default search action
Hyoung-Kee Choi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j19]Jeongho Lee, Hyoung-Kee Choi, Jin Hee Yoon, Seongjune Kim:
An Empirical Analysis of Incorrect Account Remediation in the Case of Broken Authentication. IEEE Access 11: 141610-141627 (2023) - 2021
- [j18]Songhui Kwon, Hyoung-Kee Choi:
Evolution of Wi-Fi Protected Access: Security Challenges. IEEE Consumer Electron. Mag. 10(1): 74-81 (2021) - [j17]Ejin Kim, Hyoung-Kee Choi:
Security Analysis and Bypass User Authentication Bound to Device of Windows Hello in the Wild. Secur. Commun. Networks 2021: 6245306:1-6245306:13 (2021)
2010 – 2019
- 2019
- [j16]Seyeong Lee, Hyoung-Kee Choi, Ejin Kim, Jong-Hyouk Lee:
Secure and efficient binding updates in host-based distributed mobility management. Wirel. Networks 25(4): 1443-1459 (2019) - 2018
- [c22]Ji-Yeon Yang, Hyoung-Kee Choi:
PPNDN: Popularity-based Caching for Privacy Preserving in Named Data Networking. ICIS 2018: 39-44 - 2017
- [j15]Mahdi Daghmehchi Firoozjaei, Jaegwan Yu, Hyoung-Kee Choi, Hyoungshick Kim:
Privacy-preserving nearest neighbor queries using geographical features of cellular networks. Comput. Commun. 98: 11-19 (2017) - [c21]Joon-Woo Yu, Hyoung-Kee Choi:
Efficient Protocol for Searchable encryption and secure deletion on cloud storages. ICCE 2017: 444-447 - 2016
- [j14]Hyoung-Kee Choi, Ki-Eun Shin, Hyoungshick Kim:
A Healthcare Information System for Secure Delivery and Remote Management of Medical Records. IEICE Trans. Inf. Syst. 99-D(4): 883-890 (2016) - [c20]Hyoung-Kee Choi, Hyoseok Lee:
Extraction of TLS master secret key in windows. ICTC 2016: 667-671 - [c19]Dong Yong Kim, Hyoung-Kee Choi:
Efficient design for secure multipath TCP against eavesdropper in initial handshake. ICTC 2016: 672-677 - 2015
- [j13]Daesung Choi, Hyoung-Kee Choi, Se-Young Lee:
A group-based security protocol for machine-type communications in LTE-advanced. Wirel. Networks 21(2): 405-419 (2015) - [c18]Hyoung-Kee Choi, Chan-Kyu Han, Daesung Choi:
Improvement of security protocol for Machine Type Communications in LTE-advanced. IWCMC 2015: 1301-1306 - 2014
- [j12]Chan-Kyu Han, Hyoung-Kee Choi:
Security Analysis of Handover Key Management in 4G LTE/SAE Networks. IEEE Trans. Mob. Comput. 13(2): 457-468 (2014) - [c17]Daesung Choi, Sungdae Hong, Hyoung-Kee Choi:
A group-based security protocol for Machine Type Communications in LTE-Advanced. INFOCOM Workshops 2014: 161-162 - 2012
- [j11]Jung-Yoon Kim, Hyoung-Kee Choi:
An Enhanced Security Protocol for VANET-Based Entertainment Services. IEICE Trans. Commun. 95-B(7): 2245-2256 (2012) - [j10]Jung-Yoon Kim, Hyoung-Kee Choi:
Improvements on Hsiang and Shih's Remote User Authentication Scheme Using Smart Cards. IEICE Trans. Inf. Syst. 95-D(10): 2393-2400 (2012) - [c16]Jong-Sung Yang, Hyoung-Kee Choi:
IP based security architecture of virtual network in cloud computing system. IWCMC 2012: 709-715 - [c15]Jung-Yoon Kim, Hyoung-Kee Choi:
An efficient and versatile key management protocol for secure smart grid communications. WCNC 2012: 1823-1828 - 2011
- [j9]Hyoung-Kee Choi, In-Hwan Kim, Jae-Chern Yoo:
Secure and Efficient Protocol for Vehicular Ad Hoc Network with Privacy Preservation. EURASIP J. Wirel. Commun. Netw. 2011 (2011) - [j8]Jung-Yoon Kim, Hyoung-Kee Choi, John A. Copeland:
Further Improved Remote User Authentication Scheme. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(6): 1426-1433 (2011) - 2010
- [j7]Jae-Chern Yoo, Byoung Deog Choi, Hyoung-Kee Choi:
1-D fast normalized cross-correlation using additions. Digit. Signal Process. 20(5): 1482-1493 (2010) - [j6]Jin Whan Kang, Sang-Hyo Kim, Seokho Yoon, Tae Hee Han, Hyoung-Kee Choi:
A New LLR Approximation for BICM Systems with HARQ. IEICE Trans. Commun. 93-B(6): 1628-1632 (2010) - [j5]Sueng Jae Bae, Tae-Jin Lee, Hyoung-Kee Choi, Min Young Chung:
A Contention Access Mechanism Based on a Partitioned Contention Access Period in IEEE 802.15.4 MAC. IEICE Trans. Commun. 93-B(12): 3577-3590 (2010) - [j4]Jung-Yoon Kim, Hyoung-Kee Choi:
Improvements on Sun 's Conditional Access System in Pay-TV Broadcasting Systems. IEEE Trans. Multim. 12(4): 337-340 (2010) - [c14]Jung-Yoon Kim, Hyoung-Kee Choi, John A. Copeland:
An Efficient Authentication Scheme for Security and Privacy Preservation in V2I Communications. VTC Fall 2010: 1-6
2000 – 2009
- 2009
- [j3]Sehwa Song, Hyoung-Kee Choi, Jung-Yoon Kim:
A Secure and Lightweight Approach for Routing Optimization in Mobile IPv6. EURASIP J. Wirel. Commun. Netw. 2009 (2009) - [j2]Chan-Kyu Han, Hyoung-Kee Choi:
Effective discovery of attacks using entropy of packet dynamics. IEEE Netw. 23(5): 4-12 (2009) - [c13]Chan-Kyu Han, Hyoung-Kee Choi, In-Hwan Kim:
Building Femtocell More Secure with Improved Proxy Signature. GLOBECOM 2009: 1-6 - [c12]Chan-Kyu Han, Hyoung-Kee Choi, Jung Woo Baek, Ho Woo Lee:
Evaluation of authentication signaling loads in 3GPP LTE/SAE networks. LCN 2009: 37-44 - [c11]Ki-Eun Shin, Hyoung-Kee Choi, Jongmin Jeong:
A practical security framework for a VANET-based entertainment service. PM2HW2N@MSWiM 2009: 175-182 - 2008
- [c10]Sung-Hyun Eum, Sung-Jae Cho, Hyoung-Kee Choi, Hyunseung Choo:
A Robust Session Key Distribution in 802.11i. ICCSA Workshops 2008: 201-206 - 2007
- [c9]Sangho Ahn, Sanghun Kim, Hyoung-Kee Choi, Sun Yong Kim, Seokho Yoon:
A Novel Frequency Offset Estimation Algorithm Using Differential Combining for OFDM-Based WLAN Systems. International Conference on Computational Science (4) 2007: 360-367 - [c8]Eun-Chul Cha, Hyoung-Kee Choi, Sung-Jae Cho:
Evaluation of Security Protocols for the Session Initiation Protocol. ICCCN 2007: 611-616 - [c7]Eun-Chul Cha, Hyoung-Kee Choi:
A Study of Performance Improvement in EAP. Networking 2007: 1183-1186 - [c6]Ki-Yoon Kim, Hyoung-Kee Choi:
A Symptom-Based Taxonomy for an Early Detection of Network Attacks. PAISI 2007: 327-328 - 2006
- [c5]Sanghun Kim, Seokho Yoon, Hyoung-Kee Choi, Sun Yong Kim:
A Low Complexity and Robust Frequency Offset Estimation Algorithm for OFDM-Based WLAN Systems. International Conference on Computational Science (2) 2006: 961-968 - 2005
- [c4]Hyoung-Kee Choi, Jitae Shin:
Simulation Framework for Wireless Internet Access Networks. International Conference on Computational Science (2) 2005: 453-460 - [c3]Yongchan Jeong, Jitae Shin, Hyoung-Kee Choi:
Channel-Adaptive GPS Scheduling for Heterogeneous Multimedia in CDMA Networks. ICCNMC 2005: 93-101 - [c2]Hyoung-Kee Choi, John A. Copeland:
Modeling the Behavior of TCP in Web Traffic. ICOIN 2005: 188-197 - 2001
- [j1]Hyoung-Kee Choi, Osama Qadan, Dolors Sala, John O. Limb, Jeff Meyers:
Interactive Web service via satellite to the home. IEEE Commun. Mag. 39(3): 182-190 (2001)
1990 – 1999
- 1999
- [c1]Hyoung-Kee Choi, John O. Limb:
A Behavioral Model of Web Traffic. ICNP 1999: 327-334
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint