|
Search the dblp DataBase
Jaecheol Ryou:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Junsuk Lee, Jeonghyun Kim, Kisong Yoon, Changsoon Park, Jaecheol Ryou
A Study on Digital Content Distribution Model Protecting Rights of Distribution's Subjects Based on Contract. [Citation Graph (0, 0)][DBLP] ICWI, 2002, pp:112-119 [Conf]
- Kiyoung Moon, Namje Park, Jongsu Jang, Sungwon Sohn, Jaecheol Ryou
An Integrated XML Security Mechanism for Mobile Grid Application. [Citation Graph (0, 0)][DBLP] ICCSA (1), 2004, pp:776-783 [Conf]
- SangCheol Hwang, Namhoon Lee, Kouichi Sakurai, GungGil Park, Jaecheol Ryou
The Improved Risk Analysis Mechanism in the Practical Risk Analysis System. [Citation Graph (0, 0)][DBLP] ICOIN, 2005, pp:835-842 [Conf]
- Yeonjeong Jeong, Junil Kim, Jihyun Park, Kisong Yoon, Jaecheol Ryou
End-to-End Digital Rights Management on the Overall Value-Chains of Content Distribution. [Citation Graph (0, 0)][DBLP] IMSA, 2005, pp:294-297 [Conf]
- Kiyoung Moon, Namje Park, Kyoil Chung, Sungwon Sohn, Jaecheol Ryou
Security Frameworks for Open LBS Based on Web Services Security Mechanism. [Citation Graph (0, 0)][DBLP] ISPA Workshops, 2005, pp:609-618 [Conf]
- Youngtae Yun, Sangseo Park, Yosik Kim, Jaecheol Ryou
A Design and Implementation of Profile Based Web Application Securing Proxy. [Citation Graph (0, 0)][DBLP] ISPEC, 2006, pp:248-259 [Conf]
- Mooseop Kim, Jaecheol Ryou, Yongje Choi, Sungik Jun
Low Power AES Hardware Architecture for Radio Frequency Identification. [Citation Graph (0, 0)][DBLP] IWSEC, 2006, pp:353-363 [Conf]
- Marie Kim, YoungJun Lee, Jaecheol Ryou
What Are Possible Security Threats in Ubiquitous Sensor Network Environment? [Citation Graph (0, 0)][DBLP] APNOMS, 2007, pp:437-446 [Conf]
- Mooseop Kim, Youngse Kim, Jaecheol Ryou, Sungik Jun
Efficient Implementation of the Keyed-Hash Message Authentication Code Based on SHA-1 Algorithm for Mobile Trusted Computing. [Citation Graph (0, 0)][DBLP] ATC, 2007, pp:410-419 [Conf]
- Mooseop Kim, Jaecheol Ryou
Power Efficient Hardware Architecture of SHA-1 Algorithm for Trusted Mobile Computing. [Citation Graph (0, 0)][DBLP] ICICS, 2007, pp:375-385 [Conf]
- Junil Kim, Yeonjeong Jeong, Kisong Yoon, Jaecheol Ryou
A trustworthy end-to-end key management scheme for digital rights management. [Citation Graph (0, 0)][DBLP] ACM Multimedia, 2006, pp:635-638 [Conf]
Efficient Hardware Architecture of SHA-256 Algorithm for Trusted Mobile Computing. [Citation Graph (, )][DBLP]
Compact Implementation of SHA-1 Hash Function for Mobile Trusted Module. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.002secs
|