2008 |
41 | EE | Deqing Zou,
Jong Hyuk Park,
Laurence Tianruo Yang,
Zhensong Liao,
Tai-Hoon Kim:
A Formal Framework for Expressing Trust Negotiation in the Ubiquitous Computing Environment.
UIC 2008: 35-45 |
40 | EE | Govardhanan Kousalya,
P. Narayanasamy,
Jong Hyuk Park,
Tai-Hoon Kim:
Predictive handoff mechanism with real-time mobility tracking in a campus wide wireless network considering ITS.
Computer Communications 31(12): 2781-2789 (2008) |
39 | EE | Deok-Gyu Lee,
Jong Hyuk Park,
Tai-Hoon Kim,
Laurence Tianruo Yang:
U-multimedia framework: a secure and intelligent multimedia service framework based on context information in U-home.
The Journal of Supercomputing 45(1): 88-104 (2008) |
2007 |
38 | | Marcin S. Szczuka,
Daniel Howard,
Dominik Slezak,
Haeng-Kon Kim,
Tai-Hoon Kim,
Il Seok Ko,
Geuk Lee,
Peter M. A. Sloot:
Advances in Hybrid Information Technology, First International Conference, ICHIT 2006, Jeju Island, Korea, November 9-11, 2006, Revised Selected Papers
Springer 2007 |
37 | EE | Firdous Kausar,
Sajid Hussain,
Tai-Hoon Kim,
Ashraf Masood:
Attack-Resilient Random Key Distribution Scheme for Distributed Sensor Networks.
EUC Workshops 2007: 1-11 |
36 | EE | Chang Sun,
Hong-Jun Wang,
Hua Li,
Tai-Hoon Kim:
Perceptually Adaptive Lagrange Multiplier for Rate-Distortion Optimization in H.264.
FGCN (1) 2007: 459-463 |
35 | EE | Majid Alkaee Taleghan,
Amirhosein Taherkordi,
Mohsen Sharifi,
Tai-Hoon Kim:
A Survey of System Software for Wireless Sensor Networks.
FGCN (2) 2007: 402-407 |
34 | EE | Deqing Zou,
Jong Hyuk Park,
Tai-Hoon Kim,
Xueguang Chen:
Integrating Attribute and Status Constraint into the RBAC Model for Access Control in Ubiquitous Systems.
FGCN (2) 2007: 71-75 |
33 | EE | Minseong Ju,
Seoksoo Kim,
Tai-Hoon Kim:
A Study on Digital Media Security by Hopfield Neural Network.
ISNN (3) 2007: 140-146 |
32 | EE | Jae-Dong Shin,
Sang-Soo Yeo,
Tai-Hoon Kim,
Sung Kwon Kim:
Hybrid Tag Anti-collision Algorithms in RFID Systems.
International Conference on Computational Science (4) 2007: 693-700 |
31 | EE | Tai-Hoon Kim,
Kouich Sakurai,
Sun-myung Hwang:
Induction and Implementation of Security Requirements in Each System Block.
MMM (2) 2007: 694-701 |
2006 |
30 | EE | Tai-Hoon Kim,
Seoksoo Kim,
Hee-Un Park,
Myoung-sub Kim:
Analysis of Security Session Reusing in Distribution Server System.
ICCSA (5) 2006: 700-707 |
29 | EE | In-hye Seo,
Heau-jo Kang,
Tai-Hoon Kim:
Performance Analysis of Adaptive Digital FPU Transmission System in Fading Environment.
ICIC (1) 2006: 1062-1071 |
28 | EE | Mingyun Kang,
Minseong Ju,
Tai-Hoon Kim,
Geuk Lee,
Kyung Sung:
A Study on the Improvement of Military Logistics System Using RFID.
ICIC (1) 2006: 1098-1102 |
27 | EE | Geuk Lee,
Il Seok Ko,
Tai-Hoon Kim:
A Vulnerability Assessment Tool Based on OVAL in System Block Model.
ICIC (1) 2006: 1115-1120 |
26 | EE | Geuk Lee,
Seoksoo Kim,
Tai-Hoon Kim,
Min Wook Kil:
Convergence Rate in Intelligent Self-organizing Feature Map Using Dynamic Gaussian Function.
KES (2) 2006: 701-708 |
25 | EE | Tai-Hoon Kim,
Sun-myoung Hwang:
Intelligent Method for Building Security Countermeasures.
KES (2) 2006: 745-750 |
24 | EE | Tai-Hoon Kim:
Security Requirements for Ubiquitous Software Development Site.
KES (2) 2006: 836-843 |
2005 |
23 | EE | Sang-Yule Choi,
Myong-chul Shin,
Nam-Young Hur,
Jong-Boo Kim,
Tai-Hoon Kim,
Jae Sang Cha:
Distribution Data Security System Based on Web Based Active Database.
ICCSA (2) 2005: 341-352 |
22 | EE | Jae Sang Cha,
Kyungsup Kwak,
Sang-Yule Choi,
Tai-Hoon Kim,
Chang Dae Yoon,
Chong Hyun Lee:
Interference-Free ZCD-UWB for Wireless Home Network Applications.
ICCSA (2) 2005: 429-441 |
21 | EE | Tai-Hoon Kim,
Seung-youn Lee:
Design Procedure of IT Systems Security Countermeasures.
ICCSA (2) 2005: 468-473 |
20 | EE | Tai-Hoon Kim,
Seung-youn Lee:
Security Evaluation Targets for Enhancement of IT Systems Assurance.
ICCSA (2) 2005: 491-498 |
19 | EE | Sang-Yule Choi,
Myong-chul Shin,
Nam-Young Hur,
Jong-Boo Kim,
Tai-Hoon Kim,
Jae Sang Cha:
Distribution Data Security System Based on Web Based Active Database.
ICCSA (4) 2005: 1319-1330 |
18 | EE | YangSun Lee,
Heau-jo Kang,
Malrey Lee,
Tai-Hoon Kim:
A Study on the Effect of Interference on Time Hopping Binary PPM Impulse Radio System.
ICIC (2) 2005: 665-674 |
17 | EE | Tai-Hoon Kim,
Seung-youn Lee:
A Relationship Between Products Evaluation and IT Systems Assurance.
KES (1) 2005: 1125-1130 |
16 | EE | Tai-Hoon Kim,
Seung-youn Lee:
Intelligent Method for Building Security Countermeasures by Applying Dr. T.H. Kim's Block Model.
KES (2) 2005: 1069-1075 |
15 | EE | Tai-Hoon Kim,
Chang-hwa Hong,
Myoung-sub Kim:
Towards New Areas of Security Engineering.
RSFDGrC (2) 2005: 568-574 |
2004 |
14 | EE | Tai-Hoon Kim,
Dong Chun Lee:
Reduction Method of Threat Phrases by Classifying Assets.
ICCSA (1) 2004: 1052-1059 |
13 | EE | Eun-ser Lee,
Kyung-Whan Lee,
Tai-Hoon Kim,
Il-Hong Jung:
Introduction and Evaluation of Development System Security Process of ISO/IEC TR 15504.
ICCSA (1) 2004: 451-460 |
12 | EE | Haeng-Kon Kim,
Tai-Hoon Kim:
Design on Mobile Secure Electronic Transaction Protocol with Component Based Development.
ICCSA (1) 2004: 461-470 |
11 | EE | Tai-Hoon Kim,
Haeng-Kon Kim:
A Relationship between Security Engineering and Security Evaluation.
ICCSA (4) 2004: 717-724 |
10 | EE | Tai-Hoon Kim,
Myong-chul Shin,
Sang-ho Kim,
Jae Sang Cha:
Security Requirements for Software Development.
KES 2004: 116-122 |
9 | EE | Eun-ser Lee,
Tai-Hoon Kim:
Development Site Security Process of ISO/IEC TR 15504.
KES 2004: 60-66 |
8 | EE | Tai-Hoon Kim,
Ho-yeol Kwon:
Applying Security Engineering to Build Security Countermeasures: An Introduction.
PARA 2004: 957-963 |
7 | EE | Seung-youn Lee,
Myong-chul Shin,
Jae Sang Cha,
Tai-Hoon Kim:
Threat Description for Developing Security Countermeasure.
PCM (1) 2004: 548-555 |
2003 |
6 | EE | Sang-ho Kim,
Eun-ser Kim,
Choon Seong Leem,
Ho-jun Shin,
Tai-Hoon Kim:
SSE-CMM BPs to Meet the Requirements of ALC_DVS.1 Component in CC.
ISCIS 2003: 1069-1075 |
5 | EE | Sang-ho Kim,
Choon Seong Leem,
Tai-Hoon Kim,
Jae-Sung Kim:
Supplement of Security-Related Parts of ISO/IEC TR 15504.
ISCIS 2003: 1084-1089 |
4 | EE | Tai-Hoon Kim,
Byung-Gyu No,
Dong Chun Lee:
Threat Description for the PP by Using the Concept of the Assets Protected by TOE.
International Conference on Computational Science 2003: 605-614 |
3 | EE | Haeng-Kon Kim,
Tai-Hoon Kim,
Jae-Sung Kim:
Reliability Assurance in Development Process for TOE on the Common Criteria.
SERA 2003: 364-375 |
2 | | Haeng-Kon Kim,
Tai-Hoon Kim,
Jae-Sung Kim:
ECSSL Protocol Based on 3B Algorithm.
SNPD 2003: 166-169 |
1 | | Tai-Hoon Kim,
Jae-Sung Kim,
Eun-Kyoung Yi,
Haeng-Kon Kim:
A Study on the Relationship of Assurance Requirements between K Level of KISEC and EAL Level of CC.
SNPD 2003: 170-176 |