Jong-Hyouk Lee (이종혁)
Jong-Hyouk Lee (이종혁)
Dept. of Computer and Information Security, Sejong University
Verified email at - Homepage
Cited by
Cited by
Anonymous authentication for wireless body area networks with provable security
D He, S Zeadally, N Kumar, JH Lee
IEEE Systems Journal 11 (4), 2590-2601, 2016
Blockchain-based secure firmware update for embedded devices in an Internet of Things environment
B Lee, JH Lee
The Journal of Supercomputing 73, 1152-1167, 2017
Analysis of the main consensus protocols of blockchain
S Zhang, JH Lee
ICT express 6 (2), 93-97, 2020
Requirements of distributed mobility management
HA Chan, et al.
IETF RFC 7333, 2012
Enhanced three-factor security protocol for consumer USB mass storage devices
D He, N Kumar, JH Lee, RS Sherratt
IEEE Transactions on Consumer Electronics 60 (1), 30-37, 2014
How the blockchain revolution will reshape the consumer electronics industry [future directions]
JH Lee, M Pilkington
IEEE Consumer Electronics Magazine 6 (3), 19-23, 2017
BIDaaS: Blockchain based ID as a service
JH Lee
IEEE Access 6, 2274-2278, 2017
Double-spending with a sybil attack in the bitcoin decentralized network
S Zhang, JH Lee
IEEE transactions on Industrial Informatics 15 (10), 5715-5722, 2019
Comparative Handover Performance Analysis of IPv6 Mobility Management Protocols
JH Lee, JM Bonnin, I You, TM Chung
Industrial Electronics, IEEE Transactions on 60 (3), 1077-1088, 2013
Cost analysis of IP mobility management protocols for consumer mobile devices
JH Lee, T Ernst, TM Chung
IEEE Transactions on Consumer Electronics 56 (2), 1010-1017, 2010
Intelligent mobile video surveillance system as a Bayesian coalition game in vehicular sensor networks: Learning automata approach
N Kumar, JH Lee, JJPC Rodrigues
IEEE Transactions on Intelligent Transportation Systems 16 (3), 1148-1161, 2014
Performance Analysis of PMIPv6 based NEtwork MObility for Intelligent Transportation Systems
JH Lee, T Ernst, N Chilamkurti
Vehicular Technology, IEEE Transactions on 61 (1), 74-85, 2012
Effective value of decision tree with KDD 99 intrusion detection datasets for intrusion detection system
JH Lee, JH Lee, SG Sohn, JH Ryu, TM Chung
2008 10th International conference on advanced communication technology 2 …, 2008
Privacy-preserving data aggregation scheme against internal attackers in smart grids
D He, N Kumar, JH Lee
Wireless Networks 22, 491-502, 2016
Peer-to-peer cooperative caching for data dissemination in urban vehicular communications
N Kumar, JH Lee
IEEE Systems Journal 8 (4), 1136-1144, 2013
Lightweight ECC based RFID authentication integrated with an ID verifier transfer protocol
D He, N Kumar, N Chilamkurti, JH Lee
Journal of medical systems 38, 1-6, 2014
Anonymous two-factor authentication for consumer roaming service in global mobility networks
D He, N Kumar, MK Khan, JH Lee
Consumer Electronics, IEEE Transactions on 59 (4), 811-817, 2013
Security and privacy challenges in the internet of things [security and privacy matters]
JH Lee, H Kim
IEEE Consumer Electronics Magazine 6 (3), 134-136, 2017
One-to-many authentication for access control in mobile pay-TV systems
D He, N Kumar, H Shen, JH Lee
Science China. Information Sciences 59 (5), 052108, 2016
Distributed mobility anchoring
P Seite, P Bertin, L JH
draft-seite-dmm-dma-06 (work in progress), 2013
The system can't perform the operation now. Try again later.
Articles 1–20