|
Search the dblp DataBase
Jeom Goo Kim:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Dong Chun Lee, Jeom Goo Kim, JooSeok Song
Performance of Location Caching Scheme to Support Call Locality in Wireless Networks. [Citation Graph (0, 0)][DBLP] ASIAN, 2000, pp:43-57 [Conf]
- Dong Chun Lee, Hyun Cheul Shin, Jeom Goo Kim
New Location Management for Reducing HLR Overhead Traffic in Mobile Networks. [Citation Graph (0, 0)][DBLP] CoopIS/DOA/ODBASE, 2002, pp:529-530 [Conf]
- Dong Hwi Lee, Jeom Goo Kim, Kuinam J. Kim
HOIDS-Based Detection Method of Vicious Event in Large Networks. [Citation Graph (0, 0)][DBLP] EUC Workshops, 2006, pp:998-1005 [Conf]
- Jeom Goo Kim, Yoochan Ra, Jaehwan Lim
Certificate Management Client System for E-transactions on Internet. [Citation Graph (0, 0)][DBLP] International Conference on Computational Science, 2003, pp:596-604 [Conf]
- Dong Chun Lee, Jeom Goo Kim, Kuinam J. Kim
Mobility Management Scheme for Reducing Location Traffic Cost in IMT-2000 Networks. [Citation Graph (0, 0)][DBLP] ICCSA (2), 2003, pp:50-59 [Conf]
- Sang-Young Lee, Yung-Hyeon Lee, Jeom Goo Kim, Dong Chun Lee
Workflow System Modeling in the Mobile Healthcare B2B Using Semantic Information. [Citation Graph (0, 0)][DBLP] ICCSA (2), 2005, pp:762-770 [Conf]
- Won Shik Na, Jeom Goo Kim, Intae Ryoo
Perimeter Defence Policy Model of Cascade MPLS VPN Networks. [Citation Graph (0, 0)][DBLP] ICCSA (1), 2004, pp:1026-1034 [Conf]
- Do Hyeon Lee, Jeom Goo Kim
Conversion Scheme for Reducing Security Vulnerability in IPv4/ IPv6 Networks. [Citation Graph (0, 0)][DBLP] KES (3), 2006, pp:564-571 [Conf]
- Jeom Goo Kim, Young-Cheol Lee, Jae-Kwang Lee
An Implementation of Vulnerability Evaluation System for Network Security on CC. [Citation Graph (0, 0)][DBLP] PDPTA, 2000, pp:- [Conf]
- Dong Chun Lee, Jeom Goo Kim
Adaptive Migration Strategy for Mobile Agents on Internet. [Citation Graph (0, 0)][DBLP] TES, 2001, pp:201-212 [Conf]
- Jeom Goo Kim, Do Hyeon Lee, Jeog-bae Lee
A Design of Fair Blind Signatures Protocol Using PVNIOT. [Citation Graph (0, 0)][DBLP] ICCSA (2), 2007, pp:140-147 [Conf]
- Eun A. Jun, Seok Won Jung, Jeom Goo Kim, Jong In Lim
Efficient an Implementation Method Research of a Smart Card Atomic Operation. [Citation Graph (0, 0)][DBLP] ICCSA (2), 2007, pp:113-121 [Conf]
- Jeom Goo Kim, Do Hyeon Lee
An Access Control Using SPKI Certificate in Peer-to-Peer Environment. [Citation Graph (0, 0)][DBLP] ICCSA (2), 2007, pp:148-156 [Conf]
Search in 0.001secs, Finished in 0.002secs
|