The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Jae-Kwang Lee: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Dhinaharan Nagamalai, Beatrice Cynthia Dhinakaran, P. Sasikala, Seoung-Hyeon Lee, Jae-Kwang Lee
    Security Threats and Countermeasures in WLAN. [Citation Graph (0, 0)][DBLP]
    AINTEC, 2005, pp:168-182 [Conf]
  2. Won Goo Lee, Byungsun Choi, Seoung-Hyeon Lee, Jae-Kwang Lee
    Fulltext-Image Watermarking Using Improved DWT and HVS Based on JPEG Compression. [Citation Graph (0, 0)][DBLP]
    AWIC, 2005, pp:254-259 [Conf]
  3. Bonghan Kim, Han-Jin Cho, Jae-Kwang Lee
    Efficient Key Distribution Protocol for Secure Multicast Communication. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:1007-1016 [Conf]
  4. Seoung-Hyeon Lee, Byung-Sun Choi, Jae-Seung Lee, Ki-Young Moon, Jae-Kwang Lee
    VO Authentication Framework in Grid Environment Using Digital Signature. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2006, pp:945-953 [Conf]
  5. Won Goo Lee, Jae-Kwang Lee
    Applied Research of Active Network to Control Network Traffic in Virtual Battlefield. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:254-261 [Conf]
  6. Dhinaharan Nagamalai, Beatrice Cynthia Dhinakaran, Byoung-Sun Choi, Jae-Kwang Lee
    V-TCP: A Novel TCP Enhancement Technique. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:125-132 [Conf]
  7. Dhinaharan Nagamalai, Seoung-Hyeon Lee, Won Goo Lee, Jae-Kwang Lee
    SCTP over High Speed Wide Area Networks. [Citation Graph (0, 0)][DBLP]
    ICN (1), 2005, pp:628-634 [Conf]
  8. Dhinaharan Nagamalai, Dong-ho Kang, Ki-Young Moon, Jae-Kwang Lee
    V-TCP: A Novel TCP Enhancement Technique for Wireless Mobile Environments. [Citation Graph (0, 0)][DBLP]
    ICOIN, 2005, pp:122-131 [Conf]
  9. Jae-Woo Kim, Han-Jin Cho, Il-Sun Hwang, Sung-Yul Park, Jae-Kwang Lee
    Analysis of Public Key Infrastructure Systems for Authentication. [Citation Graph (0, 0)][DBLP]
    PDPTA, 1999, pp:187-192 [Conf]
  10. Jeom Goo Kim, Young-Cheol Lee, Jae-Kwang Lee
    An Implementation of Vulnerability Evaluation System for Network Security on CC. [Citation Graph (0, 0)][DBLP]
    PDPTA, 2000, pp:- [Conf]
  11. Dhinaharan Nagamalai, Beatrice Cynthia Dhinakaran, Jae-Kwang Lee
    Multi Layer Approach to Defend DDoS Attacks Caused by Spam. [Citation Graph (0, 0)][DBLP]
    MUE, 2007, pp:97-102 [Conf]

  12. Study on IP Traceback System for DDoS. [Citation Graph (, )][DBLP]


  13. An Empirical Study of Spam and Spam Vulnerable email Accounts. [Citation Graph (, )][DBLP]


  14. A Study on the Efficient Mutual Authentication Mechanism Using the Agent Server. [Citation Graph (, )][DBLP]


  15. The Traceback Method about DoS Attack in Open Grid Computing Environment. [Citation Graph (, )][DBLP]


  16. Bayesian Approach Based Comment Spam Defending Tool. [Citation Graph (, )][DBLP]


  17. A Study of Defense DDoS Attacks Using IP Traceback. [Citation Graph (, )][DBLP]


  18. A Security Framework for Secure Home Networking in Ubiquitous Computing. [Citation Graph (, )][DBLP]


  19. "Reminder: please update your details": Phishing Trends. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002