A behavioral model of web traffic HK Choi, JO Limb Network Protocols, 1999.(ICNP'99) Proceedings. Seventh International …, 1999 | 376 | 1999 |
Security analysis of handover key management in 4G LTE/SAE networks CK Han, HK Choi IEEE Transactions on Mobile Computing 13 (2), 457-468, 2012 | 117 | 2012 |
A group-based security protocol for machine-type communications in LTE-advanced D Choi, HK Choi, SY Lee Wireless networks 21, 405-419, 2015 | 75 | 2015 |
Evaluation of authentication signaling loads in 3GPP LTE/SAE networks CK Han, HK Choi, JW Baek, HW Lee 2009 IEEE 34th Conference on Local Computer Networks, 37-44, 2009 | 70 | 2009 |
Evaluation of security protocols for the session initiation protocol EC Cha, HK Choi, SJ Cho 2007 16th International Conference on Computer Communications and Networks …, 2007 | 49 | 2007 |
Building femtocell more secure with improved proxy signature CK Han, HK Choi, IH Kim GLOBECOM 2009-2009 IEEE Global Telecommunications Conference, 1-6, 2009 | 48 | 2009 |
An efficient and versatile key management protocol for secure smart grid communications JY Kim, HK Choi 2012 IEEE Wireless Communications and Networking Conference (WCNC), 1823-1828, 2012 | 47 | 2012 |
Malicious traffic detection using K-means DH Shin, KK An, SC Choi, HK Choi The Journal of Korean Institute of Communications and Information Sciences …, 2016 | 33 | 2016 |
Key distribution method and authentication server C Hyoung-Kee, JY Kim, D Kwon, E Lee, I Kim, SH Song US Patent 8,850,205, 2014 | 28 | 2014 |
Secure and efficient protocol for vehicular ad hoc network with privacy preservation HK Choi, IH Kim, JC Yoo EURASIP Journal on Wireless Communications and Networking 2011, 1-15, 2011 | 28 | 2011 |
Mutual authentication method and system with network in machine type communication HK Choi, DS Choi, YJ Kim, JY Park, DH Shin, JW Yu US Patent 9,866,554, 2018 | 26 | 2018 |
Improvements on Sun's conditional access system in pay-TV broadcasting systems JY Kim, HK Choi IEEE Transactions on Multimedia 12 (4), 337-340, 2010 | 26 | 2010 |
Evolution of Wi-Fi protected access: security challenges S Kwon, HK Choi IEEE Consumer Electronics Magazine 10 (1), 74-81, 2020 | 25 | 2020 |
Effective discovery of attacks using entropy of packet dynamics CK Han, HK Choi IEEE network 23 (5), 4-12, 2009 | 23 | 2009 |
1-D fast normalized cross-correlation using additions JC Yoo, BD Choi, HK Choi Digital Signal Processing 20 (5), 1482-1493, 2010 | 22 | 2010 |
A secure and lightweight approach for routing optimization in mobile IPv6 S Song, HK Choi, JY Kim EURASIP Journal on Wireless Communications and Networking 2009, 1-10, 2009 | 20 | 2009 |
Interactive Web service via satellite to the home HK Choi, O Qadan, D Sala, JO Limb, J Meyers IEEE communications magazine 39 (3), 182-190, 2001 | 19 | 2001 |
Privacy-preserving nearest neighbor queries using geographical features of cellular networks MD Firoozjaei, J Yu, H Choi, H Kim Computer Communications 98, 11-19, 2017 | 18 | 2017 |
A practical security framework for a VANET-based entertainment service KE Shin, HK Choi, J Jeong Proceedings of the 4th ACM workshop on Performance monitoring and …, 2009 | 18 | 2009 |
Further improved remote user authentication scheme JY Kim, HK Choi, JA Copeland IEICE transactions on fundamentals of electronics, communications and …, 2011 | 16 | 2011 |