|
Search the dblp DataBase
Souhwan Jung:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Dong-Guk Han, Katsuyuki Okeya, Tae-Hyun Kim, Yoon Sung Hwang, Young-Ho Park, Souhwan Jung
Cryptanalysis of the Countermeasures Using Randomized Binary Signed Digits. [Citation Graph (0, 0)][DBLP] ACNS, 2004, pp:398-413 [Conf]
- Seung Wook Jung, Souhwan Jung
Forward Secure Password-Enabled PKI with Instant Revocation. [Citation Graph (0, 0)][DBLP] EuroPKI, 2006, pp:54-67 [Conf]
- Kihun Hong, Souhwan Jung
An Efficient Authentication Scheme Using Recovery Information in Signature. [Citation Graph (0, 0)][DBLP] ICICS, 2004, pp:520-531 [Conf]
- Souhwan Jung, Fan Zhao, Shyhtsun Felix Wu, HyunGon Kim
Threat Analysis on NEtwork MObility (NEMO). [Citation Graph (0, 0)][DBLP] ICICS, 2004, pp:331-342 [Conf]
- Souhwan Jung, Jaeduck Choi, Younghan Kim, Sungi Kim
IPSec Support in NAT-PT Scenario for IPv6 Transition. [Citation Graph (0, 0)][DBLP] ISC, 2005, pp:194-202 [Conf]
- Namhi Kang, Seongil Yoo, Younghan Kim, Souhwan Jung, Kihun Hong
Heterogeneous Routing Protocol Coordinator for Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP] UCS, 2006, pp:384-397 [Conf]
- Kihun Hong, Souhwan Jung, Luigi Lo Iacono, Christoph Ruland
Impacts of Security Protocols on Real-Time Multimedia Communications. [Citation Graph (0, 0)][DBLP] WISA, 2004, pp:1-13 [Conf]
- Kihun Hong, Souhwan Jung, Shyhtsun Felix Wu
A Hash-Chain Based Authentication Scheme for Fast Handover in Wireless Network. [Citation Graph (0, 0)][DBLP] WISA, 2005, pp:96-107 [Conf]
- Ki Yong Lee, Souhwan Jung, JaeYeol Rheem
Smoothing approach using forward-backward Kalman filter with Markov switching parameters for speech enhancement. [Citation Graph (0, 0)][DBLP] Signal Processing, 2000, v:80, n:12, pp:2579-2588 [Journal]
- Seung Wook Jung, Souhwan Jung
Secure Password Authentication for Distributed Computing. [Citation Graph (0, 0)][DBLP] CIS, 2006, pp:491-501 [Conf]
A Fast and Efficient Handover Authentication Achieving Conditional Privacy in V2I Networks. [Citation Graph (, )][DBLP]
Link Stability-Aware Ad Hoc Routing Protocol with Multiple Sampling Rates. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.002secs
|