Search the dblp DataBase
DaeHun Nyang :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Jeonil Kang , DaeHun Nyang RFID Authentication Protocol with Strong Resistance Against Traceability and Denial of Service Attacks. [Citation Graph (0, 0)][DBLP ] ESAS, 2005, pp:164-175 [Conf ] HongKi Lee , DaeHun Nyang , JooSeok Song Message and Its Origin Authentication Protocol for Data Aggregation in Sensor Networks. [Citation Graph (0, 0)][DBLP ] EUC Workshops, 2006, pp:281-290 [Conf ] JuSung Park , Jeonil Kang , DaeHun Nyang Selective Collision Based Medium Access Control Protocol for Proactive Protection of Privacy for RFID. [Citation Graph (0, 0)][DBLP ] EUC Workshops, 2005, pp:383-392 [Conf ] Abedelaziz Mohaisen , DaeHun Nyang Hierarchical Grid-Based Pairwise Key Predistribution Scheme for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] EWSN, 2006, pp:83-98 [Conf ] JiHyung Lim , DaeHun Nyang , Jeonil Kang , Kyunghee Lee , Hyotaek Lim Distributed Certificate Authority Under the GRID-Location Aided Routing Protocol. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:380-387 [Conf ] DaeHun Nyang , JooSeok Song Preventing Double-Spent Coins from Revealing User's Whole Secret. [Citation Graph (0, 0)][DBLP ] ICISC, 1999, pp:30-37 [Conf ] You Sung Kang , KyungHee Oh , ByungHo Chung , Kyoil Chung , DaeHun Nyang Analysis and Countermeasure on Vulnerability of WPA Key Exchange Mechanism. [Citation Graph (0, 0)][DBLP ] ICOIN, 2004, pp:915-924 [Conf ] Hyotaek Lim , DaeHun Nyang , David Hung-Chang Du An Efficient Video Prefix-Caching Scheme in Wide Area Networks. [Citation Graph (0, 0)][DBLP ] ICOIN, 2004, pp:679-688 [Conf ] Jeonil Kang , DaeHun Nyang , Kyunghee Lee Two Factor Face Authentication Scheme with Cancelable Feature. [Citation Graph (0, 0)][DBLP ] IWBRS, 2005, pp:67-76 [Conf ] DaeHun Nyang , Abedelaziz Mohaisen Cooperative Public Key Authentication Protocol in Wireless Sensor Network. [Citation Graph (0, 0)][DBLP ] UIC, 2006, pp:864-873 [Conf ] DaeHun Nyang , S. Y. Lim , JooSeok Song A complete test sequence using cyclic sequence for conformance testing. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1999, v:22, n:15-16, pp:1447-1456 [Journal ] Zhu Lei , DaeHun Nyang , Kyunghee Lee , Hyotaek Lim Fair Reputation Evaluating Protocol for Mobile Ad Hoc Network. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:683-693 [Conf ] DaeHun Nyang , Kyunghee Lee Fuzzy Face Vault: How to Implement Fuzzy Vault with Weighted Features. [Citation Graph (0, 0)][DBLP ] HCI (5), 2007, pp:491-496 [Conf ] Jeonil Kang , DaeHun Nyang , Abedelaziz Mohaisen , Young-Geun Choi , KoonSoon Kim Certificate Issuing Using Proxy and Threshold Signatures in Self-initialized Ad Hoc Network. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2007, pp:886-899 [Conf ] Young-Geun Choi , Jeonil Kang , DaeHun Nyang Proactive Code Verification Protocol in Wireless Sensor Network. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2007, pp:1085-1096 [Conf ] YoungJae Maeng , Abedelaziz Mohaisen , DaeHun Nyang Secret Key Revocation in Sensor Networks. [Citation Graph (0, 0)][DBLP ] UIC, 2007, pp:1222-1232 [Conf ] Sinkyu Kim , Jae-Woo Choi , DaeHun Nyang , GeneBeck Hahn , JooSeok Song Smart Proactive Caching Scheme for Fast Authenticated Handoff in Wireless LAN. [Citation Graph (0, 0)][DBLP ] J. Comput. Sci. Technol., 2007, v:22, n:3, pp:476-480 [Journal ] Structures for Communication-Efficient Public Key Revocation in Ubiquitous Sensor Network. [Citation Graph (, )][DBLP ] On Grid-Based Key Pre-distribution: Toward a Better Connectivity in Wireless Sensor Network. [Citation Graph (, )][DBLP ] Protection Techniques of Secret Information in Non-tamper Proof Devices of Smart Home Network. [Citation Graph (, )][DBLP ] Data Randomization for Lightweight Secure Data Aggregation in Sensor Network. [Citation Graph (, )][DBLP ] Software-Based Remote Code Attestation in Wireless Sensor Network. [Citation Graph (, )][DBLP ] Privacy in Location Based Services: Primitives Toward the Solution. [Citation Graph (, )][DBLP ] A Survey on Deep Packet Inspection for Intrusion Detection Systems [Citation Graph (, )][DBLP ] Hierarchical Grid-Based Pairwise Key Pre-distribution in Wireless Sensor Networks [Citation Graph (, )][DBLP ] Privacy in Location Based Services: Primitives Toward the Solution [Citation Graph (, )][DBLP ] Search in 0.003secs, Finished in 0.004secs