2009 |
8 | EE | Heasuk Jo,
Woongryul Jeon,
Yunho Lee,
Seungjoo Kim,
Dongho Won:
Security Specification for Conversion Technologies of Heterogeneous DRM Systems.
ISPEC 2009: 159-170 |
2007 |
7 | EE | Donghyun Choi,
Yunho Lee,
Hogab Kang,
Seungjoo Kim,
Dongho Won:
An Efficient and Secure Rights Sharing Method for DRM System Against Replay Attack.
ATC 2007: 135-145 |
6 | EE | Donghwi Shin,
Youngsung Choi,
Yunho Lee,
Sangjoon Park,
Seungjoo Kim,
Dongho Won:
Security Analysis on the Authentication Mechanisms of Korean Popular Messengers.
HCI (5) 2007: 547-552 |
2006 |
5 | EE | Yunho Lee:
Channel Prediction with Cascade AR Modeling.
AICT/ICIW 2006: 40 |
4 | EE | Yunho Lee,
Heasuk Jo,
Seungjoo Kim,
Dongho Won:
An Efficient Dispute Resolving Method for Digital Images.
OTM Workshops (1) 2006: 331-341 |
3 | EE | Soojin Lee,
Byungchun Chung,
Heeyoul Kim,
Yunho Lee,
Chanil Park,
Hyunsoo Yoon:
Real-time analysis of intrusion detection alerts via correlation.
Computers & Security 25(3): 169-183 (2006) |
2 | EE | Yunho Lee,
Seungjoo Kim,
Dongho Won:
Weakness and Improvements of Yong-Lee's Anonymous Fingerprinting Protocol.
IEICE Transactions 89-A(7): 2084-2087 (2006) |
2005 |
1 | EE | Yunho Lee,
Kwang-Woo Lee,
Seungjoo Kim,
Dongho Won,
Hyungkyu Yang:
A Method for Deciding Quantization Steps in QIM Watermarking Schemes.
EUC Workshops 2005: 965-975 |