A mobile based anti-phishing authentication scheme using QR code K Choi, C Lee, W Jeon, K Lee, D Won International Conference on Mobile IT Convergence, 109-113, 2011 | 76 | 2011 |
Cryptanalysis and improvement of a biometrics-based multi-server authentication with key agreement scheme H Kim, W Jeon, K Lee, Y Lee, D Won Computational Science and Its Applications–ICCSA 2012: 12th International …, 2012 | 70 | 2012 |
BRCA1 positively regulates FOXO3 expression by restricting FOXO3 gene methylation and epigenetic silencing through targeting EZH2 in breast cancer C Gong, S Yao, AR Gomes, EPS Man, HJ Lee, G Gong, S Chang, SB Kim, ... Oncogenesis 5 (4), e214-e214, 2016 | 35 | 2016 |
Subtypes of α1‐ and α2‐Adrenoceptors Mediating Noradrenergic Modulation of Spontaneous Inhibitory Postsynaptic Currents in the Hypothalamic Paraventricular … W Chong, LH Li, K Lee, MH Lee, JB Park, PD Ryu Journal of neuroendocrinology 16 (5), 450-457, 2004 | 35 | 2004 |
Construction of a secure two-factor user authentication system using fingerprint information and password W Go, K Lee, J Kwak Journal of Intelligent Manufacturing 25, 217-230, 2014 | 32 | 2014 |
Protection profile for secure e-voting systems K Lee, Y Lee, D Won, S Kim Information Security, Practice and Experience: 6th International Conference …, 2010 | 20 | 2010 |
Shared key management method, shared key generating method and message communication method for scada system, and recording medium S Lee, SJ Kim, D Won, DH Choi, LEE Kwang-Woo, B Lee, H Jeong, ... US Patent App. 12/384,173, 2010 | 17 | 2010 |
SK+ F-101926 IS ANTIDIURETIC IN MAN J Dubb, N Allison, D Tatoian, A Blumberg, K Lee, R Stote Kidney International 31 (1), 267-267, 1987 | 17 | 1987 |
The effect of perinatal anxiety on bronchiolitis is influenced by polymorphisms in ROS-related genes E Lee, HY Chang, KS Lee, DI Suh, HS Yu, MJ Kang, IA Choi, J Park, ... BMC Pulmonary Medicine 14, 1-9, 2014 | 11 | 2014 |
Verification method for operation of encryption apparatus and its application to electronic voting Y Lee, K Lee, S Kim, D Won US Patent 7,882,038, 2011 | 11 | 2011 |
Internet Based E-Will Management System Using Certificate and Method Thereof K Lee, D Won, S Kim US Patent App. 12/775,352, 2011 | 9 | 2011 |
A secure and efficient E-Will system based on PKI K Lee, D Won, S Kim Information 14 (7), 2187-2206, 2011 | 9 | 2011 |
Vulnerabilities Analysis of the OTP Implemented on a PC WC Hong, KW Lee, SJ Kim, DH Won The KIPS Transactions: PartC 17 (4), 361-370, 2010 | 9 | 2010 |
Protection profile of personal information security system: designing a secure personal information security system HJ Lee, K Lee, D Won 2011IEEE 10th International Conference on Trust, Security and Privacy in …, 2011 | 8 | 2011 |
Analysis on vulnerability of home healthcare medical devices and development of protection profile based on Common Criteria version 3.1 C Lee, K Lee, S Kim, D Won 2011 First ACIS/JNU International Conference on Computers, Networks, Systems …, 2011 | 7 | 2011 |
기업 비밀정보 유출 방지 및 보호 관점에서의 디지털 복합기 보안 기술 동향 분석 KW Lee, SJ Kim Review of KIISC 20 (1), 47-55, 2010 | 7 | 2010 |
Effect of Water on the Control of Methylene Blue within CsY Zeolite; Photoacoustic Spectroscopic Method 박동호, 이기웅, 최상준 Bulletin of the Korean Chemical Society 16 (6), 467-469, 1995 | 7 | 1995 |
Study on A secure remote user authentication scheme using smart cards J Qiuyan, K Lee, D Won International Journal of Security and Its Applications 7 (2), 105-116, 2013 | 6 | 2013 |
Security improvement on a group key exchange protocol for mobile networks J Nam, K Lee, J Paik, W Paik, D Won International Conference on Computational Science and Its Applications, 123-132, 2011 | 6 | 2011 |
An attack on an RFID authentication protocol conforming to EPC class 1 generation 2 standard C Lee, S Park, K Lee, D Won Convergence and Hybrid Information Technology: 5th International Conference …, 2011 | 6 | 2011 |