Hyotaek Lim
Hyotaek Lim
Professor, Division of Computer Engineering, Dongseo University
Verified email at dongseo.ac.kr - Homepage
TitleCited byYear
A strong user authentication framework for cloud computing
AJ Choudhury, P Kumar, M Sain, H Lim, H Jae-Lee
2011 IEEE Asia-Pacific Services Computing Conference, 110-115, 2011
Hand tracking and gesture recognition system for human-computer interaction using low-cost hardware
HS Yeo, BG Lee, H Lim
Multimedia Tools and Applications 74 (8), 2687-2715, 2015
Online banking authentication system using mobile-OTP with QR-code
YS Lee, NH Kim, H Lim, HK Jo, HJ Lee
5th International Conference on Computer Sciences and Convergence …, 2010
Two factor authentication for cloud computing
S Lee, I Ong, HT Lim, HJ Lee
Journal of information and communication convergence engineering 8 (4), 427-432, 2010
Leveraging client-side storage techniques for enhanced use of multiple consumer cloud storage services on resource-constrained mobile devices
HS Yeo, XS Phang, HJ Lee, H Lim
Journal of Network and Computer Applications 43, 142-156, 2014
Homomorphic encryption in mobile multi cloud computing
M Louk, H Lim
2015 international conference on information networking (ICOIN), 493-497, 2015
e2Home: A lightweight smart home management system
CM Yeoh, HY Tan, CK Kok, HJ Lee, H Lim
2008 Third International Conference on Convergence and Hybrid Information …, 2008
One-time knocking framework using SPA and IPsec
JH Liew, S Lee, I Ong, HJ Lee, H Lim
2010 2nd International Conference on Education Technology and Computer 5, V5 …, 2010
An efficient online signature verification scheme using dynamic programming of string matching
AG Reza, H Lim, MJ Alam
International Conference on Hybrid Information Technology, 590-597, 2011
A new content-defined chunking algorithm for data deduplication in cloud storage
RNS Widodo, H Lim, M Atiquzzaman
Future Generation Computer Systems 71, 145-156, 2017
SDM: Smart deduplication for mobile cloud storage
RNS Widodo, H Lim, M Atiquzzaman
Future Generation Computer Systems 70, 64-73, 2017
A secure and efficient three-pass authenticated key agreement protocol based on elliptic curves
MH Lim, CM Yeoh, S Lee, H Lim, H Lee
International Conference on Research in Networking, 170-182, 2008
Cell loss recovery method in B-ISDN/ATM networks
HT Lim, JS Song
Electronics Letters 31 (11), 849-851, 1995
A ping pong based one-time-passwords authentication system
B Davaanaym, YS Lee, HJ Lee, SG Lee, HT Lim
2009 Fifth International Joint Conference on INC, IMS and IDC, 574-579, 2009
Dragon-MAC: Securing Wireless Sensor Networks with Authenticated Encryption.
SY Lim, CC Pu, HT Lim, HJ Lee
IACR Cryptology ePrint Archive 2007, 204, 2007
Display device
KD Lee
US Patent 7,701,530, 2010
Design and implementation of iATA on Windows CE platform: an ATA-based virtual storage system
CM Yeoh, YS They, HJ Lee, H Lim
2009 WRI International Conference on Communications and Mobile Computing 3 …, 2009
Atmospheric input of trace metals over the Yellow Sea: Shipboard results, April 1995
GH Hong, SH Kim, DB Yang, GH Lim
Health of the Yellow Sea, 211-235, 1998
Design and implementation of iSCSI-based virtual storage system for mobile health care
H Lim, S Choi
Proceedings of 7th International Workshop on Enterprise networking and …, 2005
Adaptive selection of dynamic VM consolidation algorithm using neural network for cloud resource management
JN Witanto, H Lim, M Atiquzzaman
Future Generation Computer Systems 87, 35-42, 2018
The system can't perform the operation now. Try again later.
Articles 1–20