Follow
Changhoon Lee
Title
Cited by
Year
A chosen plaintext linear attack on block cipher CIKS-1
C Lee, D Hong, S Lee, S Lee, H Yang, J Lim
International Conference on Information and Communications Security, 456-468, 2002
392002
A chosen plaintext linear attack on block cipher CIKS-1
C Lee, D Hong, S Lee, S Lee, H Yang, J Lim
Information and Communications Security, 456-468, 2002
382002
A Cube Attack on a Reduced-Round Sycon
M Cho, H Eom, E Tcydenova, C Lee
Electronics 11 (21), 3605, 2022
12022
A framework for unified digital evidence management in security convergence
KS Lim, C Lee
Electronic Commerce Research 13 (3), 379-398, 2013
72013
A key management scheme for security and energy efficiency in sensor networks
HY Kim, CH Lee
網際網路技術學刊 13 (2), 223-231, 2012
52012
A learning automata-based fault-tolerant routing algorithm for mobile ad hoc networks
S Misra, PV Krishna, A Bhiwal, AS Chawla, BE Wolfinger, C Lee
The Journal of Supercomputing, 1-20, 2012
822012
A new approach of differential fault analysis on block ciphers with s-box
K Jeong, J Sung, S Hong, C Lee
International Information Institute (Tokyo). Information 16 (3), 1915, 2013
52013
A new cellular architecture for information retrieval from sensor networks through embedded service and security protocols
A Shahzad, R Landry, M Lee, N Xiong, J Lee, C Lee
Sensors 16 (6), 821, 2016
82016
A power-, delay-and emergency-efficient protocol of ubiquitous sensor network systems for silver town applications
YS Yu, SH Choi, HK Park, C Lee, YS Jeong, SH Kim
The Journal of Supercomputing 54 (1), 122-137, 2010
62010
A privacy preserving authentication scheme for roaming in ubiquitous networks
SA Chaudhry, A Albeshri, N Xiong, C Lee, T Shon
Cluster Computing, 1-14, 2017
222017
A reliability comparison method for OSINT validity analysis
S Gong, J Cho, C Lee
IEEE Transactions on Industrial Informatics 14 (12), 5428-5435, 2018
382018
A Research for Partition Restoration Techniques
J Namgung, I young Hong, J Park, C Lee, S Lee
Future Information Technology, 315-322, 2014
12014
A Special Issue on Information Sciences on Human Centric Computing
Q Jin, S Panchanathan, C Lee
A Special Issue on Information Sciences on Human Centric Computing, 257, 229, 2014
2014
A statistical model for network data analysis: KDD CUP 99’data evaluation and its comparing with MIT Lincoln Laboratory network data
J Cho, C Lee, S Cho, JH Song, J Lim, J Moon
Simulation Modelling Practice and Theory 18 (4), 431-435, 2010
72010
A Study of the Decryption Method of LockMyPix’s Media Files for Forensic Analysis
J Park, S Seo, Y Kim, C Lee
The Journal of Digital Forensics 14 (3), 269-278, 2020
52020
A Study on Application Method of Crypto-module for Industrial Control System
B Seok, Y Kim, C Lee
Journal of Digital Contents Society 18 (5), 1001-1008, 2017
32017
A Study on Creating WBC-AES Dummy LUT as a Countermeasure against DCA
M Choi, B Seok, S Seo, C Lee
Journal of the Korea Institute of Information Security & Cryptology 33 (3 …, 2023
2023
A Study on Rekeying and Sponged-based Scheme against Side Channel Attacks
TSD Phuc, C Lee
한국디지털콘텐츠학회 논문지 19 (3), 579-586, 2018
2018
A Study on Tachograph based Security Network
S Yaqoob, C Lee, T Shon
International Journal of Smart Home 7 (1), 231-238, 2013
52013
A Study on Tachograph based Security Network
S Yaqoob, C Lee, T Shon
International Journal of Smart Home 7 (1), 231-238, 2013
52013
The system can't perform the operation now. Try again later.
Articles 1–20