Follow
Jong-Hyouk Lee (이종혁)
Jong-Hyouk Lee (이종혁)
Dept. of Computer and Information Security, Sejong University
Verified email at sejong.ac.kr - Homepage
Title
Cited by
Cited by
Year
Anonymous authentication for wireless body area networks with provable security
D He, S Zeadally, N Kumar, JH Lee
IEEE Systems Journal 11 (4), 2590-2601, 2016
4072016
Blockchain-based secure firmware update for embedded devices in an Internet of Things environment
B Lee, JH Lee
The Journal of Supercomputing 73 (3), 1152-1167, 2017
3342017
Requirements of distributed mobility management
HA Chan, et al.
IETF RFC 7333, 2012
2232012
Analysis of the main consensus protocols of blockchain
S Zhang, JH Lee
ICT express 6 (2), 93-97, 2020
2122020
Enhanced three-factor security protocol for consumer USB mass storage devices
D He, N Kumar, JH Lee, RS Sherratt
IEEE Transactions on Consumer Electronics 60 (1), 30-37, 2014
1952014
How the blockchain revolution will reshape the consumer electronics industry [future directions]
JH Lee, M Pilkington
IEEE Consumer Electronics Magazine 6 (3), 19-23, 2017
1722017
Comparative Handover Performance Analysis of IPv6 Mobility Management Protocols
JH Lee, JM Bonnin, I You, TM Chung
Industrial Electronics, IEEE Transactions on 60 (3), 1077-1088, 2013
1472013
BIDaaS: Blockchain based ID as a service
JH Lee
IEEE Access 6, 2274-2278, 2017
1382017
Cost analysis of IP mobility management protocols for consumer mobile devices
JH Lee, T Ernst, TM Chung
IEEE Transactions on Consumer Electronics 56 (2), 1010-1017, 2010
1362010
Performance Analysis of PMIPv6 based NEtwork MObility for Intelligent Transportation Systems
JH Lee, T Ernst, N Chilamkurti
Vehicular Technology, IEEE Transactions on 61 (1), 74-85, 2012
1242012
Intelligent mobile video surveillance system as a Bayesian coalition game in vehicular sensor networks: Learning automata approach
N Kumar, JH Lee, JJPC Rodrigues
IEEE Transactions on Intelligent Transportation Systems 16 (3), 1148-1161, 2014
1192014
Effective value of decision tree with KDD 99 intrusion detection datasets for intrusion detection system
JH Lee, JH Lee, SG Sohn, JH Ryu, TM Chung
2008 10th International conference on advanced communication technology 2 …, 2008
1172008
Peer-to-peer cooperative caching for data dissemination in urban vehicular communications
N Kumar, JH Lee
IEEE Systems Journal 8 (4), 1136-1144, 2013
1072013
Privacy-preserving data aggregation scheme against internal attackers in smart grids
D He, N Kumar, JH Lee
Wireless Networks 22 (2), 491-502, 2016
1032016
Double-spending with a sybil attack in the bitcoin decentralized network
S Zhang, JH Lee
IEEE transactions on Industrial Informatics 15 (10), 5715-5722, 2019
992019
Lightweight ECC based RFID authentication integrated with an ID verifier transfer protocol
D He, N Kumar, N Chilamkurti, JH Lee
Journal of medical systems 38 (10), 1-6, 2014
932014
Distributed mobility anchoring
P Seite, P Bertin, JH Lee
draft-seite-dmm-dma-06 (work in progress), 2013
90*2013
One-to-many authentication for access control in mobile pay-TV systems
D He, N Kumar, H Shen, JH Lee
Science China Information Sciences 59 (5), 1-14, 2016
882016
Anonymous two-factor authentication for consumer roaming service in global mobility networks
D He, N Kumar, MK Khan, JH Lee
Consumer Electronics, IEEE Transactions on 59 (4), 811-817, 2013
852013
Secure firmware validation and update for consumer devices in home networking
BC Choi, SH Lee, JC Na, JH Lee
IEEE Transactions on Consumer Electronics 62 (1), 39-44, 2016
732016
The system can't perform the operation now. Try again later.
Articles 1–20