Hyotaek Lim
Hyotaek Lim
Professor, Division of Computer Engineering, Dongseo University
Verified email at - Homepage
Cited by
Cited by
Hand tracking and gesture recognition system for human-computer interaction using low-cost hardware
HS Yeo, BG Lee, H Lim
Multimedia Tools and Applications 74 (8), 2687-2715, 2015
A strong user authentication framework for cloud computing
AJ Choudhury, P Kumar, M Sain, H Lim, H Jae-Lee
2011 IEEE Asia-Pacific Services Computing Conference, 110-115, 2011
Online banking authentication system using mobile-OTP with QR-code
YS Lee, NH Kim, H Lim, HK Jo, HJ Lee
5th International Conference on Computer Sciences and Convergence …, 2010
Two factor authentication for cloud computing
S Lee, I Ong, HT Lim, HJ Lee
Journal of information and communication convergence engineering 8 (4), 427-432, 2010
Adaptive selection of dynamic VM consolidation algorithm using neural network for cloud resource management
JN Witanto, H Lim, M Atiquzzaman
Future generation computer systems 87, 35-42, 2018
A new content-defined chunking algorithm for data deduplication in cloud storage
RNS Widodo, H Lim, M Atiquzzaman
Future Generation Computer Systems 71, 145-156, 2017
Homomorphic encryption in mobile multi cloud computing
M Louk, H Lim
2015 international conference on information networking (ICOIN), 493-497, 2015
Smart government framework with geo-crowdsourcing and social media analysis
JN Witanto, H Lim, M Atiquzzaman
Future Generation Computer Systems 89, 1-9, 2018
Leveraging client-side storage techniques for enhanced use of multiple consumer cloud storage services on resource-constrained mobile devices
HS Yeo, XS Phang, HJ Lee, H Lim
Journal of Network and Computer Applications 43, 142-156, 2014
e2Home: A lightweight smart home management system
CM Yeoh, HY Tan, CK Kok, HJ Lee, H Lim
2008 Third International Conference on Convergence and Hybrid Information …, 2008
An efficient online signature verification scheme using dynamic programming of string matching
AG Reza, H Lim, MJ Alam
International Conference on Hybrid Information Technology, 590-597, 2011
One-time knocking framework using SPA and IPsec
JH Liew, S Lee, I Ong, HJ Lee, H Lim
2010 2nd International Conference on Education Technology and Computer 5, V5 …, 2010
A Ping Pong based one-time-passwords authentication system
B Davaanaym, YS Lee, HJ Lee, SG Lee, HT Lim
2009 Fifth International Joint Conference on INC, IMS and IDC, 574-579, 2009
SDM: Smart deduplication for mobile cloud storage
RNS Widodo, H Lim, M Atiquzzaman
Future Generation Computer Systems 70, 64-73, 2017
An analysis of security system for intrusion in smartphone environment
M Louk, H Lim, HJ Lee
The Scientific World Journal 2014, 2014
A comparative study of tree-based and mesh-based overlay p2p media streaming
CY Goh, HS Yeo, H Lim, PK Hoong, JWY Lim, IKT Tan
International Journal of Multimedia and Ubiquitous Engineering 8 (4), 97-105, 2013
Cell loss recovery method in B-ISDN/ATM networks
H TaekLim, J SeokSong
Electronics Letters 31 (11), 849-851, 1995
Security system for healthcare data in cloud computing
M Louk, H Lim, HJ Lee
International Journal of Security and Its Applications 8 (3), 241-248, 2014
A secure and efficient three-pass authenticated key agreement protocol based on elliptic curves
MH Lim, CM Yeoh, S Lee, H Lim, H Lee
International Conference on Research in Networking, 170-182, 2008
Dragon-MAC: Securing wireless sensor networks with authenticated encryption
SY Lim, CC Pu, HT Lim, HJ Lee
Cryptology ePrint Archive, 2007
The system can't perform the operation now. Try again later.
Articles 1–20