dblp.uni-trier.dewww.uni-trier.de

Dong-Kyoo Kim

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
15EESyed Rehan Afzal, Subir Biswas, Jong-bin Koh, Taqi Raza, Gunhee Lee, Dong-Kyoo Kim: RSRP: A Robust Secure Routing Protocol for Mobile Ad Hoc Networks. WCNC 2008: 2313-2318
2006
14EESong-hwa Chae, Wonil Kim, Dong-Kyoo Kim: uT-RBAC: Ubiquitous Role-Based Access Control Model. IEICE Transactions 89-A(1): 238-239 (2006)
2005
13EEGunhee Lee, Wonil Kim, Dong-Kyoo Kim: An Effective Method for Location Privacy in Ubiquitous Computing. EUC Workshops 2005: 1006-1015
12EEJungtae Kim, Gunhee Lee, Jung-Taek Seo, Eung Ki Park, Choonsik Park, Dong-Kyoo Kim: Y-AOI: Y-Means Based Attribute Oriented Induction Identifying Root Cause for IDSs. FSKD (2) 2005: 205-214
11EEJungtae Kim, Gunhee Lee, Jung-Taek Seo, Eung Ki Park, Choonsik Park, Dong-Kyoo Kim: An Alert Reasoning Method for Intrusion Detection System Using Attribute Oriented Induction. ICOIN 2005: 72-79
10EESong-hwa Chae, Wonil Kim, Dong-Kyoo Kim: Role-Based Access Control Model for Ubiquitous Computing Environment. WISA 2005: 354-363
2004
9EESihn-hye Park, Wonil Kim, Dong-Kyoo Kim: Autonomic Protection System Using Adaptive Security Policy. ICCSA (3) 2004: 896-905
8EEGunhee Lee, Wonil Kim, Dong-Kyoo Kim: A Novel Method to Support User's Consent in Usage Control for Stable Trust in E-business. ICCSA (3) 2004: 906-914
7EESoon-Dong Kim, Man-Pyo Hong, Dong-Kyoo Kim: A Study on Marking Bit Size for Path Identification Method: Deploying the Pi Filter at the End Host. ICCSA (4) 2004: 611-616
6EEJongwoon Park, Gunhee Lee, Sangha Lee, Dong-Kyoo Kim: RPS: An Extension of Reference Monitor to Prevent Race-Attacks. PCM (1) 2004: 556-563
5EESong-hwa Chae, Wonil Kim, Dong-Kyoo Kim: Efficient Role Based Access Control Method in Wireless Environment. PWC 2004: 431-439
4EEGunhee Lee, Wonil Kim, Dong-Kyoo Kim, Hongjin Yeh: Effective Web-Related Resource Security Using Distributed Role Hierarchy. WAIM 2004: 87-96
2003
3EEGunhee Lee, Hongjin Yeh, Wonil Kim, Dong-Kyoo Kim: Web Security Using Distributed Role Hierarchy. GCC (1) 2003: 1087-1090
2EESong-hwa Chae, Wonil Kim, Dong-Kyoo Kim: A Novel Approach to Role-Based Access Control. International Conference on Computational Science 2003: 1060-1068
2000
1 Seong-Won Yuk, Dong-Ho Cho, Min-Gyu Kang, Dong-Kyoo Kim, Byung-Cheol Shin: Adaptive Redundancy Control for Systematic Erasure Code Based Real Time Data Transmission in Internet. ICC (3) 2000: 1769-1773

Coauthor Index

1Syed Rehan Afzal [15]
2Subir Biswas [15]
3Song-hwa Chae [2] [5] [10] [14]
4Dong-Ho Cho [1]
5Man-Pyo Hong [7]
6Min-Gyu Kang [1]
7Jungtae Kim [11] [12]
8Soon-Dong Kim [7]
9Wonil Kim [2] [3] [4] [5] [8] [9] [10] [13] [14]
10Jong-bin Koh [15]
11Gunhee Lee [3] [4] [6] [8] [11] [12] [13] [15]
12Sangha Lee [6]
13Choonsik Park [11] [12]
14Eung Ki Park [11] [12]
15Jongwoon Park [6]
16Sihn-hye Park [9]
17Taqi Raza [15]
18Jung-Taek Seo [11] [12]
19Byung-Cheol Shin [1]
20Hongjin Yeh [3] [4]
21Seong-Won Yuk [1]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)