The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Taekyoung Kwon: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Taekyoung Kwon
    Robust Software Tokens - Yet Another Method for Securing User's Digital Identity. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:476-487 [Conf]
  2. Peng Wang, Yongdae Kim, Vishal Kher, Taekyoung Kwon
    Strengthening Password-Based Authentication Protocols Against Online Dictionary Attacks. [Citation Graph (0, 0)][DBLP]
    ACNS, 2005, pp:17-32 [Conf]
  3. JongHyup Lee, Taekyoung Kwon, JooSeok Song
    Location-Aware Key Management Using Multi-layer Grids for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ACNS, 2006, pp:390-404 [Conf]
  4. Hyung-Woo Lee, Taekyoung Kwon, Hyung-Jong Kim
    NS-2 Based IP Traceback Simulation Against Reflector Based DDoS Attack. [Citation Graph (0, 0)][DBLP]
    AIS, 2004, pp:90-99 [Conf]
  5. Yong-Guk Kim, Taekyoung Kwon
    An Authentication Scheme Based Upon Face Recognition for the Mobile Environment. [Citation Graph (0, 0)][DBLP]
    CIS, 2004, pp:274-279 [Conf]
  6. Sang-ho Park, Taekyoung Kwon
    An Efficient Message Broadcast Authentication Scheme for Sensor Networks. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:427-432 [Conf]
  7. Myeongho Kang, Taekyoung Kwon, Changyong Yang, JooSeok Song
    The Design and Verification of Services Feature Interaction Manager on AIN Using Z Schema. [Citation Graph (0, 0)][DBLP]
    COMPSAC, 1996, pp:477-482 [Conf]
  8. Sooyeon Shin, Taekyoung Kwon
    Efficient Key Agreement for Merging Clusters in Ad-Hoc Networking Environments. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:996-1005 [Conf]
  9. Taekyoung Kwon, Hyeonjoon Moon
    Multi-modal Techniques for Identity Theft Prevention. [Citation Graph (0, 0)][DBLP]
    Human.Society@Internet, 2005, pp:291-300 [Conf]
  10. GeneBeck Hahn, Taekyoung Kwon, Sinkyu Kim, JooSeok Song
    Cluster-Based Certificate Chain for Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2006, pp:769-778 [Conf]
  11. Taekyoung Kwon
    Authenticated Key Agreement Without Subgroup Element Verification. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2005, pp:577-583 [Conf]
  12. Taekyoung Kwon, Jaeil Lee
    Practical Digital Signature Generation Using Biometrics. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:728-737 [Conf]
  13. Taekyoung Kwon, Hyeonjoon Moon
    Multi-modal Biometrics with PKIs for Border Control Applications. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2005, pp:584-590 [Conf]
  14. Youngkwon Lee, Taekyoung Kwon
    An Improved Fingerprint-Based Remote User Authentication Scheme Using Smart Cards. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2006, pp:915-922 [Conf]
  15. Hyung-Woo Lee, Sung-Hyun Yun, Taekyoung Kwon, Jae-Sung Kim, Hee-Un Park, Nam-Ho Oh
    Reflector Attack Traceback System with Pushback Based iTrace Mechanism. [Citation Graph (0, 0)][DBLP]
    ICICS, 2004, pp:236-248 [Conf]
  16. Chae Hoon Lim, Taekyoung Kwon
    Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer. [Citation Graph (0, 0)][DBLP]
    ICICS, 2006, pp:1-20 [Conf]
  17. Soonhak Kwon, Taekyoung Kwon, Young-Ho Park
    New Architecture for Multiplication in GF(2m) and Comparisons with Normal and Polynomial Basis Multipliers for Elliptic Curve Cryptography. [Citation Graph (0, 0)][DBLP]
    ICISC, 2005, pp:335-351 [Conf]
  18. Jaeil Lee, Taekyoung Kwon, Sanghoon Song, JooSeok Song
    A Model for Embedding and Authorizing Digital Signatures in Printed Documents. [Citation Graph (0, 0)][DBLP]
    ICISC, 2002, pp:465-477 [Conf]
  19. Haeyong Kim, Yongho Seok, Nakjung Choi, Yanghee Choi, Taekyoung Kwon
    Optimal Multi-sink Positioning and Energy-Efficient Routing in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICOIN, 2005, pp:264-274 [Conf]
  20. Jaeyoung Choi, Géraldine Texier, Yongho Seok, Taekyoung Kwon, Laurent Toutain, Yanghee Choi
    Interoperability Experiences on Integrating Between Different Active Measurement Systems. [Citation Graph (0, 0)][DBLP]
    ICOIN, 2006, pp:630-638 [Conf]
  21. Taekyoung Kwon, Myeongho Kang, JooSeok Song
    An Adaptable and Reliable Authentication Protocol for Communication Networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 1997, pp:737-744 [Conf]
  22. Taekyoung Kwon
    Virtual Software Tokens - A Practical Way to Secure PKI Roaming. [Citation Graph (0, 0)][DBLP]
    InfraSec, 2002, pp:288-302 [Conf]
  23. Jihyuk Choi, Taekyoung Kwon, Yanghee Choi, Mahmoud Naghshineh
    Call Admission Control for Multimedia Services in Mobile Cellular Networks: A Markov Decision Approach. [Citation Graph (0, 0)][DBLP]
    ISCC, 2000, pp:594-599 [Conf]
  24. Sanghoon Song, Taekyoung Kwon, Ki Song Yoon
    Practical Security Improvement of PKCS#5. [Citation Graph (0, 0)][DBLP]
    ISCIS, 2003, pp:869-876 [Conf]
  25. Taekyoung Kwon, Hyeonjoon Moon
    Multi-modal Biometrics with PKI Technologies for Border Control Applications. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:99-114 [Conf]
  26. Taekyoung Kwon, Sang-ho Park
    Experimental Study on Wireless Sensor Network Security. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:741-743 [Conf]
  27. Jiyong Jang, Taekyoung Kwon, JooSeok Song
    A Time-Based Key Management Protocol for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2007, pp:314-328 [Conf]
  28. Taekyoung Kwon
    On the Difficulty of Protecting Private Keys in Software. [Citation Graph (0, 0)][DBLP]
    ISC, 2002, pp:17-31 [Conf]
  29. Taekyoung Kwon
    Practical Authenticated Key Agreement Using Passwords. [Citation Graph (0, 0)][DBLP]
    ISC, 2004, pp:1-12 [Conf]
  30. Hyunsoo Song, Taekyoung Kwon
    Security Analysis of Secure Password Authentication for Keystroke Dynamics. [Citation Graph (0, 0)][DBLP]
    KES (1), 2006, pp:916-923 [Conf]
  31. Min Chen, Taekyoung Kwon, Yanghee Choi
    Data Dissemination based on Mobile Agent in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    LCN, 2005, pp:527-529 [Conf]
  32. Taekyoung Kwon, JooSeok Song
    Security and efficiency in authentication protocols resistant to password guessing attack. [Citation Graph (0, 0)][DBLP]
    LCN, 1997, pp:245-252 [Conf]
  33. Sangheon Pack, Taekyoung Kwon, Yanghee Choi
    A comparative study of mobility anchor point selection schemes in hierarchical mobile IPv6 networks. [Citation Graph (0, 0)][DBLP]
    Mobility Management & Wireless Access Protocols, 2004, pp:130-131 [Conf]
  34. Taekyoung Kwon
    Authentication and Key Agreement Via Memorable Passwords. [Citation Graph (0, 0)][DBLP]
    NDSS, 2001, pp:- [Conf]
  35. Jaecheol Kim, Jaeyoung Choi, Dukhyun Chang, Taekyoung Kwon, Yanghee Choi, Eungsu Yuk
    Traffic characteristics of a massively multi-player online role playing game. [Citation Graph (0, 0)][DBLP]
    NETGAMES, 2005, pp:1-8 [Conf]
  36. GeneBeck Hahn, Taekyoung Kwon, Sinkyu Kim, JooSeok Song
    Design and Analysis of Improved GSM Authentication Protocol for Roaming Users. [Citation Graph (0, 0)][DBLP]
    NPC, 2004, pp:451-458 [Conf]
  37. Sanghoon Song, Taekyoung Kwon
    Domain-Based Proxy for Efficient Location Tracking of Mobile Agents. [Citation Graph (0, 0)][DBLP]
    NPC, 2004, pp:205-212 [Conf]
  38. Jeongkeun Lee, Taekyoung Kwon, Yanghee Choi, Sajal K. Das, Kyung-ah Kim
    Analysis of RFID anti-collision algorithms using smart antennas. [Citation Graph (0, 0)][DBLP]
    SenSys, 2004, pp:265-266 [Conf]
  39. Soonhak Kwon, Taekyoung Kwon, Young-Ho Park
    Efficient Linear Array for Multiplication over NIST Recommended Binary Fields. [Citation Graph (0, 0)][DBLP]
    WILF, 2005, pp:427-436 [Conf]
  40. Taekyoung Kwon, Seongan Lim
    Automation-Considered Logic of Authentication and Key Distribution. [Citation Graph (0, 0)][DBLP]
    WISA, 2003, pp:442-457 [Conf]
  41. Taekyoung Kwon, Yanghee Choi, Chatschik Bisdikian, Mahmoud Naghshineh
    Call Admission Control or Adaptive Multimedia in Wireless/Mobile Networks. [Citation Graph (0, 0)][DBLP]
    WOWMOM, 1998, pp:111-116 [Conf]
  42. Taekyoung Kwon, Ilkyu Park, Yanghee Choi, Sajal K. Das
    Bandwidth Adaption Algorithms with Multi-Objectives for Adaptive Multimedia Services in Wireless/Mobile Networks. [Citation Graph (0, 0)][DBLP]
    WOWMOM, 1999, pp:51-59 [Conf]
  43. Yung Yi, Yongho Seok, Taekyoung Kwon, Yanghee Choi, Junseok Park
    W2F2Q: packet fair queuing in wireless packet networks. [Citation Graph (0, 0)][DBLP]
    WOWMOM, 2000, pp:2-10 [Conf]
  44. Min Chen, Taekyoung Kwon, Yanghee Choi
    Energy-efficient differentiated directed diffusion (EDDD) in wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:2, pp:231-245 [Journal]
  45. Taekyoung Kwon, JooSeok Song
    Efficient and secure password-based authentication protocols against guessing attacks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1998, v:21, n:9, pp:853-861 [Journal]
  46. Sangheon Pack, Minji Nam, Taekyoung Kwon, Yanghee Choi
    An adaptive mobility anchor point selection scheme in Hierarchical Mobile IPv6 networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:16, pp:3066-3078 [Journal]
  47. Jeongkeun Lee, Kideok Cho, Seungjae Lee, Taekyoung Kwon, Yanghee Choi
    Distributed and energy-efficient target localization and tracking in wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:13-14, pp:2494-2505 [Journal]
  48. Taekyoung Kwon
    Digital signature algorithm for securing digital identities. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2002, v:82, n:5, pp:247-252 [Journal]
  49. Taekyoung Kwon
    Erratum to: "Digital signature algorithm for securing digital identities": [Information Processing Letters 82 (2002) 247-252]. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2003, v:88, n:4, pp:201-202 [Journal]
  50. Sangheon Pack, Hakyung Jung, Taekyoung Kwon, Yanghee Choi
    SNC: a selective neighbor caching scheme for fast handoff in IEEE 802.11 wireless networks. [Citation Graph (0, 0)][DBLP]
    Mobile Computing and Communications Review, 2005, v:9, n:4, pp:39-49 [Journal]
  51. Jiho Ryu, Yongho Seok, Nakjung Choi, Taekyoung Kwon, Yanghee Choi
    S-EDCA: EDCA based on SuperSlot and Pseudo Collision. [Citation Graph (0, 0)][DBLP]
    Mobile Computing and Communications Review, 2006, v:10, n:4, pp:15-16 [Journal]
  52. Taekyoung Kwon, JooSeok Song
    Clarifying Straight Replays and Forced Delays. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 1999, v:33, n:1, pp:47-52 [Journal]
  53. Taekyoung Kwon, Yanghee Choi, Chatschik Bisdikian, Mahmoud Naghshineh
    QoS Provisioning in Wireless/Mobile Multimedia Networks Using an Adaptive Framework. [Citation Graph (0, 0)][DBLP]
    Wireless Networks, 2003, v:9, n:1, pp:51-59 [Journal]
  54. Hyung-Woo Lee, Taekyoung Kwon
    Biometric Digital Key Mechanisms for Telebiometric Authentication Based on Biometric Certificate. [Citation Graph (0, 0)][DBLP]
    HCI (5), 2007, pp:428-437 [Conf]
  55. Hyeonjoon Moon, Taekyoung Kwon
    Biometric Person Authentication for Access Control Scenario Based on Face Recognition. [Citation Graph (0, 0)][DBLP]
    HCI (5), 2007, pp:463-472 [Conf]
  56. Taekyoung Kwon, Hyeonjoon Moon
    Knowledge-Based User Authentication Associated with Biometrics. [Citation Graph (0, 0)][DBLP]
    HCI (5), 2007, pp:414-419 [Conf]
  57. Taekyoung Kwon, Sang-ho Park, Sooyeon Shin
    Multi-modal Authentication for Ubiquitous Computing Environments. [Citation Graph (0, 0)][DBLP]
    HCI (6), 2007, pp:113-121 [Conf]
  58. Daehyung Jo, Jeongkeun Lee, Semun Lee, Taejoon Ha, Taekyoung Kwon, Yanghee Choi
    Signal Dragging: Effects of Terminal Movement on War-Driving in CDMA/WCDMA Networks. [Citation Graph (0, 0)][DBLP]
    LoCA, 2007, pp:211-227 [Conf]
  59. Kwangkyu Park, JongHyup Lee, Taekyoung Kwon, JooSeok Song
    Secure Dynamic Network Reprogramming Using Supplementary Hash in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    UIC, 2007, pp:653-662 [Conf]
  60. Jinglun Shi, Taekyoung Kwon, Yanghee Choi, Junkai Huang, Weiping Liu
    An Energy-Efficient Framework for Wireless Sensor Networks with Multiple Gateways. [Citation Graph (0, 0)][DBLP]
    UIC, 2007, pp:632-640 [Conf]
  61. Taekyoung Kwon, Dong Hoon Lee
    Three-Party Password Authenticated Key Agreement Resistant to Server Compromise. [Citation Graph (0, 0)][DBLP]
    WISA, 2006, pp:312-323 [Conf]
  62. Taekyoung Kwon, Jung Hee Cheon, Yongdae Kim, Jaeil Lee
    Privacy Protection in PKIs: A Separation-of-Authority Approach. [Citation Graph (0, 0)][DBLP]
    WISA, 2006, pp:297-311 [Conf]
  63. Seongil Han, Yongsub Nam, Yongho Seok, Taekyoung Kwon, Yanghee Choi
    Two-phase Collision Avoidance to Improve Scalability in Wireless LANs. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]
  64. Sangheon Pack, Taekyoung Kwon, Yanghee Choi
    A performance comparison of mobility anchor point selection schemes in Hierarchical Mobile IPv6 networks. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:6, pp:1630-1642 [Journal]
  65. Yongsub Nam, Taekyoung Kwon, HoJin Lee, Hakyung Jung, Yanghee Choi
    Guaranteeing the network lifetime in wireless sensor networks: A MAC layer approach. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2007, v:30, n:13, pp:2532-2545 [Journal]
  66. Yongho Seok, Taekyoung Kwon, Yanghee Choi, Jean-Marie Bonnin
    Temporal fairness guarantee in multi-rate wireless LANs for per-flow protection. [Citation Graph (0, 0)][DBLP]
    Wireless Networks, 2007, v:13, n:2, pp:237-258 [Journal]

  67. Location management area (LMA)-based MBS handover in mobile WiMAX systems. [Citation Graph (, )][DBLP]


  68. On the Privacy-Preserving HCI Issues. [Citation Graph (, )][DBLP]


  69. A HybridQuery Tree Protocol for Tag Collision Arbitration in RFID systems. [Citation Graph (, )][DBLP]


  70. Half Direct-Link Setup (H-DLS) for Fairness between External and Local TCP Connections in IEEE 802.11e Wireless LANs. [Citation Graph (, )][DBLP]


  71. Quantifying the Interference Gray Zone in Wireless Networks: A Measurement Study. [Citation Graph (, )][DBLP]


  72. Energy-Efficient Itinerary Planning for Mobile Agents in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  73. Proximity Based Peer-to-Peer Overlay Networks (P3ON) with Load Distribution. [Citation Graph (, )][DBLP]


  74. A Reliability Aware Flooding Algorithm (RAFA) in wireless multi-hop networks. [Citation Graph (, )][DBLP]


  75. Hybrid Distributed Coordination Function for Next-Generation High-Bandwidth WLANs. [Citation Graph (, )][DBLP]


  76. Performance comparison of content-oriented networking alternatives: A tree versus a distributed hash table. [Citation Graph (, )][DBLP]


  77. An experimental study on the capture effect in 802.11a networks. [Citation Graph (, )][DBLP]


  78. Revamping the IEEE 802.11a PHY simulation models. [Citation Graph (, )][DBLP]


  79. Measurement and Analysis of BitTorrent Traffic in Mobile WiMAX Networks. [Citation Graph (, )][DBLP]


  80. A Distributed Node Scheduling Protocol Considering Sensing Coverage in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  81. Scheduling-Based Coordination Function (SCF) in WLANs for High Throughput. [Citation Graph (, )][DBLP]


  82. TA-MAC: Task Aware MAC Protocol for Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  83. Macro-Level and Micro-Level Routing (MMR) for Urban Vehicular Ad Hoc Networks. [Citation Graph (, )][DBLP]


  84. Leader-Based Rate Adaptive Multicasting for Wireless LANs. [Citation Graph (, )][DBLP]


  85. TCP improvement in multi-radio multi-channel multi-hop networks. [Citation Graph (, )][DBLP]


  86. A Scalable Rate Adaptation Mechanism for IEEE 802.11e Wireless. [Citation Graph (, )][DBLP]


  87. RSS-based Carrier Sensing and Interference Estimation in 802.11 Wireless Networks. [Citation Graph (, )][DBLP]


  88. Use of AGPS Call Data Records for Non-GPS Terminal Positioning in Cellular Networks. [Citation Graph (, )][DBLP]


  89. A pointer forwarding scheme with mobility-aware binding update in Mobile IPv6 networks. [Citation Graph (, )][DBLP]


  90. Fast-handoff support in IEEE 802.11 wireless networks. [Citation Graph (, )][DBLP]


Search in 0.005secs, Finished in 0.456secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002