The SCEAS System
Navigation Menu

Search the dblp DataBase


Jaecheol Ryou: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Junsuk Lee, Jeonghyun Kim, Kisong Yoon, Changsoon Park, Jaecheol Ryou
    A Study on Digital Content Distribution Model Protecting Rights of Distribution's Subjects Based on Contract. [Citation Graph (0, 0)][DBLP]
    ICWI, 2002, pp:112-119 [Conf]
  2. Kiyoung Moon, Namje Park, Jongsu Jang, Sungwon Sohn, Jaecheol Ryou
    An Integrated XML Security Mechanism for Mobile Grid Application. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:776-783 [Conf]
  3. SangCheol Hwang, Namhoon Lee, Kouichi Sakurai, GungGil Park, Jaecheol Ryou
    The Improved Risk Analysis Mechanism in the Practical Risk Analysis System. [Citation Graph (0, 0)][DBLP]
    ICOIN, 2005, pp:835-842 [Conf]
  4. Yeonjeong Jeong, Junil Kim, Jihyun Park, Kisong Yoon, Jaecheol Ryou
    End-to-End Digital Rights Management on the Overall Value-Chains of Content Distribution. [Citation Graph (0, 0)][DBLP]
    IMSA, 2005, pp:294-297 [Conf]
  5. Kiyoung Moon, Namje Park, Kyoil Chung, Sungwon Sohn, Jaecheol Ryou
    Security Frameworks for Open LBS Based on Web Services Security Mechanism. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:609-618 [Conf]
  6. Youngtae Yun, Sangseo Park, Yosik Kim, Jaecheol Ryou
    A Design and Implementation of Profile Based Web Application Securing Proxy. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2006, pp:248-259 [Conf]
  7. Mooseop Kim, Jaecheol Ryou, Yongje Choi, Sungik Jun
    Low Power AES Hardware Architecture for Radio Frequency Identification. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2006, pp:353-363 [Conf]
  8. Marie Kim, YoungJun Lee, Jaecheol Ryou
    What Are Possible Security Threats in Ubiquitous Sensor Network Environment? [Citation Graph (0, 0)][DBLP]
    APNOMS, 2007, pp:437-446 [Conf]
  9. Mooseop Kim, Youngse Kim, Jaecheol Ryou, Sungik Jun
    Efficient Implementation of the Keyed-Hash Message Authentication Code Based on SHA-1 Algorithm for Mobile Trusted Computing. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:410-419 [Conf]
  10. Mooseop Kim, Jaecheol Ryou
    Power Efficient Hardware Architecture of SHA-1 Algorithm for Trusted Mobile Computing. [Citation Graph (0, 0)][DBLP]
    ICICS, 2007, pp:375-385 [Conf]
  11. Junil Kim, Yeonjeong Jeong, Kisong Yoon, Jaecheol Ryou
    A trustworthy end-to-end key management scheme for digital rights management. [Citation Graph (0, 0)][DBLP]
    ACM Multimedia, 2006, pp:635-638 [Conf]

  12. Efficient Hardware Architecture of SHA-256 Algorithm for Trusted Mobile Computing. [Citation Graph (, )][DBLP]

  13. Compact Implementation of SHA-1 Hash Function for Mobile Trusted Module. [Citation Graph (, )][DBLP]

Search in 0.017secs, Finished in 0.018secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002