Search the dblp DataBase
Taekyoung Kwon :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Taekyoung Kwon Robust Software Tokens - Yet Another Method for Securing User's Digital Identity. [Citation Graph (0, 0)][DBLP ] ACISP, 2003, pp:476-487 [Conf ] Peng Wang , Yongdae Kim , Vishal Kher , Taekyoung Kwon Strengthening Password-Based Authentication Protocols Against Online Dictionary Attacks. [Citation Graph (0, 0)][DBLP ] ACNS, 2005, pp:17-32 [Conf ] JongHyup Lee , Taekyoung Kwon , JooSeok Song Location-Aware Key Management Using Multi-layer Grids for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] ACNS, 2006, pp:390-404 [Conf ] Hyung-Woo Lee , Taekyoung Kwon , Hyung-Jong Kim NS-2 Based IP Traceback Simulation Against Reflector Based DDoS Attack. [Citation Graph (0, 0)][DBLP ] AIS, 2004, pp:90-99 [Conf ] Yong-Guk Kim , Taekyoung Kwon An Authentication Scheme Based Upon Face Recognition for the Mobile Environment. [Citation Graph (0, 0)][DBLP ] CIS, 2004, pp:274-279 [Conf ] Sang-ho Park , Taekyoung Kwon An Efficient Message Broadcast Authentication Scheme for Sensor Networks. [Citation Graph (0, 0)][DBLP ] CIS (2), 2005, pp:427-432 [Conf ] Myeongho Kang , Taekyoung Kwon , Changyong Yang , JooSeok Song The Design and Verification of Services Feature Interaction Manager on AIN Using Z Schema. [Citation Graph (0, 0)][DBLP ] COMPSAC, 1996, pp:477-482 [Conf ] Sooyeon Shin , Taekyoung Kwon Efficient Key Agreement for Merging Clusters in Ad-Hoc Networking Environments. [Citation Graph (0, 0)][DBLP ] EUC Workshops, 2005, pp:996-1005 [Conf ] Taekyoung Kwon , Hyeonjoon Moon Multi-modal Techniques for Identity Theft Prevention. [Citation Graph (0, 0)][DBLP ] Human.Society@Internet, 2005, pp:291-300 [Conf ] GeneBeck Hahn , Taekyoung Kwon , Sinkyu Kim , JooSeok Song Cluster-Based Certificate Chain for Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2006, pp:769-778 [Conf ] Taekyoung Kwon Authenticated Key Agreement Without Subgroup Element Verification. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2005, pp:577-583 [Conf ] Taekyoung Kwon , Jaeil Lee Practical Digital Signature Generation Using Biometrics. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:728-737 [Conf ] Taekyoung Kwon , Hyeonjoon Moon Multi-modal Biometrics with PKIs for Border Control Applications. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2005, pp:584-590 [Conf ] Youngkwon Lee , Taekyoung Kwon An Improved Fingerprint-Based Remote User Authentication Scheme Using Smart Cards. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2006, pp:915-922 [Conf ] Hyung-Woo Lee , Sung-Hyun Yun , Taekyoung Kwon , Jae-Sung Kim , Hee-Un Park , Nam-Ho Oh Reflector Attack Traceback System with Pushback Based iTrace Mechanism. [Citation Graph (0, 0)][DBLP ] ICICS, 2004, pp:236-248 [Conf ] Chae Hoon Lim , Taekyoung Kwon Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer. [Citation Graph (0, 0)][DBLP ] ICICS, 2006, pp:1-20 [Conf ] Soonhak Kwon , Taekyoung Kwon , Young-Ho Park New Architecture for Multiplication in GF (2m ) and Comparisons with Normal and Polynomial Basis Multipliers for Elliptic Curve Cryptography. [Citation Graph (0, 0)][DBLP ] ICISC, 2005, pp:335-351 [Conf ] Jaeil Lee , Taekyoung Kwon , Sanghoon Song , JooSeok Song A Model for Embedding and Authorizing Digital Signatures in Printed Documents. [Citation Graph (0, 0)][DBLP ] ICISC, 2002, pp:465-477 [Conf ] Haeyong Kim , Yongho Seok , Nakjung Choi , Yanghee Choi , Taekyoung Kwon Optimal Multi-sink Positioning and Energy-Efficient Routing in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] ICOIN, 2005, pp:264-274 [Conf ] Jaeyoung Choi , Géraldine Texier , Yongho Seok , Taekyoung Kwon , Laurent Toutain , Yanghee Choi Interoperability Experiences on Integrating Between Different Active Measurement Systems. [Citation Graph (0, 0)][DBLP ] ICOIN, 2006, pp:630-638 [Conf ] Taekyoung Kwon , Myeongho Kang , JooSeok Song An Adaptable and Reliable Authentication Protocol for Communication Networks. [Citation Graph (0, 0)][DBLP ] INFOCOM, 1997, pp:737-744 [Conf ] Taekyoung Kwon Virtual Software Tokens - A Practical Way to Secure PKI Roaming. [Citation Graph (0, 0)][DBLP ] InfraSec, 2002, pp:288-302 [Conf ] Jihyuk Choi , Taekyoung Kwon , Yanghee Choi , Mahmoud Naghshineh Call Admission Control for Multimedia Services in Mobile Cellular Networks: A Markov Decision Approach. [Citation Graph (0, 0)][DBLP ] ISCC, 2000, pp:594-599 [Conf ] Sanghoon Song , Taekyoung Kwon , Ki Song Yoon Practical Security Improvement of PKCS#5. [Citation Graph (0, 0)][DBLP ] ISCIS, 2003, pp:869-876 [Conf ] Taekyoung Kwon , Hyeonjoon Moon Multi-modal Biometrics with PKI Technologies for Border Control Applications. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:99-114 [Conf ] Taekyoung Kwon , Sang-ho Park Experimental Study on Wireless Sensor Network Security. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:741-743 [Conf ] Jiyong Jang , Taekyoung Kwon , JooSeok Song A Time-Based Key Management Protocol for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] ISPEC, 2007, pp:314-328 [Conf ] Taekyoung Kwon On the Difficulty of Protecting Private Keys in Software. [Citation Graph (0, 0)][DBLP ] ISC, 2002, pp:17-31 [Conf ] Taekyoung Kwon Practical Authenticated Key Agreement Using Passwords. [Citation Graph (0, 0)][DBLP ] ISC, 2004, pp:1-12 [Conf ] Hyunsoo Song , Taekyoung Kwon Security Analysis of Secure Password Authentication for Keystroke Dynamics. [Citation Graph (0, 0)][DBLP ] KES (1), 2006, pp:916-923 [Conf ] Min Chen , Taekyoung Kwon , Yanghee Choi Data Dissemination based on Mobile Agent in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] LCN, 2005, pp:527-529 [Conf ] Taekyoung Kwon , JooSeok Song Security and efficiency in authentication protocols resistant to password guessing attack. [Citation Graph (0, 0)][DBLP ] LCN, 1997, pp:245-252 [Conf ] Sangheon Pack , Taekyoung Kwon , Yanghee Choi A comparative study of mobility anchor point selection schemes in hierarchical mobile IPv6 networks. [Citation Graph (0, 0)][DBLP ] Mobility Management & Wireless Access Protocols, 2004, pp:130-131 [Conf ] Taekyoung Kwon Authentication and Key Agreement Via Memorable Passwords. [Citation Graph (0, 0)][DBLP ] NDSS, 2001, pp:- [Conf ] Jaecheol Kim , Jaeyoung Choi , Dukhyun Chang , Taekyoung Kwon , Yanghee Choi , Eungsu Yuk Traffic characteristics of a massively multi-player online role playing game. [Citation Graph (0, 0)][DBLP ] NETGAMES, 2005, pp:1-8 [Conf ] GeneBeck Hahn , Taekyoung Kwon , Sinkyu Kim , JooSeok Song Design and Analysis of Improved GSM Authentication Protocol for Roaming Users. [Citation Graph (0, 0)][DBLP ] NPC, 2004, pp:451-458 [Conf ] Sanghoon Song , Taekyoung Kwon Domain-Based Proxy for Efficient Location Tracking of Mobile Agents. [Citation Graph (0, 0)][DBLP ] NPC, 2004, pp:205-212 [Conf ] Jeongkeun Lee , Taekyoung Kwon , Yanghee Choi , Sajal K. Das , Kyung-ah Kim Analysis of RFID anti-collision algorithms using smart antennas. [Citation Graph (0, 0)][DBLP ] SenSys, 2004, pp:265-266 [Conf ] Soonhak Kwon , Taekyoung Kwon , Young-Ho Park Efficient Linear Array for Multiplication over NIST Recommended Binary Fields. [Citation Graph (0, 0)][DBLP ] WILF, 2005, pp:427-436 [Conf ] Taekyoung Kwon , Seongan Lim Automation-Considered Logic of Authentication and Key Distribution. [Citation Graph (0, 0)][DBLP ] WISA, 2003, pp:442-457 [Conf ] Taekyoung Kwon , Yanghee Choi , Chatschik Bisdikian , Mahmoud Naghshineh Call Admission Control or Adaptive Multimedia in Wireless/Mobile Networks. [Citation Graph (0, 0)][DBLP ] WOWMOM, 1998, pp:111-116 [Conf ] Taekyoung Kwon , Ilkyu Park , Yanghee Choi , Sajal K. Das Bandwidth Adaption Algorithms with Multi-Objectives for Adaptive Multimedia Services in Wireless/Mobile Networks. [Citation Graph (0, 0)][DBLP ] WOWMOM, 1999, pp:51-59 [Conf ] Yung Yi , Yongho Seok , Taekyoung Kwon , Yanghee Choi , Junseok Park W2F2Q: packet fair queuing in wireless packet networks. [Citation Graph (0, 0)][DBLP ] WOWMOM, 2000, pp:2-10 [Conf ] Min Chen , Taekyoung Kwon , Yanghee Choi Energy-efficient differentiated directed diffusion (EDDD) in wireless sensor networks. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2006, v:29, n:2, pp:231-245 [Journal ] Taekyoung Kwon , JooSeok Song Efficient and secure password-based authentication protocols against guessing attacks. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1998, v:21, n:9, pp:853-861 [Journal ] Sangheon Pack , Minji Nam , Taekyoung Kwon , Yanghee Choi An adaptive mobility anchor point selection scheme in Hierarchical Mobile IPv6 networks. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2006, v:29, n:16, pp:3066-3078 [Journal ] Jeongkeun Lee , Kideok Cho , Seungjae Lee , Taekyoung Kwon , Yanghee Choi Distributed and energy-efficient target localization and tracking in wireless sensor networks. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2006, v:29, n:13-14, pp:2494-2505 [Journal ] Taekyoung Kwon Digital signature algorithm for securing digital identities. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 2002, v:82, n:5, pp:247-252 [Journal ] Taekyoung Kwon Erratum to: "Digital signature algorithm for securing digital identities": [Information Processing Letters 82 (2002) 247-252]. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 2003, v:88, n:4, pp:201-202 [Journal ] Sangheon Pack , Hakyung Jung , Taekyoung Kwon , Yanghee Choi SNC: a selective neighbor caching scheme for fast handoff in IEEE 802.11 wireless networks. [Citation Graph (0, 0)][DBLP ] Mobile Computing and Communications Review, 2005, v:9, n:4, pp:39-49 [Journal ] Jiho Ryu , Yongho Seok , Nakjung Choi , Taekyoung Kwon , Yanghee Choi S-EDCA: EDCA based on SuperSlot and Pseudo Collision. [Citation Graph (0, 0)][DBLP ] Mobile Computing and Communications Review, 2006, v:10, n:4, pp:15-16 [Journal ] Taekyoung Kwon , JooSeok Song Clarifying Straight Replays and Forced Delays. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 1999, v:33, n:1, pp:47-52 [Journal ] Taekyoung Kwon , Yanghee Choi , Chatschik Bisdikian , Mahmoud Naghshineh QoS Provisioning in Wireless/Mobile Multimedia Networks Using an Adaptive Framework. [Citation Graph (0, 0)][DBLP ] Wireless Networks, 2003, v:9, n:1, pp:51-59 [Journal ] Hyung-Woo Lee , Taekyoung Kwon Biometric Digital Key Mechanisms for Telebiometric Authentication Based on Biometric Certificate. [Citation Graph (0, 0)][DBLP ] HCI (5), 2007, pp:428-437 [Conf ] Hyeonjoon Moon , Taekyoung Kwon Biometric Person Authentication for Access Control Scenario Based on Face Recognition. [Citation Graph (0, 0)][DBLP ] HCI (5), 2007, pp:463-472 [Conf ] Taekyoung Kwon , Hyeonjoon Moon Knowledge-Based User Authentication Associated with Biometrics. [Citation Graph (0, 0)][DBLP ] HCI (5), 2007, pp:414-419 [Conf ] Taekyoung Kwon , Sang-ho Park , Sooyeon Shin Multi-modal Authentication for Ubiquitous Computing Environments. [Citation Graph (0, 0)][DBLP ] HCI (6), 2007, pp:113-121 [Conf ] Daehyung Jo , Jeongkeun Lee , Semun Lee , Taejoon Ha , Taekyoung Kwon , Yanghee Choi Signal Dragging: Effects of Terminal Movement on War-Driving in CDMA/WCDMA Networks. [Citation Graph (0, 0)][DBLP ] LoCA, 2007, pp:211-227 [Conf ] Kwangkyu Park , JongHyup Lee , Taekyoung Kwon , JooSeok Song Secure Dynamic Network Reprogramming Using Supplementary Hash in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] UIC, 2007, pp:653-662 [Conf ] Jinglun Shi , Taekyoung Kwon , Yanghee Choi , Junkai Huang , Weiping Liu An Energy-Efficient Framework for Wireless Sensor Networks with Multiple Gateways. [Citation Graph (0, 0)][DBLP ] UIC, 2007, pp:632-640 [Conf ] Taekyoung Kwon , Dong Hoon Lee Three-Party Password Authenticated Key Agreement Resistant to Server Compromise. [Citation Graph (0, 0)][DBLP ] WISA, 2006, pp:312-323 [Conf ] Taekyoung Kwon , Jung Hee Cheon , Yongdae Kim , Jaeil Lee Privacy Protection in PKIs: A Separation-of-Authority Approach. [Citation Graph (0, 0)][DBLP ] WISA, 2006, pp:297-311 [Conf ] Seongil Han , Yongsub Nam , Yongho Seok , Taekyoung Kwon , Yanghee Choi Two-phase Collision Avoidance to Improve Scalability in Wireless LANs. [Citation Graph (0, 0)][DBLP ] GLOBECOM, 2006, pp:- [Conf ] Sangheon Pack , Taekyoung Kwon , Yanghee Choi A performance comparison of mobility anchor point selection schemes in Hierarchical Mobile IPv6 networks. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2007, v:51, n:6, pp:1630-1642 [Journal ] Yongsub Nam , Taekyoung Kwon , HoJin Lee , Hakyung Jung , Yanghee Choi Guaranteeing the network lifetime in wireless sensor networks: A MAC layer approach. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2007, v:30, n:13, pp:2532-2545 [Journal ] Yongho Seok , Taekyoung Kwon , Yanghee Choi , Jean-Marie Bonnin Temporal fairness guarantee in multi-rate wireless LANs for per-flow protection. [Citation Graph (0, 0)][DBLP ] Wireless Networks, 2007, v:13, n:2, pp:237-258 [Journal ] Location management area (LMA)-based MBS handover in mobile WiMAX systems. [Citation Graph (, )][DBLP ] On the Privacy-Preserving HCI Issues. [Citation Graph (, )][DBLP ] A HybridQuery Tree Protocol for Tag Collision Arbitration in RFID systems. [Citation Graph (, )][DBLP ] Half Direct-Link Setup (H-DLS) for Fairness between External and Local TCP Connections in IEEE 802.11e Wireless LANs. [Citation Graph (, )][DBLP ] Quantifying the Interference Gray Zone in Wireless Networks: A Measurement Study. [Citation Graph (, )][DBLP ] Energy-Efficient Itinerary Planning for Mobile Agents in Wireless Sensor Networks. [Citation Graph (, )][DBLP ] Proximity Based Peer-to-Peer Overlay Networks (P3ON) with Load Distribution. [Citation Graph (, )][DBLP ] A Reliability Aware Flooding Algorithm (RAFA) in wireless multi-hop networks. [Citation Graph (, )][DBLP ] Hybrid Distributed Coordination Function for Next-Generation High-Bandwidth WLANs. [Citation Graph (, )][DBLP ] Performance comparison of content-oriented networking alternatives: A tree versus a distributed hash table. [Citation Graph (, )][DBLP ] An experimental study on the capture effect in 802.11a networks. [Citation Graph (, )][DBLP ] Revamping the IEEE 802.11a PHY simulation models. [Citation Graph (, )][DBLP ] Measurement and Analysis of BitTorrent Traffic in Mobile WiMAX Networks. [Citation Graph (, )][DBLP ] A Distributed Node Scheduling Protocol Considering Sensing Coverage in Wireless Sensor Networks. [Citation Graph (, )][DBLP ] Scheduling-Based Coordination Function (SCF) in WLANs for High Throughput. [Citation Graph (, )][DBLP ] TA-MAC: Task Aware MAC Protocol for Wireless Sensor Networks. [Citation Graph (, )][DBLP ] Macro-Level and Micro-Level Routing (MMR) for Urban Vehicular Ad Hoc Networks. [Citation Graph (, )][DBLP ] Leader-Based Rate Adaptive Multicasting for Wireless LANs. [Citation Graph (, )][DBLP ] TCP improvement in multi-radio multi-channel multi-hop networks. [Citation Graph (, )][DBLP ] A Scalable Rate Adaptation Mechanism for IEEE 802.11e Wireless. [Citation Graph (, )][DBLP ] RSS-based Carrier Sensing and Interference Estimation in 802.11 Wireless Networks. [Citation Graph (, )][DBLP ] Use of AGPS Call Data Records for Non-GPS Terminal Positioning in Cellular Networks. [Citation Graph (, )][DBLP ] A pointer forwarding scheme with mobility-aware binding update in Mobile IPv6 networks. [Citation Graph (, )][DBLP ] Fast-handoff support in IEEE 802.11 wireless networks. [Citation Graph (, )][DBLP ] Search in 0.005secs, Finished in 0.456secs