default search action
Sanggon Lee
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j28]Elizabeth Nathania Witanto, Brian Stanley, Sang-Gon Lee:
Distributed Data Integrity Verification Scheme in Multi-Cloud Environment. Sensors 23(3): 1623 (2023) - [j27]Elizabeth Nathania Witanto, Brian Stanley, Sang-Gon Lee:
Correction: Witanto et al. Distributed Data Integrity Verification Scheme in Multi-Cloud Environment. Sensors 2023, 23, 1623. Sensors 23(12): 5566 (2023) - [j26]Yustus Eko Oktian, Sang-Gon Lee:
Blockchain-Based Federated Learning System: A Survey on Design Choices. Sensors 23(12): 5658 (2023) - 2022
- [j25]Elizabeth Nathania Witanto, Yustus Eko Oktian, Sang-Gon Lee:
Toward Data Integrity Architecture for Cloud-Based AI Systems. Symmetry 14(2): 273 (2022) - [j24]Yustus Eko Oktian, Brian Stanley, Sang-Gon Lee:
Building Trusted Federated Learning on Blockchain. Symmetry 14(7): 1407 (2022) - 2021
- [j23]Yustus Eko Oktian, Sang-Gon Lee:
BorderChain: Blockchain-Based Access Control Framework for the Internet of Things Endpoint. IEEE Access 9: 3592-3615 (2021) - [j22]Sandra Kumi, Chae-Ho Lim, Sang-Gon Lee:
Malicious URL Detection Based on Associative Classification. Entropy 23(2): 182 (2021) - [j21]Mohammed Abdulhakim Al-Absi, Ahmed Abdulhakim Al-Absi, Rui Fu, Ki-Hwan Kim, Young-Sil Lee, Byung-Gook Lee, Sang-Gon Lee, Hoon-Jae Lee:
Secure and Efficient High Throughput Medium Access Control for Vehicular Ad-Hoc Network. Sensors 21(14): 4935 (2021)
2010 – 2019
- 2019
- [c23]Yustus Eko Oktian, Elizabeth Nathania Witanto, Sandra Kumi, Sang-Gon Lee:
BlockSubPay - A Blockchain Framework for Subscription-Based Payment in Cloud Service. ICACT 2019: 153-158 - [c22]Elizabeth Nathania Witanto, Yustus Eko Oktian, Sandra Kumi, Sang-Gon Lee:
Blockchain-based OCF Firmware Update. ICTC 2019: 1248-1253 - [c21]Yustus Eko Oktian, Elizabeth Nathania Witanto, Sandra Kumi, Sang-Gon Lee:
ISP Network Bandwidth Management: Using Blockchain and SDN. ICTC 2019: 1330-1335 - 2018
- [j20]Jun Huy Lam, Sanggon Lee, Hoon-Jae Lee, Yustus Eko Oktian:
Design, implementation, and performance evaluation of identity-based cryptography in ONOS. Int. J. Netw. Manag. 28(1) (2018) - [j19]Yustus Eko Oktian, Sanggon Lee, Jun Huy Lam:
OAuthkeeper: An Authorization Framework for Software Defined Network. J. Netw. Syst. Manag. 26(1): 147-168 (2018) - 2017
- [j18]Yustus Eko Oktian, Sanggon Lee, Hoonjae Lee, Jun Huy Lam:
Distributed SDN controller system: A survey on design choice. Comput. Networks 121: 100-111 (2017) - [c20]Sanggon Lee:
Non-connection Wireless IoT Network Control Using WiFi and Bluetooth Beacon. SoICT 2017: 204-210 - 2016
- [j17]Jun Huy Lam, Sanggon Lee, Hoon-Jae Lee, Yustus Eko Oktian:
Securing SDN Southbound and Data Plane Communication with IBC. Mob. Inf. Syst. 2016: 1708970:1-1708970:12 (2016) - 2015
- [j16]Triana Mugia Rahayu, Sanggon Lee, Hoonjae Lee:
A Secure Routing Protocol for Wireless Sensor Networks Considering Secure Data Aggregation. Sensors 15(7): 15127-15158 (2015) - [c19]Bruce Ndibanje, Young-Sil Lee, Sanggon Lee, Hoon-Jae Lee:
A Privacy Preserving Security Protocol-Based Application for Wireless Communication System. HPCC/CSS/ICESS 2015: 1651-1656 - [c18]Yustus Eko Oktian, Sanggon Lee, Hoonjae Lee, Jun Huy Lam:
Secure your Northbound SDN API. ICUFN 2015: 919-920 - [c17]Jun Huy Lam, Sang-Gon Lee, Hoonjae Lee, Yustus Eko Oktian:
Securing distributed SDN with IBC. ICUFN 2015: 921-925 - 2014
- [j15]Mallikarjun Avula, Sanggon Lee, Seong-Moo Yoo:
Security Framework for Hybrid Wireless Mesh Protocol in Wireless Mesh Networks. KSII Trans. Internet Inf. Syst. 8(6): 1982-2004 (2014) - [j14]Pardeep Kumar, Mika Ylianttila, Andrei V. Gurtov, Sanggon Lee, Hoon-Jae Lee:
An Efficient and Adaptive Mutual Authentication Framework for Heterogeneous Wireless Sensor Network-Based Applications. Sensors 14(2): 2732-2755 (2014) - [j13]Bruce Ndibanje, Hoon-Jae Lee, Sanggon Lee:
Security Analysis and Improvements of Authentication and Access Control in the Internet of Things. Sensors 14(8): 14786-14805 (2014) - [j12]Pardeep Kumar, Andrei V. Gurtov, Jari H. Iinatti, Sanggon Lee:
Delegation-based robust authentication model for wireless roaming using portable communication devices. IEEE Trans. Consumer Electron. 60(4): 668-674 (2014) - [c16]Yustus Eko Oktian, Sanggon Lee, Hoonjae Lee:
Mitigating Denial of Service (DoS) attacks in OpenFlow networks. ICTC 2014: 325-330 - 2013
- [j11]Whye Kit Tan, Sanggon Lee, Jun Huy Lam, Seong-Moo Yoo:
A Security Analysis of the 802.11s Wireless Mesh Network Routing Protocol and Its Secure Routing Protocols. Sensors 13(9): 11553-11585 (2013) - 2012
- [j10]Jun Huy Lam, Sanggon Lee, Whye Kit Tan:
Performance Evaluation of Multi-Channel Wireless Mesh Networks with Embedded Systems. Sensors 12(1): 500-517 (2012) - [j9]Pardeep Kumar, Sanggon Lee, Hoon-Jae Lee:
E-SAP: Efficient-Strong Authentication Protocol for Healthcare Applications Using Wireless Medical Sensor Networks. Sensors 12(2): 1625-1647 (2012) - [c15]Jun Huy Lam, Sanggon Lee, Whye Kit Tan:
Multi-channel Wireless Mesh Networks Test-Bed with Embedded Systems. AINA Workshops 2012: 533-537 - 2011
- [j8]Meng-Hui Lim, Bok-Min Goi, Sanggon Lee:
An Analysis of Group Key Agreement Schemes based on the Bellare-Rogaway Model in Multi-party Setting. KSII Trans. Internet Inf. Syst. 5(4): 822-839 (2011) - [j7]Sang-Gon Lee:
Cryptanalysis of Multiple-Server Password-Authenticated Key Agreement Schemes Using Smart Cards. J. Inform. and Commun. Convergence Engineering 9(4): 431-434 (2011) - [j6]Madhusudan Singh, Sanggon Lee, Hoon-Jae Lee:
Performance of Mobility Models for Routing Protocol in Wireless Ad-hoc Networks. J. Inform. and Commun. Convergence Engineering 9(5): 610-614 (2011) - [j5]Pardeep Kumar, Amlan Jyoti Choudhury, Mangal Sain, Sanggon Lee, Hoon-Jae Lee:
RUASN: A Robust User Authentication Framework for Wireless Sensor Networks. Sensors 11(5): 5020-5046 (2011) - [c14]Pardeep Kumar, Sanggon Lee, Hoon-Jae Lee:
A User Authentication for Healthcare Application Using Wireless Medical Sensor Networks. HPCC 2011: 647-652 - [c13]Madhusudan Singh, Sanggon Lee, Whye Kit Tan, Jun Huy Lam:
Throughput Analysis of Wireless Mesh Network Test-Bed. ICHIT (2) 2011: 54-61 - 2010
- [j4]Jiun-Hau Liew, Ivy Ong, Sanggon Lee, Hyotaek Lim, Hoon-Jae Lee:
Practical Attacks on Hybrid Group Key Management for SOHAN. J. Inform. and Commun. Convergence Engineering 8(5): 549-553 (2010) - [c12]Pardeep Kumar, Md. Iftekhar Salam, Sanggon Lee, Hoon-Jae Lee:
Addressing secure data routing scheme for heterogeneous sensor networks. NCM 2010: 86-90
2000 – 2009
- 2009
- [j3]Sanggon Lee, Meng-Hui Lim, Hoon-Jae Lee:
Cryptanalysis of Hu-Niu-Yang's Multi-server Password Authenticated Key Agreement Schemes Using Smart Card. J. Inform. and Commun. Convergence Engineering 7(3): 340-344 (2009) - [j2]Sang-Gon Lee:
An Implementation of Project-Based Learning for Routing Design Course. J. Inform. and Commun. Convergence Engineering 7(4): 570-575 (2009) - [c11]Madhusudan Singh, Sanggon Lee:
Decentralized Hybrid Wireless Mesh Protocol. ICIS 2009: 824-829 - [c10]Bayalagmaa Davaanaym, Young-Sil Lee, Hoon-Jae Lee, Sanggon Lee, Hyotaek Lim:
A Ping Pong Based One-Time-Passwords Authentication System. NCM 2009: 574-579 - [i8]Sang-Gon Lee:
Cryptanalysis of Multiple-Server Password-Authenticated Key. IACR Cryptol. ePrint Arch. 2009: 490 (2009) - 2008
- [c9]Shu Yun Lim, Meng-Hui Lim, Sanggon Lee, Hoonjae Lee:
Secure Hybrid Group Key Management for Hierarchical Self-Organizing Sensor Network. IAS 2008: 43-49 - [c8]Meng-Hui Lim, Sanggon Lee, Hoonjae Lee:
Cryptanalytic Flaws in Oh et al.'s ID-Based Authenticated Key Agreement Protocol. ICCSA (2) 2008: 458-467 - [c7]Meng-Hui Lim, Sanggon Lee, Hoon-Jae Lee:
An Improved Variant of Wang-Cao's Certificate-Based Authenticated Key Agreement Protocol. NCM (2) 2008: 198-201 - [c6]Meng-Hui Lim, Chee-Min Yeoh, Sanggon Lee, Hyotaek Lim, Hoonjae Lee:
A Secure and Efficient Three-Pass Authenticated Key Agreement Protocol Based on Elliptic Curves. Networking 2008: 170-182 - 2007
- [j1]YoungHo Park, Hwangjun Song, KyungKeun Lee, CheolSoo Kim, Sanggon Lee, Sang-Jae Moon:
Secure Route Discovery Protocol for Ad Hoc Networks. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 90-A(2): 539-541 (2007) - [c5]Jin-Heung Lee, Sanggon Lee, Sanguk Shin:
A Secure DRM Framework for User's Domain and Key Management. ATC 2007: 420-429 - [c4]Meng-Hui Lim, Sanggon Lee, Youngho Park, Hoonjae Lee:
An Enhanced One-Round Pairing-Based Tripartite Authenticated Key Agreement Protocol. ICCSA (2) 2007: 503-513 - [c3]Meng-Hui Lim, Sanggon Lee, Youngho Park, Hoonjae Lee:
An Enhanced ID-Based Deniable Authentication Protocol on Pairings. ICCSA (2) 2007: 1008-1017 - [c2]Meng-Hui Lim, Sanggon Lee, Sang-Jae Moon:
Cryptanalysis of Tso et al.'s ID-Based Tripartite Authenticated Key Agreement Protocol. ICISS 2007: 64-76 - [i7]Meng-Hui Lim, Sanggon Lee, Youngho Park, Hoonjae Lee:
An Enhanced ID-based Deniable Authentication Protocol on Pairings. IACR Cryptol. ePrint Arch. 2007: 113 (2007) - [i6]Meng-Hui Lim, Sanggon Lee, Youngho Park, Hoonjae Lee:
An Enhanced One-round Pairing-based Tripartite Authenticated Key Agreement Protocol. IACR Cryptol. ePrint Arch. 2007: 142 (2007) - [i5]Meng-Hui Lim, Sanggon Lee, Youngho Park, Sang-Jae Moon:
Secure Deniable Authenticated Key Establishment for Internet Protocols. IACR Cryptol. ePrint Arch. 2007: 163 (2007) - [i4]Meng-Hui Lim, Sanggon Lee:
An Improved One-Round ID-Based Tripartite Authenticated Key Agreement Protocol. IACR Cryptol. ePrint Arch. 2007: 189 (2007) - [i3]Meng-Hui Lim, Sanggon Lee, Hoonjae Lee:
Cryptanalysis on Improved Chou et al.'s ID-Based Deniable Authentication Protocol. IACR Cryptol. ePrint Arch. 2007: 383 (2007) - [i2]Meng-Hui Lim, Sanggon Lee, Hoonjae Lee:
Cryptanalysis on Improved One-round Lin-Li's Tripartite Key Agreement Protocol. IACR Cryptol. ePrint Arch. 2007: 411 (2007) - [i1]Meng-Hui Lim, Sanggon Lee, Hoonjae Lee:
Cryptanalytic Flaws in Oh et al.'s ID-Based Authenticated Key Agreement Protocol. IACR Cryptol. ePrint Arch. 2007: 415 (2007) - 2005
- [c1]Sanggon Lee, Yvonne Hitchcock, Youngho Park, Sang-Jae Moon:
Provably Secure Tripartite Password Protected Key Exchange Protocol Based on Elliptic Curves. Selected Areas in Cryptography 2005: 205-220
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-19 21:37 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint