dblp.uni-trier.dewww.uni-trier.de

Dong Hoon Lee Vis

Korea University

List of publications from the DBLP Bibliography Server - FAQ

other persons with the same name:


Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo

*2009
118EEJi Young Chun, Yong Ho Kim, Jung Yeon Hwang, Dong Hoon Lee: Security Enhancing Compiler for Localization Schemes in Pervasive Sensor Networks. ACIS-ICIS 2009: 307-312
117EEJung Yeon Hwang, Dong Hoon Lee, Moti Yung: Universal forgery of the identity-based sequential aggregate signature scheme. ASIACCS 2009: 157-160
116EEHyun Sook Rhee, Jong Hwan Park, Willy Susilo, Dong Hoon Lee: Improved searchable public key encryption with designated tester. ASIACCS 2009: 376-379
115EEIk Rae Jeong, Jeong Ok Kwon, Dowon Hong, Dong Hoon Lee: Constructing PEKS schemes secure against keyword guessing attacks is possible? Computer Communications 32(2): 394-396 (2009)
114EEHyun Sook Rhee, Jeong Ok Kwon, Dong Hoon Lee: A remote user authentication scheme without using smart cards. Computer Standards & Interfaces 31(1): 6-13 (2009)
113EEIk Rae Jeong, Jeong Ok Kwon, Dong Hoon Lee: Analysis of Revocable-iff-Linked Ring Signature Scheme. IEICE Transactions 92-A(1): 322-325 (2009)
112EEJong Hwan Park, Dong Hoon Lee: Security Analysis of a Multi-Receiver Identity-Based Key Encapsulation Mechanism. IEICE Transactions 92-A(1): 329-331 (2009)
111EEIk Rae Jeong, Jeong Ok Kwon, Dong Hoon Lee: Collusion Attacks to Tanaka's Corrected ID-Based Non-interactive Key Sharing Scheme. IEICE Transactions 92-A(3): 932-934 (2009)
110EEIk Rae Jeong, Jeong Ok Kwon, Dong Hoon Lee: Stronger Chikazawa-Yamagishi ID-Based Key Distribution. IEICE Transactions 92-A(5): 1379-1382 (2009)
109EEJong Hwan Park, Dong Hoon Lee: Cryptanalysis of Chatterjee-Sarkar Hierarchical Identity-Based Encryption Scheme at PKC 06. IEICE Transactions 92-A(7): 1724-1726 (2009)
108EEIk Rae Jeong, Jeong Ok Kwon, Dowon Hong, Dong Hoon Lee: Searchable Encryption with Keyword-Recoverability. IEICE Transactions 92-D(5): 1200-1203 (2009)
107EESeung Geol Choi, Javier Herranz, Dennis Hofheinz, Jung Yeon Hwang, Eike Kiltz, Dong Hoon Lee, Moti Yung: The Kurosawa-Desmedt key encapsulation is not chosen-ciphertext secure. Inf. Process. Lett. 109(16): 897-901 (2009)
2008
106EEJong Hwan Park, Ki Tak Kim, Dong Hoon Lee: Cryptanalysis and improvement of a multi-receiver identity-based key encapsulation at INDOCRYPT 06. ASIACCS 2008: 373-380
105EETae Youn Won, Ji Young Chun, Dong Hoon Lee: Strong Authentication Protocol for Secure RFID Tag Search without Help of Central Database. EUC (2) 2008: 153-158
104EEYong Ho Kim, Kyu Young Choi, Jongin Lim, Dong Hoon Lee: An Efficient Key Establishment Scheme for Self-organizing Sensor Networks. ICDCN 2008: 345-349
103EEKwangsu Lee, Jung Yeon Hwang, Dong Hoon Lee: Non-interactive Identity-Based DNF Signature Scheme and Its Extensions. ICISC 2008: 166-183
102EESeil Kim, Ji Young Chun, Dong Hoon Lee: Cryptanalysis of Two Improved Remote User Authentication Schemes Preserving User Anonymity. ICYCS 2008: 2235-2239
101EEHyun-A Park, Dong Hoon Lee, Justin Zhan, Gary Blosser: Efficient keyword index search over encrypted documents of groups. ISI 2008: 225-229
100EEHyun-A Park, Justin Zhan, Dong Hoon Lee: Privacy-Aware Access Control through Negotiation in Daily Life Service. ISI Workshops 2008: 514-519
99EEJong Hwan Park, Dong Hoon Lee: A New Public Key Broadcast Encryption Using Boneh-Boyen-Goh's HIBE Scheme. ISPEC 2008: 101-115
98EEYong Ho Kim, Hwaseong Lee, Dong Hoon Lee: A Key Distribution Scheme for Wireless Sensor Networks. PerCom 2008: 572-577
97EEHyung-Soo Park, Hyung-Woo Lee, Dong Hoon Lee, Hong-Ki Ko: Multi-protocol authentication for SIP/SS7 mobile network. Computer Communications 31(11): 2755-2763 (2008)
96EEJung Yeon Hwang, Kyu Young Choi, Dong Hoon Lee: Security weakness in an authenticated group key agreement protocol in two rounds. Computer Communications 31(15): 3719-3724 (2008)
95EEYong Ho Kim, Dong Hoon Lee: An authentication scheme for filtering injected bogus data in sensor networks. Computer Communications 31(17): 3929-3932 (2008)
94EESeung-Hyun Seo, Jung Yeon Hwang, Kyu Young Choi, Dong Hoon Lee: Identity-based universal designated multi-verifiers signature schemes. Computer Standards & Interfaces 30(5): 288-295 (2008)
93EEIk Rae Jeong, Jeong Ok Kwon, Dong Hoon Lee: Ring Signature with Weak Linkability and Its Applications. IEEE Trans. Knowl. Data Eng. 20(8): 1145-1148 (2008)
92EEKyu Young Choi, Jung Yeon Hwang, Dong Hoon Lee: ID-Based Authenticated Group Key Agreement Secure against Insider Attacks. IEICE Transactions 91-A(7): 1828-1830 (2008)
91EEIk Rae Jeong, Jeong Ok Kwon, Dong Hoon Lee: Strong ID-Based Key Distribution. IEICE Transactions 91-B(1): 306-308 (2008)
90EEJung Yeon Hwang, Jongin Lim, Dong Hoon Lee: Impersonation Attack on a Strong ID-Based Key Distribution. IEICE Transactions 91-B(8): 2702-2703 (2008)
89EEDong Hoon Lee: Algebraic degree of the inverse of linearized polynomials. J. Symb. Comput. 43(6-7): 442-451 (2008)
88 Ik Rae Jeong, Dong Hoon Lee: Parallel Key Exchange. J. UCS 14(3): 377-396 (2008)
87EEJeong Ok Kwon, Ik Rae Jeong, Dong Hoon Lee: Practical Password-Authenticated Three-Party Key Exchange. TIIS 2(6): 312-332 (2008)
2007
86EEKyu Young Choi, Jong Hwan Park, Jung Yeon Hwang, Dong Hoon Lee: Efficient Certificateless Signature Schemes. ACNS 2007: 443-458
85EEJong Hyuk Park, Sangjin Lee, Dong Hoon Lee, Jongin Lim, In-Hwa Hong, Laurence Tianruo Yang: Design and Implementation of the UsMSS : User-centric secure Multimedia Service System in Intelligent Home. AINA 2007: 311-316
84EEMi-Yeon Kim, Misook Lim, Jin-Soo Sohn, Dong Hoon Lee: Security and Handover Designs for VoWLAN System. APNOMS 2007: 447-456
83EEHwaseong Lee, Yong Ho Kim, Dong Hoon Lee, Jongin Lim: Classification of Key Management Schemes for Wireless Sensor Networks. APWeb/WAIM Workshops 2007: 664-673
82EEYong Ho Kim, Hwaseong Lee, Jong Hyuk Park, Laurence Tianruo Yang, Dong Hoon Lee: Key Establishment Scheme for Sensor Networks with Low Communication Cost. ATC 2007: 441-448
81 Moon Jeong Kim, Dong Hoon Lee, Young Ik Eom: A Transformation Scheme for Interconnection Networks. Communications in Computing 2007: 36-42
80EEJong Hwan Park, Dong Hoon Lee: Direct Chosen-Ciphertext Secure Hierarchical ID-Based Encryption Schemes. EuroPKI 2007: 94-109
79EEHyun-A Park, Bum Han Kim, Dong Hoon Lee, Yon Dohn Chung, Justin Zhan: Secure Similarity Search. GrC 2007: 598-
78EEJoon Wan Kim, Yong Ho Kim, Hwaseong Lee, Dong Hoon Lee: A Practical Inter-sensor Broadcast Authentication Scheme. HCI (5) 2007: 399-405
77EEMoon Jeong Kim, Dong Hoon Lee, Young Ik Eom: Enhanced Non-disjoint Multi-path Source Routing Protocol for Wireless Ad-Hoc Networks. ICCSA (3) 2007: 1187-1196
76EEHyungwoo Kang, Dong Hoon Lee: Security Assessment for Application Network Services Using Fault Injection. PAISI 2007: 172-183
75EEHyun-A Park, Dong Hoon Lee, Jongin Lim, Sang Hyun Cho: PPIDS: Privacy Preserving Intrusion Detection System. PAISI 2007: 269-274
74EEYong Ho Kim, Jong Hwan Park, Dong Hoon Lee, Jongin Lim: Bogus Data Filtering in Sensor Networks. PAKDD Workshops 2007: 629-635
73EEJong Hwan Park, Kyu Young Choi, Jung Yeon Hwang, Dong Hoon Lee: Certificateless Public Key Encryption in the Selective-ID Security Model (Without Random Oracles). Pairing 2007: 60-82
72EESu-Mi Lee, Su Youn Lee, Dong Hoon Lee: Efficient Group Key Agreement for Dynamic TETRA Networks. SOFSEM (1) 2007: 400-409
71EEEun Young Choi, Su-Mi Lee, Dong Hoon Lee: Self-updating: Strong Privacy Protection Protocol for RFID-Tagged Banknotes. UIC 2007: 1171-1180
70EEJeong Ok Kwon, Ik Rae Jeong, Kouichi Sakurai, Dong Hoon Lee: Efficient verifier-based password-authenticated key exchange in the three-party setting. Computer Standards & Interfaces 29(5): 513-520 (2007)
69EEIk Rae Jeong, Dong Hoon Lee: Key agreement for key hypergraph. Computers & Security 26(7-8): 452-458 (2007)
68EEIk Rae Jeong, Jeong Ok Kwon, Dong Hoon Lee: On the Strong Forward Secrecy of the Improved Chikazawa-Yamagishi ID-Based Key Sharing. IEICE Transactions 90-A(11): 2626-2628 (2007)
67EEJeong Ok Kwon, Ik Rae Jeong, Dong Hoon Lee: Three-Round Smart Card-Based Key Exchange Scheme. IEICE Transactions 90-B(11): 3255-3258 (2007)
66EEJin Wook Byun, Dong Hoon Lee, Jong In Lim: EC2C-PAKA: An efficient client-to-client password-authenticated key agreement. Inf. Sci. 177(19): 3995-4013 (2007)
2006
65EEHak Soo Ju, Dae Youb Kim, Dong Hoon Lee, Haeryong Park, Kilsoo Chun: Modified ID-Based Threshold Decryption and Its Application to Mediated ID-Based Encryption. APWeb 2006: 720-725
64EEJin Wook Byun, Dong Hoon Lee, Jongin Lim: Efficient and Provably Secure Client-to-Client Password-Based Key Exchange Protocol. APWeb 2006: 830-836
63EEIk Rae Jeong, Jeong Ok Kwon, Dong Hoon Lee: A Diffie-Hellman Key Exchange Protocol Without Random Oracles. CANS 2006: 37-54
62 Sang Heon Han, Jung Hoon Kim, Tae Soo Yun, Dong Hoon Lee: Extensible Interface Using Projector-Based Augmentation. CGVR 2006: 132-137
61 Chang Ok Yun, Sang Heon Han, Tae Soo Yun, Dong Hoon Lee: Development of Stereoscopic Image Editing Tool using Image-Based Modeling. CGVR 2006: 42-48
60EEJeong Ok Kwon, Kouichi Sakurai, Dong Hoon Lee: One-Round Protocol for Two-Party Verifier-Based Password-Authenticated Key Exchange. Communications and Multimedia Security 2006: 87-96
59EEJin Wook Byun, Dong Hoon Lee, Jongin Lim: Efficient Conjunctive Keyword Search on Encrypted Data Storage System. EuroPKI 2006: 184-196
58EEHyungwoo Kang, Kibom Kim, Soon Jwa Hong, Dong Hoon Lee: A Model for Security Vulnerability Pattern. ICCSA (3) 2006: 385-394
57EEJeong Su Park, Su-Mi Lee, Eun Young Choi, Dong Hoon Lee: Self Re-encryption Protocol Providing Strong Privacy for Low Cost RFID System. ICCSA (4) 2006: 316-325
56EEJeong Ok Kwon, Ik Rae Jeong, Dong Hoon Lee: Provably-Secure Two-Round Password-Authenticated Group Key Exchange in the Standard Model. IWSEC 2006: 322-336
55EEJeong Ok Kwon, Kouichi Sakurai, Dong Hoon Lee: Efficient Password-Authenticated Key Exchange for Three-Party Secure Against Undetectable On-Line Dictionary Attacks. International Conference on Computational Science (1) 2006: 977-980
54EEKyoung Hyun Kim, Eun Young Choi, Su-Mi Lee, Dong Hoon Lee: Secure EPCglobal Class-1 Gen-2 RFID System Against Security and Privacy Problems. OTM Workshops (1) 2006: 362-371
53EEBo Man Kim, Kyu Young Choi, Dong Hoon Lee: Disaster Coverable PKI Model Utilizing the Existing PKI Structure. OTM Workshops (1) 2006: 537-545
52EEYong Ho Kim, Hwaseong Lee, Dong Hoon Lee, Jongin Lim: A Key Management Scheme for Large Scale Distributed Sensor Networks. PWC 2006: 437-446
51EEJin Wook Byun, Su-Mi Lee, Dong Hoon Lee, Dowon Hong: Constant-Round Password-Based Group Key Generation for Multi-layer Ad-Hoc Networks. SPC 2006: 3-17
50EEHyun Sook Rhee, Ik Rae Jeong, Jin Wook Byun, Dong Hoon Lee: Difference Set Attacks on Conjunctive Keyword Search Schemes. Secure Data Management 2006: 64-74
49EEJin Wook Byun, Hyun Suk Rhee, Hyun-A Park, Dong Hoon Lee: Off-Line Keyword Guessing Attacks on Recent Keyword Search Schemes over Encrypted Data. Secure Data Management 2006: 75-83
2005
48EEKyu Young Choi, Jung Yeon Hwang, Dong Hoon Lee, In Seog Seo: ID-based Authenticated Key Agreement for Low-Power Mobile Devices. ACISP 2005: 494-505
47EEJin Wook Byun, Dong Hoon Lee: N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords. ACNS 2005: 75-90
46EEYong Ho Kim, Mu Hyun Kim, Dong Hoon Lee, Changwook Kim: A Key Management Scheme for Commodity Sensor Networks. ADHOC-NOW 2005: 113-126
45EEJin Wook Byun, Dong Hoon Lee, Jongin Lim: Password-Based Group Key Exchange Secure Against Insider Guessing Attacks. CIS (2) 2005: 143-148
44EEJung Yeon Hwang, Dong Hoon Lee, Jongin Lim: Generic Transformation for Scalable Broadcast Encryption Schemes. CRYPTO 2005: 276-292
43EEJae Hyung Koo, Bum Han Kim, Dong Hoon Lee: Authenticated Public Key Distribution Scheme Without Trusted Third Party. EUC Workshops 2005: 926-935
42EEEun Young Choi, Su-Mi Lee, Dong Hoon Lee: Efficient RFID Authentication Protocol for Ubiquitous Computing Environment. EUC Workshops 2005: 945-954
41EENam-Su Jho, Jung Yeon Hwang, Jung Hee Cheon, Myung-Hwan Kim, Dong Hoon Lee, Eun Sun Yoo: One-Way Chain Based Broadcast Encryption Schemes. EUROCRYPT 2005: 559-574
40EESu-Mi Lee, Young Ju Hwang, Dong Hoon Lee, Jong In Lim: Efficient Authentication for Low-Cost RFID Systems. ICCSA (1) 2005: 619-627
39EEHak Soo Ju, Dae Youb Kim, Dong Hoon Lee, Jongin Lim, Kilsoo Chun: Fine Grained Control of Security Capability and Forward Security in a Pairing Based Signature Scheme. ICCSA (2) 2005: 381-390
38EEGangShin Lee, Heeran Lim, Manpyo Hong, Dong Hoon Lee: A Dynamic Path Identification Mechanism to Defend Against DDoS Attacks. ICOIN 2005: 806-813
37EEHak Soo Ju, Dae Youb Kim, Dong Hoon Lee, Jongin Lim, Kilsoo Chun: Efficient Revocation of Security Capability in Certificateless Public Key Cryptography. KES (2) 2005: 453-459
36EEJae Hyung Koo, Dong Hoon Lee: Secure Password Pocket for Distributed Web Services. NPC 2005: 327-334
35EEHyun-A Park, Jin Wook Byun, Dong Hoon Lee: Secure Index Search for Groups. TrustBus 2005: 128-140
34EEEun Young Choi, Hyun-Jeong Kim, Dong Hoon Lee: Efficient Member Revocation in Group Signature Schemes. TrustBus 2005: 195-205
33EEHyun Sook Rhee, Jin Wook Byun, Dong Hoon Lee, Jongin Lim: Oblivious Conjunctive Keyword Search. WISA 2005: 318-327
32EEJeong Ok Kwon, Jung Yeon Hwang, Changwook Kim, Dong Hoon Lee: Cryptanalysis of Lee-Kim-Yoo password-based key agreement scheme. Applied Mathematics and Computation 168(2): 858-865 (2005)
31EEDong Hoon Lee, Soon Ki Jung: Multiple path-based approach to image-based street walkthrough. Journal of Visualization and Computer Animation 16(2): 85-95 (2005)
2004
30 Jong In Lim, Dong Hoon Lee: Information Security and Cryptology - ICISC 2003, 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers Springer 2004
29EEIk Rae Jeong, Jonathan Katz, Dong Hoon Lee: One-Round Protocols for Two-Party Authenticated Key Exchange. ACNS 2004: 220-232
28EEHyun-Jeong Kim, Su-Mi Lee, Dong Hoon Lee: Constant-Round Authenticated Group Key Exchange for Dynamic Groups. ASIACRYPT 2004: 245-259
27 Dong Hoon Lee, Kyung Ho Jang, Soon Ki Jung: Intrinsic Camera Calibration Based on Radical Center Estimation. CISST 2004: 7-13
26EEGangShin Lee, Chaetae Im, TaeJin Lee, HyungJong Kim, Dong Hoon Lee: SITIS: Scalable Intrusion Tolerance Middleware for Internet Service Survivability. PCM (1) 2004: 564-571
25EEHyungwoo Kang, Soon Jwa Hong, Dong Hoon Lee: Matching Connection Pairs. PDCAT 2004: 642-649
24EEKyu Young Choi, Jung Yeon Hwang, Dong Hoon Lee: Efficient ID-based Group Key Agreement with Bilinear Maps. Public Key Cryptography 2004: 130-144
23EESu-Mi Lee, Jung Yeon Hwang, Dong Hoon Lee: Efficient Password-Based Group Key Exchange. TrustBus 2004: 191-199
22EEKyung Ho Jang, Dong Hoon Lee, Soon Ki Jung: A moving planar mirror based approach for cultural reconstruction. Journal of Visualization and Computer Animation 15(3-4): 415-423 (2004)
2003
21EEJung Yeon Hwang, Hyun-Jeong Kim, Dong Hoon Lee, Jong In Lim: Digital Signature Schemes with Restriction on Signing Capability. ACISP 2003: 324-335
20EEDong Hoon Lee, Soon Ki Jung: Capture Configuration for Image-Based Street Walkthroughs. CW 2003: 151-157
19EEEun Young Choi, Jung Yeon Hwang, Dong Hoon Lee: An Anonymous Asymmetric Public Key Traitor Tracing Scheme. EC-Web 2003: 104-114
18EEDong Hoon Lee, Soon Ki Jung: Computer Vision-Assisted Interaction in X3D Virtual Environment on WWW. Human.Society@Internet 2003 2003: 332-340
17EETaeshik Shon, Jongsub Moon, Sangjin Lee, Dong Hoon Lee, Jongin Lim: Covert Channel Detection in the ICMP Payload Using Support Vector Machine. ISCIS 2003: 828-835
2002
16EEDong-Guk Han, Hye-Young Park, Young-Ho Park, Sangjin Lee, Dong Hoon Lee, Hyungjin Yang: A Practical Approach Defeating Blackmailing. ACISP 2002: 464-481
15EEHyun-Jeong Kim, Dong Hoon Lee, Moti Yung: Privacy against Piracy: Protecting Two-Level Revocable P-K Traitor Tracing. ACISP 2002: 482-496
14EEJin Wook Byun, Ik Rae Jeong, Dong Hoon Lee, Chang-Seop Park: Password-Authenticated Key Exchange between Clients with Different Passwords. ICICS 2002: 134-146
13EEIk Rae Jeong, Hee Yun Jeong, Hyun Sook Rhee, Dong Hoon Lee, Jong In Lim: Provably Secure Encrypt-then-Sign Composition in Hybrid Signcryption. ICISC 2002: 16-34
12EEHak Soo Ju, Hyun-Jeong Kim, Dong Hoon Lee, Jong In Lim: An Anonymous Buyer-Seller Watermarking Protocol with Anonymity Control. ICISC 2002: 421-432
11EEJu Hee Ki, Hyun-Jeong Kim, Dong Hoon Lee, Chang-Seop Park: Efficient Multicast Key Management for Stateless Receivers. ICISC 2002: 497-509
10EESung A. Cho, Chae-Bogk Kim, Dong Hoon Lee: Single machine MAD/Tmax problem with a common due date. Computers & OR 29(8): 1099-1113 (2002)
2001
9EEIk Rae Jeong, Dong Hoon Lee, Jong In Lim: Efficient Transferable Cash with Group Signatures. ISC 2001: 462-474
8 Chang-Seop Park, Dong Hoon Lee: Secure and Efficient Key Management for Dynamic Multicast Groups. Operating Systems Review 35(4): 32-38 (2001)
2000
7 Dong Hoon Lee, Soon Ki Jung: Delaunay Triangles Model for Image-Based Motion Retargeting. DEFORM/AVATARS 2000: 158-168
6EEHyun-Jeong Kim, Jong In Lim, Dong Hoon Lee: Efficient and Secure Member Deletion in Group Signature Schemes. ICISC 2000: 150-161
5EEIk Rae Jeong, Dong Hoon Lee: Anonymity Control in Multi-bank E-Cash System. INDOCRYPT 2000: 104-116
4EESang-Hun Nam, Dong Hoon Lee, Jang-Hwan Im, Young-Ho Chai: Dual projection-based VR system for the light weight motion-based driving simulator. VRST 2000: 195-198
1999
3EEChae-Bogk Kim, P. Simin Pulat, Bobbie L. Foote, Dong Hoon Lee: Least cost tolerance allocation and bicriteria extension. Int. J. Computer Integrated Manufacturing 12(5): 418-426 (1999)
1995
2 Changwook Kim, Dong Hoon Lee: Node Replacement Graph Languages Squeezed with Chains, Trees, and Forests Inf. Comput. 117(1): 63-77 (1995)
1993
1 Changwook Kim, Dong Hoon Lee: Separating k-Separated eNCE Graph Languages. Theor. Comput. Sci. 120(2): 247-259 (1993)

Coauthor Index

1Gary Blosser [101]
2Jin Wook Byun [14] [33] [35] [45] [47] [49] [50] [51] [59] [64] [66]
3Young-Ho Chai [4]
4Jung Hee Cheon [41]
5Sang Hyun Cho [75]
6Sung A. Cho [10]
7Eun Young Choi [19] [34] [42] [54] [57] [71]
8Kyu Young Choi [24] [48] [53] [73] [86] [92] [94] [96] [104]
9Seung Geol Choi [107]
10Ji Young Chun [102] [105] [118]
11Kilsoo Chun [37] [39] [65]
12Yon Dohn Chung [79]
13Young Ik Eom [77] [81]
14Bobbie L. Foote [3]
15Dong-Guk Han [16]
16Sang Heon Han [61] [62]
17Javier Herranz [107]
18Dennis Hofheinz [107]
19Dowon Hong [51] [108] [115]
20In-Hwa Hong [85]
21Manpyo Hong [38]
22Soon Jwa Hong [25] [58]
23Jung Yeon Hwang [19] [21] [23] [24] [32] [41] [44] [48] [73] [86] [90] [92] [94] [96] [103] [107] [117] [118]
24Young Ju Hwang [40]
25Chaetae Im [26]
26Jang-Hwan Im [4]
27Kyung Ho Jang [22] [27]
28Hee Yun Jeong [13]
29Ik Rae Jeong [5] [9] [13] [14] [29] [50] [56] [63] [67] [68] [69] [70] [87] [88] [91] [93] [108] [110] [111] [113] [115]
30Nam-Su Jho [41]
31Hak Soo Ju [12] [37] [39] [65]
32Soon Ki Jung [7] [18] [20] [22] [27] [31]
33Hyungwoo Kang [25] [58] [76]
34Jonathan Katz [29]
35Ju Hee Ki [11]
36Eike Kiltz [107]
37Bo Man Kim [53]
38Bum Han Kim [43] [79]
39Chae-Bogk Kim [3] [10]
40Changwook Kim [1] [2] [32] [46]
41Dae Youb Kim [37] [39] [65]
42Hyun-Jeong Kim [6] [11] [12] [15] [21] [28] [34]
43HyungJong Kim [26]
44Joon Wan Kim [78]
45Jung Hoon Kim [62]
46Ki Tak Kim [106]
47Kibom Kim [58]
48Kyoung Hyun Kim [54]
49Mi-Yeon Kim [84]
50Moon Jeong Kim [77] [81]
51Mu Hyun Kim [46]
52Myung-Hwan Kim [41]
53Seil Kim [102]
54Yong Ho Kim [46] [52] [74] [78] [82] [83] [95] [98] [104] [118]
55Hong-Ki Ko [97]
56Jae Hyung Koo [36] [43]
57Jeong Ok Kwon [32] [55] [56] [60] [63] [67] [68] [70] [87] [91] [93] [108] [110] [111] [113] [114] [115]
58GangShin Lee [26] [38]
59Hwaseong Lee [52] [78] [82] [83] [98]
60Hyung-Woo Lee [97]
61Kwangsu Lee [103]
62Sangjin Lee [16] [17] [85]
63Su Youn Lee [72]
64Su-Mi Lee [23] [28] [40] [42] [51] [54] [57] [71] [72]
65TaeJin Lee [26]
66Heeran Lim [38]
67Jongin Lim (Jong In Lim) [6] [9] [12] [13] [17] [21] [30] [33] [37] [39] [40] [44] [45] [52] [59] [64] [66] [74] [75] [83] [85] [90] [104]
68Misook Lim [84]
69Jongsub Moon [17]
70Sang-Hun Nam [4]
71Chang-Seop Park [8] [11] [14]
72Haeryong Park [65]
73Hye-Young Park [16]
74Hyun-A Park [35] [49] [75] [79] [100] [101]
75Hyung-Soo Park [97]
76Jeong Su Park [57]
77Jong Hwan Park [73] [74] [80] [86] [99] [106] [109] [112] [116]
78Jong Hyuk Park [82] [85]
79Young-Ho Park [16]
80P. Simin Pulat [3]
81Hyun Sook Rhee [13] [33] [50] [114] [116]
82Hyun Suk Rhee [49]
83Kouichi Sakurai [55] [60] [70]
84In Seog Seo [48]
85Seung-Hyun Seo [94]
86Taeshik Shon [17]
87Jin-Soo Sohn [84]
88Willy Susilo [116]
89Tae Youn Won [105]
90Hyungjin Yang [16]
91Laurence Tianruo Yang [82] [85]
92Eun Sun Yoo [41]
93Chang Ok Yun [61]
94Tae Soo Yun [61] [62]
95Moti Yung (Mordechai M. Yung) [15] [107] [117]
96Justin Zhan [79] [100] [101]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)