The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

DaeHun Nyang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Jeonil Kang, DaeHun Nyang
    RFID Authentication Protocol with Strong Resistance Against Traceability and Denial of Service Attacks. [Citation Graph (0, 0)][DBLP]
    ESAS, 2005, pp:164-175 [Conf]
  2. HongKi Lee, DaeHun Nyang, JooSeok Song
    Message and Its Origin Authentication Protocol for Data Aggregation in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:281-290 [Conf]
  3. JuSung Park, Jeonil Kang, DaeHun Nyang
    Selective Collision Based Medium Access Control Protocol for Proactive Protection of Privacy for RFID. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:383-392 [Conf]
  4. Abedelaziz Mohaisen, DaeHun Nyang
    Hierarchical Grid-Based Pairwise Key Predistribution Scheme for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    EWSN, 2006, pp:83-98 [Conf]
  5. JiHyung Lim, DaeHun Nyang, Jeonil Kang, Kyunghee Lee, Hyotaek Lim
    Distributed Certificate Authority Under the GRID-Location Aided Routing Protocol. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:380-387 [Conf]
  6. DaeHun Nyang, JooSeok Song
    Preventing Double-Spent Coins from Revealing User's Whole Secret. [Citation Graph (0, 0)][DBLP]
    ICISC, 1999, pp:30-37 [Conf]
  7. You Sung Kang, KyungHee Oh, ByungHo Chung, Kyoil Chung, DaeHun Nyang
    Analysis and Countermeasure on Vulnerability of WPA Key Exchange Mechanism. [Citation Graph (0, 0)][DBLP]
    ICOIN, 2004, pp:915-924 [Conf]
  8. Hyotaek Lim, DaeHun Nyang, David Hung-Chang Du
    An Efficient Video Prefix-Caching Scheme in Wide Area Networks. [Citation Graph (0, 0)][DBLP]
    ICOIN, 2004, pp:679-688 [Conf]
  9. Jeonil Kang, DaeHun Nyang, Kyunghee Lee
    Two Factor Face Authentication Scheme with Cancelable Feature. [Citation Graph (0, 0)][DBLP]
    IWBRS, 2005, pp:67-76 [Conf]
  10. DaeHun Nyang, Abedelaziz Mohaisen
    Cooperative Public Key Authentication Protocol in Wireless Sensor Network. [Citation Graph (0, 0)][DBLP]
    UIC, 2006, pp:864-873 [Conf]
  11. DaeHun Nyang, S. Y. Lim, JooSeok Song
    A complete test sequence using cyclic sequence for conformance testing. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1999, v:22, n:15-16, pp:1447-1456 [Journal]
  12. Zhu Lei, DaeHun Nyang, Kyunghee Lee, Hyotaek Lim
    Fair Reputation Evaluating Protocol for Mobile Ad Hoc Network. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:683-693 [Conf]
  13. DaeHun Nyang, Kyunghee Lee
    Fuzzy Face Vault: How to Implement Fuzzy Vault with Weighted Features. [Citation Graph (0, 0)][DBLP]
    HCI (5), 2007, pp:491-496 [Conf]
  14. Jeonil Kang, DaeHun Nyang, Abedelaziz Mohaisen, Young-Geun Choi, KoonSoon Kim
    Certificate Issuing Using Proxy and Threshold Signatures in Self-initialized Ad Hoc Network. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:886-899 [Conf]
  15. Young-Geun Choi, Jeonil Kang, DaeHun Nyang
    Proactive Code Verification Protocol in Wireless Sensor Network. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:1085-1096 [Conf]
  16. YoungJae Maeng, Abedelaziz Mohaisen, DaeHun Nyang
    Secret Key Revocation in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    UIC, 2007, pp:1222-1232 [Conf]
  17. Sinkyu Kim, Jae-Woo Choi, DaeHun Nyang, GeneBeck Hahn, JooSeok Song
    Smart Proactive Caching Scheme for Fast Authenticated Handoff in Wireless LAN. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2007, v:22, n:3, pp:476-480 [Journal]

  18. Structures for Communication-Efficient Public Key Revocation in Ubiquitous Sensor Network. [Citation Graph (, )][DBLP]


  19. On Grid-Based Key Pre-distribution: Toward a Better Connectivity in Wireless Sensor Network. [Citation Graph (, )][DBLP]


  20. Protection Techniques of Secret Information in Non-tamper Proof Devices of Smart Home Network. [Citation Graph (, )][DBLP]


  21. Data Randomization for Lightweight Secure Data Aggregation in Sensor Network. [Citation Graph (, )][DBLP]


  22. Software-Based Remote Code Attestation in Wireless Sensor Network. [Citation Graph (, )][DBLP]


  23. Privacy in Location Based Services: Primitives Toward the Solution. [Citation Graph (, )][DBLP]


  24. A Survey on Deep Packet Inspection for Intrusion Detection Systems [Citation Graph (, )][DBLP]


  25. Hierarchical Grid-Based Pairwise Key Pre-distribution in Wireless Sensor Networks [Citation Graph (, )][DBLP]


  26. Privacy in Location Based Services: Primitives Toward the Solution [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002