The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Jeom Goo Kim: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Dong Chun Lee, Jeom Goo Kim, JooSeok Song
    Performance of Location Caching Scheme to Support Call Locality in Wireless Networks. [Citation Graph (0, 0)][DBLP]
    ASIAN, 2000, pp:43-57 [Conf]
  2. Dong Chun Lee, Hyun Cheul Shin, Jeom Goo Kim
    New Location Management for Reducing HLR Overhead Traffic in Mobile Networks. [Citation Graph (0, 0)][DBLP]
    CoopIS/DOA/ODBASE, 2002, pp:529-530 [Conf]
  3. Dong Hwi Lee, Jeom Goo Kim, Kuinam J. Kim
    HOIDS-Based Detection Method of Vicious Event in Large Networks. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:998-1005 [Conf]
  4. Jeom Goo Kim, Yoochan Ra, Jaehwan Lim
    Certificate Management Client System for E-transactions on Internet. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science, 2003, pp:596-604 [Conf]
  5. Dong Chun Lee, Jeom Goo Kim, Kuinam J. Kim
    Mobility Management Scheme for Reducing Location Traffic Cost in IMT-2000 Networks. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2003, pp:50-59 [Conf]
  6. Sang-Young Lee, Yung-Hyeon Lee, Jeom Goo Kim, Dong Chun Lee
    Workflow System Modeling in the Mobile Healthcare B2B Using Semantic Information. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:762-770 [Conf]
  7. Won Shik Na, Jeom Goo Kim, Intae Ryoo
    Perimeter Defence Policy Model of Cascade MPLS VPN Networks. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:1026-1034 [Conf]
  8. Do Hyeon Lee, Jeom Goo Kim
    Conversion Scheme for Reducing Security Vulnerability in IPv4/ IPv6 Networks. [Citation Graph (0, 0)][DBLP]
    KES (3), 2006, pp:564-571 [Conf]
  9. Jeom Goo Kim, Young-Cheol Lee, Jae-Kwang Lee
    An Implementation of Vulnerability Evaluation System for Network Security on CC. [Citation Graph (0, 0)][DBLP]
    PDPTA, 2000, pp:- [Conf]
  10. Dong Chun Lee, Jeom Goo Kim
    Adaptive Migration Strategy for Mobile Agents on Internet. [Citation Graph (0, 0)][DBLP]
    TES, 2001, pp:201-212 [Conf]
  11. Jeom Goo Kim, Do Hyeon Lee, Jeog-bae Lee
    A Design of Fair Blind Signatures Protocol Using PVNIOT. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:140-147 [Conf]
  12. Eun A. Jun, Seok Won Jung, Jeom Goo Kim, Jong In Lim
    Efficient an Implementation Method Research of a Smart Card Atomic Operation. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:113-121 [Conf]
  13. Jeom Goo Kim, Do Hyeon Lee
    An Access Control Using SPKI Certificate in Peer-to-Peer Environment. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:148-156 [Conf]

Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002