|
Mathematics |
Lee, J.-H. (1993). Terminologies in differential geometry with special focus on differential topology, semi-Riemannian manifolds, relativity and gravitation. Taejon. (Note that the size of the pdf file is about 2.3 Mbytes.) |
Lee, J.-H. (1991). On the splittings of Lorentzian manifolds. Master's dissertation (Department of Mathematics). Pohang: Pohang University of Science and Technology. |
Computer Security: Resilience |
Lee, J.-H. (2000). Designing a reliable publishing framework. Computer Laboratory Technical Report 489. Cambridge: Cambridge University Computer Laboratory. ISSN 1476-2986 UCAM-CL-TR-489. |
Anderson, R. J. & Lee, J.-H. (2000). Jikzi - a new framework for secure publishing. Security Protocols Workshop 1999 (Lecture Notes in Computer Science, Vol. 1796), pp. 21-47. Berlin: Springer. ISBN 3-540-67381-4. |
Lee, J.-H. (1998). A resilient access control scheme for secure electronic transactions. Proceedings of the 3rd USENIX Workshop on Electronic Commerce (pp. 75-82). August 31-September 3, 1998. Boston, MA, USA. |
Computer Security: Policy and Governance |
Lee, H. (2013). 2013 Information Security Program for the Ministry of Justice, Province of British Columbia. A Ministry of Justice Program Plan. |
Bailey, I., Lee, H. (2013). 2013 Information Security Program. Government Chief Information Security Officer's Strategic Plan. |
Office of the Chief Information Officer for the Province of British Columbia (2012). Information Security Policy V2.2. Government Policy. |
Hackett, S., Lee, H. (2011). 2011 Information Security Program. Government Chief Information Security Officer's Strategic Plan. |
Office of the Chief Information Officer for the Province of British Columbia (2011). Information Security Policy V2.1. Government Policy. |
Lee, H. (2011). eDiscovery. CIO Research Paper. |
Hackett, S., Lee, H. (2010). 2010 Information Security Program. Government Chief Information Security Officer's Strategic Plan. |
Office of the Chief Information Officer for the Province of British Columbia (2010). Information Security Policy V2.0. Government Policy. |
Office of the Chief Information Officer for the Province of British Columbia (2010). Information Incident Management Process. Government Standard. |
Office of the Chief Information Officer for the Province of British Columbia (2010). Information Security Classification Framework. Government Standard. |
Office of the Chief Information Officer for the Province of British Columbia (2010). Information Security Classification Guidelines. Government Standard Guidelines. |
Lee, H. (2010). Information incident investigations process. CIO Research Paper. |
Lee, H. (2010). Information incident reporting process. CIO Research Paper. |
Lee, H. (2010). Law-enforcement communication protocol process. CIO Research Paper. |
Office of the Chief Information Officer for the Province of British Columbia (2009). Cryptographic Standards for Information Protection. Government Standards. |
Lee, H. (2009). An implementation scheme for the corporate information security classification. CIO Research Paper. |
Lee, H. (2009). Roles and responsibilities of the Ministry Information Security Officers in the centralized security management. CIO Research Paper. |
Lee, H. (2009). SANS Consensus Audit Guidelines. CIO Research Paper. |
Lee, H. (2009). Security aspects of the government remote access services. CIO Research Paper. |
Lee, H. (2009). Web 2.0 Security. CIO Research Paper. |
Office of the Chief Information Officer for the Province of British Columbia (2008). Information Security Policy V1.2. Government Policy. |
Lee, H. (2008). Whistleblower protection and processes to make a disclosure. CIO Research Paper. |
Office of the Chief Information Officer for the Province of British Columbia (2007). Information Security Policy V1.1. Government Policy. |
Lee, H. (2007). Responsibilities, Accountabilities, Consultation and Information (RACI) matrices of the Information Security Policy V1.0. CIO Research Paper. |
Lee, H. (2007). Security Organization. CIO Research Paper. |
Lee, H. (2006). Roles and responsibilities grids of the Information Security Policy V1.0. CIO Research Paper. |
Lee, J.-H. (2003). DOX general description: duty-oriented access control, delegation and credential handling. FILOSAFE Corporation Technical Document FS-DES-116. |
Anderson, R. J., Stajano, F. & Lee, J.-H. (2001). Security policies. In Zelkowitz, M. V. (Ed.), Advances in Computers Vol. 55, pp. 185-235. London: Academic Press. ISBN 0-12-012155-7. |
Anderson, R. J. & Lee, J.-H. (2000). Jikzi - a new framework for security policy, trusted publishing and electronic commerce. Computer Communications, 23(17): 1621-1626. |
Computer Security: Trust |
Anderson, R. J., Crispo, B., Lee, J.-H., Manifavas, C., Matyas Jr., V. & Petitcolas, F. (1999). The global Internet trust register 1999. Cambridge: MIT Press. ISBN 0-262-51105-3. |
Anderson, R. J., Crispo, B., Lee, J.-H., Manifavas, C., Matyas Jr., V. & Petitcolas, F. (1998). The global trust register 1998. Cambridge: Northgate Consultants Ltd. ISBN 0-9532397-0-5. |
Anderson, R. J., Crispo, B., Lee, J.-H., Manifavas, C., Matyas Jr., V. & Petitcolas, F. (1998). The global trust register. Proceedings of Datasem '98 (pp. 219-241). October 1998. Brno, Czech Republic. |
Computer Security: Protocols |
Lee, J.-H. (1999). Big brother ballot. Operating Systems Review, 33(3): 19-25. |
Lee, J.-H. (1999). Anonymity revisited: the degree of the knowledge transfer. Cambridge. |
Anderson, R. J., Bergadano, F., Crispo, B., Lee, J.-H., Manifavas, C., Needham, R. M. (1998). A new family of authentication protocols. Operating Systems Review, 32(4): 9-20. |
Lee, J.-H. (1998). A practical election scheme using the Guy Fawkes protocol and paired chaining publication. Cambridge. |
Anderson, R. J., Crispo, B., Lee, J.-H., Manifavas, C., Needham, R. M. (1997). The Guy Fawkes Protocol. Recent Results Session of the 4th Fast Software Encryption Workshop. January 20-22, 1997. Haifa, Israel. |
Lee, J.-H. (1997). A survey on IPSEC key management protocols. Cambridge. |
Lee, J.-H. (1997). A personal information management scheme. Cambridge. |
Lee, J.-H. (1997). A PIN management scheme based on the Needham's scheme. Cambridge. |
Computer Security: Cryptography |
Lee, J.-H. (2000). Fingerprinting. In Katzenbeisser, S. & Petitcolas, F. (Eds.), Information hiding techniques for steganography and digital watermarking, pp.175-190. Boston: Artech House. ISBN 1-58053-035-4. |
Lee, J.-H. (1998). A method for generating authentication key used for authentication center of digital mobile communication network (English translation of the Korean patent title). Patent Registration No. 10-0152393-0000, IPC Code H04L 9/32. June 26, 1998. Korea. |
Lee, J.-H. (1998). Comments on "Digital signature for Diffie-Hellman public keys without using a one-way function." Cambridge. |
Lee, J.-H. & Koo, Y.-H. (1997). Modern cryptology. Taejon: SOFTFORUM. |
Computer Security: Audit |
Lee, J.-H. (2002). Security audit: a consulting methodology. FILOSAFE Corporation Technical Document CS-TM-106. |
Computer Security: Others |
Lee, H. (2009). Practice of Information Security. Textbook. University of Victoria. |
Lee, H. (2008). Advanced Topics in Information Security. Textbook. University of Victoria. |
Lee, H. (2006). Forensic investigations in encrypted environment. CIO Research Paper. |
Lee, H. (2006). Future trends of security technologies. CIO Research Paper. |
Software Engineering |
Lee, J.-H. (2006). Education and awareness on the Capability Maturity Model. CIO Research Paper. |
Lee, J.-H. (2004). 21 CFR Part 11 and FiloSAFE. FILOSAFE Corporation Technical Document FS-DES-121. |
Lee, J.-H. (2004). Health Insurance Portability and Accountability Act (HIPAA) and FiloSAFE. FILOSAFE Corporation Technical Document FS-DES-120. |
Chung, H. Y., Lee, J.-H. (2003). Evaluations of Postgram. FILOSAFE Corporation Technical Document PG-DES-104. |
Chung, H. Y., Lee, J.-H. (2003). Postgram: a revised user interface. FILOSAFE Corporation Technical Document PG-DES-105. |
Chung, H. Y., Chang, H. W., Lee, J.-H. (2002). Postgram: the design. FILOSAFE Corporation Technical Document PG-DES-101. |
Chung, H. Y., Lee, J.-H. (2002). Evaluation of FiloSAFE 3. FILOSAFE Corporation Technical Document FS-DES-111. |
Chung, H. Y., Lee, J.-H. (2002). FiloSAFE 3 user interface description. FILOSAFE Corporation Technical Document FS-DES-109. |
Chung, H. Y., Lee, J.-H. (2002). ShareDrive: the design concept. FILOSAFE Corporation Technical Document SD-DES-101. |
Chung, H. Y., Lee, J.-H. (2002). ShareDrive: user interface design. FILOSAFE Corporation Technical Document SD-DES-102. |
Chung, H. Y., Lee, J.-H. (2002). User-space analysis for FiloSAFE 3. FILOSAFE Corporation Technical Document FS-DES-110. |
MacDorman, K. F., Lee, J.-H., Chang, C. (2002). FiloSAFE 3.3: client user's guide. FILOSAFE Corporation Technical Document FS-DES-108. |
Lee, J.-H. (2001). A note on the Electronic Document Standard (EDS) for the Korea government standard document format. FILOSAFE Corporation Technical Document FS-DES-105. |
Lee, J.-H. (2001). FiloSAFE 3 development milestones. FILOSAFE Corporation Technical Document FS-DES-101. |
Lee, J.-H. (2001). FiloSAFE 3: solution overview. FILOSAFE Corporation Technical Document FS-DES-107. |
Lee, J.-H. (2001). Knowledgenome system design. FILOSAFE Corporation Technical Document KG-DES-001. |
Lee, J.-H., MacDorman, K. F., Rabinovich, I. (2001). FiloSAFE 3: system specifications. FILOSAFE Corporation Technical Document FS-DES-102. |
Mobile Communication |
Lee, J.-H. (1996). Certifying authority in FPLMTS. Proceedings of the 2nd International Symposium on Multi-dimensional Mobile Communications. July 18-20, 1996. Seoul, Korea. |
Lee, J.-H. (1996). Certifying authority-based FPLMTS authentication. Proceedings of IEEE International Conference on Communication Systems '96 (pp. 26.5.1-26.5.5). November 25-29, 1996. Singapore. |
Lee, J.-H. & Lim, S. B. (1994). Multiple HLRs in PLMN/PCN. Proceedings of the 13th Joint Conference on Communications & Information. April 28-30, 1994. Chuncheon, Korea. |
Lee, J.-H. (1994). Design of command interpreter block for system administration and maintenance. Electronics and Telecommunications Research Institute Technical Document HLRBLK644-220C. |
Lee, J.-H. (1994). Home Location Register's operations and maintenance function specification. Electronics and Telecommunications Research Institute Technical Document HLR-SSB004-190A. |
Lee, J.-H. (1994). User guide for form generator (command user interface). Electronics and Telecommunications Research Institute Technical Document HLRBLK650-140A. |
Lee, J.-H., Koo, Y.-H., Lim, S.-B. & Park, J.-W. (1993). Reduction of message exchange in HLR. 1993 Joint Technical Conference on Circuits/Systems, Computers and Communications. July 26-28, 1993. Nara, Japan. |
Lee, J.-H. (1993). Design of form generator (command user interface). Electronics and Telecommunications Research Institute Technical Document HLRBLK644-220B. |
Lee, J.-H. (1993). Design of man-machine-interface block. Electronics and Telecommunications Research Institute Technical Document TD93-7230-028. |
Lee, J.-H. (1993). Design of security controller block. Electronics and Telecommunications Research Institute Technical Document HLRBLK645-220A. |
Lee, J.-H. (1992). On the operating system for home location register. Telecommunications Review, 2(6):24-35. |
Computer Communications |
Lee, H. (2007). BlackBerry's PIN-to-PIN communication capability. CIO Research Paper. |
Lee, H. (2007). Instant messaging. CIO Research Paper. |
Kim, K. & Lee, J.-H. (1994). Media access control of ATM hub. Proceedings of the IEEE ICCCN'94. September 1994. San Francisco, CA, USA. |
Kim, K. & Lee, J.-H. (1993). Data communication over ATM networks. Proceedings of the 8th Joint Workshop on Computer Communications (E1-2-1-E1-2-5). December 10-11, 1993. Taipei, Taiwan. |
World Wide Web |
Kang, Y., Guen, D., Kim, M., Kim, B. H., Kim, Y., Kim, J. H., Kim, E. A., Kim, C., Nam, Y. J., Park, J. Y., Shin, M. K., Shin, J. H., Yun, S. C., Lee, K., Lee, Y. S., Lee, J.-H., Lee, H., Lim, J. M., Jeon, J. H., Choi, M. J. & Hwang, I. Y. (1995). World Wide Web. Revised edition. Seoul: WWW Forum, Korea (WWW-KR). |