The SCEAS System
Navigation Menu

Search the dblp DataBase


Kijoon Chae: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Inshil Doh, Kijoon Chae
    Key Establishment and Authentication Mechanism for Secure Sensor Networks. [Citation Graph (0, 0)][DBLP]
    APWeb Workshops, 2006, pp:335-344 [Conf]
  2. Yuseung Sohn, Misung Cho, Giwon On, Kijoon Chae
    A Secure User Authentication Method in Networked Intelligent Manufacturing Systems. [Citation Graph (0, 0)][DBLP]
    CW, 2005, pp:123-129 [Conf]
  3. Inshil Doh, Jung Min Park, Kijoon Chae
    Pairwise Key Setup and Authentication Utilizing Deployment Information for Secure Sensor Network. [Citation Graph (0, 0)][DBLP]
    HPCC, 2006, pp:280-289 [Conf]
  4. Eun-Kyeong Kwon, Yong-Gu Cho, Kijoon Chae
    Refundable Electronic Cash for Mobile Commerce. [Citation Graph (0, 0)][DBLP]
    Human.Society@Internet 2003, 2003, pp:644-649 [Conf]
  5. Mihui Kim, Kijoon Chae
    Overlapped Detection Via Approximate Entropy Estimation Against Flooding Attack in Mobile Sensor Networks. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (2), 2006, pp:1024-1032 [Conf]
  6. Jung Min Park, Min-Jung Jin, Kijoon Chae
    Secure Firewall Traversal in Mobile IP Network. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science, 2003, pp:535-544 [Conf]
  7. Mihui Kim, Kijoon Chae
    Detection and Identification Mechanism against Spoofed Traffic Using Distributed Agents. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:673-682 [Conf]
  8. Mihui Kim, Eunah Kim, Kijoon Chae
    A Scalable Mutual Authentication and Key Distribution Mechanism in a NEMO Environment. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2005, pp:591-600 [Conf]
  9. Myungjin Lee, Hyokyung Bahn, Kijoon Chae
    A New Key Management Scheme for Distributed Encrypted Storage Systems. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2006, pp:1072-1079 [Conf]
  10. Hayoung Oh, Jiyoung Lim, Kijoon Chae, Jungchan Nah
    Home Gateway with Automated Real-Time Intrusion Detection for Secure Home Networks. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:440-447 [Conf]
  11. Jung Min Park, Eun-Hui Bae, Hye-Jin Pyeon, Kijoon Chae
    A Ticket-Based AAA Security Mechanism in Mobile IP Network. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2003, pp:210-219 [Conf]
  12. Mihui Kim, Hyunjung Na, Kijoon Chae, Hyochan Bang, Jung-Chan Na
    A Combined Data Mining Approach for DDoS Attack Detection. [Citation Graph (0, 0)][DBLP]
    ICOIN, 2004, pp:943-950 [Conf]
  13. Mihui Kim, Kijoon Chae
    A Fast Defense Mechanism Against IP Spoofing Traffic in a NEMO Environment. [Citation Graph (0, 0)][DBLP]
    ICOIN, 2005, pp:843-852 [Conf]
  14. Ji-Young Lim, Ok-kyeung Kim, Yeo-Jin Kim, Ga-Jin Na, Hyunjung Na, Kijoon Chae, Young-Soo Kim, Jung-Chan Na
    Design of Security Enforcement Engine for Active Nodes in Active Networks. [Citation Graph (0, 0)][DBLP]
    ICOIN, 2003, pp:346-356 [Conf]
  15. Inshil Doh, Kijoon Chae, Howon Kim, Kyoil Chung
    Security Enhancement Mechanism for Ad-Hoc OLSR Protocol. [Citation Graph (0, 0)][DBLP]
    ICOIN, 2006, pp:317-326 [Conf]
  16. Sunnie Chung, Kijoon Chae
    An Efficient Public-key Based Authentication with Mobile-IP in E-commerce. [Citation Graph (0, 0)][DBLP]
    PDPTA, 2000, pp:- [Conf]
  17. Hayoung Oh, Kijoon Chae
    An Energy-Efficient Sensor Routing with low latency, scalability in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    MUE, 2007, pp:147-152 [Conf]
  18. Mihui Kim, Jaewon Seo, Kijoon Chae
    Integrated Notification Architecture Based on Overlay Against DDoS Attacks on Convergence Network. [Citation Graph (0, 0)][DBLP]
    SEUS, 2007, pp:466-476 [Conf]
  19. Mihui Kim, Inshil Doh, Kijoon Chae
    A Key Management Based on Multiple Regression in Hierarchical Sensor Network. [Citation Graph (0, 0)][DBLP]
    WISA, 2006, pp:267-281 [Conf]

  20. An Abnormal Area Scanning for Scalable and Energy-Efficient and Secure SensorNet Management. [Citation Graph (, )][DBLP]

  21. A secure and delay-efficient scheme for NetLMM. [Citation Graph (, )][DBLP]

Search in 0.003secs, Finished in 0.004secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002