Mun-Kyu Lee
Improvement of Das's Two-Factor Authentication Protocol in Wireless Sensor Networks.
DH Nyang, MK Lee
IACR Cryptol. ePrint Arch. 2009, 631, 2009
Security notions and advanced method for human shoulder-surfing resistant PIN-entry
MK Lee
IEEE Transactions on Information Forensics and Security 9 (4), 695-708, 2014
Dictionary attack on functional transform‐based cancelable fingerprint templates
SW Shin, MK Lee, D Moon, K Moon
ETRI journal 31 (5), 628-630, 2009
Countermeasures against power analysis attacks for the NTRU public key cryptosystem
MK Lee, JE Song, D Choi, DG Han
IEICE transactions on fundamentals of electronics, communications and …, 2010
A multicenter, randomized, placebo‐controlled, double‐blind phase II trial evaluating the optimal dose, efficacy and safety of LC 15‐0444 in patients with type 2 diabetes
EJ Rhee, WY Lee, KH Yoon, SJ Yoo, IK Lee, SH Baik, YK Kim, MK Lee, ...
Diabetes, Obesity and Metabolism 12 (12), 1113-1119, 2010
Security analysis and improvement of fingerprint authentication for smartphones
YH Jo, SY Jeon, JH Im, MK Lee
Mobile Information Systems 2016, 2016
Secure bimodal PIN-entry method using audio signals
MK Lee, H Nam, DK Kim
Computers & Security 56, 140-150, 2016
Privacy-preserving peer-to-peer energy trading in blockchain-enabled smart grids using functional encryption
YB Son, JH Im, HY Kwon, SY Jeon, MK Lee
Energies 13 (6), 1321, 2020
Authentication of a smart phone user using audio frequency analysis
JB Kim, JE Song, MK Lee
Journal of the Korea Institute of Information Security & Cryptology 22 (2 …, 2012
Low density lipoprotein cholesterol target goal attainment rate and physician perceptions about target goal achievement in Korean patients with diabetes
JY Hwang, CH Jung, WJ Lee, CY Park, SR Kim, KH Yoon, MK Lee, ...
Diabetes & metabolism journal 35 (6), 628-636, 2011
Sliding window method for NTRU
MK Lee, JW Kim, JE Song, K Park
International Conference on Applied Cryptography and Network Security, 432-442, 2007
Secure and user friendly PIN entry method
CS Kim, MK Lee
2010 Digest of Technical Papers International Conference on Consumer …, 2010
An authenticated encryption scheme with public verifiability
MK Lee, DK Kim, K Park
Japan-Korea Joint Workshop on Algorithms and Computation (WAAC2000), 49-56, 2000
Low-complexity elliptic curve cryptography processor based on configurable partial modular reduction over NIST prime fields
P Choi, MK Lee, JH Kim, DK Kim
IEEE Transactions on Circuits and Systems II: Express Briefs 65 (11), 1703-1707, 2017
Privacy-preserving palm print authentication using homomorphic encryption
JH Im, JC Choi, DH Nyang, MK Lee
2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th …, 2016
Practical privacy-preserving face authentication for smartphones secure against malicious clients
JH Im, SY Jeon, MK Lee
IEEE Transactions on Information Forensics and Security 15, 2386-2401, 2020
Two-Thumbs-Up: Physical protection for PIN entry secure against recording attacks
DH Nyang, H Kim, W Lee, S Kang, G Cho, MK Lee, A Mohaisen
computers & security 78, 1-15, 2018
Improved cancelable fingerprint templates using minutiae‐based functional transform
D Moon, JH Yoo, MK Lee
Security and Communication Networks 7 (10), 1543-1551, 2014
Design and performance analysis of electronic seal protection systems based on AES
DK Kim, MK Lee, YS Kang, SH Chung, WJ Yoon, JK Min, H Kim
ETRI journal 29 (6), 755-768, 2007
Secure and usable pin-entry method with shoulder-surfing resistance
MK Lee, H Nam
International Conference on Human-Computer Interaction, 745-748, 2013
현재 시스템이 작동되지 않습니다. 나중에 다시 시도해 주세요.
학술자료 1–20