|
Search the dblp DataBase
Sangjoon Park:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Sangjoon Park, Kwanjoong Kim
DEVS Formalism: A Hierarchical Generation Scheme. [Citation Graph (0, 0)][DBLP] AIS, 2004, pp:253-261 [Conf]
- Sangjin Lee, Seongtaek Chee, Sangjoon Park, Sung-Mo Park
Conditional Correlation Attack on Nonlinear Filter Generators. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 1996, pp:360-367 [Conf]
- Jaechul Sung, Sangjin Lee, Jong In Lim, Seokhie Hong, Sangjoon Park
Provable Security for the Skipjack-like Structure against Differential Cryptanalysis and Linear Cryptanalysis. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 2000, pp:274-288 [Conf]
- Sangjoon Park, Sangjin Lee, Seung-Cheol Goh
On the Security of the Gollmann Cascades. [Citation Graph (0, 0)][DBLP] CRYPTO, 1995, pp:148-156 [Conf]
- Sangjoon Park, Junghyun Nam, Seungjoo Kim, Dongho Won
Efficient Password-Authenticated Key Exchange Based on RSA. [Citation Graph (0, 0)][DBLP] CT-RSA, 2007, pp:309-323 [Conf]
- Sangjoon Park, Sok-Pal Cho, Byunggi Kim
A Grid Routing Scheme Considering Node Lifetime in Ubiquitous Sensor Networks. [Citation Graph (0, 0)][DBLP] EUC Workshops, 2006, pp:1021-1030 [Conf]
- Wongil Park, Sangjoon Park, Yoonchul Jang, Kwanjoong Kim, Byunggi Kim
Enhancing Connectivity Based on the Thresholds in Mobile Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP] HPCC, 2005, pp:340-347 [Conf]
- Sangjoon Park, In-Sook Cho, Byunggi Kim
An Evolution Process Model for the Internet Topology. [Citation Graph (0, 0)][DBLP] International Conference on Computational Science (3), 2006, pp:1040-1047 [Conf]
- Eunjoo Jeong, Sangjoon Park, Hyewon K. Lee, Kwan-Joong Kim, Youngsong Mun, Byunggi Kim
A Handover Scheme Based on HMIPv6 for B3G Networks. [Citation Graph (0, 0)][DBLP] ICCSA (1), 2005, pp:118-126 [Conf]
- Sangjoon Park, Eunjoo Jeong, Byunggi Kim
Reducing Link Loss in Ad Hoc Networks. [Citation Graph (0, 0)][DBLP] ICCSA (1), 2004, pp:418-425 [Conf]
- Sangjoon Park, Youngchul Kim, Hyungbin Bang, Kwanjoong Kim, Youngsong Mun, Byunggi Kim
A Resource Balancing Scheme in Heterogeneous Mobile Networks. [Citation Graph (0, 0)][DBLP] ICCSA (2), 2006, pp:319-329 [Conf]
- Sangjoon Park, Youngchul Kim, Jongmyung Choi, Jongchan Lee, Kwanjoong Kim, Byunggi Kim
A Dynamic QoS Management Scheme in B3G Networks. [Citation Graph (0, 0)][DBLP] ICCSA (2), 2006, pp:1033-1042 [Conf]
- Sangjoon Park, Youngchul Kim, Jongchan Lee
An Internetworking Scheme for UMTS/WLAN Mobile Networks. [Citation Graph (0, 0)][DBLP] ICCSA (1), 2005, pp:107-117 [Conf]
- Seungjoo Kim, Sangjoon Park, Dongho Won
Proxy signatures, Revisited. [Citation Graph (0, 0)][DBLP] ICICS, 1997, pp:223-232 [Conf]
- Sangjoon Park, Sangwoo Park, Kwangjo Kim, Dongho Won
Two efficient RSA multisignature schemes. [Citation Graph (0, 0)][DBLP] ICICS, 1997, pp:217-222 [Conf]
- Kwangjo Kim, Sangjoon Park, Joonsang Baek
Improving Fairness and Privacy of Zhou-Gollmann's Fair Non-Repudiation Protocol. [Citation Graph (0, 0)][DBLP] ICPP Workshops, 1999, pp:140-145 [Conf]
- Seungjoo Kim, Sangjoon Park, Dongho Won
Group Signatures for Hierarchical Multigroups. [Citation Graph (0, 0)][DBLP] ISW, 1997, pp:273-281 [Conf]
- Jeeyeon Kim, Seungjoo Kim, Hyunjo Kwon, Sungjae Lee, Sangjoon Park, Dongho Won
Forward-Secure Commercial Key Escrow Systems. [Citation Graph (0, 0)][DBLP] WETICE, 2001, pp:211-216 [Conf]
- Sangjoon Park, Jiyoung Song, Jongchan Lee, Kwan-Joong Kim, Byunggi Kim
A handover scheme in clustered cellular networks. [Citation Graph (0, 0)][DBLP] Future Generation Comp. Syst., 2004, v:20, n:2, pp:221-227 [Journal]
- Sangjoon Park, Byunggi Kim
Self-reproducible DEVS formalism. [Citation Graph (0, 0)][DBLP] J. Parallel Distrib. Comput., 2005, v:65, n:11, pp:1329-1336 [Journal]
- Donghwi Shin, Youngsung Choi, Yunho Lee, Sangjoon Park, Seungjoo Kim, Dongho Won
Security Analysis on the Authentication Mechanisms of Korean Popular Messengers. [Citation Graph (0, 0)][DBLP] HCI (5), 2007, pp:547-552 [Conf]
- Jongchan Lee, Miyoung Hwang, Sangjoon Park, HaeSuk Jang, Byunggi Kim
A Routing Scheme of Mobile Sink in Sensor Networks. [Citation Graph (0, 0)][DBLP] ICCSA (2), 2007, pp:751-763 [Conf]
- Jiyoung Song, Sangjoon Park, Jongchan Lee, Hyunjoo Moon, Byunggi Kim
Explicit Routing Designation (ERD) Method the Cache Information in Nested Mobile Networks. [Citation Graph (0, 0)][DBLP] ICCSA (2), 2007, pp:764-777 [Conf]
- Jongbae Moon, Donggyu Kwak, Yongyun Cho, Sangjoon Park, Jongchan Lee
A XML Script-Based Testing Tool for Embedded Softwares. [Citation Graph (0, 0)][DBLP] ICCSA (2), 2007, pp:818-828 [Conf]
- Ajit Warrier, Sangjoon Park, Jeongki Min, Injong Rhee
How much energy saving does topology control offer for wireless sensor networks? - A practical study. [Citation Graph (0, 0)][DBLP] Computer Communications, 2007, v:30, n:14-15, pp:2867-2879 [Journal]
A Handover Scheme Supporting the Buffer Management in B3G Networks. [Citation Graph (, )][DBLP]
Resource Management through Resource Virtualization in Distributed Network Environments. [Citation Graph (, )][DBLP]
Shot Boundary Detection Using a Global Decision Tree in Ubiquitous Environment. [Citation Graph (, )][DBLP]
A File Carving Algorithm for Digital Forensics. [Citation Graph (, )][DBLP]
Noun and Keyword Detection of Korean in Ubiquitous Environment. [Citation Graph (, )][DBLP]
Issues for Applying Instant Messaging to Smart Home Systems. [Citation Graph (, )][DBLP]
Phased Scene Change Detection in Ubiquitous Environments. [Citation Graph (, )][DBLP]
Efficient RFID Authentication Protocol for Minimizing RFID Tag Computation. [Citation Graph (, )][DBLP]
New link estimation for reliability in wireless sensor networks. [Citation Graph (, )][DBLP]
Search in 0.006secs, Finished in 0.007secs
|