Follow
Mun-Kyu Lee
Title
Cited by
Cited by
Year
Improvement of Das's two-factor authentication protocol in wireless sensor networks
DH Nyang, MK Lee
Cryptology EPrint Archive, 2009
1262009
Security notions and advanced method for human shoulder-surfing resistant PIN-entry
MK Lee
IEEE transactions on information forensics and security 9 (4), 695-708, 2014
1052014
Dictionary attack on functional transform‐based cancelable fingerprint templates
SW Shin, MK Lee, D Moon, K Moon
ETRI journal 31 (5), 628-630, 2009
782009
Privacy-preserving peer-to-peer energy trading in blockchain-enabled smart grids using functional encryption
YB Son, JH Im, HY Kwon, SY Jeon, MK Lee
Energies 13 (6), 1321, 2020
722020
Countermeasures against power analysis attacks for the NTRU public key cryptosystem
MK Lee, JE Song, D Choi, DG Han
IEICE transactions on fundamentals of electronics, communications and …, 2010
542010
Security analysis and improvement of fingerprint authentication for smartphones
YH Jo, SY Jeon, JH Im, MK Lee
Mobile Information Systems 2016, 2016
442016
Low-complexity elliptic curve cryptography processor based on configurable partial modular reduction over NIST prime fields
P Choi, MK Lee, JH Kim, DK Kim
IEEE Transactions on Circuits and Systems II: Express Briefs 65 (11), 1703-1707, 2017
402017
Practical privacy-preserving face authentication for smartphones secure against malicious clients
JH Im, SY Jeon, MK Lee
IEEE Transactions on Information Forensics and Security 15, 2386-2401, 2020
362020
Secure bimodal PIN-entry method using audio signals
MK Lee, H Nam, DK Kim
Computers & Security 56, 140-150, 2016
362016
Two-Thumbs-Up: Physical protection for PIN entry secure against recording attacks
DH Nyang, H Kim, W Lee, S Kang, G Cho, MK Lee, A Mohaisen
computers & security 78, 1-15, 2018
312018
Authentication of a smart phone user using audio frequency analysis
JB Kim, JE Song, MK Lee
Journal of the Korea Institute of Information Security & Cryptology 22 (2 …, 2012
302012
Toward quantum secured distributed energy resources: Adoption of post-quantum cryptography (pqc) and quantum key distribution (qkd)
J Ahn, HY Kwon, B Ahn, K Park, T Kim, MK Lee, J Kim, J Chung
Energies 15 (3), 714, 2022
272022
Efficient and privacy-preserving energy trading on blockchain using dual binary encoding for inner product encryption
T Gaybullaev, HY Kwon, T Kim, MK Lee
Sensors 21 (6), 2024, 2021
252021
Secure and user friendly PIN entry method
CS Kim, MK Lee
2010 Digest of Technical Papers International Conference on Consumer …, 2010
242010
Sliding window method for NTRU
MK Lee, JW Kim, JE Song, K Park
International Conference on Applied Cryptography and Network Security, 432-442, 2007
232007
An authenticated encryption scheme with public verifiability
MK Lee, DK Kim, K Park
Japan-Korea Joint Workshop on Algorithms and Computation (WAAC2000), 49-56, 2000
192000
Improved cancelable fingerprint templates using minutiae‐based functional transform
D Moon, JH Yoo, MK Lee
Security and Communication Networks 7 (10), 1543-1551, 2014
182014
Advanced intrusion detection combining signature-based and behavior-based detection methods
HY Kwon, T Kim, MK Lee
Electronics 11 (6), 867, 2022
172022
Privacy-preserving palm print authentication using homomorphic encryption
JH Im, JC Choi, DH Nyang, MK Lee
2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th …, 2016
172016
Design and performance analysis of electronic seal protection systems based on AES
DK Kim, MK Lee, YS Kang, SH Chung, WJ Yoon, JK Min, H Kim
ETRI journal 29 (6), 755-768, 2007
162007
The system can't perform the operation now. Try again later.
Articles 1–20