Loading...
The system can't perform the operation now. Try again later.
Citations per year
Duplicate citations
The following articles are merged in Scholar. Their
combined citations
are counted only for the first article.
Merged citations
This "Cited by" count includes citations to the following articles in Scholar. The ones marked
*
may be different from the article in the profile.
Add co-authors
Co-authors
Follow
New articles by this author
New citations to this author
New articles related to this author's research
Email address for updates
Done
My profile
My library
Metrics
Alerts
Settings
Sign in
Sign in
Get my own profile
Cited by
All
Since 2020
Citations
48
45
h-index
3
3
i10-index
2
2
0
12
6
2019
2020
2021
2022
2023
2024
2025
3
7
6
10
9
12
1
Co-authors
Wonsuk Choi
School of Cybersecurity, Korea University
Verified email at korea.ac.kr
Dong Hoon Lee
Professor of CIST, Korea University
Verified email at korea.ac.kr
Hyojin Jo
Yonsei University
Follow
Seungho Lee
Samsung Electronics
Verified email at korea.ac.kr
Trusted execution technologies
Root of Trust
Secure Boot
OS
Articles
Cited by
Co-authors
Title
Sort
Sort by citations
Sort by year
Sort by title
Cited by
Cited by
Year
T-box: A forensics-enabled trusted automotive data recording method
S Lee, W Choi, HJ Jo, DH Lee
IEEE Access 7, 49738-49755
, 2019
24
2019
How to securely record logs based on ARM trustzone
S Lee, W Choi, HJ Jo, DH Lee
Proceedings of the 2019 ACM Asia Conference on Computer and Communications …
, 2019
12
2019
Fine-grained access control-enabled logging method on ARM TrustZone
S Lee, HJ Jo, W Choi, H Kim, JH Park, DH Lee
IEEE Access 8, 81348-81364
, 2020
9
2020
Poster: Secure Logging Infrastructure Employing Heterogeneous Trusted Execution Environments
S Lee, W Choi, HJ Jo, DH Lee
3
2020
The system can't perform the operation now. Try again later.
Articles 1–4
Show more
Privacy
Terms
Help
About Scholar
Search help