The SCEAS System
Navigation Menu

Search the dblp DataBase


Sungik Jun: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Minsoo Lee, Sehyun Park, Sungik Jun
    A Security Management Framework with Roaming Coordinator for Pervasive Services. [Citation Graph (0, 0)][DBLP]
    ATC, 2006, pp:302-311 [Conf]
  2. Minsoo Lee, Jintaek Kim, Sehyun Park, Ohyoung Song, Sungik Jun
    A Location-Aware Secure Interworking Architecture Between 3GPP and WLAN Systems. [Citation Graph (0, 0)][DBLP]
    ICISC, 2004, pp:394-406 [Conf]
  3. Junhyung Um, Sangwoo Lee, Youngsoo Park, Sungik Jun, Thewhan KimU
    An efficient inverse multiplier/divider architecture for cryptography systems. [Citation Graph (0, 0)][DBLP]
    ISCAS (5), 2003, pp:149-152 [Conf]
  4. Mooseop Kim, Jaecheol Ryou, Yongje Choi, Sungik Jun
    Low Power AES Hardware Architecture for Radio Frequency Identification. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2006, pp:353-363 [Conf]
  5. Minsoo Lee, Gwanyeon Kim, Sehyun Park, Sungik Jun, Jaehoon Nah, Ohyoung Song
    Efficient 3G/WLAN Interworking Techniques for Seamless Roaming Services with Location-Aware Authentication. [Citation Graph (0, 0)][DBLP]
    NETWORKING, 2005, pp:370-381 [Conf]
  6. Janghaeng Lee, Sung Ho Hwang, Neungsoo Park, Seong-Won Lee, Sungik Jun, Young Soo Kim
    A high performance NIDS using FPGA-based regular expression matching. [Citation Graph (0, 0)][DBLP]
    SAC, 2007, pp:1187-1191 [Conf]
  7. Mooseop Kim, Youngse Kim, Jaecheol Ryou, Sungik Jun
    Efficient Implementation of the Keyed-Hash Message Authentication Code Based on SHA-1 Algorithm for Mobile Trusted Computing. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:410-419 [Conf]
  8. Jongpil Kim, Sungik Jun
    Authentication and Key Agreement Method for Home Networks Using a Smart Card. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2007, pp:655-665 [Conf]
  9. Minsoo Lee, Gwanyeon Kim, Sehyun Park, Ohyoung Song, Sungik Jun
    Predictive Mobility Support with Secure Context Management for Vehicular Users. [Citation Graph (0, 0)][DBLP]
    Net-Con, 2005, pp:21-28 [Conf]

  10. Efficient Hardware Architecture of SHA-256 Algorithm for Trusted Mobile Computing. [Citation Graph (, )][DBLP]

  11. The Need of MTM Interface Specification for the Trusted Mobile Platform. [Citation Graph (, )][DBLP]

  12. Implementation of a TCG-Based Trusted Computing in Mobile Device. [Citation Graph (, )][DBLP]

  13. Compact Implementation of SHA-1 Hash Function for Mobile Trusted Module. [Citation Graph (, )][DBLP]

  14. Context-aware security service in RFID/USN environments using MAUT and extended GRBAC. [Citation Graph (, )][DBLP]

Search in 0.002secs, Finished in 0.002secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002