Calculated based on number of publications stored in Pure and citations from Scopus
20062024

Research activity per year

Filter
Conference contribution

Search results

  • 2023

    Privacy Enhanced Federated Learning Utilizing Differential Privacy and Interplanetary File System

    Kim, H. & Doh, I., 2023, 37th International Conference on Information Networking, ICOIN 2023. IEEE Computer Society, p. 312-317 6 p. (International Conference on Information Networking; vol. 2023-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • 2022

    Cloud Security Issues and Log-based Proactive Strategy

    Mejri, O., Yang, D. & Doh, I., 2022, 24th International Conference on Advanced Communication Technology: Artificial Intelligence Technologies toward Cybersecurity!!, ICACT 2022 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 392-397 6 p. (International Conference on Advanced Communication Technology, ICACT; vol. 2022-February).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • 2021

    Cloud Security Issues and Log-based Proactive Strategy

    Mejri, O., Yang, D. & Doh, I., 7 Feb 2021, 23rd International Conference on Advanced Communication Technology: On-Line Security in Pandemic Era!, ICACT 2021 - Proceeding. Institute of Electrical and Electronics Engineers Inc., p. 392-397 6 p. 9370392. (International Conference on Advanced Communication Technology, ICACT; vol. 2021-February).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Improved Raft Algorithm exploiting Federated Learning for Private Blockchain performance enhancement

    Kim, D., Doh, I. & Chae, K., 13 Jan 2021, 35th International Conference on Information Networking, ICOIN 2021. IEEE Computer Society, p. 828-832 5 p. 9333932. (International Conference on Information Networking; vol. 2021-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    21 Scopus citations
  • 2020

    Design of Blockchain System for Protection of Personal Information in Digital Content Trading Environment

    Heo, G., Yang, D., Doh, I. & Chae, K., Jan 2020, 34th International Conference on Information Networking, ICOIN 2020. IEEE Computer Society, p. 152-157 6 p. 9016501. (International Conference on Information Networking; vol. 2020-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    7 Scopus citations
  • Randomly Elected Blockchain System based on Grouping Verifiers for Efficiency and Security

    Yang, D., Jeon, S., Doh, I. & Chae, K., Feb 2020, 22nd International Conference on Advanced Communications Technology: Digital Security Global Agenda for Safe Society, ICACT 2020 - Proceeding. Institute of Electrical and Electronics Engineers Inc., p. 159-165 7 p. 9061277. (International Conference on Advanced Communication Technology, ICACT; vol. 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • 2019

    Binarized Multi-Factor Cognitive Detection of Bio-Modality Spoofing in Fog Based Medical Cyber-Physical System

    Mowla, N. I., Doh, I. & Chae, K., 17 May 2019, 33rd International Conference on Information Networking, ICOIN 2019. IEEE Computer Society, p. 43-48 6 p. 8718118. (International Conference on Information Networking; vol. 2019-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • Dynamic group key management for efficient fog computing

    Lim, J., Doh, I. & Chae, K., 2019, Innovative Mobile and Internet Services in Ubiquitous Computing - Proceedings of the 12th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing IMIS-2018. Javaid, N., Enokido, T., Xhafa, F. & Barolli, L. (eds.). Springer Verlag, p. 685-694 10 p. (Advances in Intelligent Systems and Computing; vol. 773).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • SEFL: Selective Ensemble Fuzzy Learner for Cognitive Detection of Bio-Modality Spoofing in MCPS

    Mowla, N. I., Doh, I. & Chae, K., 29 Apr 2019, 21st International Conference on Advanced Communication Technology: ICT for 4th Industrial Revolution!, ICACT 2019 - Proceeding. Institute of Electrical and Electronics Engineers Inc., p. 1153-1158 6 p. 8701916. (International Conference on Advanced Communication Technology, ICACT; vol. 2019-February).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2018

    Authorization based on mobile whitelist in devices for device-to-device communications

    You, S., Yang, D., Doh, I. & Chae, K., 19 Apr 2018, 32nd International Conference on Information Networking, ICOIN 2018. IEEE Computer Society, p. 706-711 6 p. (International Conference on Information Networking; vol. 2018-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • Customized embedded system design for lower limb rehabilitation patients

    Lee, C. E., Yeo, I. C. & Doh, I., 23 Mar 2018, IEEE 20th International Conference on Advanced Communication Technology: Opening New Era of Intelligent Things, ICACT 2018. Institute of Electrical and Electronics Engineers Inc., p. 229-233 5 p. (International Conference on Advanced Communication Technology, ICACT; vol. 2018-February).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Evolving neural network intrusion detection system for MCPS

    Mowla, N., Doh, I. & Chae, K., 23 Mar 2018, IEEE 20th International Conference on Advanced Communication Technology: Opening New Era of Intelligent Things, ICACT 2018. Institute of Electrical and Electronics Engineers Inc., p. 1040-1045 6 p. (International Conference on Advanced Communication Technology, ICACT; vol. 2018-February).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Scopus citations
  • NRIT: Non-redundant indirect trust search algorithm for a cross-domain based CDNi-P2P architecture

    Li, S., Doh, I. & Chae, K., 23 Mar 2018, IEEE 20th International Conference on Advanced Communication Technology: Opening New Era of Intelligent Things, ICACT 2018. Institute of Electrical and Electronics Engineers Inc., p. 992-998 7 p. (International Conference on Advanced Communication Technology, ICACT; vol. 2018-February).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • RMBC: Randomized mesh blockchain using DBFT consensus algorithm

    Jeon, S., Doh, I. & Chae, K., 19 Apr 2018, 32nd International Conference on Information Networking, ICOIN 2018. IEEE Computer Society, p. 712-717 6 p. (International Conference on Information Networking; vol. 2018-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    17 Scopus citations
  • Secure medical image-sharing mechanism based on visual cryptography in EHR system

    Yang, D., Doh, I. & Chae, K., 23 Mar 2018, IEEE 20th International Conference on Advanced Communication Technology: Opening New Era of Intelligent Things, ICACT 2018. Institute of Electrical and Electronics Engineers Inc., p. 463-467 5 p. (International Conference on Advanced Communication Technology, ICACT; vol. 2018-February).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    6 Scopus citations
  • Selective fuzzy ensemble learner for cognitive detection of bio-identifiable modality spoofing in MCPS

    Mowla, N., Doh, I. & Chae, K., 23 Mar 2018, IEEE 20th International Conference on Advanced Communication Technology: Opening New Era of Intelligent Things, ICACT 2018. Institute of Electrical and Electronics Engineers Inc., p. 63-67 5 p. (International Conference on Advanced Communication Technology, ICACT; vol. 2018-February).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    6 Scopus citations
  • 2017

    Automated parking lot management system using embedded robot type smart car based on wireless sensors

    Kang, Y., Jung, D. & Doh, I., 15 Dec 2017, 2017 27th International Telecommunication Networks and Applications Conference, ITNAC 2017. Institute of Electrical and Electronics Engineers Inc., p. 1-6 6 p. (2017 27th International Telecommunication Networks and Applications Conference, ITNAC 2017; vol. 2017-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Scopus citations
  • Enhanced password processing scheme based on visual cryptography and OCR

    Yang, D., Doh, I. & Chae, K., 13 Apr 2017, 31st International Conference on Information Networking, ICOIN 2017. IEEE Computer Society, p. 254-258 5 p. 7899514. (International Conference on Information Networking).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    12 Scopus citations
  • Evolving neural network intrusion detection system for MCPS

    Mowla, N., Doh, I. & Chae, K. J., 29 Mar 2017, 19th International Conference on Advanced Communications Technology: Opening Era of Smart Society, ICACT 2017 - Proceeding. Institute of Electrical and Electronics Engineers Inc., p. 183-187 5 p. 7890080. (International Conference on Advanced Communication Technology, ICACT).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    7 Scopus citations
  • Lightweight authentication for distributed mobile P2P communications

    Lim, J., Doh, I. & Chae, K., 2017, Innovative Mobile and Internet Services in Ubiquitous Computing - Proceedings of the 11th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2017. Enokido, T. & Barolli, L. (eds.). Springer Verlag, p. 580-589 10 p. (Advances in Intelligent Systems and Computing; vol. 612).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Non-redundant indirect trust search algorithm based on a cross-domain trust model in content delivery network

    Li, S., Doh, I. & Chae, K., 29 Mar 2017, 19th International Conference on Advanced Communications Technology: Opening Era of Smart Society, ICACT 2017 - Proceeding. Institute of Electrical and Electronics Engineers Inc., p. 72-77 6 p. 7890059. (International Conference on Advanced Communication Technology, ICACT).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    6 Scopus citations
  • 2016

    A cross-domain trust model for reputation management in hybrid CDNi-P2P network

    Li, S., Doh, I. & Chae, K., 2016, 2016 6th International Workshop on Computer Science and Engineering, WCSE 2016. International Workshop on Computer Science and Engineering (WCSE), p. 180-184 5 p. (2016 6th International Workshop on Computer Science and Engineering, WCSE 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • A group authentication scheme based on lagrange interpolation polynomial

    Li, S., Doh, I. & Chae, K., 21 Dec 2016, Proceedings - 2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2016. Xhafa, F., Barolli, L. & Uchida, N. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 386-391 6 p. 7794496. (Proceedings - 2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    9 Scopus citations
  • An anonymous IP-based privacy protection routing mechanism for CDNi

    Li, S., Doh, I. & Chae, K., 7 Mar 2016, 30th International Conference on Information Networking, ICOIN 2016. IEEE Computer Society, p. 75-80 6 p. 7427091. (International Conference on Information Networking; vol. 2016-March).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • Authentication for mobile open IPTV service security

    Lim, J., Doh, I. & Chae, K., 21 Dec 2016, Proceedings - 2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2016. Xhafa, F., Barolli, L. & Uchida, N. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 381-385 5 p. 7794495. (Proceedings - 2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Mutual authentication based on visual cryptography and OCR for secure IoT service

    Yang, D., Doh, I. & Chae, K., 2016, 2016 6th International Workshop on Computer Science and Engineering, WCSE 2016. International Workshop on Computer Science and Engineering (WCSE), p. 214-219 6 p. (2016 6th International Workshop on Computer Science and Engineering, WCSE 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Securing information flow in content delivery networks with visual and quantum cryptography

    Mowla, N. I., Doh, I. & Chae, K., 7 Mar 2016, 30th International Conference on Information Networking, ICOIN 2016. IEEE Computer Society, p. 463-468 6 p. 7427160. (International Conference on Information Networking; vol. 2016-March).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • 2015

    An efficient defense mechanism for spoofed IP attack in SDN based CDNi

    Mowla, N. I., Doh, I. & Chae, K., 10 Mar 2015, 2015 International Conference on Information Networking, ICOIN 2015. IEEE Computer Society, p. 92-97 6 p. 7057863. (International Conference on Information Networking; vol. 2015-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    16 Scopus citations
  • Key management mechanism in ALTO/SDN based CDNi architecture

    Li, S., Doh, I. & Chae, K., 10 Mar 2015, 2015 International Conference on Information Networking, ICOIN 2015. IEEE Computer Society, p. 110-115 6 p. 7057866. (International Conference on Information Networking; vol. 2015-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • Secure Authentication for Structured Smart Grid System

    Doh, I., Lim, J. & Chae, K., 30 Sep 2015, Proceedings - 2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2015. Palmieri, F., Barolli, L., Dos Santos Silva, H. & Chen, H.-C. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 200-204 5 p. 7284948. (Proceedings - 2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    27 Scopus citations
  • 2014

    Multi-defense mechanism against DDoS in SDN based CDNi

    Nishat-I-Mowla, Doh, I. & Chae, K., 2014, Proceedings - 2014 8th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2014. Institute of Electrical and Electronics Engineers Inc., p. 447-451 5 p. 6975504. (Proceedings - 2014 8th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    16 Scopus citations
  • Service security for smart grid system

    Doh, I., Lim, J. & Chae, K., 2014, Proceedings - 2014 8th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2014. Institute of Electrical and Electronics Engineers Inc., p. 427-432 6 p. 6975501. (Proceedings - 2014 8th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • User authentication mechanism based on secure positioning system in RFID communication

    Chen, X., Doh, I. & Chae, K., 2014, Ubiquitous Information Technologies and Applications, CUTE 2013. Springer Verlag, p. 683-690 8 p. (Lecture Notes in Electrical Engineering; vol. 280 LNEE).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2013

    Key establishment and management for secure cellular machine-to-machine communication

    Doh, I., Lim, J., Li, S. & Chae, K., 2013, Proceedings - 7th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2013. p. 579-584 6 p. 6603737. (Proceedings - 7th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    8 Scopus citations
  • Secure aggregation and attack detection for smart grid system

    Doh, I., Lim, J. & Chae, K., 2013, Proceedings - 16th International Conference on Network-Based Information Systems, NBiS 2013. IEEE Computer Society, p. 270-275 6 p. 6685408. (Proceedings - 16th International Conference on Network-Based Information Systems, NBiS 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    7 Scopus citations
  • Security based semantic context awareness system for M2M ubiquitous healthcare service

    Choi, Y., Doh, I., Park, S. S. & Chae, K. J., 2013, Ubiquitous Information Technologies and Applications, CUTE 2012. p. 187-196 10 p. (Lecture Notes in Electrical Engineering; vol. 214 LNEE).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • 2012

    An improved security approach based on kerberos for M2M open IPTV system

    Doh, I., Chae, K., Lim, J. & Chung, M. Y., 2012, Proceedings of the 2012 15th International Conference on Network-Based Information Systems, NBIS 2012. p. 754-759 6 p. 6354919. (Proceedings of the 2012 15th International Conference on Network-Based Information Systems, NBIS 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • Downlink scheduling scheme based on estimation of channel quality at the crossed timeslot for effective resource allocation in LTE-advanced system

    Kim, J. S., Choi, B. G., Doh, I. & Chung, M. Y., 2012, Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, ICUIMC'12. 32. (Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, ICUIMC'12).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Group key management for secure mobile IPTV service

    Doh, I., Lim, J. & Chung, M. Y., 2012, Proceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012. p. 352-357 6 p. 6296878. (Proceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • 2008

    A key setup and a secure data transmission mechanism based on three-dimensional coordinates for sensor network communication

    Doh, I. & Chae, K., 2008, Proceedings of the International Conference on Information Science and Security, ICISS 2008. IEEE Computer Society, p. 121-127 7 p. 4438221. (Proceedings of the International Conference on Information Science and Security, ICISS 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • 2007

    A key management based on multiple regression in hierarchical sensor network

    Kim, M., Doh, I. & Chae, K., 2007, Information Security Applications - 7th International Workshop, WISA 2006 Revised Selected Papers. Springer Verlag, p. 267-281 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4298 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2006

    Denial-of-Service(DoS) detection through practical entropy estimation on hierarchical sensor networks

    Kim, M., Doh, I. & Chae, K., 2006, 8th International Conference Advanced Communication Technology, ICACT 2006 - Proceedings. p. 1562-1566 5 p. 1625888. (8th International Conference Advanced Communication Technology, ICACT 2006 - Proceedings; vol. 3).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    10 Scopus citations
  • Key establishment and authentication mechanism for secure sensor networks

    Doh, I. & Chae, K., 2006, Advanced Web and Network Technologies, and Applications - APWeb 2006 International Workshops: XRA, IWSN, MEGA, and ICSE, Proceedings. p. 335-344 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3842 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Pairwise Key establishment mechanism based on clustering for secure sensor network

    Inshil, D., Mihui, K. & Kijoon, C., 2006, 8th International Conference Advanced Communication Technology, ICACT 2006 - Proceedings. p. 1388-1392 5 p. 1625836. (8th International Conference Advanced Communication Technology, ICACT 2006 - Proceedings; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Pairwise key setup and authentication utilizing deployment information for secure sensor network

    Doh, I., Park, J. M. & Chae, K., 2006, High Performance Computing and Communications - Second International Conference, HPCC 2006, Proceedings. Springer Verlag, p. 280-289 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4208 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Security enhancement mechanism for Ad-hoc OLSR protocol

    Doh, I., Chae, K., Kim, H. & Chung, K., 2006, Information Networking: Advances in Data Communications and Wireless Networks - International Conference, ICOIN 2006. Revised Selected Papers. Springer Verlag, p. 317-326 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3961 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
Your message has successfully been sent.
Your message was not sent due to an error.