Login / Signup
Keun-Ho Lee
Publication Activity (10 Years)
Years Active: 2002-2021
Publications (10 Years): 9
Top Topics
Ubiquitous Computing
Biometric Authentication
Context Aware Computing
Everyday Objects
Top Venues
Clust. Comput.
J. Comput. Virol. Hacking Tech.
CSA/CUTE
Int. J. Distributed Sens. Networks
</>
Publications
</>
Byung-Duck Lee
,
Keun-Ho Lee
,
Seong-Soo Han
,
Chang-Sung Jeong
Reproduction based Multi-Contents Distribution Platform.
KSII Trans. Internet Inf. Syst.
15 (2) (2021)
Hyeok Kang
,
Keun-Ho Lee
,
Gui-Jung Kim
Safe and convenient personal authentication method using Moiré 3D authentication based on biometric authentication.
Clust. Comput.
22 (Suppl 1) (2019)
Bo-Seon Kang
,
Keun-Ho Lee
2-Channel authentication technique using cardiac impulse based OTP.
J. Comput. Virol. Hacking Tech.
12 (3) (2016)
DongBum Seo
,
Keun-Ho Lee
,
You-Boo Jeon
Ubiquitous Computing for Cloud Infrastructure to Mobile Application in IoT Environment.
CSA/CUTE
(2016)
DongBum Seo
,
You-Boo Jeon
,
Song-Hee Lee
,
Keun-Ho Lee
Cloud computing for ubiquitous computing on M2M and IoT environment mobile application.
Clust. Comput.
19 (2) (2016)
Jung-Hoon Kim
,
Keun-Ho Lee
Vulnerabilities of intelligent automobiles using TPEG update based on T-DMB and its countermeasures.
J. Comput. Virol. Hacking Tech.
11 (3) (2015)
Hak-Hyun Choi
,
Seung-Ae Lim
,
You-Boo Jeon
,
Keun-Ho Lee
An effective implementation scheme of a layer overlay representation of a hologram video technology in an M2M application environment.
Clust. Comput.
18 (2) (2015)
Kyeong-Rae Cho
,
You-Boo Jeon
,
Keun-Ho Lee
,
JinSoo Park
The Packet Filtering Method with Packet Delay Distribution Forecasting for Stability and Synchronization in a Heterogeneous Network.
CSA/CUTE
(2015)
DongBum Seo
,
Chang-Sung Jeong
,
You-Boo Jeon
,
Keun-Ho Lee
Cloud infrastructure for ubiquitous M2M and IoT environment mobile application.
Clust. Comput.
18 (2) (2015)
You-Boo Jeon
,
Keun-Ho Lee
,
Doo-Soon Park
,
Chang-Sung Jeong
An Efficient Cluster Authentication Scheme Based on VANET Environment in M2M Application.
Int. J. Distributed Sens. Networks
9 (2013)
Young-Gu Kim
,
Soo-Hwan Kim
,
Hoon Lim
,
Sanghoon Lee
,
Keun-Ho Lee
,
Young-Kwan Park
,
Moon-Hyun Yoo
The Statistical Failure Analysis for the Design of Robust SRAM in Nano-Scale Era.
ISQED
(2008)
Sang-Bum Han
,
Keun-Ho Lee
,
Chong-Sun Hwang
Region-based Shadow Registration Scheme for Efficient Mobility Management in the SIP.
J. Inf. Sci. Eng.
24 (3) (2008)
Keun-Ho Lee
,
Sang-Bum Han
,
Heyi-Sook Suh
,
Chong-Sun Hwang
,
SangKeun Lee
Authentication Protocol Using Threshold Certification in Hierarchical-cluser-based Ad Hoc Networks.
J. Inf. Sci. Eng.
23 (2) (2007)
Keun-Ho Lee
,
Sang-Bum Han
,
Heyi-Sook Suh
,
Chong-Sun Hwang
,
SangKeun Lee
Threshold Authenticated Key Configuration Scheme Based on Multi-layer Clustering in Mobile Ad Hoc.
APWeb Workshops
(2006)
Keun-Ho Lee
,
Chong-Sun Hwang
Hierarchical Cluster Configuration Scheme for Scalable Ad Hoc Networks.
ICCSA (2)
(2006)
Sang-Bum Han
,
Heyi-Sook Suh
,
Keun-Ho Lee
,
Chong-Sun Hwang
Efficient Mobility Management for Multimedia Service in Wireless IP Networks.
ACIS-ICIS
(2005)
Keun-Ho Lee
,
Sang-Bum Han
,
Heyi-Sook Suh
,
SangKeun Lee
,
Chong-Sun Hwang
Authentication Based on Multilayer Clustering in Ad Hoc Networks.
EURASIP J. Wirel. Commun. Netw.
2005 (5) (2005)
Won-Seok Lee
,
Keun-Ho Lee
,
Jin-Kyu Park
,
Tae-Kyung Kim
,
Young-Kwan Park
,
Jeong-Taek Kong
Investigation of the capacitance deviation due to metal-fills and the effective interconnect geometry modeling.
ISQED
(2003)
Jin-Kyu Park
,
Keun-Ho Lee
,
Chang-Sub Lee
,
Gi-Young Yang
,
Young-Kwan Park
,
Jeong-Taek Kong
Characterizing the Current Degradation of Abnormally Structured MOS Transistors Using a 3D Poisson Solver.
ISQED
(2002)