The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Seung Jo Han: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Binod Vaidya, Jongwoo Kim, Jae-Young Pyun, Jong-An Park, Seung Jo Han
    Performance Analysis of Audio Streaming in Secure Wireless Access Network. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:556-561 [Conf]
  2. Binod Vaidya, SangDuck Lee, Jae-Kyun Han, Seung Jo Han
    Authentication Mechanism Using One-Time Password for 802.11 Wireless LAN. [Citation Graph (0, 0)][DBLP]
    CSR, 2006, pp:619-628 [Conf]
  3. Seung-Jin Park, Muhammad Bilal Ahmad, Seung-Hak Rhee, Seung Jo Han, Jong-An Park
    Image Corner Detection Using Radon Transform. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:948-955 [Conf]
  4. Binod Vaidya, Jongwoo Kim, Jae-Young Pyun, Jong-An Park, Seung Jo Han
    Framework for Secure Audio Streaming to Wireless Access Network. [Citation Graph (0, 0)][DBLP]
    ICW/ICHSN/ICMCS/SENET, 2005, pp:122-127 [Conf]
  5. ByungRae Cha, Binod Vaidya, Seung Jo Han
    Anomaly Intrusion Detection for System Call Using the Soundex Algorithm and Neural Networks. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:427-433 [Conf]
  6. Binod Vaidya, SangDuck Lee, Eung-Kon Kim, Seung Jo Han
    Using One-Time Password Based Authentication for Wireless IP Network. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:739-740 [Conf]
  7. Binod Vaidya, Jongwoo Kim, Jae-Young Pyun, Jong-An Park, Seung Jo Han
    Evaluation of Audio Streaming in Secure Wireless Access Network. [Citation Graph (0, 0)][DBLP]
    Panhellenic Conference on Informatics, 2005, pp:828-838 [Conf]
  8. Jae-Young Pyun, Jong Park, Seung Jo Han, Yoon Kim, Sang-Hyun Park
    TCP-Friendly Congestion Control over Heterogeneous Wired/Wireless IP Network. [Citation Graph (0, 0)][DBLP]
    PCM (2), 2005, pp:489-500 [Conf]
  9. Seung-Hak Rhee, Seung Jo Han, Pan-Koo Kim, Muhammad Bilal Ahmad, Jong-An Park
    Vehicle Tracking Using Image Processing Techniques. [Citation Graph (0, 0)][DBLP]
    Rough Sets and Current Trends in Computing, 2004, pp:671-678 [Conf]
  10. Binod Vaidya, Youngjin Kim, Eung-Kon Kim, Seung Jo Han
    Investigating Authentication Mechanisms for Wireless Mobile Network. [Citation Graph (0, 0)][DBLP]
    UIC, 2006, pp:902-911 [Conf]
  11. Binod Vaidya, SangDuck Lee, Eung-Kon Kim, Jong-An Park, Seung Jo Han
    Investigating Media Streaming in Multipath Multihop Wireless Network. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (4), 2007, pp:717-720 [Conf]
  12. Jongan Park, Seungjo Han, PanKoo Kim
    Using Intrinsic Object Attributes for Incremental Content Based Image Retrieval with Histograms. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (3), 2007, pp:829-835 [Conf]

  13. Investigating Secure Framework for Hybrid Multipath Ad Hoc Network. [Citation Graph (, )][DBLP]


  14. Secure Mobile IP Communication in Residential Networks. [Citation Graph (, )][DBLP]


  15. A Novel Cross Layer Intrusion Detection System in MANET. [Citation Graph (, )][DBLP]


  16. Multipath Routing Scheme for Wireless Multihop Network. [Citation Graph (, )][DBLP]


  17. Investigation of Secure Media Streaming over Wireless Access Network. [Citation Graph (, )][DBLP]


  18. Streaming Media Securely over Multipath Multihop Wireless Network. [Citation Graph (, )][DBLP]


  19. Investigation of Secure Framework for Multipath MANET. [Citation Graph (, )][DBLP]


  20. Design of WLAN Secure System Against Weaknesses of the IEEE 802.1x. [Citation Graph (, )][DBLP]


  21. Investigating voice communication over multipath wireless mobile ad hoc network. [Citation Graph (, )][DBLP]


  22. Investigating Authentication Architecture Based on Mobility in Heterogeneous Network. [Citation Graph (, )][DBLP]


  23. QoS Assurance of Multimedia Traffic in Residential Network with Hybrid Co-ordination Function and Queuing Disciplines. [Citation Graph (, )][DBLP]


  24. Kerberos Based Authentication Protocol with Improved Identity Protection in 3G Network. [Citation Graph (, )][DBLP]


  25. A Secure Intrusion Detection System with Authentication in Mobile Ad hoc Network. [Citation Graph (, )][DBLP]


Search in 0.013secs, Finished in 0.014secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002