SCI & SCI-E       International(ETC)       Domestic

[40] Jungheum Park, Sangjin Lee, "Data fragment forensics for embedded DVR systems," Digital Investigation 11(3), pp. 187-200, 2014.09.
[39] Chan-Youn Lee, Sangjin Lee, "Structure and application of IconCache.db files for digital forensics," Digital Investigation 11(2), pp. 102-110, 2014.07.
[38] Jewan Bang, Changhoon Lee, Sangjin Lee, Kyungho Lee, "Damaged backup data recovery method for Windows mobile," The Journal of Supercomputing 66(2), pp. 875-887, 2013.11.
[37] Ilyoung Hong, Hyeon Yu, Sangjin Lee, Kyungho Lee, "A new triage model conforming to the needs of selective search and seizure of electronic evidence," Digital Investigation 10, pp. 175-192, 2013.09.
[36] Namheun Son, Yunho Lee, Dohyun Kim, Joshua I. James, Sangjin Lee, Kyungho Lee, "A study of user data integrity during acquisition of Android devices," Digital Investigation 10, pp. S3-S11, 2013.08.
[35] Keungi Lee, Changhoon Lee, Sangjin Lee, "On-site investigation methodology for incident response in Windows environments," Computers and Mathematics with Application 65, pp. 1413-1420, 2013.05.
[34] Jungheum Park, Sangjin Lee, "Forensic analysis techniques for fragmented flash memory pages in smartphones," Digital Investigation 9, pp. 109-118, 2012.11.
[33] Hyunji Chung, Jungheum Park, Sangjin Lee, Cheulhoon Kang, "Digital forensic investigation of cloud storage services," Digital Investigation 9, pp. 81-95, 2012.11.
[32] Namheun Son, Keungi Lee, SangJun Jeon, Sangjin Lee, Changhoon Lee, "The effective method of database server forensics on the enterprise environment," Security and Communication Networks 5, pp. 1086-1093, 2012.10.
[31] Sangjun Jeon, Jewan Bang, Keunduck Byun, Sangjin Lee, "A recovery method of deleted record for SQLite database," Personal and Ubiquitous Computing 16, pp. 707-715, 2012.07.
[30] Byeongyeong Yoo, Jungheum Park, Sungsu Lim, Jewan Bang, Sangjin Lee, "A study on multimedia file carving method," Multimedia Tools and Applications 61(1), pp. 243-261, 2012.07.
[29] HyunCheol Jeong, Huy Kang Kim, Sangjin Lee, Eunjin Kim, "Detection of Zombie PCs Based on Email Spam Analysis," KSII Transcations on Internet and Information Systems 6, pp. 1445-1462, 2012.05.
[28] Kyung-Soo Lim, Antonio Savoldi, Changhoon Lee, Sangjin Lee, "On-the-spot digital investigation by means of LDFS: Live Data Forensic System," Mathematical and Computer Modelling 55, pp. 223-240, 2012.01.
[27] Sungsu Lim, Byeongyeong Yoo, Jungheum Park, KeunDuck Byun, Sangjin Lee, "A research on the investigation method of digital forensics for a VMware Workstation¡¯s virtual machine," Mathematical and Computer Modellin 55, pp. 151-160, 2012.01.
[25] Sung-Jae Lee, Jae Seong Lee, Mun-Kyu Lee, Sangjin Lee, Doo-Ho Choi, Dong Kyue Kim, "Low-Power Design of Hardware One-Time Password Generators for Card-Type OTPs," ETRI Journal 33(4), pp. 611-620, 2011.08.
[26] Junghoon Oh, Seungbong Lee, Sangjin Lee, "Advanced evidence collection and analysis of web browser activity," Digital Investigation 8, pp. S62-S70, 2011.08.
[24] Jewan Bang, Byeongyeong Yoo, Sangjin Lee, "Analysis of changes in file time attributes with file manipulation," Digital Investigation 7, pp. 135-144, 2011.04.
[23] Seokhee Lee, Antonio Savoldi, Kyoung Soo Lim, Jong Hyuk Park, Sangjin Lee, "A proposal for automating investigations in live forensics," Computer Standards & Interfaces 32, pp. 246-255, 2010.10.
[22] Jewan Bang, Byeongyeong Yoo, Sangjin Lee, "Secure USB bypassing tool," Digital Investigation 7, pp. S114-S120, 2010.08.
[20] Changhoon Lee, Sangjin Lee, Jong Hyuk Park, Sajid Hussain, Jun Hwan Son, "Security analysis of pure DDP-based cipher proper for multimedia and ubiquitous device," Telecommunication Syetems 44, pp. 267-279, 2010.07.
[21] Jongsung Kim, Yuseop Lee, Sangjin Lee, "DES with any reduced masked rounds is not secure against side-channel attacks," Computers and Mathematics with Applications 60, pp. 347-354, 2010.07.
[19] Yeog Kim, Sangjin Lee, Jong In Lim, "Fraud Detection for Information Reliability from the Internet in Forensic Accounting," Journal of Internet Technology 11(3), pp. 323-331, 2010.05.
[17] Keun Gi Lee, Joon Ho Choi, Kyung Soo Lim, Seokhee Lee, Sangjin Lee, "Novel Methodologies to Detect Covert Databases," International Journal of Innovative Computing 6(3B), pp. 1349-4198, 2010.03.
[18] JUN CHOI, DUKJAE MOON, SANGJIN LEE, "A New Primitive for Stream Ciphers Applicable to Pervasive Environment," Intelligent Automation and Soft Computing 16(3), pp. 461-471, 2010.03.
[15] Jongsung Kim, Seokhie Hong, Dong-Guk Han, and Sangjin Lee, "Improved Side-Channel Attack on DES with the First Four Rounds Masked," ETRI Journal 31(5), pp. 625-627, 2009.10.
[16] Kyung-Soo Lim, Youngseok Choi, Jongsung Kim, Changhoon Lee, Sangjin Lee, "CFES: Comprehensive Framework for Forensic Analysis of Embedded Systems," J. of Internet Technology 10(5), pp. 549-562, 2009.10.
[14] Jungheum Park, Sangjin Lee, "Forensic Investigation of Microsoft PowerPoint Files," Digital Investigation 6, pp. 16-24, 2009.09.
[13] Bora Park, Jungheum Park, Sangjin Lee, "Data concealment and detection in Microsoft Office 2007 files," Digital Investigation 5, pp. 104-114, 2009.03.
[12] Jong Hyuk Park, Sangjin Lee, Jongin Lim, T. Laurence, "U-HMS: hybrid system for secure intelligent multimedia data services in Ubi-Home," Journal of Intelligent Manufacturing 20, pp. 337-346, 2009.01.
[11] Jungsung Kim, Changhoon Lee, Jaechul Sung, Seokhie Hong, Sangjin Lee, Jongin Lim, "Seven New Block Cipher Structures with Provable Security against Differential Cryptanalysis," IEICE Transacations on Fundamentals of Electronics, Communications and Computer Sciences E91-A(10), pp. 3047-3058, 2008.10.
[10] Bonseok Koo, Gwonho Ryu, Taejoo Chang, Sangjin Lee, "Design and Implementation of Unified Hardware for 128-Bit Block Ciphers ARIA and AES," ETRI Journal 29(6), pp. 820-822, 2007.12.
[9] Jong Hyuk Park, Sangjin Lee, In-Hwa Hong, "DRBAC Model Using a WSNM for Services in i-Home," IEICE Transactions on Information and Systems 45(1), pp. 2831-2837, 2006.12.
[8] Deukjo Hong, Seokhie Hong, Wonil Lee, Sangjin Lee, Jongin Lim, Jaechul Sung, Okyeon Yi, "Known-IV, Known-in-Advance-IV, and Replayed-and-Known-IV Attacks on Multiple Modes of Operation of Block Ciphers," Journal of Cryptology 19(4), pp. 441-462, 2006.10.
[7] Seokhie Hong, Jaechul Sung, Sangjin Lee, Jongin Lim and Jongsu Kim, "Provable security for 13 round Skipjack-like structure," Information Processing Letters 82(5), pp. 243-246, 2002.06.
[6] Ju-Sung Kang, Seokhie Hong, Sangjin Lee, Okyeon Yi, Choonsik Park, and Jongin Lim, "Practical and Provable Security against Differential and Linear Cryptanalysis for Substitution-Permutation Networks," ETRI Journal 23(4), pp. 158-167, 2001.12.
[5] Deukjo Hong, Jaechul Sung, Shiho Moriai, Sangjin Lee, and Jongin Lim, "Impossible differential cryptanalysis of Zodiac," IEICE Transactions, Part A: on Fundamentals of Electronics 2355, pp. 38-43, 2001.04.
[4] Changho Seo, Sangjin Lee, Yeoulouk Sung, Keunhee Han, and Sangchoon Kim, "A Lower Bound on the Linear Span of an FCSR," IEEE Transactions on Information Theory 46(2), pp. 691-693, 2000.03.
[3] Seongtaeck Chee, Sangjin Lee, Kwangjo Kim, and Daeho Kim, "Correlation Immune Functions with Controllable Nonlinearity," ETRI Journal 19(4), pp. 389-401, 1997.11.
[2] Sung Mo Park, Sangjin Lee, Soo Hak Sung, and Kwangjo Kim, "Improving bounds for the number of correlation immune Boolean functions," Information Processing Letters 61(4), pp. 209-212, 1997.02.
[1] Seongtaek Chee, Sangjin Lee, Choonsik Park, and Soo Hak Sung, "Developments in Generalized Feistel Network," Electronics Letters 35(9), pp. 707-708, 1999.