dblp.uni-trier.dewww.uni-trier.de

Kijoon Chae

Ki-Joon Chae

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
30EEHayoung Oh, Kijoon Chae: An Abnormal Area Scanning for Scalable and Energy-Efficient and Secure SensorNet Management. MUE 2008: 592-596
29EEHayoung Oh, Kijoon Chae: A secure and delay-efficient scheme for NetLMM. Mobility Conference 2008: 62
2007
28EEHayoung Oh, Kijoon Chae: An Energy-Efficient Sensor Routing with low latency, scalability in Wireless Sensor Networks. MUE 2007: 147-152
27EEMihui Kim, Jaewon Seo, Kijoon Chae: Integrated Notification Architecture Based on Overlay Against DDoS Attacks on Convergence Network. SEUS 2007: 466-476
2006
26EEInshil Doh, Kijoon Chae: Key Establishment and Authentication Mechanism for Secure Sensor Networks. APWeb Workshops 2006: 335-344
25EEInshil Doh, Jung Min Park, Kijoon Chae: Pairwise Key Setup and Authentication Utilizing Deployment Information for Secure Sensor Network. HPCC 2006: 280-289
24EEMyungjin Lee, Hyokyung Bahn, Kijoon Chae: A New Key Management Scheme for Distributed Encrypted Storage Systems. ICCSA (1) 2006: 1072-1079
23EEHayoung Oh, Jiyoung Lim, Kijoon Chae, Jungchan Nah: Home Gateway with Automated Real-Time Intrusion Detection for Secure Home Networks. ICCSA (4) 2006: 440-447
22EEInshil Doh, Kijoon Chae, Howon Kim, Kyoil Chung: Security Enhancement Mechanism for Ad-Hoc OLSR Protocol. ICOIN 2006: 317-326
21EEMihui Kim, Kijoon Chae: Overlapped Detection Via Approximate Entropy Estimation Against Flooding Attack in Mobile Sensor Networks. International Conference on Computational Science (2) 2006: 1024-1032
20EEMihui Kim, Inshil Doh, Kijoon Chae: A Key Management Based on Multiple Regression in Hierarchical Sensor Network. WISA 2006: 267-281
19EEMihui Kim, Kijoon Chae: Proactive Defense Mechanism against IP Spoofing Traffic on a NEMO Environment. IEICE Transactions 89-A(7): 1959-1967 (2006)
2005
18EEYuseung Sohn, Misung Cho, Giwon On, Kijoon Chae: A Secure User Authentication Method in Networked Intelligent Manufacturing Systems. CW 2005: 123-129
17EEMihui Kim, Eunah Kim, Kijoon Chae: A Scalable Mutual Authentication and Key Distribution Mechanism in a NEMO Environment. ICCSA (1) 2005: 591-600
16EEMihui Kim, Kijoon Chae: A Fast Defense Mechanism Against IP Spoofing Traffic in a NEMO Environment. ICOIN 2005: 843-852
2004
15 Kijoon Chae, Moti Yung: Information Security Applications, 4th International Workshop, WISA 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers Springer 2004
14EEMihui Kim, Kijoon Chae: Detection and Identification Mechanism against Spoofed Traffic Using Distributed Agents. ICCSA (1) 2004: 673-682
13EEMihui Kim, Hyunjung Na, Kijoon Chae, Hyochan Bang, Jung-Chan Na: A Combined Data Mining Approach for DDoS Attack Detection. ICOIN 2004: 943-950
2003
12EEEun-Kyeong Kwon, Yong-Gu Cho, Kijoon Chae: Refundable Electronic Cash for Mobile Commerce. Human.Society@Internet 2003 2003: 644-649
11EEJung Min Park, Eun-Hui Bae, Hye-Jin Pyeon, Kijoon Chae: A Ticket-Based AAA Security Mechanism in Mobile IP Network. ICCSA (2) 2003: 210-219
10EEJi-Young Lim, Ok-kyeung Kim, Yeo-Jin Kim, Ga-Jin Na, Hyunjung Na, Kijoon Chae, Young-Soo Kim, Jung-Chan Na: Design of Security Enforcement Engine for Active Nodes in Active Networks. ICOIN 2003: 346-356
9EEJung Min Park, Min-Jung Jin, Kijoon Chae: Secure Firewall Traversal in Mobile IP Network. International Conference on Computational Science 2003: 535-544
2002
8EEJi-Young Lim, Ki-Joon Chae: Flow Admission Control for MPLS Support of DiffServ. ICOIN (1) 2002: 480-493
7EEWon Kim, Ki-Joon Chae, Dong-Sub Cho, Byoungju Choi, Anmo Jeong, Myung Kim, Kiho Lee, Meejeong Lee, Sang-Ho Lee, Seung-Soo Park, Hwan-Seung Yong: The Chamois Component-Based Knowledge Engineering Framework. IEEE Computer 35(5): 46-54 (2002)
6EEWon Kim, Ki-Joon Chae, Dong-Sub Cho, Byoungju Choi, Anmo Jeong, Myung Kim, Kiho Lee, Meejeong Lee, Minsoo Lee, Sang-Ho Lee, Seung-Soo Park, Hwan-Seung Yong, Ho-Sook Kim, Jung-Won Lee, Wol-Young Lee: The Chamois Reconfigurable Data-Mining Architecture. Journal of Object Technology 1(2): 21-33 (2002)
2001
5EEEun-Kyeong Kwon, Yong-Gu Cho, Ki-Joon Chae: Security Enhancement on Mobile Commerce. Human.Society@Internet 2001: 164-176
4EEJi-Young Lim, Ki-Joon Chae: Differentiated Link Based QoS Routing Algorithms for Multimedia Traffic in MPLS Networks. ICOIN 2001: 587-592
3EEEun-Kyeong Kwon, Yong-Gu Cho, Ki-Joon Chae: Integrated Transport Layer Security: End-to-End Security Model between WTLS and TLS. ICOIN 2001: 65-71
2000
2 Sunnie Chung, Kijoon Chae: An Efficient Public-key Based Authentication with Mobile-IP in E-commerce. PDPTA 2000
1999
1 Ji-Young Lim, Mi-Hee Kim, Ki-Joon Chae: Predictive and Adaptive Bandwidth Reservation Strategies in Wireless Networks. PDPTA 1999: 121-127

Coauthor Index

1Eun-Hui Bae [11]
2Hyokyung Bahn [24]
3Hyochan Bang [13]
4Dong-Sub Cho [6] [7]
5Misung Cho [18]
6Yong-Gu Cho [3] [5] [12]
7Byoungju Choi [6] [7]
8Kyoil Chung [22]
9Sunnie Chung [2]
10Inshil Doh [20] [22] [25] [26]
11Anmo Jeong [6] [7]
12Min-Jung Jin [9]
13Eunah Kim [17]
14Ho-Sook Kim [6]
15Howon Kim (Ho Won Kim) [22]
16Mi-Hee Kim [1]
17Mihui Kim [13] [14] [16] [17] [19] [20] [21] [27]
18Myung Kim [6] [7]
19Ok-kyeung Kim [10]
20Won Kim [6] [7]
21Yeo-Jin Kim [10]
22Young-Soo Kim [10]
23Eun-Kyeong Kwon [3] [5] [12]
24Jung-Won Lee [6]
25Kiho Lee [6] [7]
26Meejeong Lee [6] [7]
27Minsoo Lee [6]
28Myungjin Lee [24]
29Sang-Ho Lee [6] [7]
30Wol-Young Lee [6]
31Ji-Young Lim [1] [4] [8] [10]
32Jiyoung Lim [23]
33Ga-Jin Na [10]
34Hyunjung Na [10] [13]
35Jung-Chan Na [10] [13]
36Jungchan Nah [23]
37Hayoung Oh [23] [28] [29] [30]
38Giwon On [18]
39Jung Min Park [9] [11] [25]
40Seung-Soo Park [6] [7]
41Hye-Jin Pyeon [11]
42Jaewon Seo [27]
43Yuseung Sohn [18]
44Hwan-Seung Yong [6] [7]
45Moti Yung (Mordechai M. Yung) [15]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)