|
Search the dblp DataBase
Hyung Chan Kim:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Seog Chung Seo, Hyung Chan Kim, R. S. Ramakrishna
A New Security Protocol Based on Elliptic Curve Cryptosystems for Securing Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP] EUC Workshops, 2006, pp:291-301 [Conf]
- Hyung Chan Kim, Wook Shin, R. S. Ramakrishna, Kouichi Sakurai
Design and Implementation of an Extended Reference Monitor for Trusted Operating Systems. [Citation Graph (0, 0)][DBLP] ISPEC, 2006, pp:235-247 [Conf]
- Hyung Chan Kim, R. S. Ramakrishna, Kouichi Sakurai
A Collaborative Role-Based Access Control for Trusted Operating Systems in Distributed Environment. [Citation Graph (0, 0)][DBLP] IEICE Transactions, 2005, v:88, n:1, pp:270-279 [Journal]
- Hyung Chan Kim, R. S. Ramakrishna, Wook Shin, Kouichi Sakurai
Enforcement of Integrated Security Policy in Trusted Operating Systems. [Citation Graph (0, 0)][DBLP] IWSEC, 2007, pp:214-229 [Conf]
A Policy Language for the Extended Reference Monitor in Trusted Operating Systems. [Citation Graph (, )][DBLP]
Capturing Information Flow with Concatenated Dynamic Taint Analysis. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.002secs
|