The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Yong Ho Kim: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Yong Ho Kim, Mu Hyun Kim, Dong Hoon Lee, Changwook Kim
    A Key Management Scheme for Commodity Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ADHOC-NOW, 2005, pp:113-126 [Conf]
  2. Seung Sik Choi, Yong Ho Kim, Jong Seog Koh, Dong-Ho Cho
    Packet Fair Queueing Scheduling in an Integrated CDMA System Based on Channel Status Information. [Citation Graph (0, 0)][DBLP]
    CDMA International Conference, 2002, pp:275-284 [Conf]
  3. Yong Ho Kim, Hwaseong Lee, Dong Hoon Lee, Jongin Lim
    A Key Management Scheme for Large Scale Distributed Sensor Networks. [Citation Graph (0, 0)][DBLP]
    PWC, 2006, pp:437-446 [Conf]
  4. Hyeong-gyun Kim, Yong Ho Kim, Jong-Geun Jeong
    Matching Algorithm for Hangul Recognition Based on PDA. [Citation Graph (0, 0)][DBLP]
    IWANN, 2005, pp:889-898 [Conf]
  5. Minsik Park, Yong Ho Kim, Jin Soo Choi, Jin Woo Hong
    Data Broadcast Metadata Based on PMCP for Open Interface to a DTV Data Server. [Citation Graph (0, 0)][DBLP]
    PCM (1), 2005, pp:234-245 [Conf]
  6. Sang Chul Ahn, Yong Ho Kim, Wook Hyun Kwon
    A fuzzy generalized predictive control using affine fuzzy predictors for nonlinear systems. [Citation Graph (0, 0)][DBLP]
    Journal of Intelligent and Fuzzy Systems, 1998, v:6, n:2, pp:185-207 [Journal]
  7. Hwaseong Lee, Yong Ho Kim, Dong Hoon Lee, Jongin Lim
    Classification of Key Management Schemes for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    APWeb/WAIM Workshops, 2007, pp:664-673 [Conf]
  8. Yong Ho Kim, Hwaseong Lee, Jong Hyuk Park, Laurence Tianruo Yang, Dong Hoon Lee
    Key Establishment Scheme for Sensor Networks with Low Communication Cost. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:441-448 [Conf]
  9. Joon Wan Kim, Yong Ho Kim, Hwaseong Lee, Dong Hoon Lee
    A Practical Inter-sensor Broadcast Authentication Scheme. [Citation Graph (0, 0)][DBLP]
    HCI (5), 2007, pp:399-405 [Conf]

  10. Security Enhancing Compiler for Localization Schemes in Pervasive Sensor Networks. [Citation Graph (, )][DBLP]


  11. Le salon de récurrence. [Citation Graph (, )][DBLP]


  12. Bogus Data Filtering in Sensor Networks. [Citation Graph (, )][DBLP]


  13. A Key Distribution Scheme for Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  14. A NETwork COding based Multicasting (NETCOM) over IEEE 802.11 Multi-hop. [Citation Graph (, )][DBLP]


  15. An Efficient Key Establishment Scheme for Self-organizing Sensor Networks. [Citation Graph (, )][DBLP]


  16. An authentication scheme for filtering injected bogus data in sensor networks. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002