Anonymous authentication for wireless body area networks with provable security D He, S Zeadally, N Kumar, JH Lee IEEE Systems Journal 11 (4), 2590-2601, 2016 | 330 | 2016 |
Blockchain-based secure firmware update for embedded devices in an Internet of Things environment B Lee, JH Lee The Journal of Supercomputing 73 (3), 1152-1167, 2017 | 237 | 2017 |
Requirements of distributed mobility management HA Chan, et al. IETF RFC 7333, 2012 | 213 | 2012 |
Enhanced three-factor security protocol for consumer USB mass storage devices D He, N Kumar, JH Lee, RS Sherratt IEEE Transactions on Consumer Electronics 60 (1), 30-37, 2014 | 162 | 2014 |
Comparative Handover Performance Analysis of IPv6 Mobility Management Protocols JH Lee, JM Bonnin, I You, TM Chung Industrial Electronics, IEEE Transactions on 60 (3), 1077-1088, 2013 | 137 | 2013 |
Cost analysis of IP mobility management protocols for consumer mobile devices JH Lee, T Ernst, TM Chung IEEE Transactions on Consumer Electronics 56 (2), 1010-1017, 2010 | 133 | 2010 |
Performance Analysis of PMIPv6 based NEtwork MObility for Intelligent Transportation Systems JH Lee, T Ernst, N Chilamkurti Vehicular Technology, IEEE Transactions on 61 (1), 74-85, 2012 | 124 | 2012 |
Intelligent mobile video surveillance system as a Bayesian coalition game in vehicular sensor networks: Learning automata approach N Kumar, JH Lee, JJPC Rodrigues IEEE Transactions on Intelligent Transportation Systems 16 (3), 1148-1161, 2014 | 108 | 2014 |
Effective value of decision tree with KDD 99 intrusion detection datasets for intrusion detection system JH Lee, JH Lee, SG Sohn, JH Ryu, TM Chung 2008 10th International Conference on Advanced Communication Technology 2 …, 2008 | 101 | 2008 |
How the blockchain revolution will reshape the consumer electronics industry [future directions] JH Lee, M Pilkington IEEE Consumer Electronics Magazine 6 (3), 19-23, 2017 | 99 | 2017 |
Peer-to-peer cooperative caching for data dissemination in urban vehicular communications N Kumar, JH Lee IEEE Systems Journal 8 (4), 1136-1144, 2013 | 96 | 2013 |
Distributed mobility anchoring P Seite, P Bertin, JH Lee draft-seite-dmm-dma-06 (work in progress), 2013 | 88* | 2013 |
One-to-many authentication for access control in mobile pay-TV systems D He, N Kumar, H Shen, JH Lee Science China Information Sciences 59 (5), 1-14, 2016 | 85 | 2016 |
BIDaaS: Blockchain based ID as a service JH Lee IEEE Access 6, 2274-2278, 2017 | 84 | 2017 |
Anonymous two-factor authentication for consumer roaming service in global mobility networks D He, N Kumar, MK Khan, JH Lee Consumer Electronics, IEEE Transactions on 59 (4), 811-817, 2013 | 80 | 2013 |
Privacy-preserving data aggregation scheme against internal attackers in smart grids D He, N Kumar, JH Lee Wireless Networks 22 (2), 491-502, 2016 | 73 | 2016 |
Lightweight ECC based RFID authentication integrated with an ID verifier transfer protocol D He, N Kumar, N Chilamkurti, JH Lee Journal of medical systems 38 (10), 1-6, 2014 | 73 | 2014 |
A comparative performance analysis on hierarchical mobile IPv6 and proxy mobile IPv6 JH Lee, YH Han, S Gundavelli, TM Chung Telecommunication Systems 41 (4), 279-292, 2009 | 67 | 2009 |
How much do we gain by introducing route optimization in Proxy Mobile IPv6 networks? JH Lee, TM Chung annals of telecommunications-annales des télécommunications 65 (5), 233-246, 2010 | 66 | 2010 |
Distributed IP Mobility Management from the Perspective of the IETF: Motivations, Requirements, Approaches, Comparison, and Challenges JH Lee, JM Bonnin, P Seite, HA Chan IEEE Wireless Communications 20 (5), 159-168, 2013 | 59 | 2013 |