|
Search the dblp DataBase
Jae-Kwang Lee:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Dhinaharan Nagamalai, Beatrice Cynthia Dhinakaran, P. Sasikala, Seoung-Hyeon Lee, Jae-Kwang Lee
Security Threats and Countermeasures in WLAN. [Citation Graph (0, 0)][DBLP] AINTEC, 2005, pp:168-182 [Conf]
- Won Goo Lee, Byungsun Choi, Seoung-Hyeon Lee, Jae-Kwang Lee
Fulltext-Image Watermarking Using Improved DWT and HVS Based on JPEG Compression. [Citation Graph (0, 0)][DBLP] AWIC, 2005, pp:254-259 [Conf]
- Bonghan Kim, Han-Jin Cho, Jae-Kwang Lee
Efficient Key Distribution Protocol for Secure Multicast Communication. [Citation Graph (0, 0)][DBLP] ICCSA (1), 2004, pp:1007-1016 [Conf]
- Seoung-Hyeon Lee, Byung-Sun Choi, Jae-Seung Lee, Ki-Young Moon, Jae-Kwang Lee
VO Authentication Framework in Grid Environment Using Digital Signature. [Citation Graph (0, 0)][DBLP] ICCSA (2), 2006, pp:945-953 [Conf]
- Won Goo Lee, Jae-Kwang Lee
Applied Research of Active Network to Control Network Traffic in Virtual Battlefield. [Citation Graph (0, 0)][DBLP] ICCSA (1), 2004, pp:254-261 [Conf]
- Dhinaharan Nagamalai, Beatrice Cynthia Dhinakaran, Byoung-Sun Choi, Jae-Kwang Lee
V-TCP: A Novel TCP Enhancement Technique. [Citation Graph (0, 0)][DBLP] ICN (2), 2005, pp:125-132 [Conf]
- Dhinaharan Nagamalai, Seoung-Hyeon Lee, Won Goo Lee, Jae-Kwang Lee
SCTP over High Speed Wide Area Networks. [Citation Graph (0, 0)][DBLP] ICN (1), 2005, pp:628-634 [Conf]
- Dhinaharan Nagamalai, Dong-ho Kang, Ki-Young Moon, Jae-Kwang Lee
V-TCP: A Novel TCP Enhancement Technique for Wireless Mobile Environments. [Citation Graph (0, 0)][DBLP] ICOIN, 2005, pp:122-131 [Conf]
- Jae-Woo Kim, Han-Jin Cho, Il-Sun Hwang, Sung-Yul Park, Jae-Kwang Lee
Analysis of Public Key Infrastructure Systems for Authentication. [Citation Graph (0, 0)][DBLP] PDPTA, 1999, pp:187-192 [Conf]
- Jeom Goo Kim, Young-Cheol Lee, Jae-Kwang Lee
An Implementation of Vulnerability Evaluation System for Network Security on CC. [Citation Graph (0, 0)][DBLP] PDPTA, 2000, pp:- [Conf]
- Dhinaharan Nagamalai, Beatrice Cynthia Dhinakaran, Jae-Kwang Lee
Multi Layer Approach to Defend DDoS Attacks Caused by Spam. [Citation Graph (0, 0)][DBLP] MUE, 2007, pp:97-102 [Conf]
Study on IP Traceback System for DDoS. [Citation Graph (, )][DBLP]
An Empirical Study of Spam and Spam Vulnerable email Accounts. [Citation Graph (, )][DBLP]
A Study on the Efficient Mutual Authentication Mechanism Using the Agent Server. [Citation Graph (, )][DBLP]
The Traceback Method about DoS Attack in Open Grid Computing Environment. [Citation Graph (, )][DBLP]
Bayesian Approach Based Comment Spam Defending Tool. [Citation Graph (, )][DBLP]
A Study of Defense DDoS Attacks Using IP Traceback. [Citation Graph (, )][DBLP]
A Security Framework for Secure Home Networking in Ubiquitous Computing. [Citation Graph (, )][DBLP]
"Reminder: please update your details": Phishing Trends. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.002secs
|