Hyotaek Lim
Hyotaek Lim
Professor, Division of Computer Engineering, Dongseo University
Verified email at dongseo.ac.kr - Homepage
Cited by
Cited by
A strong user authentication framework for cloud computing
AJ Choudhury, P Kumar, M Sain, H Lim, H Jae-Lee
2011 IEEE Asia-Pacific Services Computing Conference, 110-115, 2011
Hand tracking and gesture recognition system for human-computer interaction using low-cost hardware
HS Yeo, BG Lee, H Lim
Multimedia Tools and Applications 74 (8), 2687-2715, 2015
Online banking authentication system using mobile-OTP with QR-code
YS Lee, NH Kim, H Lim, HK Jo, HJ Lee
5th International Conference on Computer Sciences and Convergence …, 2010
Two factor authentication for cloud computing
S Lee, I Ong, HT Lim, HJ Lee
Journal of information and communication convergence engineering 8 (4), 427-432, 2010
Homomorphic encryption in mobile multi cloud computing
M Louk, H Lim
2015 international conference on information networking (ICOIN), 493-497, 2015
Leveraging client-side storage techniques for enhanced use of multiple consumer cloud storage services on resource-constrained mobile devices
HS Yeo, XS Phang, HJ Lee, H Lim
Journal of Network and Computer Applications 43, 142-156, 2014
e2Home: A lightweight smart home management system
CM Yeoh, HY Tan, CK Kok, HJ Lee, H Lim
2008 Third International Conference on Convergence and Hybrid Information …, 2008
An efficient online signature verification scheme using dynamic programming of string matching
AG Reza, H Lim, MJ Alam
International Conference on Hybrid Information Technology, 590-597, 2011
A new content-defined chunking algorithm for data deduplication in cloud storage
RNS Widodo, H Lim, M Atiquzzaman
Future Generation Computer Systems 71, 145-156, 2017
One-time knocking framework using SPA and IPsec
JH Liew, S Lee, I Ong, HJ Lee, H Lim
2010 2nd International Conference on Education Technology and Computer 5, V5 …, 2010
A ping pong based one-time-passwords authentication system
B Davaanaym, YS Lee, HJ Lee, SG Lee, HT Lim
2009 Fifth International Joint Conference on INC, IMS and IDC, 574-579, 2009
A secure and efficient three-pass authenticated key agreement protocol based on elliptic curves
MH Lim, CM Yeoh, S Lee, H Lim, H Lee
International Conference on Research in Networking, 170-182, 2008
SDM: Smart deduplication for mobile cloud storage
RNS Widodo, H Lim, M Atiquzzaman
Future Generation Computer Systems 70, 64-73, 2017
Cell loss recovery method in B-ISDN/ATM networks
HT Lim, JS Song
Electronics Letters 31 (11), 849-851, 1995
Adaptive selection of dynamic VM consolidation algorithm using neural network for cloud resource management
JN Witanto, H Lim, M Atiquzzaman
Future Generation Computer Systems 87, 35-42, 2018
Display device
KD Lee
US Patent 7,701,530, 2010
Design and implementation of iATA on Windows CE platform: an ATA-based virtual storage system
CM Yeoh, YS They, HJ Lee, H Lim
2009 WRI International Conference on Communications and Mobile Computing 3 …, 2009
Dragon-MAC: Securing Wireless Sensor Networks with Authenticated Encryption.
SY Lim, CC Pu, HT Lim, HJ Lee
IACR Cryptol. ePrint Arch. 2007, 204, 2007
Atmospheric input of trace metals over the Yellow Sea: Shipboard results, April 1995
GH Hong, SH Kim, DB Yang, GH Lim
Health of the Yellow Sea, 211-235, 1998
A study on efficient OTP generation using stream cipher with random digit
YS Lee, HT Lim, HJ Lee
2010 The 12th International Conference on Advanced Communication Technology …, 2010
The system can't perform the operation now. Try again later.
Articles 1–20