The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Tai-Hoon Kim: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Tai-Hoon Kim, Byung-Gyu No, Dong Chun Lee
    Threat Description for the PP by Using the Concept of the Assets Protected by TOE. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science, 2003, pp:605-614 [Conf]
  2. Jae Sang Cha, Kyungsup Kwak, Sang-Yule Choi, Tai-Hoon Kim, Chang Dae Yoon, Chong Hyun Lee
    Interference-Free ZCD-UWB for Wireless Home Network Applications. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:429-441 [Conf]
  3. Sang-Yule Choi, Myong-chul Shin, Nam-Young Hur, Jong-Boo Kim, Tai-Hoon Kim, Jae Sang Cha
    Distribution Data Security System Based on Web Based Active Database. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:341-352 [Conf]
  4. Sang-Yule Choi, Myong-chul Shin, Nam-Young Hur, Jong-Boo Kim, Tai-Hoon Kim, Jae Sang Cha
    Distribution Data Security System Based on Web Based Active Database. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2005, pp:1319-1330 [Conf]
  5. Haeng-Kon Kim, Tai-Hoon Kim
    Design on Mobile Secure Electronic Transaction Protocol with Component Based Development. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:461-470 [Conf]
  6. Tai-Hoon Kim, Haeng-Kon Kim
    A Relationship between Security Engineering and Security Evaluation. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:717-724 [Conf]
  7. Tai-Hoon Kim, Seoksoo Kim, Hee-Un Park, Myoung-sub Kim
    Analysis of Security Session Reusing in Distribution Server System. [Citation Graph (0, 0)][DBLP]
    ICCSA (5), 2006, pp:700-707 [Conf]
  8. Tai-Hoon Kim, Dong Chun Lee
    Reduction Method of Threat Phrases by Classifying Assets. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:1052-1059 [Conf]
  9. Tai-Hoon Kim, Seung-youn Lee
    Design Procedure of IT Systems Security Countermeasures. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:468-473 [Conf]
  10. Tai-Hoon Kim, Seung-youn Lee
    Security Evaluation Targets for Enhancement of IT Systems Assurance. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:491-498 [Conf]
  11. Eun-ser Lee, Kyung-Whan Lee, Tai-Hoon Kim, Il-Hong Jung
    Introduction and Evaluation of Development System Security Process of ISO/IEC TR 15504. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:451-460 [Conf]
  12. Geuk Lee, Il Seok Ko, Tai-Hoon Kim
    A Vulnerability Assessment Tool Based on OVAL in System Block Model. [Citation Graph (0, 0)][DBLP]
    ICIC (1), 2006, pp:1115-1120 [Conf]
  13. Yangsun Lee, HeauJo Kang, Malrey Lee, Tai-Hoon Kim
    A Study on the Effect of Interference on Time Hopping Binary PPM Impulse Radio System. [Citation Graph (0, 0)][DBLP]
    ICIC (2), 2005, pp:665-674 [Conf]
  14. Mingyun Kang, Minseong Ju, Tai-Hoon Kim, Geuk Lee, Kyung Sung
    A Study on the Improvement of Military Logistics System Using RFID. [Citation Graph (0, 0)][DBLP]
    ICIC (1), 2006, pp:1098-1102 [Conf]
  15. In-hye Seo, Heau-Jo Kang, Tai-Hoon Kim
    Performance Analysis of Adaptive Digital FPU Transmission System in Fading Environment. [Citation Graph (0, 0)][DBLP]
    ICIC (1), 2006, pp:1062-1071 [Conf]
  16. Sang-ho Kim, Eun-ser Kim, Choon Seong Leem, Ho-jun Shin, Tai-Hoon Kim
    SSE-CMM BPs to Meet the Requirements of ALC_DVS.1 Component in CC. [Citation Graph (0, 0)][DBLP]
    ISCIS, 2003, pp:1069-1075 [Conf]
  17. Sang-ho Kim, Choon Seong Leem, Tai-Hoon Kim, Jae-Sung Kim
    Supplement of Security-Related Parts of ISO/IEC TR 15504. [Citation Graph (0, 0)][DBLP]
    ISCIS, 2003, pp:1084-1089 [Conf]
  18. Tai-Hoon Kim
    Security Requirements for Ubiquitous Software Development Site. [Citation Graph (0, 0)][DBLP]
    KES (2), 2006, pp:836-843 [Conf]
  19. Tai-Hoon Kim, Myong-chul Shin, Sang-ho Kim, Jae Sang Cha
    Security Requirements for Software Development. [Citation Graph (0, 0)][DBLP]
    KES, 2004, pp:116-122 [Conf]
  20. Tai-Hoon Kim, Sun-myoung Hwang
    Intelligent Method for Building Security Countermeasures. [Citation Graph (0, 0)][DBLP]
    KES (2), 2006, pp:745-750 [Conf]
  21. Tai-Hoon Kim, Seung-youn Lee
    Intelligent Method for Building Security Countermeasures by Applying Dr. T.H. Kim's Block Model. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:1069-1075 [Conf]
  22. Tai-Hoon Kim, Seung-youn Lee
    A Relationship Between Products Evaluation and IT Systems Assurance. [Citation Graph (0, 0)][DBLP]
    KES (1), 2005, pp:1125-1130 [Conf]
  23. Eun-ser Lee, Tai-Hoon Kim
    Development Site Security Process of ISO/IEC TR 15504. [Citation Graph (0, 0)][DBLP]
    KES, 2004, pp:60-66 [Conf]
  24. Geuk Lee, Seoksoo Kim, Tai-Hoon Kim, Min Wook Kil
    Convergence Rate in Intelligent Self-organizing Feature Map Using Dynamic Gaussian Function. [Citation Graph (0, 0)][DBLP]
    KES (2), 2006, pp:701-708 [Conf]
  25. Tai-Hoon Kim, Ho-yeol Kwon
    Applying Security Engineering to Build Security Countermeasures: An Introduction. [Citation Graph (0, 0)][DBLP]
    PARA, 2004, pp:957-963 [Conf]
  26. Seung-youn Lee, Myong-chul Shin, Jae Sang Cha, Tai-Hoon Kim
    Threat Description for Developing Security Countermeasure. [Citation Graph (0, 0)][DBLP]
    PCM (1), 2004, pp:548-555 [Conf]
  27. Tai-Hoon Kim, Chang-hwa Hong, Myoung-sub Kim
    Towards New Areas of Security Engineering. [Citation Graph (0, 0)][DBLP]
    RSFDGrC (2), 2005, pp:568-574 [Conf]
  28. Haeng-Kon Kim, Tai-Hoon Kim, Jae-Sung Kim
    Reliability Assurance in Development Process for TOE on the Common Criteria. [Citation Graph (0, 0)][DBLP]
    SERA, 2003, pp:364-375 [Conf]
  29. Haeng-Kon Kim, Tai-Hoon Kim, Jae-Sung Kim
    ECSSL Protocol Based on 3B Algorithm. [Citation Graph (0, 0)][DBLP]
    SNPD, 2003, pp:166-169 [Conf]
  30. Tai-Hoon Kim, Jae-Sung Kim, Eun-Kyoung Yi, Haeng-Kon Kim
    A Study on the Relationship of Assurance Requirements between K Level of KISEC and EAL Level of CC. [Citation Graph (0, 0)][DBLP]
    SNPD, 2003, pp:170-176 [Conf]
  31. Jae-Dong Shin, Sang Soo Yeo, Tai-Hoon Kim, Sung Kwon Kim
    Hybrid Tag Anti-collision Algorithms in RFID Systems. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (4), 2007, pp:693-700 [Conf]
  32. Minseong Ju, Seoksoo Kim, Tai-Hoon Kim
    A Study on Digital Media Security by Hopfield Neural Network. [Citation Graph (0, 0)][DBLP]
    ISNN (3), 2007, pp:140-146 [Conf]
  33. Tai-Hoon Kim, Kouich Sakurai, Sun-Myung Hwang
    Induction and Implementation of Security Requirements in Each System Block. [Citation Graph (0, 0)][DBLP]
    MMM (2), 2007, pp:694-701 [Conf]

  34. Discrete Fourier Transformation based Image Authentication technique. [Citation Graph (, )][DBLP]


  35. Attack-Resilient Random Key Distribution Scheme for Distributed Sensor Networks. [Citation Graph (, )][DBLP]


  36. USABAGILE_Web: A Web Agile Usability Approach for Web Site Design. [Citation Graph (, )][DBLP]


  37. Channel assignment and scheduling in multichannel wireless sensor networks. [Citation Graph (, )][DBLP]


  38. A Formal Framework for Expressing Trust Negotiation in the Ubiquitous Computing Environment. [Citation Graph (, )][DBLP]


  39. Perceptually Adaptive Lagrange Multiplier for Rate-Distortion Optimization in H.264. [Citation Graph (, )][DBLP]


  40. A Survey of System Software for Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  41. Integrating Attribute and Status Constraint into the RBAC Model for Access Control in Ubiquitous Systems. [Citation Graph (, )][DBLP]


  42. A Novel Approach for Infrastructure Deployment for VANET. [Citation Graph (, )][DBLP]


  43. A Prioritized Service Protocol for Vehicular Communication. [Citation Graph (, )][DBLP]


  44. An Approach on Adaptive Time-Delay Estimate and Compensation Control in Internet-Based Control Systems. [Citation Graph (, )][DBLP]


  45. Towards Automated Traffic System Using Vehicular Network with Directional Antenna. [Citation Graph (, )][DBLP]


  46. Agent Based Approach to Regression Testing. [Citation Graph (, )][DBLP]


  47. Directed Graph Pattern Synthesis in LSB Technique on Video Steganography. [Citation Graph (, )][DBLP]


  48. Effective GIS Mobile Query System. [Citation Graph (, )][DBLP]


  49. Flexible Key Distribution for SCADA Network using Multi-Agent System. [Citation Graph (, )][DBLP]


  50. Block Model Application for Decision Support Systems. [Citation Graph (, )][DBLP]


  51. Research on Critical Infrastructures and Critical Information Infrastructures. [Citation Graph (, )][DBLP]


  52. Crossed Crypto-Scheme in WPA PSK Mode. [Citation Graph (, )][DBLP]


  53. Home Network Device Authentication: Device Authentication Framework and Device Certificate Profile. [Citation Graph (, )][DBLP]


  54. A Simulation Model Supporting Time and Non-time Metrics for Web Service Composition. [Citation Graph (, )][DBLP]


  55. SH-CRBAC: Integrating Attribute and Status Constraints into the RBAC Model in Smart Home Systems. [Citation Graph (, )][DBLP]


  56. Predictive handoff mechanism with real-time mobility tracking in a campus wide wireless network considering ITS. [Citation Graph (, )][DBLP]


Search in 0.712secs, Finished in 0.715secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002