|
Search the dblp DataBase
Tai-Hoon Kim:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Tai-Hoon Kim, Byung-Gyu No, Dong Chun Lee
Threat Description for the PP by Using the Concept of the Assets Protected by TOE. [Citation Graph (0, 0)][DBLP] International Conference on Computational Science, 2003, pp:605-614 [Conf]
- Jae Sang Cha, Kyungsup Kwak, Sang-Yule Choi, Tai-Hoon Kim, Chang Dae Yoon, Chong Hyun Lee
Interference-Free ZCD-UWB for Wireless Home Network Applications. [Citation Graph (0, 0)][DBLP] ICCSA (2), 2005, pp:429-441 [Conf]
- Sang-Yule Choi, Myong-chul Shin, Nam-Young Hur, Jong-Boo Kim, Tai-Hoon Kim, Jae Sang Cha
Distribution Data Security System Based on Web Based Active Database. [Citation Graph (0, 0)][DBLP] ICCSA (2), 2005, pp:341-352 [Conf]
- Sang-Yule Choi, Myong-chul Shin, Nam-Young Hur, Jong-Boo Kim, Tai-Hoon Kim, Jae Sang Cha
Distribution Data Security System Based on Web Based Active Database. [Citation Graph (0, 0)][DBLP] ICCSA (4), 2005, pp:1319-1330 [Conf]
- Haeng-Kon Kim, Tai-Hoon Kim
Design on Mobile Secure Electronic Transaction Protocol with Component Based Development. [Citation Graph (0, 0)][DBLP] ICCSA (1), 2004, pp:461-470 [Conf]
- Tai-Hoon Kim, Haeng-Kon Kim
A Relationship between Security Engineering and Security Evaluation. [Citation Graph (0, 0)][DBLP] ICCSA (4), 2004, pp:717-724 [Conf]
- Tai-Hoon Kim, Seoksoo Kim, Hee-Un Park, Myoung-sub Kim
Analysis of Security Session Reusing in Distribution Server System. [Citation Graph (0, 0)][DBLP] ICCSA (5), 2006, pp:700-707 [Conf]
- Tai-Hoon Kim, Dong Chun Lee
Reduction Method of Threat Phrases by Classifying Assets. [Citation Graph (0, 0)][DBLP] ICCSA (1), 2004, pp:1052-1059 [Conf]
- Tai-Hoon Kim, Seung-youn Lee
Design Procedure of IT Systems Security Countermeasures. [Citation Graph (0, 0)][DBLP] ICCSA (2), 2005, pp:468-473 [Conf]
- Tai-Hoon Kim, Seung-youn Lee
Security Evaluation Targets for Enhancement of IT Systems Assurance. [Citation Graph (0, 0)][DBLP] ICCSA (2), 2005, pp:491-498 [Conf]
- Eun-ser Lee, Kyung-Whan Lee, Tai-Hoon Kim, Il-Hong Jung
Introduction and Evaluation of Development System Security Process of ISO/IEC TR 15504. [Citation Graph (0, 0)][DBLP] ICCSA (1), 2004, pp:451-460 [Conf]
- Geuk Lee, Il Seok Ko, Tai-Hoon Kim
A Vulnerability Assessment Tool Based on OVAL in System Block Model. [Citation Graph (0, 0)][DBLP] ICIC (1), 2006, pp:1115-1120 [Conf]
- Yangsun Lee, HeauJo Kang, Malrey Lee, Tai-Hoon Kim
A Study on the Effect of Interference on Time Hopping Binary PPM Impulse Radio System. [Citation Graph (0, 0)][DBLP] ICIC (2), 2005, pp:665-674 [Conf]
- Mingyun Kang, Minseong Ju, Tai-Hoon Kim, Geuk Lee, Kyung Sung
A Study on the Improvement of Military Logistics System Using RFID. [Citation Graph (0, 0)][DBLP] ICIC (1), 2006, pp:1098-1102 [Conf]
- In-hye Seo, Heau-Jo Kang, Tai-Hoon Kim
Performance Analysis of Adaptive Digital FPU Transmission System in Fading Environment. [Citation Graph (0, 0)][DBLP] ICIC (1), 2006, pp:1062-1071 [Conf]
- Sang-ho Kim, Eun-ser Kim, Choon Seong Leem, Ho-jun Shin, Tai-Hoon Kim
SSE-CMM BPs to Meet the Requirements of ALC_DVS.1 Component in CC. [Citation Graph (0, 0)][DBLP] ISCIS, 2003, pp:1069-1075 [Conf]
- Sang-ho Kim, Choon Seong Leem, Tai-Hoon Kim, Jae-Sung Kim
Supplement of Security-Related Parts of ISO/IEC TR 15504. [Citation Graph (0, 0)][DBLP] ISCIS, 2003, pp:1084-1089 [Conf]
- Tai-Hoon Kim
Security Requirements for Ubiquitous Software Development Site. [Citation Graph (0, 0)][DBLP] KES (2), 2006, pp:836-843 [Conf]
- Tai-Hoon Kim, Myong-chul Shin, Sang-ho Kim, Jae Sang Cha
Security Requirements for Software Development. [Citation Graph (0, 0)][DBLP] KES, 2004, pp:116-122 [Conf]
- Tai-Hoon Kim, Sun-myoung Hwang
Intelligent Method for Building Security Countermeasures. [Citation Graph (0, 0)][DBLP] KES (2), 2006, pp:745-750 [Conf]
- Tai-Hoon Kim, Seung-youn Lee
Intelligent Method for Building Security Countermeasures by Applying Dr. T.H. Kim's Block Model. [Citation Graph (0, 0)][DBLP] KES (2), 2005, pp:1069-1075 [Conf]
- Tai-Hoon Kim, Seung-youn Lee
A Relationship Between Products Evaluation and IT Systems Assurance. [Citation Graph (0, 0)][DBLP] KES (1), 2005, pp:1125-1130 [Conf]
- Eun-ser Lee, Tai-Hoon Kim
Development Site Security Process of ISO/IEC TR 15504. [Citation Graph (0, 0)][DBLP] KES, 2004, pp:60-66 [Conf]
- Geuk Lee, Seoksoo Kim, Tai-Hoon Kim, Min Wook Kil
Convergence Rate in Intelligent Self-organizing Feature Map Using Dynamic Gaussian Function. [Citation Graph (0, 0)][DBLP] KES (2), 2006, pp:701-708 [Conf]
- Tai-Hoon Kim, Ho-yeol Kwon
Applying Security Engineering to Build Security Countermeasures: An Introduction. [Citation Graph (0, 0)][DBLP] PARA, 2004, pp:957-963 [Conf]
- Seung-youn Lee, Myong-chul Shin, Jae Sang Cha, Tai-Hoon Kim
Threat Description for Developing Security Countermeasure. [Citation Graph (0, 0)][DBLP] PCM (1), 2004, pp:548-555 [Conf]
- Tai-Hoon Kim, Chang-hwa Hong, Myoung-sub Kim
Towards New Areas of Security Engineering. [Citation Graph (0, 0)][DBLP] RSFDGrC (2), 2005, pp:568-574 [Conf]
- Haeng-Kon Kim, Tai-Hoon Kim, Jae-Sung Kim
Reliability Assurance in Development Process for TOE on the Common Criteria. [Citation Graph (0, 0)][DBLP] SERA, 2003, pp:364-375 [Conf]
- Haeng-Kon Kim, Tai-Hoon Kim, Jae-Sung Kim
ECSSL Protocol Based on 3B Algorithm. [Citation Graph (0, 0)][DBLP] SNPD, 2003, pp:166-169 [Conf]
- Tai-Hoon Kim, Jae-Sung Kim, Eun-Kyoung Yi, Haeng-Kon Kim
A Study on the Relationship of Assurance Requirements between K Level of KISEC and EAL Level of CC. [Citation Graph (0, 0)][DBLP] SNPD, 2003, pp:170-176 [Conf]
- Jae-Dong Shin, Sang Soo Yeo, Tai-Hoon Kim, Sung Kwon Kim
Hybrid Tag Anti-collision Algorithms in RFID Systems. [Citation Graph (0, 0)][DBLP] International Conference on Computational Science (4), 2007, pp:693-700 [Conf]
- Minseong Ju, Seoksoo Kim, Tai-Hoon Kim
A Study on Digital Media Security by Hopfield Neural Network. [Citation Graph (0, 0)][DBLP] ISNN (3), 2007, pp:140-146 [Conf]
- Tai-Hoon Kim, Kouich Sakurai, Sun-Myung Hwang
Induction and Implementation of Security Requirements in Each System Block. [Citation Graph (0, 0)][DBLP] MMM (2), 2007, pp:694-701 [Conf]
Discrete Fourier Transformation based Image Authentication technique. [Citation Graph (, )][DBLP]
Attack-Resilient Random Key Distribution Scheme for Distributed Sensor Networks. [Citation Graph (, )][DBLP]
USABAGILE_Web: A Web Agile Usability Approach for Web Site Design. [Citation Graph (, )][DBLP]
Channel assignment and scheduling in multichannel wireless sensor networks. [Citation Graph (, )][DBLP]
A Formal Framework for Expressing Trust Negotiation in the Ubiquitous Computing Environment. [Citation Graph (, )][DBLP]
Perceptually Adaptive Lagrange Multiplier for Rate-Distortion Optimization in H.264. [Citation Graph (, )][DBLP]
A Survey of System Software for Wireless Sensor Networks. [Citation Graph (, )][DBLP]
Integrating Attribute and Status Constraint into the RBAC Model for Access Control in Ubiquitous Systems. [Citation Graph (, )][DBLP]
A Novel Approach for Infrastructure Deployment for VANET. [Citation Graph (, )][DBLP]
A Prioritized Service Protocol for Vehicular Communication. [Citation Graph (, )][DBLP]
An Approach on Adaptive Time-Delay Estimate and Compensation Control in Internet-Based Control Systems. [Citation Graph (, )][DBLP]
Towards Automated Traffic System Using Vehicular Network with Directional Antenna. [Citation Graph (, )][DBLP]
Agent Based Approach to Regression Testing. [Citation Graph (, )][DBLP]
Directed Graph Pattern Synthesis in LSB Technique on Video Steganography. [Citation Graph (, )][DBLP]
Effective GIS Mobile Query System. [Citation Graph (, )][DBLP]
Flexible Key Distribution for SCADA Network using Multi-Agent System. [Citation Graph (, )][DBLP]
Block Model Application for Decision Support Systems. [Citation Graph (, )][DBLP]
Research on Critical Infrastructures and Critical Information Infrastructures. [Citation Graph (, )][DBLP]
Crossed Crypto-Scheme in WPA PSK Mode. [Citation Graph (, )][DBLP]
Home Network Device Authentication: Device Authentication Framework and Device Certificate Profile. [Citation Graph (, )][DBLP]
A Simulation Model Supporting Time and Non-time Metrics for Web Service Composition. [Citation Graph (, )][DBLP]
SH-CRBAC: Integrating Attribute and Status Constraints into the RBAC Model in Smart Home Systems. [Citation Graph (, )][DBLP]
Predictive handoff mechanism with real-time mobility tracking in a campus wide wireless network considering ITS. [Citation Graph (, )][DBLP]
Search in 0.003secs, Finished in 0.154secs
|