![]() | ![]() |
Ki-Joon Chae
List of publications from the DBLP Bibliography Server - FAQ
2008 | ||
---|---|---|
30 | EE | Hayoung Oh, Kijoon Chae: An Abnormal Area Scanning for Scalable and Energy-Efficient and Secure SensorNet Management. MUE 2008: 592-596 |
29 | EE | Hayoung Oh, Kijoon Chae: A secure and delay-efficient scheme for NetLMM. Mobility Conference 2008: 62 |
2007 | ||
28 | EE | Hayoung Oh, Kijoon Chae: An Energy-Efficient Sensor Routing with low latency, scalability in Wireless Sensor Networks. MUE 2007: 147-152 |
27 | EE | Mihui Kim, Jaewon Seo, Kijoon Chae: Integrated Notification Architecture Based on Overlay Against DDoS Attacks on Convergence Network. SEUS 2007: 466-476 |
2006 | ||
26 | EE | Inshil Doh, Kijoon Chae: Key Establishment and Authentication Mechanism for Secure Sensor Networks. APWeb Workshops 2006: 335-344 |
25 | EE | Inshil Doh, Jung Min Park, Kijoon Chae: Pairwise Key Setup and Authentication Utilizing Deployment Information for Secure Sensor Network. HPCC 2006: 280-289 |
24 | EE | Myungjin Lee, Hyokyung Bahn, Kijoon Chae: A New Key Management Scheme for Distributed Encrypted Storage Systems. ICCSA (1) 2006: 1072-1079 |
23 | EE | Hayoung Oh, Jiyoung Lim, Kijoon Chae, Jungchan Nah: Home Gateway with Automated Real-Time Intrusion Detection for Secure Home Networks. ICCSA (4) 2006: 440-447 |
22 | EE | Inshil Doh, Kijoon Chae, Howon Kim, Kyoil Chung: Security Enhancement Mechanism for Ad-Hoc OLSR Protocol. ICOIN 2006: 317-326 |
21 | EE | Mihui Kim, Kijoon Chae: Overlapped Detection Via Approximate Entropy Estimation Against Flooding Attack in Mobile Sensor Networks. International Conference on Computational Science (2) 2006: 1024-1032 |
20 | EE | Mihui Kim, Inshil Doh, Kijoon Chae: A Key Management Based on Multiple Regression in Hierarchical Sensor Network. WISA 2006: 267-281 |
19 | EE | Mihui Kim, Kijoon Chae: Proactive Defense Mechanism against IP Spoofing Traffic on a NEMO Environment. IEICE Transactions 89-A(7): 1959-1967 (2006) |
2005 | ||
18 | EE | Yuseung Sohn, Misung Cho, Giwon On, Kijoon Chae: A Secure User Authentication Method in Networked Intelligent Manufacturing Systems. CW 2005: 123-129 |
17 | EE | Mihui Kim, Eunah Kim, Kijoon Chae: A Scalable Mutual Authentication and Key Distribution Mechanism in a NEMO Environment. ICCSA (1) 2005: 591-600 |
16 | EE | Mihui Kim, Kijoon Chae: A Fast Defense Mechanism Against IP Spoofing Traffic in a NEMO Environment. ICOIN 2005: 843-852 |
2004 | ||
15 | Kijoon Chae, Moti Yung: Information Security Applications, 4th International Workshop, WISA 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers Springer 2004 | |
14 | EE | Mihui Kim, Kijoon Chae: Detection and Identification Mechanism against Spoofed Traffic Using Distributed Agents. ICCSA (1) 2004: 673-682 |
13 | EE | Mihui Kim, Hyunjung Na, Kijoon Chae, Hyochan Bang, Jung-Chan Na: A Combined Data Mining Approach for DDoS Attack Detection. ICOIN 2004: 943-950 |
2003 | ||
12 | EE | Eun-Kyeong Kwon, Yong-Gu Cho, Kijoon Chae: Refundable Electronic Cash for Mobile Commerce. Human.Society@Internet 2003 2003: 644-649 |
11 | EE | Jung Min Park, Eun-Hui Bae, Hye-Jin Pyeon, Kijoon Chae: A Ticket-Based AAA Security Mechanism in Mobile IP Network. ICCSA (2) 2003: 210-219 |
10 | EE | Ji-Young Lim, Ok-kyeung Kim, Yeo-Jin Kim, Ga-Jin Na, Hyunjung Na, Kijoon Chae, Young-Soo Kim, Jung-Chan Na: Design of Security Enforcement Engine for Active Nodes in Active Networks. ICOIN 2003: 346-356 |
9 | EE | Jung Min Park, Min-Jung Jin, Kijoon Chae: Secure Firewall Traversal in Mobile IP Network. International Conference on Computational Science 2003: 535-544 |
2002 | ||
8 | EE | Ji-Young Lim, Ki-Joon Chae: Flow Admission Control for MPLS Support of DiffServ. ICOIN (1) 2002: 480-493 |
7 | EE | Won Kim, Ki-Joon Chae, Dong-Sub Cho, Byoungju Choi, Anmo Jeong, Myung Kim, Kiho Lee, Meejeong Lee, Sang-Ho Lee, Seung-Soo Park, Hwan-Seung Yong: The Chamois Component-Based Knowledge Engineering Framework. IEEE Computer 35(5): 46-54 (2002) |
6 | EE | Won Kim, Ki-Joon Chae, Dong-Sub Cho, Byoungju Choi, Anmo Jeong, Myung Kim, Kiho Lee, Meejeong Lee, Minsoo Lee, Sang-Ho Lee, Seung-Soo Park, Hwan-Seung Yong, Ho-Sook Kim, Jung-Won Lee, Wol-Young Lee: The Chamois Reconfigurable Data-Mining Architecture. Journal of Object Technology 1(2): 21-33 (2002) |
2001 | ||
5 | EE | Eun-Kyeong Kwon, Yong-Gu Cho, Ki-Joon Chae: Security Enhancement on Mobile Commerce. Human.Society@Internet 2001: 164-176 |
4 | EE | Ji-Young Lim, Ki-Joon Chae: Differentiated Link Based QoS Routing Algorithms for Multimedia Traffic in MPLS Networks. ICOIN 2001: 587-592 |
3 | EE | Eun-Kyeong Kwon, Yong-Gu Cho, Ki-Joon Chae: Integrated Transport Layer Security: End-to-End Security Model between WTLS and TLS. ICOIN 2001: 65-71 |
2000 | ||
2 | Sunnie Chung, Kijoon Chae: An Efficient Public-key Based Authentication with Mobile-IP in E-commerce. PDPTA 2000 | |
1999 | ||
1 | Ji-Young Lim, Mi-Hee Kim, Ki-Joon Chae: Predictive and Adaptive Bandwidth Reservation Strategies in Wireless Networks. PDPTA 1999: 121-127 |