The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Hyung Chan Kim: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Seog Chung Seo, Hyung Chan Kim, R. S. Ramakrishna
    A New Security Protocol Based on Elliptic Curve Cryptosystems for Securing Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:291-301 [Conf]
  2. Hyung Chan Kim, Wook Shin, R. S. Ramakrishna, Kouichi Sakurai
    Design and Implementation of an Extended Reference Monitor for Trusted Operating Systems. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2006, pp:235-247 [Conf]
  3. Hyung Chan Kim, R. S. Ramakrishna, Kouichi Sakurai
    A Collaborative Role-Based Access Control for Trusted Operating Systems in Distributed Environment. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:270-279 [Journal]
  4. Hyung Chan Kim, R. S. Ramakrishna, Wook Shin, Kouichi Sakurai
    Enforcement of Integrated Security Policy in Trusted Operating Systems. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2007, pp:214-229 [Conf]

  5. A Policy Language for the Extended Reference Monitor in Trusted Operating Systems. [Citation Graph (, )][DBLP]


  6. Capturing Information Flow with Concatenated Dynamic Taint Analysis. [Citation Graph (, )][DBLP]


Search in 0.001secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002