Anonymous authentication for wireless body area networks with provable security D He, S Zeadally, N Kumar, JH Lee IEEE Systems Journal 11 (4), 2590-2601, 2016 | 472 | 2016 |
Blockchain-based secure firmware update for embedded devices in an Internet of Things environment B Lee, JH Lee The Journal of Supercomputing 73, 1152-1167, 2017 | 415 | 2017 |
Analysis of the main consensus protocols of blockchain S Zhang, JH Lee ICT express 6 (2), 93-97, 2020 | 389 | 2020 |
Requirements of distributed mobility management HA Chan, et al. IETF RFC 7333, 2012 | 231 | 2012 |
Enhanced three-factor security protocol for consumer USB mass storage devices D He, N Kumar, JH Lee, RS Sherratt IEEE Transactions on Consumer Electronics 60 (1), 30-37, 2014 | 224 | 2014 |
How the blockchain revolution will reshape the consumer electronics industry [future directions] JH Lee, M Pilkington IEEE Consumer Electronics Magazine 6 (3), 19-23, 2017 | 220 | 2017 |
BIDaaS: Blockchain based ID as a service JH Lee IEEE Access 6, 2274-2278, 2017 | 186 | 2017 |
Double-spending with a sybil attack in the bitcoin decentralized network S Zhang, JH Lee IEEE transactions on Industrial Informatics 15 (10), 5715-5722, 2019 | 163 | 2019 |
Comparative Handover Performance Analysis of IPv6 Mobility Management Protocols JH Lee, JM Bonnin, I You, TM Chung Industrial Electronics, IEEE Transactions on 60 (3), 1077-1088, 2013 | 158 | 2013 |
Cost analysis of IP mobility management protocols for consumer mobile devices JH Lee, T Ernst, TM Chung IEEE Transactions on Consumer Electronics 56 (2), 1010-1017, 2010 | 141 | 2010 |
Intelligent mobile video surveillance system as a Bayesian coalition game in vehicular sensor networks: Learning automata approach N Kumar, JH Lee, JJPC Rodrigues IEEE Transactions on Intelligent Transportation Systems 16 (3), 1148-1161, 2014 | 134 | 2014 |
Performance Analysis of PMIPv6 based NEtwork MObility for Intelligent Transportation Systems JH Lee, T Ernst, N Chilamkurti Vehicular Technology, IEEE Transactions on 61 (1), 74-85, 2012 | 126 | 2012 |
Effective value of decision tree with KDD 99 intrusion detection datasets for intrusion detection system JH Lee, JH Lee, SG Sohn, JH Ryu, TM Chung 2008 10th International conference on advanced communication technology 2 …, 2008 | 126 | 2008 |
Privacy-preserving data aggregation scheme against internal attackers in smart grids D He, N Kumar, JH Lee Wireless Networks 22, 491-502, 2016 | 121 | 2016 |
Peer-to-peer cooperative caching for data dissemination in urban vehicular communications N Kumar, JH Lee IEEE Systems Journal 8 (4), 1136-1144, 2013 | 118 | 2013 |
Lightweight ECC based RFID authentication integrated with an ID verifier transfer protocol D He, N Kumar, N Chilamkurti, JH Lee Journal of medical systems 38, 1-6, 2014 | 104 | 2014 |
Anonymous two-factor authentication for consumer roaming service in global mobility networks D He, N Kumar, MK Khan, JH Lee Consumer Electronics, IEEE Transactions on 59 (4), 811-817, 2013 | 96 | 2013 |
Security and privacy challenges in the internet of things [security and privacy matters] JH Lee, H Kim IEEE Consumer Electronics Magazine 6 (3), 134-136, 2017 | 93 | 2017 |
One-to-many authentication for access control in mobile pay-TV systems D He, N Kumar, H Shen, JH Lee Science China. Information Sciences 59 (5), 052108, 2016 | 92 | 2016 |
Distributed mobility anchoring P Seite, P Bertin, L JH draft-seite-dmm-dma-06 (work in progress), 2013 | 92* | 2013 |