BibTeX records: Yunho Lee

download as .bib file

@article{DBLP:journals/access/ShinLLKL23,
  author       = {Kyounga Shin and
                  Yunho Lee and
                  Jungho Lim and
                  Honggoo Kang and
                  Sangjin Lee},
  title        = {System {API} Vectorization for Malware Detection},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {53788--53805},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3276902},
  doi          = {10.1109/ACCESS.2023.3276902},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/ShinLLKL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isscc/ParkCYBKYLCPLCM22,
  author       = {Myeong{-}Jae Park and
                  Ho Sung Cho and
                  Tae{-}Sik Yun and
                  Sangjin Byeon and
                  Young Jun Koo and
                  Sang{-}Sic Yoon and
                  Dong{-}Uk Lee and
                  Seokwoo Choi and
                  Ji Hwan Park and
                  Jinhyung Lee and
                  Kyungjun Cho and
                  Junil Moon and
                  Byung Kuk Yoon and
                  Young Jun Park and
                  Sangmuk Oh and
                  Chang Kwon Lee and
                  Tae{-}Kyun Kim and
                  Seong{-}Hee Lee and
                  Hyun{-}Woo Kim and
                  Yucheon Ju and
                  Seung{-}Kyun Lim and
                  Seung Geun Baek and
                  Kyo Yun Lee and
                  Sang Hun Lee and
                  Woo Sung We and
                  Seungchan Kim and
                  Yongseok Choi and
                  Seong{-}Hak Lee and
                  Seung Min Yang and
                  Gunho Lee and
                  In{-}Keun Kim and
                  Younghyun Jeon and
                  Jae{-}Hyung Park and
                  Jong Chan Yun and
                  Chanhee Park and
                  Sun{-}Yeol Kim and
                  Sungjin Kim and
                  Dong{-}Yeol Lee and
                  Su{-}Hyun Oh and
                  Taejin Hwang and
                  Junghyun Shin and
                  Yunho Lee and
                  Hyunsik Kim and
                  Jaeseung Lee and
                  Youngdo Hur and
                  Sangkwon Lee and
                  Jieun Jang and
                  Junhyun Chun and
                  Joohwan Cho},
  title        = {A 192-Gb 12-High 896-GB/s {HBM3} {DRAM} with a {TSV} Auto-Calibration
                  Scheme and Machine-Learning-Based Layout Optimization},
  booktitle    = {{IEEE} International Solid-State Circuits Conference, {ISSCC} 2022,
                  San Francisco, CA, USA, February 20-26, 2022},
  pages        = {444--446},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ISSCC42614.2022.9731562},
  doi          = {10.1109/ISSCC42614.2022.9731562},
  timestamp    = {Mon, 21 Mar 2022 13:32:47 +0100},
  biburl       = {https://dblp.org/rec/conf/isscc/ParkCYBKYLCPLCM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smc/OhJYLKK19,
  author       = {Byungsoo Oh and
                  Tae Joon Jun and
                  WonDeuk Yoon and
                  Yunho Lee and
                  Sangtae Kim and
                  Daeyoung Kim},
  title        = {Enhancing Trust of Supply Chain Using Blockchain Platform with Robust
                  Data Model and Verification Mechanisms},
  booktitle    = {2019 {IEEE} International Conference on Systems, Man and Cybernetics,
                  {SMC} 2019, Bari, Italy, October 6-9, 2019},
  pages        = {3504--3511},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/SMC.2019.8913871},
  doi          = {10.1109/SMC.2019.8913871},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/smc/OhJYLKK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/KimLL18,
  author       = {Dohyun Kim and
                  Yunho Lee and
                  Sangjin Lee},
  title        = {Mobile forensic reference set (MFReS) and mobile forensic investigation
                  for android devices},
  journal      = {J. Supercomput.},
  volume       = {74},
  number       = {12},
  pages        = {6618--6632},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11227-017-2205-5},
  doi          = {10.1007/S11227-017-2205-5},
  timestamp    = {Mon, 02 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tjs/KimLL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isc2/YoonLCSHLKK18,
  author       = {WonDeuk Yoon and
                  Yunho Lee and
                  Hyangseok Chae and
                  Sangwon Seo and
                  Sehyeon Heo and
                  Nakyung Lee and
                  Kiwoong Kwon and
                  Daeyoung Kim},
  title        = {{HERMES:} GS1-based Smart City Service Intercommunity},
  booktitle    = {{IEEE} International Smart Cities Conference, {ISC2} 2018, Kansas
                  City, MO, USA, September 16-19, 2018},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ISC2.2018.8656925},
  doi          = {10.1109/ISC2.2018.8656925},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isc2/YoonLCSHLKK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/ShinSLY14,
  author       = {Yongjoo Shin and
                  Sihu Song and
                  Yunho Lee and
                  Hyunsoo Yoon},
  title        = {A Novel Intrusion Tolerant System Using Live Migration},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {97-D},
  number       = {4},
  pages        = {984--988},
  year         = {2014},
  url          = {https://doi.org/10.1587/transinf.E97.D.984},
  doi          = {10.1587/TRANSINF.E97.D.984},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/ShinSLY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SonLKJLL13,
  author       = {Namheun Son and
                  Yunho Lee and
                  Dohyun Kim and
                  Joshua I. James and
                  Sangjin Lee and
                  Kyungho Lee},
  title        = {A study of user data integrity during acquisition of Android devices},
  journal      = {Digit. Investig.},
  volume       = {10},
  number       = {Supplement},
  pages        = {S3--S11},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.diin.2013.06.001},
  doi          = {10.1016/J.DIIN.2013.06.001},
  timestamp    = {Mon, 02 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/SonLKJLL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icuimc/JeonLW13,
  author       = {Woongryul Jeon and
                  Yunho Lee and
                  Dongho Won},
  title        = {A secure user-friendly authentication scheme with anonymity for wireless
                  communications},
  booktitle    = {The 7th International Conference on Ubiquitous Information Management
                  and Communication, {ICUIMC} '13, Kota Kinabalu, Malaysia - January
                  17 - 19, 2013},
  pages        = {110},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2448556.2448666},
  doi          = {10.1145/2448556.2448666},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icuimc/JeonLW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mue/ChoCKL13,
  author       = {Seongsoo Cho and
                  Son Kwang Chul and
                  Chung Hyeok Kim and
                  Yunho Lee},
  editor       = {James J. Park and
                  Joseph Kee{-}Yin Ng and
                  Hwa{-}Young Jeong and
                  Agustinus Borgy Waluyo},
  title        = {Development of Mobile Games for Rehabilitation Training for the Hearing
                  Impaired},
  booktitle    = {Multimedia and Ubiquitous Engineering, {MUE} 2013, May 9-11, 2013,
                  Seoul, Korea},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {240},
  pages        = {621--625},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-94-007-6738-6\_76},
  doi          = {10.1007/978-94-007-6738-6\_76},
  timestamp    = {Sun, 04 Jun 2017 10:10:13 +0200},
  biburl       = {https://dblp.org/rec/conf/mue/ChoCKL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/LeeYL12,
  author       = {Yunho Lee and
                  Sang Guun Yoo and
                  Soojin Lee},
  title        = {An Efficient Detection And Management Of False Accusation Attacks
                  In Hierarchical Ad-Hoc Networks},
  journal      = {{KSII} Trans. Internet Inf. Syst.},
  volume       = {6},
  number       = {7},
  pages        = {1874--1893},
  year         = {2012},
  url          = {https://doi.org/10.3837/tiis.2012.07.009},
  doi          = {10.3837/TIIS.2012.07.009},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itiis/LeeYL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fgit/AhnLP12,
  author       = {Shinkwon Ahn and
                  Yunho Lee and
                  Kyungil Park},
  editor       = {Tai{-}Hoon Kim and
                  Hyun Seob Cho and
                  Osvaldo Gervasi and
                  Stephen S. Yau},
  title        = {A Case Study on International Human Rights Restoration and Peace -
                  (With Focus on the Problems Arising from the Japanese Military's Sex
                  Slavery Practice)},
  booktitle    = {Computer Applications for Graphics, Grid Computing, and Industrial
                  Environment - International Conferences, GDC, {IESH} and {CGAG} 2012,
                  Held as Part of the Future Generation Information Technology Conference,
                  {FGIT} 2012, Gangneug, Korea, December 16-19, 2012. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {351},
  pages        = {124--132},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35600-1\_18},
  doi          = {10.1007/978-3-642-35600-1\_18},
  timestamp    = {Tue, 23 May 2017 01:07:31 +0200},
  biburl       = {https://dblp.org/rec/conf/fgit/AhnLP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsa/KimJLLW12,
  author       = {Hakhyun Kim and
                  Woongryul Jeon and
                  Kwang{-}Woo Lee and
                  Yunho Lee and
                  Dongho Won},
  editor       = {Beniamino Murgante and
                  Osvaldo Gervasi and
                  Sanjay Misra and
                  Nadia Nedjah and
                  Ana Maria A. C. Rocha and
                  David Taniar and
                  Bernady O. Apduhan},
  title        = {Cryptanalysis and Improvement of a Biometrics-Based Multi-server Authentication
                  with Key Agreement Scheme},
  booktitle    = {Computational Science and Its Applications - {ICCSA} 2012 - 12th International
                  Conference, Salvador de Bahia, Brazil, June 18-21, 2012, Proceedings,
                  Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7335},
  pages        = {391--406},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31137-6\_30},
  doi          = {10.1007/978-3-642-31137-6\_30},
  timestamp    = {Tue, 14 May 2019 10:00:43 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsa/KimJLLW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cfi/YooLW11,
  author       = {Jaesung Yoo and
                  Yunho Lee and
                  Dongho Won},
  editor       = {Dae Young Kim},
  title        = {An improved key establishment scheme for wireless sensor network},
  booktitle    = {6th International Conference on Future Internet Technologies, {CFI}
                  '11, Seoul, Republic of Korea, June 13-15, 2011},
  pages        = {70--71},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2002396.2002415},
  doi          = {10.1145/2002396.2002415},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cfi/YooLW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ichit/LeeYKL11,
  author       = {Yunho Lee and
                  Sang Guun Yoo and
                  Juho Kim and
                  Soojin Lee},
  editor       = {Geuk Lee and
                  Daniel Howard and
                  Dominik Slezak},
  title        = {Specification-Based Intrusion Detection System for WiBro},
  booktitle    = {Convergence and Hybrid Information Technology - 5th International
                  Conference, {ICHIT} 2011, Daejeon, Korea, September 22-24, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6935},
  pages        = {445--455},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24082-9\_55},
  doi          = {10.1007/978-3-642-24082-9\_55},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/ichit/LeeYKL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KimJLW11,
  author       = {Hakhyun Kim and
                  Woongryul Jeon and
                  Yunho Lee and
                  Dongho Won},
  title        = {Cryptanalysis and improvement of a biometrics-based multi-server authentication
                  with key agreement scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {451},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/451},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KimJLW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/LeeKW10,
  author       = {Yunho Lee and
                  Seungjoo Kim and
                  Dongho Won},
  title        = {Enhancement of two-factor authenticated key exchange protocols in
                  public wireless LANs},
  journal      = {Comput. Electr. Eng.},
  volume       = {36},
  number       = {1},
  pages        = {213--223},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.compeleceng.2009.08.007},
  doi          = {10.1016/J.COMPELECENG.2009.08.007},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cee/LeeKW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/LeePMKW10,
  author       = {Yunho Lee and
                  Sangjoon Park and
                  Masahiro Mambo and
                  Seungjoo Kim and
                  Dongho Won},
  title        = {Towards trustworthy e-voting using paper receipts},
  journal      = {Comput. Stand. Interfaces},
  volume       = {32},
  number       = {5-6},
  pages        = {305--311},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.csi.2010.03.001},
  doi          = {10.1016/J.CSI.2010.03.001},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csi/LeePMKW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/LeeLWK10,
  author       = {Kwang{-}Woo Lee and
                  Yunho Lee and
                  Dongho Won and
                  Seungjoo Kim},
  editor       = {Jin Kwak and
                  Robert H. Deng and
                  Yoojae Won and
                  Guilin Wang},
  title        = {Protection Profile for Secure E-Voting Systems},
  booktitle    = {Information Security, Practice and Experience, 6th International Conference,
                  {ISPEC} 2010, Seoul, Korea, May 12-13, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6047},
  pages        = {386--397},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12827-1\_28},
  doi          = {10.1007/978-3-642-12827-1\_28},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/LeeLWK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsa/LeeLKW09,
  author       = {Kwang{-}Woo Lee and
                  Yunho Lee and
                  Seungjoo Kim and
                  Dongho Won},
  editor       = {Osvaldo Gervasi and
                  David Taniar and
                  Beniamino Murgante and
                  Antonio Lagan{\`{a}} and
                  Youngsong Mun and
                  Marina L. Gavrilova},
  title        = {A Practical Approach to a Reliable Electronic Election},
  booktitle    = {Computational Science and Its Applications - {ICCSA} 2009, International
                  Conference, Seoul, Korea, June 29-July 2, 2009, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5593},
  pages        = {191--203},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02457-3\_17},
  doi          = {10.1007/978-3-642-02457-3\_17},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsa/LeeLKW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/JoJLKW09,
  author       = {Heasuk Jo and
                  Woongryul Jeon and
                  Yunho Lee and
                  Seungjoo Kim and
                  Dongho Won},
  editor       = {Feng Bao and
                  Hui Li and
                  Guilin Wang},
  title        = {Security Specification for Conversion Technologies of Heterogeneous
                  {DRM} Systems},
  booktitle    = {Information Security Practice and Experience, 5th International Conference,
                  {ISPEC} 2009, Xi'an, China, April 13-15, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5451},
  pages        = {159--170},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00843-6\_15},
  doi          = {10.1007/978-3-642-00843-6\_15},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/JoJLKW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ncm/JoLKKW09,
  author       = {Heasuk Jo and
                  Yunho Lee and
                  Mijin Kim and
                  Seungjoo Kim and
                  Dongho Won},
  editor       = {Jinhwa Kim and
                  Dursun Delen and
                  Jinsoo Park and
                  Franz Ko and
                  Chen Rui and
                  Jong Hyung Lee and
                  Jian Wang and
                  Gang Kou},
  title        = {Off-Line Password-Guessing Attack to Yang's and Huang's Authentication
                  Schemes for Session Initiation Protocol},
  booktitle    = {International Conference on Networked Computing and Advanced Information
                  Management, {NCM} 2009, Fifth International Joint Conference on INC,
                  {IMS} and {IDC:} {INC} 2009: International Conference on Networked
                  Computing, {IMS} 2009: International Conference on Advanced Information
                  Management and Service, {IDC} 2009: International Conference on Digital
                  Content, Multimedia Technology and its Applications, Seoul, Korea,
                  August 25-27, 2009},
  pages        = {618--621},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/NCM.2009.251},
  doi          = {10.1109/NCM.2009.251},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ncm/JoLKKW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0912-0580,
  author       = {Yunho Lee and
                  Soojin Lee},
  title        = {A New Efficient Key Management Protocol for Wireless Sensor and Actor
                  Networks},
  journal      = {CoRR},
  volume       = {abs/0912.0580},
  year         = {2009},
  url          = {http://arxiv.org/abs/0912.0580},
  eprinttype    = {arXiv},
  eprint       = {0912.0580},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0912-0580.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icebe/LeeKW08,
  author       = {Yunho Lee and
                  Seungjoo Kim and
                  Dongho Won},
  title        = {How to Trust {DRE} Voting Machines Preserving Voter Privacy},
  booktitle    = {2008 {IEEE} International Conference on e-Business Engineering, {ICEBE}
                  2008, Xi'an, China, October 22-24, 2008},
  pages        = {302--307},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ICEBE.2008.37},
  doi          = {10.1109/ICEBE.2008.37},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icebe/LeeKW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atc/ChoiLKKW07,
  author       = {Donghyun Choi and
                  Yunho Lee and
                  Hogab Kang and
                  Seungjoo Kim and
                  Dongho Won},
  editor       = {Bin Xiao and
                  Laurence Tianruo Yang and
                  Jianhua Ma and
                  Christian M{\"{u}}ller{-}Schloer and
                  Yu Hua},
  title        = {An Efficient and Secure Rights Sharing Method for {DRM} System Against
                  Replay Attack},
  booktitle    = {Autonomic and Trusted Computing, 4th International Conference, {ATC}
                  2007, Hong Kong, China, July 11-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4610},
  pages        = {135--145},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73547-2\_16},
  doi          = {10.1007/978-3-540-73547-2\_16},
  timestamp    = {Thu, 01 Feb 2024 20:40:31 +0100},
  biburl       = {https://dblp.org/rec/conf/atc/ChoiLKKW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hci/ShinCLPKW07,
  author       = {Donghwi Shin and
                  Youngsung Choi and
                  Yunho Lee and
                  Sangjoon Park and
                  Seungjoo Kim and
                  Dongho Won},
  editor       = {Constantine Stephanidis},
  title        = {Security Analysis on the Authentication Mechanisms of Korean Popular
                  Messengers},
  booktitle    = {Universal Access in Human Computer Interaction. Coping with Diversity,
                  4th International Conference on Universal Access in Human-Computer
                  Interaction, {UAHCI} 2007, Held as Part of {HCI} International 2007,
                  Beijing, China, July 22-27, 2007, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4554},
  pages        = {547--552},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73279-2\_61},
  doi          = {10.1007/978-3-540-73279-2\_61},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hci/ShinCLPKW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LeeCKLPY06,
  author       = {Soojin Lee and
                  Byungchun Chung and
                  Heeyoul Kim and
                  Yunho Lee and
                  Chanil Park and
                  Hyunsoo Yoon},
  title        = {Real-time analysis of intrusion detection alerts via correlation},
  journal      = {Comput. Secur.},
  volume       = {25},
  number       = {3},
  pages        = {169--183},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.cose.2005.09.004},
  doi          = {10.1016/J.COSE.2005.09.004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LeeCKLPY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/LeeKW06,
  author       = {Yunho Lee and
                  Seungjoo Kim and
                  Dongho Won},
  title        = {Weakness and Improvements of Yong-Lee's Anonymous Fingerprinting Protocol},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {89-A},
  number       = {7},
  pages        = {2084--2087},
  year         = {2006},
  url          = {https://doi.org/10.1093/ietfec/e89-a.7.2084},
  doi          = {10.1093/IETFEC/E89-A.7.2084},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/LeeKW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aict/Lee06,
  author       = {Yunho Lee},
  title        = {Channel Prediction with Cascade {AR} Modeling},
  booktitle    = {Advanced International Conference on Telecommunications and International
                  Conference on Internet and Web Applications and Services {(AICT/ICIW}
                  2006), 19-25 February 2006, Guadeloupe, French Caribbean},
  pages        = {40},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/AICT-ICIW.2006.62},
  doi          = {10.1109/AICT-ICIW.2006.62},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aict/Lee06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/otm/LeeJKW06,
  author       = {Yunho Lee and
                  Heasuk Jo and
                  Seungjoo Kim and
                  Dongho Won},
  editor       = {Robert Meersman and
                  Zahir Tari and
                  Pilar Herrero},
  title        = {An Efficient Dispute Resolving Method for Digital Images},
  booktitle    = {On the Move to Meaningful Internet Systems 2006: {OTM} 2006 Workshops,
                  {OTM} Confederated International Workshops and Posters, AWeSOMe, CAMS,
                  COMINF, IS, KSinBIT, MIOS-CIAO, MONET, OnToContent, ORM, PerSys, {OTM}
                  Academy Doctoral Consortium, RDDS, SWWS, and SeBGIS 2006, Montpellier,
                  France, October 29 - November 3, 2006. Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4277},
  pages        = {331--341},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11915034\_57},
  doi          = {10.1007/11915034\_57},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/otm/LeeJKW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeeLKW06,
  author       = {Yunho Lee and
                  Kwang{-}Woo Lee and
                  Seungjoo Kim and
                  Dongho Won},
  title        = {Towards Trustworthy e-Voting using Paper Receipts},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {167},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/167},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeeLKW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/euc/LeeLKWY05,
  author       = {Yunho Lee and
                  Kwang{-}Woo Lee and
                  Seungjoo Kim and
                  Dongho Won and
                  Hyungkyu Yang},
  editor       = {Tomoya Enokido and
                  Lu Yan and
                  Bin Xiao and
                  Daeyoung Kim and
                  Yuan{-}Shun Dai and
                  Laurence Tianruo Yang},
  title        = {A Method for Deciding Quantization Steps in {QIM} Watermarking Schemes},
  booktitle    = {Embedded and Ubiquitous Computing - {EUC} 2005 Workshops, {EUC} 2005
                  Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Nagasaki, Japan, December
                  6-9, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3823},
  pages        = {965--975},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11596042\_99},
  doi          = {10.1007/11596042\_99},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/euc/LeeLKWY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics