|
Search the dblp DataBase
Jung Min Park:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Inshil Doh, Jung Min Park, Kijoon Chae
Pairwise Key Setup and Authentication Utilizing Deployment Information for Secure Sensor Network. [Citation Graph (0, 0)][DBLP] HPCC, 2006, pp:280-289 [Conf]
- Jung Min Park, Min-Jung Jin, Kijoon Chae
Secure Firewall Traversal in Mobile IP Network. [Citation Graph (0, 0)][DBLP] International Conference on Computational Science, 2003, pp:535-544 [Conf]
- Jung Min Park, Eun-Hui Bae, Hye-Jin Pyeon, Kijoon Chae
A Ticket-Based AAA Security Mechanism in Mobile IP Network. [Citation Graph (0, 0)][DBLP] ICCSA (2), 2003, pp:210-219 [Conf]
- Young-Jo Cho, Jung Min Park, Jaehyun Park, Sang-Rok Oh, Chong Won Lee
A Control Architecture to Achieve Manipulation Task Goals for a Humanoid Robot. [Citation Graph (0, 0)][DBLP] ICRA, 1998, pp:206-212 [Conf]
- Yong Ho Song, Jung Min Park, Yongsu Park, Eul-Gyu Im
A New Methodology of Analyzing Security Vulnerability for Network Services. [Citation Graph (0, 0)][DBLP] ISI, 2006, pp:737-738 [Conf]
- Creighton T. R. Hager, Scott F. Midkiff, Jung Min Park, Thomas L. Martin
Performance and Energy Efficiency of Block Ciphers in Personal Digital Assistants. [Citation Graph (0, 0)][DBLP] PerCom, 2005, pp:127-136 [Conf]
- Jung Min Park, Edwin K. P. Chong, Howard Jay Siegel
Constructing fair-exchange protocols for E-commerce via distributed computation of RSA signatures. [Citation Graph (0, 0)][DBLP] PODC, 2003, pp:172-181 [Conf]
- Jung Min Park, Edwin K. P. Chong, Howard Jay Siegel
Efficient Multicast Packet Authentication Using Signature Amortization. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 2002, pp:227-240 [Conf]
- Jung Min Park, Edwin K. P. Chong, Howard Jay Siegel
Efficient multicast stream authentication using erasure codes. [Citation Graph (0, 0)][DBLP] ACM Trans. Inf. Syst. Secur., 2003, v:6, n:2, pp:258-285 [Journal]
- Ruiliang Chen, Jung Min Park, Randolph Marchany
A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks. [Citation Graph (0, 0)][DBLP] IEEE Trans. Parallel Distrib. Syst., 2007, v:18, n:5, pp:577-588 [Journal]
- Michael Chorzempa, Jung Min Park, Mohamed Eltoweissy
SECK: survivable and efficient clustered keying for wireless sensor networks. [Citation Graph (0, 0)][DBLP] IPCCC, 2005, pp:453-458 [Conf]
- Jung Min Park, Seong-Lyun Kim
Distributed throughput-maximization using the up- and downlink duality in wireless networks. [Citation Graph (0, 0)][DBLP] IWCMC, 2007, pp:97-102 [Conf]
- Kaigui Bian, Jung Min Park, Ruiliang Chen
Stasis Trap: Cross-Layer Stealthy Attacks in Wireless Ad Hoc Networks. [Citation Graph (0, 0)][DBLP] GLOBECOM, 2006, pp:- [Conf]
- Ruiliang Chen, Jung Min Park, Randolph Marchany
RIM: Router Interface Marking for IP Traceback. [Citation Graph (0, 0)][DBLP] GLOBECOM, 2006, pp:- [Conf]
- Ruiliang Chen, Michael Snow, Jung Min Park, M. Tamer Refaei, Mohamed Eltoweissy
Defense against Routing Disruption Attacks in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP] GLOBECOM, 2006, pp:- [Conf]
- Michael Chorzempa, Jung Min Park, Mohamed Eltoweissy
Key management for long-lived sensor networks in hostile environments. [Citation Graph (0, 0)][DBLP] Computer Communications, 2007, v:30, n:9, pp:1964-1979 [Journal]
On Providing Automatic Parental Consent over Information Collection from Children. [Citation Graph (, )][DBLP]
Robust Distributed Spectrum Sensing in Cognitive Radio Networks. [Citation Graph (, )][DBLP]
A quorum-based framework for establishing control channels in dynamic spectrum access networks. [Citation Graph (, )][DBLP]
Evaluation of Online Resources in Assisting Phishing Detection. [Citation Graph (, )][DBLP]
Security vulnerabilities in IEEE 802.22. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.002secs
|