A strong user authentication framework for cloud computing AJ Choudhury, P Kumar, M Sain, H Lim, H Jae-Lee 2011 IEEE Asia-Pacific Services Computing Conference, 110-115, 2011 | 185 | 2011 |
Hand tracking and gesture recognition system for human-computer interaction using low-cost hardware HS Yeo, BG Lee, H Lim Multimedia Tools and Applications 74 (8), 2687-2715, 2015 | 164 | 2015 |
Online banking authentication system using mobile-OTP with QR-code YS Lee, NH Kim, H Lim, HK Jo, HJ Lee 5th International Conference on Computer Sciences and Convergence …, 2010 | 87 | 2010 |
Two factor authentication for cloud computing S Lee, I Ong, HT Lim, HJ Lee Journal of information and communication convergence engineering 8 (4), 427-432, 2010 | 53 | 2010 |
Homomorphic encryption in mobile multi cloud computing M Louk, H Lim 2015 International Conference on Information Networking (ICOIN), 493-497, 2015 | 32 | 2015 |
A new content-defined chunking algorithm for data deduplication in cloud storage RNS Widodo, H Lim, M Atiquzzaman Future Generation Computer Systems 71, 145-156, 2017 | 28 | 2017 |
Leveraging client-side storage techniques for enhanced use of multiple consumer cloud storage services on resource-constrained mobile devices HS Yeo, XS Phang, HJ Lee, H Lim Journal of Network and Computer Applications 43, 142-156, 2014 | 27 | 2014 |
e2Home: A lightweight smart home management system CM Yeoh, HY Tan, CK Kok, HJ Lee, H Lim 2008 Third International Conference on Convergence and Hybrid Information …, 2008 | 23 | 2008 |
Adaptive selection of dynamic VM consolidation algorithm using neural network for cloud resource management JN Witanto, H Lim, M Atiquzzaman Future generation computer systems 87, 35-42, 2018 | 22 | 2018 |
An efficient online signature verification scheme using dynamic programming of string matching AG Reza, H Lim, MJ Alam International Conference on Hybrid Information Technology, 590-597, 2011 | 22 | 2011 |
One-time knocking framework using SPA and IPsec JH Liew, S Lee, I Ong, HJ Lee, H Lim 2010 2nd International Conference on Education Technology and Computer 5, V5 …, 2010 | 20 | 2010 |
SDM: Smart deduplication for mobile cloud storage RNS Widodo, H Lim, M Atiquzzaman Future Generation Computer Systems 70, 64-73, 2017 | 19 | 2017 |
A ping pong based one-time-passwords authentication system B Davaanaym, YS Lee, HJ Lee, SG Lee, HT Lim 2009 Fifth International Joint Conference on INC, IMS and IDC, 574-579, 2009 | 19 | 2009 |
A secure and efficient three-pass authenticated key agreement protocol based on elliptic curves MH Lim, CM Yeoh, S Lee, H Lim, H Lee International Conference on Research in Networking, 170-182, 2008 | 17 | 2008 |
Cell loss recovery method in B-ISDN/ATM networks HT Lim, JS Song Electronics Letters 31 (11), 849-851, 1995 | 17 | 1995 |
An analysis of security system for intrusion in smartphone environment M Louk, H Lim, HJ Lee The Scientific World Journal 2014, 2014 | 15 | 2014 |
Display device K Lee US Patent 7,701,530, 2010 | 15 | 2010 |
Design and implementation of iATA on Windows CE platform: an ATA-based virtual storage system CM Yeoh, YS They, HJ Lee, H Lim 2009 WRI International Conference on Communications and Mobile Computing 3 …, 2009 | 14 | 2009 |
Dragon-MAC: Securing Wireless Sensor Network with Authenticated Encryption SY Lim, CC Pu, HT Lim, HJ Lee Journal of the Korea Institute of Information and Communication Engineering …, 2007 | 14 | 2007 |
A comparative study of tree-based and mesh-based overlay p2p media streaming CY Goh, HS Yeo, H Lim, PK Hoong, JWY Lim, IKT Tan International Journal of Multimedia and Ubiquitous Engineering 8 (4), 97-105, 2013 | 13 | 2013 |