY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SonLKJLL13, author = {Namheun Son and Yunho Lee and Dohyun Kim and Joshua I. James and Sangjin Lee and Kyungho Lee}, title = {A study of user data integrity during acquisition of Android devices}, journal = {Digit. Investig.}, volume = {10}, number = {Supplement}, pages = {S3--S11}, year = {2013}, url = {https://doi.org/10.1016/j.diin.2013.06.001}, doi = {10.1016/J.DIIN.2013.06.001}, timestamp = {Mon, 02 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/SonLKJLL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icuimc/JeonLW13, author = {Woongryul Jeon and Yunho Lee and Dongho Won}, title = {A secure user-friendly authentication scheme with anonymity for wireless communications}, booktitle = {The 7th International Conference on Ubiquitous Information Management and Communication, {ICUIMC} '13, Kota Kinabalu, Malaysia - January 17 - 19, 2013}, pages = {110}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2448556.2448666}, doi = {10.1145/2448556.2448666}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icuimc/JeonLW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mue/ChoCKL13, author = {Seongsoo Cho and Son Kwang Chul and Chung Hyeok Kim and Yunho Lee}, editor = {James J. Park and Joseph Kee{-}Yin Ng and Hwa{-}Young Jeong and Agustinus Borgy Waluyo}, title = {Development of Mobile Games for Rehabilitation Training for the Hearing Impaired}, booktitle = {Multimedia and Ubiquitous Engineering, {MUE} 2013, May 9-11, 2013, Seoul, Korea}, series = {Lecture Notes in Electrical Engineering}, volume = {240}, pages = {621--625}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-94-007-6738-6\_76}, doi = {10.1007/978-94-007-6738-6\_76}, timestamp = {Sun, 04 Jun 2017 10:10:13 +0200}, biburl = {https://dblp.org/rec/conf/mue/ChoCKL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/LeeYL12, author = {Yunho Lee and Sang Guun Yoo and Soojin Lee}, title = {An Efficient Detection And Management Of False Accusation Attacks In Hierarchical Ad-Hoc Networks}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {6}, number = {7}, pages = {1874--1893}, year = {2012}, url = {https://doi.org/10.3837/tiis.2012.07.009}, doi = {10.3837/TIIS.2012.07.009}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/LeeYL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/AhnLP12, author = {Shinkwon Ahn and Yunho Lee and Kyungil Park}, editor = {Tai{-}Hoon Kim and Hyun Seob Cho and Osvaldo Gervasi and Stephen S. Yau}, title = {A Case Study on International Human Rights Restoration and Peace - (With Focus on the Problems Arising from the Japanese Military's Sex Slavery Practice)}, booktitle = {Computer Applications for Graphics, Grid Computing, and Industrial Environment - International Conferences, GDC, {IESH} and {CGAG} 2012, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2012, Gangneug, Korea, December 16-19, 2012. Proceedings}, series = {Communications in Computer and Information Science}, volume = {351}, pages = {124--132}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35600-1\_18}, doi = {10.1007/978-3-642-35600-1\_18}, timestamp = {Tue, 23 May 2017 01:07:31 +0200}, biburl = {https://dblp.org/rec/conf/fgit/AhnLP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsa/KimJLLW12, author = {Hakhyun Kim and Woongryul Jeon and Kwang{-}Woo Lee and Yunho Lee and Dongho Won}, editor = {Beniamino Murgante and Osvaldo Gervasi and Sanjay Misra and Nadia Nedjah and Ana Maria A. C. Rocha and David Taniar and Bernady O. Apduhan}, title = {Cryptanalysis and Improvement of a Biometrics-Based Multi-server Authentication with Key Agreement Scheme}, booktitle = {Computational Science and Its Applications - {ICCSA} 2012 - 12th International Conference, Salvador de Bahia, Brazil, June 18-21, 2012, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {7335}, pages = {391--406}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31137-6\_30}, doi = {10.1007/978-3-642-31137-6\_30}, timestamp = {Tue, 14 May 2019 10:00:43 +0200}, biburl = {https://dblp.org/rec/conf/iccsa/KimJLLW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cfi/YooLW11, author = {Jaesung Yoo and Yunho Lee and Dongho Won}, editor = {Dae Young Kim}, title = {An improved key establishment scheme for wireless sensor network}, booktitle = {6th International Conference on Future Internet Technologies, {CFI} '11, Seoul, Republic of Korea, June 13-15, 2011}, pages = {70--71}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2002396.2002415}, doi = {10.1145/2002396.2002415}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cfi/YooLW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ichit/LeeYKL11, author = {Yunho Lee and Sang Guun Yoo and Juho Kim and Soojin Lee}, editor = {Geuk Lee and Daniel Howard and Dominik Slezak}, title = {Specification-Based Intrusion Detection System for WiBro}, booktitle = {Convergence and Hybrid Information Technology - 5th International Conference, {ICHIT} 2011, Daejeon, Korea, September 22-24, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6935}, pages = {445--455}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24082-9\_55}, doi = {10.1007/978-3-642-24082-9\_55}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/ichit/LeeYKL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KimJLW11, author = {Hakhyun Kim and Woongryul Jeon and Yunho Lee and Dongho Won}, title = {Cryptanalysis and improvement of a biometrics-based multi-server authentication with key agreement scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {451}, year = {2011}, url = {http://eprint.iacr.org/2011/451}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KimJLW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/LeeKW10, author = {Yunho Lee and Seungjoo Kim and Dongho Won}, title = {Enhancement of two-factor authenticated key exchange protocols in public wireless LANs}, journal = {Comput. Electr. Eng.}, volume = {36}, number = {1}, pages = {213--223}, year = {2010}, url = {https://doi.org/10.1016/j.compeleceng.2009.08.007}, doi = {10.1016/J.COMPELECENG.2009.08.007}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cee/LeeKW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/LeePMKW10, author = {Yunho Lee and Sangjoon Park and Masahiro Mambo and Seungjoo Kim and Dongho Won}, title = {Towards trustworthy e-voting using paper receipts}, journal = {Comput. Stand. Interfaces}, volume = {32}, number = {5-6}, pages = {305--311}, year = {2010}, url = {https://doi.org/10.1016/j.csi.2010.03.001}, doi = {10.1016/J.CSI.2010.03.001}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csi/LeePMKW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/LeeLWK10, author = {Kwang{-}Woo Lee and Yunho Lee and Dongho Won and Seungjoo Kim}, editor = {Jin Kwak and Robert H. Deng and Yoojae Won and Guilin Wang}, title = {Protection Profile for Secure E-Voting Systems}, booktitle = {Information Security, Practice and Experience, 6th International Conference, {ISPEC} 2010, Seoul, Korea, May 12-13, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6047}, pages = {386--397}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12827-1\_28}, doi = {10.1007/978-3-642-12827-1\_28}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/LeeLWK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsa/LeeLKW09, author = {Kwang{-}Woo Lee and Yunho Lee and Seungjoo Kim and Dongho Won}, editor = {Osvaldo Gervasi and David Taniar and Beniamino Murgante and Antonio Lagan{\`{a}} and Youngsong Mun and Marina L. Gavrilova}, title = {A Practical Approach to a Reliable Electronic Election}, booktitle = {Computational Science and Its Applications - {ICCSA} 2009, International Conference, Seoul, Korea, June 29-July 2, 2009, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {5593}, pages = {191--203}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02457-3\_17}, doi = {10.1007/978-3-642-02457-3\_17}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccsa/LeeLKW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/JoJLKW09, author = {Heasuk Jo and Woongryul Jeon and Yunho Lee and Seungjoo Kim and Dongho Won}, editor = {Feng Bao and Hui Li and Guilin Wang}, title = {Security Specification for Conversion Technologies of Heterogeneous {DRM} Systems}, booktitle = {Information Security Practice and Experience, 5th International Conference, {ISPEC} 2009, Xi'an, China, April 13-15, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5451}, pages = {159--170}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00843-6\_15}, doi = {10.1007/978-3-642-00843-6\_15}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/JoJLKW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ncm/JoLKKW09, author = {Heasuk Jo and Yunho Lee and Mijin Kim and Seungjoo Kim and Dongho Won}, editor = {Jinhwa Kim and Dursun Delen and Jinsoo Park and Franz Ko and Chen Rui and Jong Hyung Lee and Jian Wang and Gang Kou}, title = {Off-Line Password-Guessing Attack to Yang's and Huang's Authentication Schemes for Session Initiation Protocol}, booktitle = {International Conference on Networked Computing and Advanced Information Management, {NCM} 2009, Fifth International Joint Conference on INC, {IMS} and {IDC:} {INC} 2009: International Conference on Networked Computing, {IMS} 2009: International Conference on Advanced Information Management and Service, {IDC} 2009: International Conference on Digital Content, Multimedia Technology and its Applications, Seoul, Korea, August 25-27, 2009}, pages = {618--621}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/NCM.2009.251}, doi = {10.1109/NCM.2009.251}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ncm/JoLKKW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0912-0580, author = {Yunho Lee and Soojin Lee}, title = {A New Efficient Key Management Protocol for Wireless Sensor and Actor Networks}, journal = {CoRR}, volume = {abs/0912.0580}, year = {2009}, url = {http://arxiv.org/abs/0912.0580}, eprinttype = {arXiv}, eprint = {0912.0580}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0912-0580.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icebe/LeeKW08, author = {Yunho Lee and Seungjoo Kim and Dongho Won}, title = {How to Trust {DRE} Voting Machines Preserving Voter Privacy}, booktitle = {2008 {IEEE} International Conference on e-Business Engineering, {ICEBE} 2008, Xi'an, China, October 22-24, 2008}, pages = {302--307}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ICEBE.2008.37}, doi = {10.1109/ICEBE.2008.37}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icebe/LeeKW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atc/ChoiLKKW07, author = {Donghyun Choi and Yunho Lee and Hogab Kang and Seungjoo Kim and Dongho Won}, editor = {Bin Xiao and Laurence Tianruo Yang and Jianhua Ma and Christian M{\"{u}}ller{-}Schloer and Yu Hua}, title = {An Efficient and Secure Rights Sharing Method for {DRM} System Against Replay Attack}, booktitle = {Autonomic and Trusted Computing, 4th International Conference, {ATC} 2007, Hong Kong, China, July 11-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4610}, pages = {135--145}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73547-2\_16}, doi = {10.1007/978-3-540-73547-2\_16}, timestamp = {Thu, 01 Feb 2024 20:40:31 +0100}, biburl = {https://dblp.org/rec/conf/atc/ChoiLKKW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hci/ShinCLPKW07, author = {Donghwi Shin and Youngsung Choi and Yunho Lee and Sangjoon Park and Seungjoo Kim and Dongho Won}, editor = {Constantine Stephanidis}, title = {Security Analysis on the Authentication Mechanisms of Korean Popular Messengers}, booktitle = {Universal Access in Human Computer Interaction. Coping with Diversity, 4th International Conference on Universal Access in Human-Computer Interaction, {UAHCI} 2007, Held as Part of {HCI} International 2007, Beijing, China, July 22-27, 2007, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {4554}, pages = {547--552}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73279-2\_61}, doi = {10.1007/978-3-540-73279-2\_61}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hci/ShinCLPKW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LeeCKLPY06, author = {Soojin Lee and Byungchun Chung and Heeyoul Kim and Yunho Lee and Chanil Park and Hyunsoo Yoon}, title = {Real-time analysis of intrusion detection alerts via correlation}, journal = {Comput. Secur.}, volume = {25}, number = {3}, pages = {169--183}, year = {2006}, url = {https://doi.org/10.1016/j.cose.2005.09.004}, doi = {10.1016/J.COSE.2005.09.004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LeeCKLPY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/LeeKW06, author = {Yunho Lee and Seungjoo Kim and Dongho Won}, title = {Weakness and Improvements of Yong-Lee's Anonymous Fingerprinting Protocol}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {89-A}, number = {7}, pages = {2084--2087}, year = {2006}, url = {https://doi.org/10.1093/ietfec/e89-a.7.2084}, doi = {10.1093/IETFEC/E89-A.7.2084}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/LeeKW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aict/Lee06, author = {Yunho Lee}, title = {Channel Prediction with Cascade {AR} Modeling}, booktitle = {Advanced International Conference on Telecommunications and International Conference on Internet and Web Applications and Services {(AICT/ICIW} 2006), 19-25 February 2006, Guadeloupe, French Caribbean}, pages = {40}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/AICT-ICIW.2006.62}, doi = {10.1109/AICT-ICIW.2006.62}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aict/Lee06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/otm/LeeJKW06, author = {Yunho Lee and Heasuk Jo and Seungjoo Kim and Dongho Won}, editor = {Robert Meersman and Zahir Tari and Pilar Herrero}, title = {An Efficient Dispute Resolving Method for Digital Images}, booktitle = {On the Move to Meaningful Internet Systems 2006: {OTM} 2006 Workshops, {OTM} Confederated International Workshops and Posters, AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET, OnToContent, ORM, PerSys, {OTM} Academy Doctoral Consortium, RDDS, SWWS, and SeBGIS 2006, Montpellier, France, October 29 - November 3, 2006. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {4277}, pages = {331--341}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11915034\_57}, doi = {10.1007/11915034\_57}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/otm/LeeJKW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeeLKW06, author = {Yunho Lee and Kwang{-}Woo Lee and Seungjoo Kim and Dongho Won}, title = {Towards Trustworthy e-Voting using Paper Receipts}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {167}, year = {2006}, url = {http://eprint.iacr.org/2006/167}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeeLKW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/euc/LeeLKWY05, author = {Yunho Lee and Kwang{-}Woo Lee and Seungjoo Kim and Dongho Won and Hyungkyu Yang}, editor = {Tomoya Enokido and Lu Yan and Bin Xiao and Daeyoung Kim and Yuan{-}Shun Dai and Laurence Tianruo Yang}, title = {A Method for Deciding Quantization Steps in {QIM} Watermarking Schemes}, booktitle = {Embedded and Ubiquitous Computing - {EUC} 2005 Workshops, {EUC} 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Nagasaki, Japan, December 6-9, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3823}, pages = {965--975}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596042\_99}, doi = {10.1007/11596042\_99}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/euc/LeeLKWY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.