International Journal 6

  1. Tamer AbuHmed, KyungHee Lee, and DaeHun Nyang, “UOIT Keyboard: A Constructive Keyboard for Small Touchscreen Devices,” IEEE Transactions on Human-Machine Systems, Vol. 45, No. 6, pp. 782-789, Dec 2015.
  2. Jeonil Kang, DaeHun Nyang, and KyungHee Lee, “Two-Factor Face Authentication Using Matrix Permutation Transformation And A User Password,” Information Sciences, Vol. 269, pp. 1-20, Jun 2014.
  3. Tamer AbuHmed, Jeonil Kang, DaeHun Nyang, and KyungHee Lee, “A Software-Based Group Attestation for Wireless Sensor Networks,” Adhoc & Sensor Wireless Networks Journal, Vol. 13, No. 1-2, pp. 121-154, Jan 2011.
  4. Abedelaziz Mohaisen, DaeHun Nyang, YoungJae Maeng, KyungHee Lee, and Dowon Hong, “Grid-Based Key Pre-Distribution in Wireless Sensor Networks,” KSII Transactions on Internet and Information Systems, Vol. 3, No. 2, pp. 195-208, Apr 2009.
  5. Jihyung Lim, DaeHun Nyang, Jeonil Kang, KyungHee Lee, and HyoTaek Lim, “Distributed Certificate Authority Under The Grid-Location Aided Routing Protocol,” ICCSA 2006, LNCS 3983, pp. 380-387, 2006.
  6. Jeonil Kang, DaeHun Nyang, and KyungHee Lee, “Two Factor Face Authentication Scheme with Cancelable Feature,” IWBRS 2005, LNCS 3781, pp. 67-76, 2005.

International Journal/Review/Magazine 1

  1. Abedelaziz Mohaisen, DaeHun Nyang, and KyungHee Lee, “Hierarchical Grid-based Pairwise Key Pre-distribution in Wireless Sensor Networks,” International Journal of Network Security, Vol. 8, No. 3, pp. 282-292, May 2009.

International Conference 4

  1. Abedelaziz Mohaisen, YoungJae Maeng, Jeonil Kang, DaeHun Nyang, KyungHee Lee, Dowon Hong, and JongWook Han, “Protection Techniques of Secret Information in Non-Tamper Proof Devices of Smart Home Network,” UIC 2008, LNCS 5061, pp. 548-562, 2008.
  2. Zhul Lei, DaeHun Nyang, KyungHee Lee, and HyoTaek Lim, “Fair Reputation Evaluating Protocol for Mobile Ad Hoc Network,” CIS 2006, LNAI 4456, pp. 683-693, 2007.
  3. Abedelaziz Mohaisen, DaeHun Nyang, YoungJae Maeng, and KyungHee Lee, “Structures for Communication-efficient Public Key Revocation in Ubiquitous Sensor Network,” MSN 2007, LNCS 4864, pp. 822-833, 2007.
  4. DaeHun Nyang and KyungHee Lee, “Fuzzy Face Vault: How to Implement Fuzzy Vault with Weighted Features,” HCII 2007, LNCS 4554, pp. 491-496, 2007.

International Award 0

검색된 결과가 없습니다.