The SCEAS System
Navigation Menu

Search the dblp DataBase


Jeong-Nyeo Kim: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Sang-Woo Lee, Jeong-Nyeo Kim, Jong-Soo Jang
    An Efficient Divider Architecture over GF(2m) for Elliptic Curve Cryptography. [Citation Graph (0, 0)][DBLP]
    ESA/VLSI, 2004, pp:569-576 [Conf]
  2. Bo-Heung Chung, Jeong-Nyeo Kim, Sung Won Sohn
    Improve Network Security with Kernel-Level Intrusion Detection Sensor. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:409-414 [Conf]
  3. Su-Hyung Jo, Jeong-Nyeo Kim, Sung Won Sohn
    Design of Policy-Based Security Management for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:337-340 [Conf]
  4. Jin-Ho Hwang, Ju-Dong Shin, Mi-Ra Yun, Jeong-Nyeo Kim, Sang-Su Lee, Sung Un Kim
    Fault/Attack Tolerant Recovery Mechanism Under SRLG Constraint in the Next Generation Optical VPN. [Citation Graph (0, 0)][DBLP]
    ECUMN, 2004, pp:386-396 [Conf]
  5. Sang-Woo Lee, Yong-Sung Jeon, Jeong-Nyeo Kim, Ki-Young Kim, Jong-Soo Jang
    Design and Implementation of a Gigabit Router using Network Processor. [Citation Graph (0, 0)][DBLP]
    IMSA, 2005, pp:32-35 [Conf]
  6. Jae-Deok Lim, Joon-Suk Yu, Jeong-Nyeo Kim
    ICFS: Integrated Crypto-FileSystem into Vnode Layer using Access Control. [Citation Graph (0, 0)][DBLP]
    IMSA, 2002, pp:97-101 [Conf]
  7. Jae-Deok Lim, Joon-Suk Yu, Jeong-Nyeo Kim
    A study of the method of providing secure network channel among secure OSs. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:345-350 [Conf]

  8. The home device authentication system construction for pervasive home network. [Citation Graph (, )][DBLP]

  9. Implementation of LSM-Based RBAC Module for Embedded System. [Citation Graph (, )][DBLP]

Search in 0.001secs, Finished in 0.002secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002