2008 |
15 | EE | Syed Rehan Afzal,
Subir Biswas,
Jong-bin Koh,
Taqi Raza,
Gunhee Lee,
Dong-Kyoo Kim:
RSRP: A Robust Secure Routing Protocol for Mobile Ad Hoc Networks.
WCNC 2008: 2313-2318 |
2006 |
14 | EE | Song-hwa Chae,
Wonil Kim,
Dong-Kyoo Kim:
uT-RBAC: Ubiquitous Role-Based Access Control Model.
IEICE Transactions 89-A(1): 238-239 (2006) |
2005 |
13 | EE | Gunhee Lee,
Wonil Kim,
Dong-Kyoo Kim:
An Effective Method for Location Privacy in Ubiquitous Computing.
EUC Workshops 2005: 1006-1015 |
12 | EE | Jungtae Kim,
Gunhee Lee,
Jung-Taek Seo,
Eung Ki Park,
Choonsik Park,
Dong-Kyoo Kim:
Y-AOI: Y-Means Based Attribute Oriented Induction Identifying Root Cause for IDSs.
FSKD (2) 2005: 205-214 |
11 | EE | Jungtae Kim,
Gunhee Lee,
Jung-Taek Seo,
Eung Ki Park,
Choonsik Park,
Dong-Kyoo Kim:
An Alert Reasoning Method for Intrusion Detection System Using Attribute Oriented Induction.
ICOIN 2005: 72-79 |
10 | EE | Song-hwa Chae,
Wonil Kim,
Dong-Kyoo Kim:
Role-Based Access Control Model for Ubiquitous Computing Environment.
WISA 2005: 354-363 |
2004 |
9 | EE | Sihn-hye Park,
Wonil Kim,
Dong-Kyoo Kim:
Autonomic Protection System Using Adaptive Security Policy.
ICCSA (3) 2004: 896-905 |
8 | EE | Gunhee Lee,
Wonil Kim,
Dong-Kyoo Kim:
A Novel Method to Support User's Consent in Usage Control for Stable Trust in E-business.
ICCSA (3) 2004: 906-914 |
7 | EE | Soon-Dong Kim,
Man-Pyo Hong,
Dong-Kyoo Kim:
A Study on Marking Bit Size for Path Identification Method: Deploying the Pi Filter at the End Host.
ICCSA (4) 2004: 611-616 |
6 | EE | Jongwoon Park,
Gunhee Lee,
Sangha Lee,
Dong-Kyoo Kim:
RPS: An Extension of Reference Monitor to Prevent Race-Attacks.
PCM (1) 2004: 556-563 |
5 | EE | Song-hwa Chae,
Wonil Kim,
Dong-Kyoo Kim:
Efficient Role Based Access Control Method in Wireless Environment.
PWC 2004: 431-439 |
4 | EE | Gunhee Lee,
Wonil Kim,
Dong-Kyoo Kim,
Hongjin Yeh:
Effective Web-Related Resource Security Using Distributed Role Hierarchy.
WAIM 2004: 87-96 |
2003 |
3 | EE | Gunhee Lee,
Hongjin Yeh,
Wonil Kim,
Dong-Kyoo Kim:
Web Security Using Distributed Role Hierarchy.
GCC (1) 2003: 1087-1090 |
2 | EE | Song-hwa Chae,
Wonil Kim,
Dong-Kyoo Kim:
A Novel Approach to Role-Based Access Control.
International Conference on Computational Science 2003: 1060-1068 |
2000 |
1 | | Seong-Won Yuk,
Dong-Ho Cho,
Min-Gyu Kang,
Dong-Kyoo Kim,
Byung-Cheol Shin:
Adaptive Redundancy Control for Systematic Erasure Code Based Real Time Data Transmission in Internet.
ICC (3) 2000: 1769-1773 |