|
Search the dblp DataBase
Tai-Myoung Chung:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Seon-Ho Park, Young-Ju Han, Tai-Myoung Chung
Context-Role Based Access Control for Context-Aware Application. [Citation Graph (0, 0)][DBLP] HPCC, 2006, pp:572-580 [Conf]
- Hyung-Jin Lim, Dong-Young Lee, Tae-Kyung Kim, Tai-Myoung Chung
An Analysis and Evaluation of Policy-Based Network Management Approaches. [Citation Graph (0, 0)][DBLP] ICCNMC, 2005, pp:590-599 [Conf]
- Jung-Ho Eom, Sang-Hun Lee, Hyung-Jin Lim, Tai-Myoung Chung
Qualitative Method-Based the Effective Risk Mitigation Method in the Risk Management. [Citation Graph (0, 0)][DBLP] ICCSA (2), 2006, pp:239-248 [Conf]
- Dong-Young Lee, Hyung-Jin Lim, Tai-Myoung Chung
A Study on Agent-Based Integrated Security Management System for Managing Heterogeneous Firewall Systems. [Citation Graph (0, 0)][DBLP] ICCSA (5), 2006, pp:655-664 [Conf]
- Hyung-Jin Lim, Moonseong Kim, Dong-Young Lee, Tai-Myoung Chung
An Analysis of Policy Provisioning Complexity in Accordance with the Application Attributes of the Policy-Based Network. [Citation Graph (0, 0)][DBLP] ICCSA (5), 2006, pp:626-634 [Conf]
- Hyung-Jin Lim, Dong-Young Lee, Tai-Myoung Chung
Comparative Analysis of IPv6 VPN Transition in NEMO Environments. [Citation Graph (0, 0)][DBLP] ICCSA (3), 2006, pp:486-496 [Conf]
- Hyung-Jin Lim, Dong-Young Lee, Tae-Kyung Kim, Tai-Myoung Chung
An Evaluation and Analysis for IP VPN Model in IPv6 Transition Environment. [Citation Graph (0, 0)][DBLP] ICCSA (2), 2006, pp:135-144 [Conf]
- Jin S. Yang, Young J. Han, Dong-Soo Kim, Beom-Hwan Chang, Tai-Myoung Chung, Jung-Chan Na
A Fine-Grained Taxonomy of Security Vulnerability in Active Network Environments. [Citation Graph (0, 0)][DBLP] ICCSA (1), 2004, pp:693-700 [Conf]
- Hyung-Jin Lim, Ki-jeong Chun, Tai-Myoung Chung
Adaptive Bandwidth Control Using Fuzzy Inference in Policy-Based Network Management. [Citation Graph (0, 0)][DBLP] ICOIN, 2005, pp:443-451 [Conf]
- Jung-Muk Lim, Hyung-Jin Lim, Tai-Myoung Chung
Performance Evaluation of Public Key Based Mechanisms for Mobile IPv4 Authentication in AAA Environments. [Citation Graph (0, 0)][DBLP] ICOIN, 2006, pp:62-71 [Conf]
- Jung-Ho Eom, Young-Ju Han, Tai-Myoung Chung
Modeling Active Cyber Attack for Network Vulnerability Assessment. [Citation Graph (0, 0)][DBLP] ISPA Workshops, 2006, pp:971-980 [Conf]
- Jong-Hyouk Lee, Tai-Myoung Chung
Session Key Forwarding Scheme Based on AAA Architecture in Wireless Networks. [Citation Graph (0, 0)][DBLP] ISPA, 2006, pp:18-26 [Conf]
- Jong-Hyouk Lee, Tai-Myoung Chung
Experimental Performance Evaluation of Mobile IPv6 Handovers over Wireless LAN. [Citation Graph (0, 0)][DBLP] ICSNC, 2006, pp:57- [Conf]
- Jong-Hyouk Lee, Tai-Myoung Chung
Performance Evaluation of Dual Authentication Scheme in Mobile IPv6 Networks. [Citation Graph (0, 0)][DBLP] ICSNC, 2006, pp:58- [Conf]
- Beom-Hwan Chang, Dong-Soo Kim, Hyun-Ku Kim, Jung-Chan Na, Tai-Myoung Chung
Active security management based on Secure Zone Cooperation. [Citation Graph (0, 0)][DBLP] Future Generation Comp. Syst., 2004, v:20, n:2, pp:283-293 [Journal]
- Seon-Ho Park, Joon-Sic Cho, Sung-Min Jung, Young-Ju Han, Tai-Myoung Chung
Architecture of Context-Aware Integrated Security Management Systems for Smart Home Environment. [Citation Graph (0, 0)][DBLP] APNOMS, 2007, pp:102-111 [Conf]
- Young-Ju Han, Jung-Ho Eom, Seon-Ho Park, Tai-Myoung Chung
Energy-Efficient Distance Based Clustering Routing Scheme for Long-Term Lifetime of Multi-hop Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP] APNOMS, 2007, pp:543-546 [Conf]
- Seon-Ho Park, Young-Ju Han, Tai-Myoung Chung
Context-Aware Security Management System for Pervasive Computing Environment. [Citation Graph (0, 0)][DBLP] CONTEXT, 2007, pp:384-396 [Conf]
- Jung-Ho Eom, Seon-Ho Park, Young-Ju Han, Tai-Myoung Chung
Risk Assessment Method Based on Business Process-Oriented Asset Evaluation for Information System Security. [Citation Graph (0, 0)][DBLP] International Conference on Computational Science (3), 2007, pp:1024-1031 [Conf]
- Young-Ju Han, Seon-Ho Park, Jung-Ho Eom, Tai-Myoung Chung
Energy-Efficient Distance Based Clustering Routing Scheme for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP] ICCSA (2), 2007, pp:195-206 [Conf]
- Jong-Myoung Kim, Young-Ju Han, Seon-Ho Park, Tai-Myoung Chung
N-Dimensional Grid-Based Key Predistribution in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP] ICCSA (2), 2007, pp:1107-1120 [Conf]
- Seon-Ho Park, Joon-Sic Cho, Young-Ju Han, Tai-Myoung Chung
Design and Implementation of Context-Aware Security Management System for Ubiquitous Computing Environment. [Citation Graph (0, 0)][DBLP] ISPA Workshops, 2007, pp:235-244 [Conf]
- Jong-Hyouk Lee, Young-Ju Han, Tai-Myoung Chung
Local Authentication Scheme Based on AAA in Mobile IPv6 Networks. [Citation Graph (0, 0)][DBLP] MMM (2), 2007, pp:552-559 [Conf]
- Joong-Hee Lee, Jong-Hyouk Lee, Tai-Myoung Chung
A Novel Inter-LMD Handoff Mechanism for Network-Based Localized Mobility Management. [Citation Graph (0, 0)][DBLP] NEW2AN, 2007, pp:356-366 [Conf]
- Jong-Hyouk Lee, Young-Ju Han, Jong-Hyun Kim, Jung-Chan Na, Tai-Myoung Chung
PKG-MIB: Private-Mib for Package-Based Linux Systems in a Large Scale Management Domain. [Citation Graph (0, 0)][DBLP] KES-AMSTA, 2007, pp:833-840 [Conf]
Preventing Out-of-Sequence Packets on the Route Optimization Procedure in Proxy Mobile IPv6. [Citation Graph (, )][DBLP]
An Investigation of Distance-Based Proxy Mobile Client Selection Schemes for NetLMM. [Citation Graph (, )][DBLP]
DTPD: Data Transfer Tool Performance Diagnosis System in High Speed Networks. [Citation Graph (, )][DBLP]
Group Key Locking Scheme in Mobile Multicast Environments with Modified MLDs. [Citation Graph (, )][DBLP]
Extended Concentric-Clustering Routing Scheme Adapted to Various Environments of Sensor Networks. [Citation Graph (, )][DBLP]
Architecture of Context-Aware Workflow Authorization Management Systems for Workflow-Based Systems. [Citation Graph (, )][DBLP]
A Performance Analysis on Route Optimization for Proxy Mobile IPv6. [Citation Graph (, )][DBLP]
Authentication Analysis Based on Certificate for Proxy Mobile IPv6 Environment. [Citation Graph (, )][DBLP]
Authentication Scheme Based on Trust and Clustering Using Fuzzy Control in Wireless Ad-Hoc Networks. [Citation Graph (, )][DBLP]
A Light-Weighted Misused Key Detection in Wireless Sensor Networks. [Citation Graph (, )][DBLP]
SecDEACH: Secure and Resilient Dynamic Clustering Protocol Preserving Data Privacy in WSNs. [Citation Graph (, )][DBLP]
MANET ID : Improvement on Group Communications and ZRP. [Citation Graph (, )][DBLP]
A Scheme to reduce the handoff latency using mSCTP in Fast Mobile IPv6. [Citation Graph (, )][DBLP]
An Adaptive Inter-Mobility Supports Scheme for NetLMM. [Citation Graph (, )][DBLP]
The Concentric-Cluster Routing Scheme Adapted to Large-scale Sensor Networks. [Citation Graph (, )][DBLP]
An Optimal Access Points Allocation Scheme Based on Genetic Algorithm. [Citation Graph (, )][DBLP]
Policy-based hybrid management architecture for IP-based VPN. [Citation Graph (, )][DBLP]
Hybrid PMIPv6 indication mechanism for interaction between MIPv6 and PMIPv6. [Citation Graph (, )][DBLP]
A comparative signaling cost analysis of Hierarchical Mobile IPv6 and Proxy Mobile IPv6. [Citation Graph (, )][DBLP]
Secure Fast Handover Scheme of Proxy Mobile IPv6. [Citation Graph (, )][DBLP]
An Energy Efficient Concentric Clustering Scheme in Wireless Sensor Networks. [Citation Graph (, )][DBLP]
A Study on Access Control Model for Context-Aware Workflow. [Citation Graph (, )][DBLP]
Enhanced Light Weight Route Optimization in Proxy Mobile IPv6. [Citation Graph (, )][DBLP]
The Bias Routing Tree Avoiding Technique for Hierarchical Routing Protocol over 6LoWPAN. [Citation Graph (, )][DBLP]
A Misused Key Detection Mechanism for Hierarchical Routings in Wireless Sensor Network. [Citation Graph (, )][DBLP]
A study new challenge for billing system in converged service platform. [Citation Graph (, )][DBLP]
How much do we gain by introducing route optimization in Proxy Mobile IPv6 networks? [Citation Graph (, )][DBLP]
Optimizing Access Point Allocation Using Genetic Algorithmic Approach for Smart Home Environments. [Citation Graph (, )][DBLP]
Search in 0.003secs, Finished in 0.305secs
|