Hyotaek Lim
Hyotaek Lim
Professor, Division of Computer Engineering, Dongseo University
Verified email at dongseo.ac.kr - Homepage
Cited by
Cited by
A strong user authentication framework for cloud computing
AJ Choudhury, P Kumar, M Sain, H Lim, H Jae-Lee
2011 IEEE Asia-Pacific Services Computing Conference, 110-115, 2011
Hand tracking and gesture recognition system for human-computer interaction using low-cost hardware
HS Yeo, BG Lee, H Lim
Multimedia Tools and Applications 74 (8), 2687-2715, 2015
Online banking authentication system using mobile-OTP with QR-code
YS Lee, NH Kim, H Lim, HK Jo, HJ Lee
5th International Conference on Computer Sciences and Convergence …, 2010
Two factor authentication for cloud computing
S Lee, I Ong, HT Lim, HJ Lee
Journal of information and communication convergence engineering 8 (4), 427-432, 2010
Adaptive selection of dynamic VM consolidation algorithm using neural network for cloud resource management
JN Witanto, H Lim, M Atiquzzaman
Future generation computer systems 87, 35-42, 2018
A new content-defined chunking algorithm for data deduplication in cloud storage
RNS Widodo, H Lim, M Atiquzzaman
Future Generation Computer Systems 71, 145-156, 2017
Homomorphic encryption in mobile multi cloud computing
M Louk, H Lim
2015 International Conference on Information Networking (ICOIN), 493-497, 2015
Leveraging client-side storage techniques for enhanced use of multiple consumer cloud storage services on resource-constrained mobile devices
HS Yeo, XS Phang, HJ Lee, H Lim
Journal of Network and Computer Applications 43, 142-156, 2014
e2Home: A lightweight smart home management system
CM Yeoh, HY Tan, CK Kok, HJ Lee, H Lim
2008 Third International Conference on Convergence and Hybrid Information …, 2008
An efficient online signature verification scheme using dynamic programming of string matching
AG Reza, H Lim, MJ Alam
International Conference on Hybrid Information Technology, 590-597, 2011
One-time knocking framework using SPA and IPsec
JH Liew, S Lee, I Ong, HJ Lee, H Lim
2010 2nd International Conference on Education Technology and Computer 5, V5 …, 2010
A ping pong based one-time-passwords authentication system
B Davaanaym, YS Lee, HJ Lee, SG Lee, HT Lim
2009 Fifth International Joint Conference on INC, IMS and IDC, 574-579, 2009
SDM: Smart deduplication for mobile cloud storage
RNS Widodo, H Lim, M Atiquzzaman
Future Generation Computer Systems 70, 64-73, 2017
Cell loss recovery method in B-ISDN/ATM networks
HT Lim, JS Song
Electronics Letters 31 (11), 849-851, 1995
Smart government framework with geo-crowdsourcing and social media analysis
JN Witanto, H Lim, M Atiquzzaman
Future Generation Computer Systems 89, 1-9, 2018
An analysis of security system for intrusion in smartphone environment
M Louk, H Lim, HJ Lee
The Scientific World Journal 2014, 2014
Display device
KD Lee
US Patent 7,701,530, 2010
A secure and efficient three-pass authenticated key agreement protocol based on elliptic curves
MH Lim, CM Yeoh, S Lee, H Lim, H Lee
International Conference on Research in Networking, 170-182, 2008
Dragon-MAC: Securing Wireless Sensor Network with Authenticated Encryption
SY Lim, CC Pu, HT Lim, HJ Lee
Journal of the Korea Institute of Information and Communication Engineering …, 2007
A comparative study of tree-based and mesh-based overlay p2p media streaming
CY Goh, HS Yeo, H Lim, PK Hoong, JWY Lim, IKT Tan
International Journal of Multimedia and Ubiquitous Engineering 8 (4), 97-105, 2013
The system can't perform the operation now. Try again later.
Articles 1–20