Search the dblp DataBase
Kijoon Chae :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Inshil Doh , Kijoon Chae Key Establishment and Authentication Mechanism for Secure Sensor Networks. [Citation Graph (0, 0)][DBLP ] APWeb Workshops, 2006, pp:335-344 [Conf ] Yuseung Sohn , Misung Cho , Giwon On , Kijoon Chae A Secure User Authentication Method in Networked Intelligent Manufacturing Systems. [Citation Graph (0, 0)][DBLP ] CW, 2005, pp:123-129 [Conf ] Inshil Doh , Jung Min Park , Kijoon Chae Pairwise Key Setup and Authentication Utilizing Deployment Information for Secure Sensor Network. [Citation Graph (0, 0)][DBLP ] HPCC, 2006, pp:280-289 [Conf ] Eun-Kyeong Kwon , Yong-Gu Cho , Kijoon Chae Refundable Electronic Cash for Mobile Commerce. [Citation Graph (0, 0)][DBLP ] Human.Society@Internet 2003, 2003, pp:644-649 [Conf ] Mihui Kim , Kijoon Chae Overlapped Detection Via Approximate Entropy Estimation Against Flooding Attack in Mobile Sensor Networks. [Citation Graph (0, 0)][DBLP ] International Conference on Computational Science (2), 2006, pp:1024-1032 [Conf ] Jung Min Park , Min-Jung Jin , Kijoon Chae Secure Firewall Traversal in Mobile IP Network. [Citation Graph (0, 0)][DBLP ] International Conference on Computational Science, 2003, pp:535-544 [Conf ] Mihui Kim , Kijoon Chae Detection and Identification Mechanism against Spoofed Traffic Using Distributed Agents. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:673-682 [Conf ] Mihui Kim , Eunah Kim , Kijoon Chae A Scalable Mutual Authentication and Key Distribution Mechanism in a NEMO Environment. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2005, pp:591-600 [Conf ] Myungjin Lee , Hyokyung Bahn , Kijoon Chae A New Key Management Scheme for Distributed Encrypted Storage Systems. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2006, pp:1072-1079 [Conf ] Hayoung Oh , Jiyoung Lim , Kijoon Chae , Jungchan Nah Home Gateway with Automated Real-Time Intrusion Detection for Secure Home Networks. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:440-447 [Conf ] Jung Min Park , Eun-Hui Bae , Hye-Jin Pyeon , Kijoon Chae A Ticket-Based AAA Security Mechanism in Mobile IP Network. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2003, pp:210-219 [Conf ] Mihui Kim , Hyunjung Na , Kijoon Chae , Hyochan Bang , Jung-Chan Na A Combined Data Mining Approach for DDoS Attack Detection. [Citation Graph (0, 0)][DBLP ] ICOIN, 2004, pp:943-950 [Conf ] Mihui Kim , Kijoon Chae A Fast Defense Mechanism Against IP Spoofing Traffic in a NEMO Environment. [Citation Graph (0, 0)][DBLP ] ICOIN, 2005, pp:843-852 [Conf ] Ji-Young Lim , Ok-kyeung Kim , Yeo-Jin Kim , Ga-Jin Na , Hyunjung Na , Kijoon Chae , Young-Soo Kim , Jung-Chan Na Design of Security Enforcement Engine for Active Nodes in Active Networks. [Citation Graph (0, 0)][DBLP ] ICOIN, 2003, pp:346-356 [Conf ] Inshil Doh , Kijoon Chae , Howon Kim , Kyoil Chung Security Enhancement Mechanism for Ad-Hoc OLSR Protocol. [Citation Graph (0, 0)][DBLP ] ICOIN, 2006, pp:317-326 [Conf ] Sunnie Chung , Kijoon Chae An Efficient Public-key Based Authentication with Mobile-IP in E-commerce. [Citation Graph (0, 0)][DBLP ] PDPTA, 2000, pp:- [Conf ] Hayoung Oh , Kijoon Chae An Energy-Efficient Sensor Routing with low latency, scalability in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] MUE, 2007, pp:147-152 [Conf ] Mihui Kim , Jaewon Seo , Kijoon Chae Integrated Notification Architecture Based on Overlay Against DDoS Attacks on Convergence Network. [Citation Graph (0, 0)][DBLP ] SEUS, 2007, pp:466-476 [Conf ] Mihui Kim , Inshil Doh , Kijoon Chae A Key Management Based on Multiple Regression in Hierarchical Sensor Network. [Citation Graph (0, 0)][DBLP ] WISA, 2006, pp:267-281 [Conf ] An Abnormal Area Scanning for Scalable and Energy-Efficient and Secure SensorNet Management. [Citation Graph (, )][DBLP ] A secure and delay-efficient scheme for NetLMM. [Citation Graph (, )][DBLP ] Search in 0.003secs, Finished in 0.004secs