Hyotaek Lim
Hyotaek Lim
Professor, Division of Computer Engineering, Dongseo University
Adresse e-mail validée de dongseo.ac.kr - Page d'accueil
Citée par
Citée par
A strong user authentication framework for cloud computing
AJ Choudhury, P Kumar, M Sain, H Lim, H Jae-Lee
2011 IEEE Asia-Pacific Services Computing Conference, 110-115, 2011
Hand tracking and gesture recognition system for human-computer interaction using low-cost hardware
HS Yeo, BG Lee, H Lim
Multimedia Tools and Applications 74 (8), 2687-2715, 2015
Online banking authentication system using mobile-OTP with QR-code
YS Lee, NH Kim, H Lim, HK Jo, HJ Lee
5th International Conference on Computer Sciences and Convergence …, 2010
Two factor authentication for cloud computing
S Lee, I Ong, HT Lim, HJ Lee
Journal of information and communication convergence engineering 8 (4), 427-432, 2010
Homomorphic encryption in mobile multi cloud computing
M Louk, H Lim
2015 International Conference on Information Networking (ICOIN), 493-497, 2015
A new content-defined chunking algorithm for data deduplication in cloud storage
RNS Widodo, H Lim, M Atiquzzaman
Future Generation Computer Systems 71, 145-156, 2017
Leveraging client-side storage techniques for enhanced use of multiple consumer cloud storage services on resource-constrained mobile devices
HS Yeo, XS Phang, HJ Lee, H Lim
Journal of Network and Computer Applications 43, 142-156, 2014
Adaptive selection of dynamic VM consolidation algorithm using neural network for cloud resource management
JN Witanto, H Lim, M Atiquzzaman
Future generation computer systems 87, 35-42, 2018
e2Home: A lightweight smart home management system
CM Yeoh, HY Tan, CK Kok, HJ Lee, H Lim
2008 Third International Conference on Convergence and Hybrid Information …, 2008
An efficient online signature verification scheme using dynamic programming of string matching
AG Reza, H Lim, MJ Alam
International Conference on Hybrid Information Technology, 590-597, 2011
SDM: Smart deduplication for mobile cloud storage
RNS Widodo, H Lim, M Atiquzzaman
Future Generation Computer Systems 70, 64-73, 2017
One-time knocking framework using SPA and IPsec
JH Liew, S Lee, I Ong, HJ Lee, H Lim
2010 2nd International Conference on Education Technology and Computer 5, V5 …, 2010
A ping pong based one-time-passwords authentication system
B Davaanaym, YS Lee, HJ Lee, SG Lee, HT Lim
2009 Fifth International Joint Conference on INC, IMS and IDC, 574-579, 2009
A secure and efficient three-pass authenticated key agreement protocol based on elliptic curves
MH Lim, CM Yeoh, S Lee, H Lim, H Lee
International Conference on Research in Networking, 170-182, 2008
Cell loss recovery method in B-ISDN/ATM networks
HT Lim, JS Song
Electronics Letters 31 (11), 849-851, 1995
Display device
K Lee
US Patent 7,701,530, 2010
An analysis of security system for intrusion in smartphone environment
M Louk, H Lim, HJ Lee
The Scientific World Journal 2014, 2014
A comparative study of tree-based and mesh-based overlay p2p media streaming
CY Goh, HS Yeo, H Lim, PK Hoong, JWY Lim, IKT Tan
International Journal of Multimedia and Ubiquitous Engineering 8 (4), 97-105, 2013
Design and implementation of iATA on Windows CE platform: an ATA-based virtual storage system
CM Yeoh, YS They, HJ Lee, H Lim
2009 WRI International Conference on Communications and Mobile Computing 3 …, 2009
Dragon-MAC: Securing Wireless Sensor Network with Authenticated Encryption
SY Lim, CC Pu, HT Lim, HJ Lee
Journal of the Korea Institute of Information and Communication Engineering …, 2007
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20