The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Tai-Myoung Chung: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Seon-Ho Park, Young-Ju Han, Tai-Myoung Chung
    Context-Role Based Access Control for Context-Aware Application. [Citation Graph (0, 0)][DBLP]
    HPCC, 2006, pp:572-580 [Conf]
  2. Hyung-Jin Lim, Dong-Young Lee, Tae-Kyung Kim, Tai-Myoung Chung
    An Analysis and Evaluation of Policy-Based Network Management Approaches. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:590-599 [Conf]
  3. Jung-Ho Eom, Sang-Hun Lee, Hyung-Jin Lim, Tai-Myoung Chung
    Qualitative Method-Based the Effective Risk Mitigation Method in the Risk Management. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2006, pp:239-248 [Conf]
  4. Dong-Young Lee, Hyung-Jin Lim, Tai-Myoung Chung
    A Study on Agent-Based Integrated Security Management System for Managing Heterogeneous Firewall Systems. [Citation Graph (0, 0)][DBLP]
    ICCSA (5), 2006, pp:655-664 [Conf]
  5. Hyung-Jin Lim, Moonseong Kim, Dong-Young Lee, Tai-Myoung Chung
    An Analysis of Policy Provisioning Complexity in Accordance with the Application Attributes of the Policy-Based Network. [Citation Graph (0, 0)][DBLP]
    ICCSA (5), 2006, pp:626-634 [Conf]
  6. Hyung-Jin Lim, Dong-Young Lee, Tai-Myoung Chung
    Comparative Analysis of IPv6 VPN Transition in NEMO Environments. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:486-496 [Conf]
  7. Hyung-Jin Lim, Dong-Young Lee, Tae-Kyung Kim, Tai-Myoung Chung
    An Evaluation and Analysis for IP VPN Model in IPv6 Transition Environment. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2006, pp:135-144 [Conf]
  8. Jin S. Yang, Young J. Han, Dong-Soo Kim, Beom-Hwan Chang, Tai-Myoung Chung, Jung-Chan Na
    A Fine-Grained Taxonomy of Security Vulnerability in Active Network Environments. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:693-700 [Conf]
  9. Hyung-Jin Lim, Ki-jeong Chun, Tai-Myoung Chung
    Adaptive Bandwidth Control Using Fuzzy Inference in Policy-Based Network Management. [Citation Graph (0, 0)][DBLP]
    ICOIN, 2005, pp:443-451 [Conf]
  10. Jung-Muk Lim, Hyung-Jin Lim, Tai-Myoung Chung
    Performance Evaluation of Public Key Based Mechanisms for Mobile IPv4 Authentication in AAA Environments. [Citation Graph (0, 0)][DBLP]
    ICOIN, 2006, pp:62-71 [Conf]
  11. Jung-Ho Eom, Young-Ju Han, Tai-Myoung Chung
    Modeling Active Cyber Attack for Network Vulnerability Assessment. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2006, pp:971-980 [Conf]
  12. Jong-Hyouk Lee, Tai-Myoung Chung
    Session Key Forwarding Scheme Based on AAA Architecture in Wireless Networks. [Citation Graph (0, 0)][DBLP]
    ISPA, 2006, pp:18-26 [Conf]
  13. Jong-Hyouk Lee, Tai-Myoung Chung
    Experimental Performance Evaluation of Mobile IPv6 Handovers over Wireless LAN. [Citation Graph (0, 0)][DBLP]
    ICSNC, 2006, pp:57- [Conf]
  14. Jong-Hyouk Lee, Tai-Myoung Chung
    Performance Evaluation of Dual Authentication Scheme in Mobile IPv6 Networks. [Citation Graph (0, 0)][DBLP]
    ICSNC, 2006, pp:58- [Conf]
  15. Beom-Hwan Chang, Dong-Soo Kim, Hyun-Ku Kim, Jung-Chan Na, Tai-Myoung Chung
    Active security management based on Secure Zone Cooperation. [Citation Graph (0, 0)][DBLP]
    Future Generation Comp. Syst., 2004, v:20, n:2, pp:283-293 [Journal]
  16. Seon-Ho Park, Joon-Sic Cho, Sung-Min Jung, Young-Ju Han, Tai-Myoung Chung
    Architecture of Context-Aware Integrated Security Management Systems for Smart Home Environment. [Citation Graph (0, 0)][DBLP]
    APNOMS, 2007, pp:102-111 [Conf]
  17. Young-Ju Han, Jung-Ho Eom, Seon-Ho Park, Tai-Myoung Chung
    Energy-Efficient Distance Based Clustering Routing Scheme for Long-Term Lifetime of Multi-hop Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    APNOMS, 2007, pp:543-546 [Conf]
  18. Seon-Ho Park, Young-Ju Han, Tai-Myoung Chung
    Context-Aware Security Management System for Pervasive Computing Environment. [Citation Graph (0, 0)][DBLP]
    CONTEXT, 2007, pp:384-396 [Conf]
  19. Jung-Ho Eom, Seon-Ho Park, Young-Ju Han, Tai-Myoung Chung
    Risk Assessment Method Based on Business Process-Oriented Asset Evaluation for Information System Security. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (3), 2007, pp:1024-1031 [Conf]
  20. Young-Ju Han, Seon-Ho Park, Jung-Ho Eom, Tai-Myoung Chung
    Energy-Efficient Distance Based Clustering Routing Scheme for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:195-206 [Conf]
  21. Jong-Myoung Kim, Young-Ju Han, Seon-Ho Park, Tai-Myoung Chung
    N-Dimensional Grid-Based Key Predistribution in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:1107-1120 [Conf]
  22. Seon-Ho Park, Joon-Sic Cho, Young-Ju Han, Tai-Myoung Chung
    Design and Implementation of Context-Aware Security Management System for Ubiquitous Computing Environment. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2007, pp:235-244 [Conf]
  23. Jong-Hyouk Lee, Young-Ju Han, Tai-Myoung Chung
    Local Authentication Scheme Based on AAA in Mobile IPv6 Networks. [Citation Graph (0, 0)][DBLP]
    MMM (2), 2007, pp:552-559 [Conf]
  24. Joong-Hee Lee, Jong-Hyouk Lee, Tai-Myoung Chung
    A Novel Inter-LMD Handoff Mechanism for Network-Based Localized Mobility Management. [Citation Graph (0, 0)][DBLP]
    NEW2AN, 2007, pp:356-366 [Conf]
  25. Jong-Hyouk Lee, Young-Ju Han, Jong-Hyun Kim, Jung-Chan Na, Tai-Myoung Chung
    PKG-MIB: Private-Mib for Package-Based Linux Systems in a Large Scale Management Domain. [Citation Graph (0, 0)][DBLP]
    KES-AMSTA, 2007, pp:833-840 [Conf]

  26. Preventing Out-of-Sequence Packets on the Route Optimization Procedure in Proxy Mobile IPv6. [Citation Graph (, )][DBLP]


  27. An Investigation of Distance-Based Proxy Mobile Client Selection Schemes for NetLMM. [Citation Graph (, )][DBLP]


  28. DTPD: Data Transfer Tool Performance Diagnosis System in High Speed Networks. [Citation Graph (, )][DBLP]


  29. Group Key Locking Scheme in Mobile Multicast Environments with Modified MLDs. [Citation Graph (, )][DBLP]


  30. Extended Concentric-Clustering Routing Scheme Adapted to Various Environments of Sensor Networks. [Citation Graph (, )][DBLP]


  31. Architecture of Context-Aware Workflow Authorization Management Systems for Workflow-Based Systems. [Citation Graph (, )][DBLP]


  32. A Performance Analysis on Route Optimization for Proxy Mobile IPv6. [Citation Graph (, )][DBLP]


  33. Authentication Analysis Based on Certificate for Proxy Mobile IPv6 Environment. [Citation Graph (, )][DBLP]


  34. Authentication Scheme Based on Trust and Clustering Using Fuzzy Control in Wireless Ad-Hoc Networks. [Citation Graph (, )][DBLP]


  35. A Light-Weighted Misused Key Detection in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  36. SecDEACH: Secure and Resilient Dynamic Clustering Protocol Preserving Data Privacy in WSNs. [Citation Graph (, )][DBLP]


  37. MANET ID : Improvement on Group Communications and ZRP. [Citation Graph (, )][DBLP]


  38. A Scheme to reduce the handoff latency using mSCTP in Fast Mobile IPv6. [Citation Graph (, )][DBLP]


  39. An Adaptive Inter-Mobility Supports Scheme for NetLMM. [Citation Graph (, )][DBLP]


  40. The Concentric-Cluster Routing Scheme Adapted to Large-scale Sensor Networks. [Citation Graph (, )][DBLP]


  41. An Optimal Access Points Allocation Scheme Based on Genetic Algorithm. [Citation Graph (, )][DBLP]


  42. Policy-based hybrid management architecture for IP-based VPN. [Citation Graph (, )][DBLP]


  43. Hybrid PMIPv6 indication mechanism for interaction between MIPv6 and PMIPv6. [Citation Graph (, )][DBLP]


  44. A comparative signaling cost analysis of Hierarchical Mobile IPv6 and Proxy Mobile IPv6. [Citation Graph (, )][DBLP]


  45. Secure Fast Handover Scheme of Proxy Mobile IPv6. [Citation Graph (, )][DBLP]


  46. An Energy Efficient Concentric Clustering Scheme in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  47. A Study on Access Control Model for Context-Aware Workflow. [Citation Graph (, )][DBLP]


  48. Enhanced Light Weight Route Optimization in Proxy Mobile IPv6. [Citation Graph (, )][DBLP]


  49. The Bias Routing Tree Avoiding Technique for Hierarchical Routing Protocol over 6LoWPAN. [Citation Graph (, )][DBLP]


  50. A Misused Key Detection Mechanism for Hierarchical Routings in Wireless Sensor Network. [Citation Graph (, )][DBLP]


  51. A study new challenge for billing system in converged service platform. [Citation Graph (, )][DBLP]


  52. How much do we gain by introducing route optimization in Proxy Mobile IPv6 networks? [Citation Graph (, )][DBLP]


  53. Optimizing Access Point Allocation Using Genetic Algorithmic Approach for Smart Home Environments. [Citation Graph (, )][DBLP]


Search in 0.019secs, Finished in 0.022secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002