dblp.uni-trier.dewww.uni-trier.de

Tai-Hoon Kim

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2008
41EEDeqing Zou, Jong Hyuk Park, Laurence Tianruo Yang, Zhensong Liao, Tai-Hoon Kim: A Formal Framework for Expressing Trust Negotiation in the Ubiquitous Computing Environment. UIC 2008: 35-45
40EEGovardhanan Kousalya, P. Narayanasamy, Jong Hyuk Park, Tai-Hoon Kim: Predictive handoff mechanism with real-time mobility tracking in a campus wide wireless network considering ITS. Computer Communications 31(12): 2781-2789 (2008)
39EEDeok-Gyu Lee, Jong Hyuk Park, Tai-Hoon Kim, Laurence Tianruo Yang: U-multimedia framework: a secure and intelligent multimedia service framework based on context information in U-home. The Journal of Supercomputing 45(1): 88-104 (2008)
2007
38 Marcin S. Szczuka, Daniel Howard, Dominik Slezak, Haeng-Kon Kim, Tai-Hoon Kim, Il Seok Ko, Geuk Lee, Peter M. A. Sloot: Advances in Hybrid Information Technology, First International Conference, ICHIT 2006, Jeju Island, Korea, November 9-11, 2006, Revised Selected Papers Springer 2007
37EEFirdous Kausar, Sajid Hussain, Tai-Hoon Kim, Ashraf Masood: Attack-Resilient Random Key Distribution Scheme for Distributed Sensor Networks. EUC Workshops 2007: 1-11
36EEChang Sun, Hong-Jun Wang, Hua Li, Tai-Hoon Kim: Perceptually Adaptive Lagrange Multiplier for Rate-Distortion Optimization in H.264. FGCN (1) 2007: 459-463
35EEMajid Alkaee Taleghan, Amirhosein Taherkordi, Mohsen Sharifi, Tai-Hoon Kim: A Survey of System Software for Wireless Sensor Networks. FGCN (2) 2007: 402-407
34EEDeqing Zou, Jong Hyuk Park, Tai-Hoon Kim, Xueguang Chen: Integrating Attribute and Status Constraint into the RBAC Model for Access Control in Ubiquitous Systems. FGCN (2) 2007: 71-75
33EEMinseong Ju, Seoksoo Kim, Tai-Hoon Kim: A Study on Digital Media Security by Hopfield Neural Network. ISNN (3) 2007: 140-146
32EEJae-Dong Shin, Sang-Soo Yeo, Tai-Hoon Kim, Sung Kwon Kim: Hybrid Tag Anti-collision Algorithms in RFID Systems. International Conference on Computational Science (4) 2007: 693-700
31EETai-Hoon Kim, Kouich Sakurai, Sun-myung Hwang: Induction and Implementation of Security Requirements in Each System Block. MMM (2) 2007: 694-701
2006
30EETai-Hoon Kim, Seoksoo Kim, Hee-Un Park, Myoung-sub Kim: Analysis of Security Session Reusing in Distribution Server System. ICCSA (5) 2006: 700-707
29EEIn-hye Seo, Heau-jo Kang, Tai-Hoon Kim: Performance Analysis of Adaptive Digital FPU Transmission System in Fading Environment. ICIC (1) 2006: 1062-1071
28EEMingyun Kang, Minseong Ju, Tai-Hoon Kim, Geuk Lee, Kyung Sung: A Study on the Improvement of Military Logistics System Using RFID. ICIC (1) 2006: 1098-1102
27EEGeuk Lee, Il Seok Ko, Tai-Hoon Kim: A Vulnerability Assessment Tool Based on OVAL in System Block Model. ICIC (1) 2006: 1115-1120
26EEGeuk Lee, Seoksoo Kim, Tai-Hoon Kim, Min Wook Kil: Convergence Rate in Intelligent Self-organizing Feature Map Using Dynamic Gaussian Function. KES (2) 2006: 701-708
25EETai-Hoon Kim, Sun-myoung Hwang: Intelligent Method for Building Security Countermeasures. KES (2) 2006: 745-750
24EETai-Hoon Kim: Security Requirements for Ubiquitous Software Development Site. KES (2) 2006: 836-843
2005
23EESang-Yule Choi, Myong-chul Shin, Nam-Young Hur, Jong-Boo Kim, Tai-Hoon Kim, Jae Sang Cha: Distribution Data Security System Based on Web Based Active Database. ICCSA (2) 2005: 341-352
22EEJae Sang Cha, Kyungsup Kwak, Sang-Yule Choi, Tai-Hoon Kim, Chang Dae Yoon, Chong Hyun Lee: Interference-Free ZCD-UWB for Wireless Home Network Applications. ICCSA (2) 2005: 429-441
21EETai-Hoon Kim, Seung-youn Lee: Design Procedure of IT Systems Security Countermeasures. ICCSA (2) 2005: 468-473
20EETai-Hoon Kim, Seung-youn Lee: Security Evaluation Targets for Enhancement of IT Systems Assurance. ICCSA (2) 2005: 491-498
19EESang-Yule Choi, Myong-chul Shin, Nam-Young Hur, Jong-Boo Kim, Tai-Hoon Kim, Jae Sang Cha: Distribution Data Security System Based on Web Based Active Database. ICCSA (4) 2005: 1319-1330
18EEYangSun Lee, Heau-jo Kang, Malrey Lee, Tai-Hoon Kim: A Study on the Effect of Interference on Time Hopping Binary PPM Impulse Radio System. ICIC (2) 2005: 665-674
17EETai-Hoon Kim, Seung-youn Lee: A Relationship Between Products Evaluation and IT Systems Assurance. KES (1) 2005: 1125-1130
16EETai-Hoon Kim, Seung-youn Lee: Intelligent Method for Building Security Countermeasures by Applying Dr. T.H. Kim's Block Model. KES (2) 2005: 1069-1075
15EETai-Hoon Kim, Chang-hwa Hong, Myoung-sub Kim: Towards New Areas of Security Engineering. RSFDGrC (2) 2005: 568-574
2004
14EETai-Hoon Kim, Dong Chun Lee: Reduction Method of Threat Phrases by Classifying Assets. ICCSA (1) 2004: 1052-1059
13EEEun-ser Lee, Kyung-Whan Lee, Tai-Hoon Kim, Il-Hong Jung: Introduction and Evaluation of Development System Security Process of ISO/IEC TR 15504. ICCSA (1) 2004: 451-460
12EEHaeng-Kon Kim, Tai-Hoon Kim: Design on Mobile Secure Electronic Transaction Protocol with Component Based Development. ICCSA (1) 2004: 461-470
11EETai-Hoon Kim, Haeng-Kon Kim: A Relationship between Security Engineering and Security Evaluation. ICCSA (4) 2004: 717-724
10EETai-Hoon Kim, Myong-chul Shin, Sang-ho Kim, Jae Sang Cha: Security Requirements for Software Development. KES 2004: 116-122
9EEEun-ser Lee, Tai-Hoon Kim: Development Site Security Process of ISO/IEC TR 15504. KES 2004: 60-66
8EETai-Hoon Kim, Ho-yeol Kwon: Applying Security Engineering to Build Security Countermeasures: An Introduction. PARA 2004: 957-963
7EESeung-youn Lee, Myong-chul Shin, Jae Sang Cha, Tai-Hoon Kim: Threat Description for Developing Security Countermeasure. PCM (1) 2004: 548-555
2003
6EESang-ho Kim, Eun-ser Kim, Choon Seong Leem, Ho-jun Shin, Tai-Hoon Kim: SSE-CMM BPs to Meet the Requirements of ALC_DVS.1 Component in CC. ISCIS 2003: 1069-1075
5EESang-ho Kim, Choon Seong Leem, Tai-Hoon Kim, Jae-Sung Kim: Supplement of Security-Related Parts of ISO/IEC TR 15504. ISCIS 2003: 1084-1089
4EETai-Hoon Kim, Byung-Gyu No, Dong Chun Lee: Threat Description for the PP by Using the Concept of the Assets Protected by TOE. International Conference on Computational Science 2003: 605-614
3EEHaeng-Kon Kim, Tai-Hoon Kim, Jae-Sung Kim: Reliability Assurance in Development Process for TOE on the Common Criteria. SERA 2003: 364-375
2 Haeng-Kon Kim, Tai-Hoon Kim, Jae-Sung Kim: ECSSL Protocol Based on 3B Algorithm. SNPD 2003: 166-169
1 Tai-Hoon Kim, Jae-Sung Kim, Eun-Kyoung Yi, Haeng-Kon Kim: A Study on the Relationship of Assurance Requirements between K Level of KISEC and EAL Level of CC. SNPD 2003: 170-176

Coauthor Index

1Jae Sang Cha [7] [10] [19] [22] [23]
2Xueguang Chen [34]
3Sang-Yule Choi [19] [22] [23]
4Chang-hwa Hong [15]
5Daniel Howard [38]
6Nam-Young Hur [19] [23]
7Sajid Hussain [37]
8Sun-myoung Hwang [25]
9Sun-myung Hwang [31]
10Minseong Ju [28] [33]
11Il-Hong Jung [13]
12Heau-jo Kang [18] [29]
13Mingyun Kang [28]
14Firdous Kausar [37]
15Min Wook Kil [26]
16Eun-ser Kim [6]
17Haeng-Kon Kim [1] [2] [3] [11] [12] [38]
18Jae-Sung Kim [1] [2] [3] [5]
19Jong-Boo Kim [19] [23]
20Myoung-sub Kim [15] [30]
21Sang-ho Kim [5] [6] [10]
22Seoksoo Kim [26] [30] [33]
23Sung Kwon Kim [32]
24Il Seok Ko [27] [38]
25Govardhanan Kousalya [40]
26Kyungsup Kwak [22]
27Ho-yeol Kwon [8]
28Chong Hyun Lee [22]
29Deok-Gyu Lee [39]
30Dong Chun Lee [4] [14]
31Eun-ser Lee [9] [13]
32Geuk Lee [26] [27] [28] [38]
33Kyung-Whan Lee [13]
34Malrey Lee [18]
35Seung-youn Lee [7] [16] [17] [20] [21]
36YangSun Lee [18]
37Choon Seong Leem [5] [6]
38Hua Li [36]
39Zhensong Liao [41]
40Ashraf Masood [37]
41P. Narayanasamy [40]
42Byung-Gyu No [4]
43Hee-Un Park [30]
44Jong Hyuk Park [34] [39] [40] [41]
45Kouich Sakurai [31]
46In-hye Seo [29]
47Mohsen Sharifi [35]
48Ho-jun Shin [6]
49Jae-Dong Shin [32]
50Myong-chul Shin [7] [10] [19] [23]
51Dominik Slezak [38]
52Peter M. A. Sloot [38]
53Chang Sun [36]
54Kyung Sung [28]
55Marcin S. Szczuka [38]
56Amirhosein Taherkordi [35]
57Majid Alkaee Taleghan [35]
58Hong-Jun Wang [36]
59Laurence Tianruo Yang [39] [41]
60Sang-Soo Yeo (Sang Soo Yeo) [32]
61Eun-Kyoung Yi [1]
62Chang Dae Yoon [22]
63Deqing Zou [34] [41]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)