The SCEAS System
Navigation Menu

Search the dblp DataBase


Jeeyeon Kim: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Hyangjin Lee, Jeeyeon Kim
    Privacy threats and issues in mobile RFID. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:510-514 [Conf]
  2. Jeeyeon Kim, Seungjoo Kim, Jin Kwak, Dongho Won
    Cryptanalysis and Improvement of Password Authenticated Key Exchange Scheme between Clients with Different Passwords. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:895-902 [Conf]
  3. Jeeyeon Kim, Hyunjo Kwon, Haeryong Park, Seungjoo Kim, Dongho Won
    An Improvement of VeriSign's Key Roaming Service Protocol. [Citation Graph (0, 0)][DBLP]
    ICWE, 2003, pp:281-288 [Conf]
  4. Jeeyeon Kim, Seungjoo Kim, Kilsoo Chun, Jaeil Lee, Dongho Won
    Group Key Agreement Protocol Among Mobile Devices in Different Cells. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2006, pp:1090-1097 [Conf]
  5. Jeeyeon Kim, Seungjoo Kim, Hyunjo Kwon, Sungjae Lee, Sangjoon Park, Dongho Won
    Forward-Secure Commercial Key Escrow Systems. [Citation Graph (0, 0)][DBLP]
    WETICE, 2001, pp:211-216 [Conf]

Search in 0.032secs, Finished in 0.032secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002