The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Goo Yeon Lee: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Goo Yeon Lee, Yong Lee, Hwa Jong Kim, Choong Kyo Jeong, Dong Eun Lee
    Design and Implementation of a Data Sharing Scheme with Security and Flexibility Applicable to Extended P2P Systems. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:484-490 [Conf]
  2. JongMin Jeong, Goo Yeon Lee, Sang-Jae Moon
    Extended Authentication Integrating Scheme for Beyond 3G Wireless Networks. [Citation Graph (0, 0)][DBLP]
    ISCIS, 2006, pp:413-423 [Conf]
  3. Eui-Jong Jeong, Goo Yeon Lee
    Efficient Location Management Scheme using MLR considering Local Usages. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:941-942 [Conf]
  4. Goo Yeon Lee, Yong Lee
    Optimization Paging Cost by Dynamic Cell Grouping in Mobile Network. [Citation Graph (0, 0)][DBLP]
    LCN, 2000, pp:292-0 [Conf]
  5. Goo Yeon Lee, Yong Lee
    Performance Analysis of an Modified Time-Based Location Registration Scheme. [Citation Graph (0, 0)][DBLP]
    LCN, 2003, pp:492-497 [Conf]
  6. Goo Yeon Lee, Chong Kwan Un
    Delay Analysis of the ISDN D-Channel Access Protocol. [Citation Graph (0, 0)][DBLP]
    Computer Networks and ISDN Systems, 1990, v:19, n:1, pp:25-41 [Journal]
  7. Goo Yeon Lee, Choong Kyo Jeong, Yong Lee, Hwa Jong Kim
    Re-key Interval Optimization for Secure Group Communications. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 2007, v:23, n:3, pp:897-909 [Journal]
  8. Goo Yeon Lee, Choong Kyo Jeong, Hwa Jong Kim, Yong Lee
    Optimal Frame Payload Size for Mobile Communications over Wireless Links of Cellular Networks. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 2007, v:23, n:3, pp:887-895 [Journal]

  9. Prevention of Black-Hole Attack using One-Way Hash Chain Scheme in Ad-Hoc Networks. [Citation Graph (, )][DBLP]


  10. Design and Analysis of Bio-AdHoc Sensor Networks for Disaster Emergency Management Systems. [Citation Graph (, )][DBLP]


  11. Authentication for WiFi - WiBbro-based BWAN interworking. [Citation Graph (, )][DBLP]


  12. Wireless Certificate Management Protocol Supporting Mobile Phones. [Citation Graph (, )][DBLP]


Search in 0.001secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002