The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Dong-Kyoo Kim: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Gunhee Lee, Wonil Kim, Dong-Kyoo Kim
    An Effective Method for Location Privacy in Ubiquitous Computing. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:1006-1015 [Conf]
  2. Jungtae Kim, Gunhee Lee, Jung-Taek Seo, Eung Ki Park, Choon Sik Park, Dong-Kyoo Kim
    Y-AOI: Y-Means Based Attribute Oriented Induction Identifying Root Cause for IDSs. [Citation Graph (0, 0)][DBLP]
    FSKD (2), 2005, pp:205-214 [Conf]
  3. Gunhee Lee, Hongjin Yeh, Wonil Kim, Dong-Kyoo Kim
    Web Security Using Distributed Role Hierarchy. [Citation Graph (0, 0)][DBLP]
    GCC (1), 2003, pp:1087-1090 [Conf]
  4. Seong-Won Yuk, Dong-Ho Cho, Min-Gyu Kang, Dong-Kyoo Kim, Byung-Cheol Shin
    Adaptive Redundancy Control for Systematic Erasure Code Based Real Time Data Transmission in Internet. [Citation Graph (0, 0)][DBLP]
    ICC (3), 2000, pp:1769-1773 [Conf]
  5. Song-hwa Chae, Wonil Kim, Dong-Kyoo Kim
    A Novel Approach to Role-Based Access Control. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science, 2003, pp:1060-1068 [Conf]
  6. Soon-Dong Kim, Man-Pyo Hong, Dong-Kyoo Kim
    A Study on Marking Bit Size for Path Identification Method: Deploying the Pi Filter at the End Host. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:611-616 [Conf]
  7. Gunhee Lee, Wonil Kim, Dong-Kyoo Kim
    A Novel Method to Support User's Consent in Usage Control for Stable Trust in E-business. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2004, pp:906-914 [Conf]
  8. Sihn-hye Park, Wonil Kim, Dong-Kyoo Kim
    Autonomic Protection System Using Adaptive Security Policy. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2004, pp:896-905 [Conf]
  9. Jungtae Kim, Gunhee Lee, Jung-Taek Seo, Eung Ki Park, Choonsik Park, Dong-Kyoo Kim
    An Alert Reasoning Method for Intrusion Detection System Using Attribute Oriented Induction. [Citation Graph (0, 0)][DBLP]
    ICOIN, 2005, pp:72-79 [Conf]
  10. Song-hwa Chae, Wonil Kim, Dong-Kyoo Kim
    Efficient Role Based Access Control Method in Wireless Environment. [Citation Graph (0, 0)][DBLP]
    PWC, 2004, pp:431-439 [Conf]
  11. Jongwoon Park, Gunhee Lee, Sangha Lee, Dong-Kyoo Kim
    RPS: An Extension of Reference Monitor to Prevent Race-Attacks. [Citation Graph (0, 0)][DBLP]
    PCM (1), 2004, pp:556-563 [Conf]
  12. Gunhee Lee, Wonil Kim, Dong-Kyoo Kim, Hongjin Yeh
    Effective Web-Related Resource Security Using Distributed Role Hierarchy. [Citation Graph (0, 0)][DBLP]
    WAIM, 2004, pp:87-96 [Conf]
  13. Song-hwa Chae, Wonil Kim, Dong-Kyoo Kim
    Role-Based Access Control Model for Ubiquitous Computing Environment. [Citation Graph (0, 0)][DBLP]
    WISA, 2005, pp:354-363 [Conf]

  14. A simple lightweight authentic bootstrapping protocol for IPv6-based low rate wireless personal area networks (6LoWPANs). [Citation Graph (, )][DBLP]


  15. A Hierarchical Multi-Parent Cluster-Based Data Aggregation Framework for WSNs. [Citation Graph (, )][DBLP]


  16. RSRP: A Robust Secure Routing Protocol for Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]


Search in 0.298secs, Finished in 0.299secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002