Follow
Mun-Kyu Lee
Title
Cited by
Cited by
Year
Improvement of Das's two-factor authentication protocol in wireless sensor networks
DH Nyang, MK Lee
Cryptology EPrint Archive, 2009
1142009
Security notions and advanced method for human shoulder-surfing resistant PIN-entry
MK Lee
IEEE Transactions on Information Forensics and Security 9 (4), 695-708, 2014
882014
Dictionary attack on functional transform‐based cancelable fingerprint templates
SW Shin, MK Lee, D Moon, K Moon
ETRI journal 31 (5), 628-630, 2009
712009
Countermeasures against power analysis attacks for the NTRU public key cryptosystem
MK Lee, JE Song, D Choi, DG Han
IEICE transactions on fundamentals of electronics, communications and …, 2010
452010
Privacy-preserving peer-to-peer energy trading in blockchain-enabled smart grids using functional encryption
YB Son, JH Im, HY Kwon, SY Jeon, MK Lee
Energies 13 (6), 1321, 2020
362020
Security analysis and improvement of fingerprint authentication for smartphones
YH Jo, SY Jeon, JH Im, MK Lee
Mobile Information Systems 2016, 2016
362016
Secure bimodal PIN-entry method using audio signals
MK Lee, H Nam, DK Kim
Computers & Security 56, 140-150, 2016
322016
Authentication of a smart phone user using audio frequency analysis
JB Kim, JE Song, MK Lee
Journal of the Korea Institute of Information Security & Cryptology 22 (2 …, 2012
252012
Sliding window method for NTRU
MK Lee, JW Kim, JE Song, K Park
International Conference on Applied Cryptography and Network Security, 432-442, 2007
222007
Low-complexity elliptic curve cryptography processor based on configurable partial modular reduction over NIST prime fields
P Choi, MK Lee, JH Kim, DK Kim
IEEE Transactions on Circuits and Systems II: Express Briefs 65 (11), 1703-1707, 2017
212017
Secure and user friendly PIN entry method
CS Kim, MK Lee
2010 Digest of Technical Papers International Conference on Consumer …, 2010
212010
An authenticated encryption scheme with public verifiability
MK Lee, DK Kim, K Park
Japan-Korea Joint Workshop on Algorithms and Computation (WAAC2000), 49-56, 2000
192000
Two-Thumbs-Up: Physical protection for PIN entry secure against recording attacks
DH Nyang, H Kim, W Lee, S Kang, G Cho, MK Lee, A Mohaisen
computers & security 78, 1-15, 2018
162018
Privacy-preserving palm print authentication using homomorphic encryption
JH Im, JC Choi, DH Nyang, MK Lee
2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th …, 2016
162016
Practical privacy-preserving face authentication for smartphones secure against malicious clients
JH Im, SY Jeon, MK Lee
IEEE Transactions on Information Forensics and Security 15, 2386-2401, 2020
152020
Improved cancelable fingerprint templates using minutiae‐based functional transform
D Moon, JH Yoo, MK Lee
Security and Communication Networks 7 (10), 1543-1551, 2014
152014
Design and performance analysis of electronic seal protection systems based on AES
DK Kim, MK Lee, YS Kang, SH Chung, WJ Yoon, JK Min, H Kim
ETRI journal 29 (6), 755-768, 2007
142007
Secure and usable pin-entry method with shoulder-surfing resistance
MK Lee, H Nam
International Conference on Human-Computer Interaction, 745-748, 2013
122013
A vulnerability analysis of MITB in online banking transactions in Korea
YJ Maeng, DO Shin, SH Kim, DH Nyang, MK Lee
Internet and Information Security 1 (2), 101-118, 2010
122010
Low‐Power Design of Hardware One‐Time Password Generators for Card‐Type OTPs
SJ Lee, JS Lee, MK Lee, SJ Lee, DH Choi, DK Kim
ETRI Journal 33 (4), 611-620, 2011
112011
The system can't perform the operation now. Try again later.
Articles 1–20