The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Souhwan Jung: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Dong-Guk Han, Katsuyuki Okeya, Tae-Hyun Kim, Yoon Sung Hwang, Young-Ho Park, Souhwan Jung
    Cryptanalysis of the Countermeasures Using Randomized Binary Signed Digits. [Citation Graph (0, 0)][DBLP]
    ACNS, 2004, pp:398-413 [Conf]
  2. Seung Wook Jung, Souhwan Jung
    Forward Secure Password-Enabled PKI with Instant Revocation. [Citation Graph (0, 0)][DBLP]
    EuroPKI, 2006, pp:54-67 [Conf]
  3. Kihun Hong, Souhwan Jung
    An Efficient Authentication Scheme Using Recovery Information in Signature. [Citation Graph (0, 0)][DBLP]
    ICICS, 2004, pp:520-531 [Conf]
  4. Souhwan Jung, Fan Zhao, Shyhtsun Felix Wu, HyunGon Kim
    Threat Analysis on NEtwork MObility (NEMO). [Citation Graph (0, 0)][DBLP]
    ICICS, 2004, pp:331-342 [Conf]
  5. Souhwan Jung, Jaeduck Choi, Younghan Kim, Sungi Kim
    IPSec Support in NAT-PT Scenario for IPv6 Transition. [Citation Graph (0, 0)][DBLP]
    ISC, 2005, pp:194-202 [Conf]
  6. Namhi Kang, Seongil Yoo, Younghan Kim, Souhwan Jung, Kihun Hong
    Heterogeneous Routing Protocol Coordinator for Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    UCS, 2006, pp:384-397 [Conf]
  7. Kihun Hong, Souhwan Jung, Luigi Lo Iacono, Christoph Ruland
    Impacts of Security Protocols on Real-Time Multimedia Communications. [Citation Graph (0, 0)][DBLP]
    WISA, 2004, pp:1-13 [Conf]
  8. Kihun Hong, Souhwan Jung, Shyhtsun Felix Wu
    A Hash-Chain Based Authentication Scheme for Fast Handover in Wireless Network. [Citation Graph (0, 0)][DBLP]
    WISA, 2005, pp:96-107 [Conf]
  9. Ki Yong Lee, Souhwan Jung, JaeYeol Rheem
    Smoothing approach using forward-backward Kalman filter with Markov switching parameters for speech enhancement. [Citation Graph (0, 0)][DBLP]
    Signal Processing, 2000, v:80, n:12, pp:2579-2588 [Journal]
  10. Seung Wook Jung, Souhwan Jung
    Secure Password Authentication for Distributed Computing. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:491-501 [Conf]

  11. A Fast and Efficient Handover Authentication Achieving Conditional Privacy in V2I Networks. [Citation Graph (, )][DBLP]


  12. Link Stability-Aware Ad Hoc Routing Protocol with Multiple Sampling Rates. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002