The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Young-Ju Han: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Seon-Ho Park, Young-Ju Han, Tai-Myoung Chung
    Context-Role Based Access Control for Context-Aware Application. [Citation Graph (0, 0)][DBLP]
    HPCC, 2006, pp:572-580 [Conf]
  2. Young J. Han, Jin S. Yang, Beom H. Chang, Jung C. Na, Tai-Myung Chung
    The Vulnerability Assessment for Active Networks; Model, Policy, Procedures, and Performance Evaluations. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:191-198 [Conf]
  3. Jong-Hyouk Lee, Young-Ju Han, Hyung-Jin Lim, Tai-Myung Chung
    New Binding Update Method using GDMHA in Hierarchical Mobile IPv6. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2005, pp:146-155 [Conf]
  4. Jin S. Yang, Young J. Han, Dong-Soo Kim, Beom-Hwan Chang, Tai-Myoung Chung, Jung-Chan Na
    A Fine-Grained Taxonomy of Security Vulnerability in Active Network Environments. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:693-700 [Conf]
  5. Jin S. Yang, Young J. Han, Dong-Soo Kim, Beom H. Chang, Tai-Myung Chung, Jung C. Na
    A Fine-Grained Taxonomy of Security Vulnerability in Active Network Environments. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:681-688 [Conf]
  6. Young J. Han, Jin S. Yang, Beom H. Chang, Tai-Myung Chung
    SVAM: The Scalable Vulnerability Analysis Model Based on Active Networks. [Citation Graph (0, 0)][DBLP]
    ICOIN, 2004, pp:857-866 [Conf]
  7. Jung-Ho Eom, Young-Ju Han, Tai-Myoung Chung
    Modeling Active Cyber Attack for Network Vulnerability Assessment. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2006, pp:971-980 [Conf]
  8. Seon-Ho Park, Joon-Sic Cho, Sung-Min Jung, Young-Ju Han, Tai-Myoung Chung
    Architecture of Context-Aware Integrated Security Management Systems for Smart Home Environment. [Citation Graph (0, 0)][DBLP]
    APNOMS, 2007, pp:102-111 [Conf]
  9. Young-Ju Han, Jung-Ho Eom, Seon-Ho Park, Tai-Myoung Chung
    Energy-Efficient Distance Based Clustering Routing Scheme for Long-Term Lifetime of Multi-hop Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    APNOMS, 2007, pp:543-546 [Conf]
  10. Seon-Ho Park, Young-Ju Han, Tai-Myoung Chung
    Context-Aware Security Management System for Pervasive Computing Environment. [Citation Graph (0, 0)][DBLP]
    CONTEXT, 2007, pp:384-396 [Conf]
  11. Jung-Ho Eom, Seon-Ho Park, Young-Ju Han, Tai-Myoung Chung
    Risk Assessment Method Based on Business Process-Oriented Asset Evaluation for Information System Security. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (3), 2007, pp:1024-1031 [Conf]
  12. Young-Ju Han, Seon-Ho Park, Jung-Ho Eom, Tai-Myoung Chung
    Energy-Efficient Distance Based Clustering Routing Scheme for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:195-206 [Conf]
  13. Jong-Myoung Kim, Young-Ju Han, Seon-Ho Park, Tai-Myoung Chung
    N-Dimensional Grid-Based Key Predistribution in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:1107-1120 [Conf]
  14. Seon-Ho Park, Joon-Sic Cho, Young-Ju Han, Tai-Myoung Chung
    Design and Implementation of Context-Aware Security Management System for Ubiquitous Computing Environment. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2007, pp:235-244 [Conf]
  15. Jong-Hyouk Lee, Young-Ju Han, Tai-Myoung Chung
    Local Authentication Scheme Based on AAA in Mobile IPv6 Networks. [Citation Graph (0, 0)][DBLP]
    MMM (2), 2007, pp:552-559 [Conf]
  16. Jong-Hyouk Lee, Young-Ju Han, Jong-Hyun Kim, Jung-Chan Na, Tai-Myoung Chung
    PKG-MIB: Private-Mib for Package-Based Linux Systems in a Large Scale Management Domain. [Citation Graph (0, 0)][DBLP]
    KES-AMSTA, 2007, pp:833-840 [Conf]

  17. DTPD: Data Transfer Tool Performance Diagnosis System in High Speed Networks. [Citation Graph (, )][DBLP]


  18. Extended Concentric-Clustering Routing Scheme Adapted to Various Environments of Sensor Networks. [Citation Graph (, )][DBLP]


  19. Architecture of Context-Aware Workflow Authorization Management Systems for Workflow-Based Systems. [Citation Graph (, )][DBLP]


  20. A Light-Weighted Misused Key Detection in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  21. SecDEACH: Secure and Resilient Dynamic Clustering Protocol Preserving Data Privacy in WSNs. [Citation Graph (, )][DBLP]


  22. MANET ID : Improvement on Group Communications and ZRP. [Citation Graph (, )][DBLP]


  23. The Concentric-Cluster Routing Scheme Adapted to Large-scale Sensor Networks. [Citation Graph (, )][DBLP]


  24. An Energy Efficient Concentric Clustering Scheme in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  25. A Misused Key Detection Mechanism for Hierarchical Routings in Wireless Sensor Network. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.281secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002