Mun-Kyu Lee
Cited by
Cited by
Improvement of Das's two-factor authentication protocol in wireless sensor networks
DH Nyang, MK Lee
Cryptology EPrint Archive, 2009
Security notions and advanced method for human shoulder-surfing resistant PIN-entry
MK Lee
IEEE Transactions on Information Forensics and Security 9 (4), 695-708, 2014
Dictionary attack on functional transform‐based cancelable fingerprint templates
SW Shin, MK Lee, D Moon, K Moon
ETRI journal 31 (5), 628-630, 2009
Countermeasures against power analysis attacks for the NTRU public key cryptosystem
MK Lee, JE Song, D Choi, DG Han
IEICE transactions on fundamentals of electronics, communications and …, 2010
Privacy-preserving peer-to-peer energy trading in blockchain-enabled smart grids using functional encryption
YB Son, JH Im, HY Kwon, SY Jeon, MK Lee
Energies 13 (6), 1321, 2020
Security analysis and improvement of fingerprint authentication for smartphones
YH Jo, SY Jeon, JH Im, MK Lee
Mobile Information Systems 2016, 2016
Secure bimodal PIN-entry method using audio signals
MK Lee, H Nam, DK Kim
Computers & Security 56, 140-150, 2016
Authentication of a smart phone user using audio frequency analysis
JB Kim, JE Song, MK Lee
Journal of the Korea Institute of Information Security & Cryptology 22 (2 …, 2012
Sliding window method for NTRU
MK Lee, JW Kim, JE Song, K Park
International Conference on Applied Cryptography and Network Security, 432-442, 2007
Low-complexity elliptic curve cryptography processor based on configurable partial modular reduction over NIST prime fields
P Choi, MK Lee, JH Kim, DK Kim
IEEE Transactions on Circuits and Systems II: Express Briefs 65 (11), 1703-1707, 2017
Secure and user friendly PIN entry method
CS Kim, MK Lee
2010 Digest of Technical Papers International Conference on Consumer …, 2010
An authenticated encryption scheme with public verifiability
MK Lee, DK Kim, K Park
Japan-Korea Joint Workshop on Algorithms and Computation (WAAC2000), 49-56, 2000
Two-Thumbs-Up: Physical protection for PIN entry secure against recording attacks
DH Nyang, H Kim, W Lee, S Kang, G Cho, MK Lee, A Mohaisen
computers & security 78, 1-15, 2018
Privacy-preserving palm print authentication using homomorphic encryption
JH Im, JC Choi, DH Nyang, MK Lee
2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th …, 2016
Practical privacy-preserving face authentication for smartphones secure against malicious clients
JH Im, SY Jeon, MK Lee
IEEE Transactions on Information Forensics and Security 15, 2386-2401, 2020
Improved cancelable fingerprint templates using minutiae‐based functional transform
D Moon, JH Yoo, MK Lee
Security and Communication Networks 7 (10), 1543-1551, 2014
Design and performance analysis of electronic seal protection systems based on AES
DK Kim, MK Lee, YS Kang, SH Chung, WJ Yoon, JK Min, H Kim
ETRI journal 29 (6), 755-768, 2007
Secure and usable pin-entry method with shoulder-surfing resistance
MK Lee, H Nam
International Conference on Human-Computer Interaction, 745-748, 2013
A vulnerability analysis of MITB in online banking transactions in Korea
YJ Maeng, DO Shin, SH Kim, DH Nyang, MK Lee
Internet and Information Security 1 (2), 101-118, 2010
Low‐Power Design of Hardware One‐Time Password Generators for Card‐Type OTPs
SJ Lee, JS Lee, MK Lee, SJ Lee, DH Choi, DK Kim
ETRI Journal 33 (4), 611-620, 2011
The system can't perform the operation now. Try again later.
Articles 1–20