2008 | ||
---|---|---|
41 | EE | Deqing Zou, Jong Hyuk Park, Laurence Tianruo Yang, Zhensong Liao, Tai-Hoon Kim: A Formal Framework for Expressing Trust Negotiation in the Ubiquitous Computing Environment. UIC 2008: 35-45 |
40 | EE | Govardhanan Kousalya, P. Narayanasamy, Jong Hyuk Park, Tai-Hoon Kim: Predictive handoff mechanism with real-time mobility tracking in a campus wide wireless network considering ITS. Computer Communications 31(12): 2781-2789 (2008) |
39 | EE | Deok-Gyu Lee, Jong Hyuk Park, Tai-Hoon Kim, Laurence Tianruo Yang: U-multimedia framework: a secure and intelligent multimedia service framework based on context information in U-home. The Journal of Supercomputing 45(1): 88-104 (2008) |
2007 | ||
38 | Marcin S. Szczuka, Daniel Howard, Dominik Slezak, Haeng-Kon Kim, Tai-Hoon Kim, Il Seok Ko, Geuk Lee, Peter M. A. Sloot: Advances in Hybrid Information Technology, First International Conference, ICHIT 2006, Jeju Island, Korea, November 9-11, 2006, Revised Selected Papers Springer 2007 | |
37 | EE | Firdous Kausar, Sajid Hussain, Tai-Hoon Kim, Ashraf Masood: Attack-Resilient Random Key Distribution Scheme for Distributed Sensor Networks. EUC Workshops 2007: 1-11 |
36 | EE | Chang Sun, Hong-Jun Wang, Hua Li, Tai-Hoon Kim: Perceptually Adaptive Lagrange Multiplier for Rate-Distortion Optimization in H.264. FGCN (1) 2007: 459-463 |
35 | EE | Majid Alkaee Taleghan, Amirhosein Taherkordi, Mohsen Sharifi, Tai-Hoon Kim: A Survey of System Software for Wireless Sensor Networks. FGCN (2) 2007: 402-407 |
34 | EE | Deqing Zou, Jong Hyuk Park, Tai-Hoon Kim, Xueguang Chen: Integrating Attribute and Status Constraint into the RBAC Model for Access Control in Ubiquitous Systems. FGCN (2) 2007: 71-75 |
33 | EE | Minseong Ju, Seoksoo Kim, Tai-Hoon Kim: A Study on Digital Media Security by Hopfield Neural Network. ISNN (3) 2007: 140-146 |
32 | EE | Jae-Dong Shin, Sang-Soo Yeo, Tai-Hoon Kim, Sung Kwon Kim: Hybrid Tag Anti-collision Algorithms in RFID Systems. International Conference on Computational Science (4) 2007: 693-700 |
31 | EE | Tai-Hoon Kim, Kouich Sakurai, Sun-myung Hwang: Induction and Implementation of Security Requirements in Each System Block. MMM (2) 2007: 694-701 |
2006 | ||
30 | EE | Tai-Hoon Kim, Seoksoo Kim, Hee-Un Park, Myoung-sub Kim: Analysis of Security Session Reusing in Distribution Server System. ICCSA (5) 2006: 700-707 |
29 | EE | In-hye Seo, Heau-jo Kang, Tai-Hoon Kim: Performance Analysis of Adaptive Digital FPU Transmission System in Fading Environment. ICIC (1) 2006: 1062-1071 |
28 | EE | Mingyun Kang, Minseong Ju, Tai-Hoon Kim, Geuk Lee, Kyung Sung: A Study on the Improvement of Military Logistics System Using RFID. ICIC (1) 2006: 1098-1102 |
27 | EE | Geuk Lee, Il Seok Ko, Tai-Hoon Kim: A Vulnerability Assessment Tool Based on OVAL in System Block Model. ICIC (1) 2006: 1115-1120 |
26 | EE | Geuk Lee, Seoksoo Kim, Tai-Hoon Kim, Min Wook Kil: Convergence Rate in Intelligent Self-organizing Feature Map Using Dynamic Gaussian Function. KES (2) 2006: 701-708 |
25 | EE | Tai-Hoon Kim, Sun-myoung Hwang: Intelligent Method for Building Security Countermeasures. KES (2) 2006: 745-750 |
24 | EE | Tai-Hoon Kim: Security Requirements for Ubiquitous Software Development Site. KES (2) 2006: 836-843 |
2005 | ||
23 | EE | Sang-Yule Choi, Myong-chul Shin, Nam-Young Hur, Jong-Boo Kim, Tai-Hoon Kim, Jae Sang Cha: Distribution Data Security System Based on Web Based Active Database. ICCSA (2) 2005: 341-352 |
22 | EE | Jae Sang Cha, Kyungsup Kwak, Sang-Yule Choi, Tai-Hoon Kim, Chang Dae Yoon, Chong Hyun Lee: Interference-Free ZCD-UWB for Wireless Home Network Applications. ICCSA (2) 2005: 429-441 |
21 | EE | Tai-Hoon Kim, Seung-youn Lee: Design Procedure of IT Systems Security Countermeasures. ICCSA (2) 2005: 468-473 |
20 | EE | Tai-Hoon Kim, Seung-youn Lee: Security Evaluation Targets for Enhancement of IT Systems Assurance. ICCSA (2) 2005: 491-498 |
19 | EE | Sang-Yule Choi, Myong-chul Shin, Nam-Young Hur, Jong-Boo Kim, Tai-Hoon Kim, Jae Sang Cha: Distribution Data Security System Based on Web Based Active Database. ICCSA (4) 2005: 1319-1330 |
18 | EE | YangSun Lee, Heau-jo Kang, Malrey Lee, Tai-Hoon Kim: A Study on the Effect of Interference on Time Hopping Binary PPM Impulse Radio System. ICIC (2) 2005: 665-674 |
17 | EE | Tai-Hoon Kim, Seung-youn Lee: A Relationship Between Products Evaluation and IT Systems Assurance. KES (1) 2005: 1125-1130 |
16 | EE | Tai-Hoon Kim, Seung-youn Lee: Intelligent Method for Building Security Countermeasures by Applying Dr. T.H. Kim's Block Model. KES (2) 2005: 1069-1075 |
15 | EE | Tai-Hoon Kim, Chang-hwa Hong, Myoung-sub Kim: Towards New Areas of Security Engineering. RSFDGrC (2) 2005: 568-574 |
2004 | ||
14 | EE | Tai-Hoon Kim, Dong Chun Lee: Reduction Method of Threat Phrases by Classifying Assets. ICCSA (1) 2004: 1052-1059 |
13 | EE | Eun-ser Lee, Kyung-Whan Lee, Tai-Hoon Kim, Il-Hong Jung: Introduction and Evaluation of Development System Security Process of ISO/IEC TR 15504. ICCSA (1) 2004: 451-460 |
12 | EE | Haeng-Kon Kim, Tai-Hoon Kim: Design on Mobile Secure Electronic Transaction Protocol with Component Based Development. ICCSA (1) 2004: 461-470 |
11 | EE | Tai-Hoon Kim, Haeng-Kon Kim: A Relationship between Security Engineering and Security Evaluation. ICCSA (4) 2004: 717-724 |
10 | EE | Tai-Hoon Kim, Myong-chul Shin, Sang-ho Kim, Jae Sang Cha: Security Requirements for Software Development. KES 2004: 116-122 |
9 | EE | Eun-ser Lee, Tai-Hoon Kim: Development Site Security Process of ISO/IEC TR 15504. KES 2004: 60-66 |
8 | EE | Tai-Hoon Kim, Ho-yeol Kwon: Applying Security Engineering to Build Security Countermeasures: An Introduction. PARA 2004: 957-963 |
7 | EE | Seung-youn Lee, Myong-chul Shin, Jae Sang Cha, Tai-Hoon Kim: Threat Description for Developing Security Countermeasure. PCM (1) 2004: 548-555 |
2003 | ||
6 | EE | Sang-ho Kim, Eun-ser Kim, Choon Seong Leem, Ho-jun Shin, Tai-Hoon Kim: SSE-CMM BPs to Meet the Requirements of ALC_DVS.1 Component in CC. ISCIS 2003: 1069-1075 |
5 | EE | Sang-ho Kim, Choon Seong Leem, Tai-Hoon Kim, Jae-Sung Kim: Supplement of Security-Related Parts of ISO/IEC TR 15504. ISCIS 2003: 1084-1089 |
4 | EE | Tai-Hoon Kim, Byung-Gyu No, Dong Chun Lee: Threat Description for the PP by Using the Concept of the Assets Protected by TOE. International Conference on Computational Science 2003: 605-614 |
3 | EE | Haeng-Kon Kim, Tai-Hoon Kim, Jae-Sung Kim: Reliability Assurance in Development Process for TOE on the Common Criteria. SERA 2003: 364-375 |
2 | Haeng-Kon Kim, Tai-Hoon Kim, Jae-Sung Kim: ECSSL Protocol Based on 3B Algorithm. SNPD 2003: 166-169 | |
1 | Tai-Hoon Kim, Jae-Sung Kim, Eun-Kyoung Yi, Haeng-Kon Kim: A Study on the Relationship of Assurance Requirements between K Level of KISEC and EAL Level of CC. SNPD 2003: 170-176 |