![]() | ![]() |
2007 | ||
---|---|---|
5 | EE | Do Hyeon Lee, Doo-young Kim, Jae-il Jung: Mobile Agent Based Intrusion Detection System Adopting Hidden Markov Model. ICCSA (2) 2007: 122-130 |
4 | EE | Do Hyeon Lee, Sun Choi, Ji-hyeon Choi, Jae-il Jung: Location-Aided Secure Routing Scheme in Mobile Ad Hoc Networks. ICCSA (2) 2007: 131-139 |
3 | EE | Jeom Goo Kim, Do Hyeon Lee, Jeog-bae Lee: A Design of Fair Blind Signatures Protocol Using PVNIOT. ICCSA (2) 2007: 140-147 |
2 | EE | Jeom Goo Kim, Do Hyeon Lee: An Access Control Using SPKI Certificate in Peer-to-Peer Environment. ICCSA (2) 2007: 148-156 |
2006 | ||
1 | EE | Do Hyeon Lee, Jeom Goo Kim: Conversion Scheme for Reducing Security Vulnerability in IPv4/ IPv6 Networks. KES (3) 2006: 564-571 |
1 | Ji-hyeon Choi | [4] |
2 | Sun Choi | [4] |
3 | Jae-il Jung | [4] [5] |
4 | Doo-young Kim | [5] |
5 | Jeom Goo Kim | [1] [2] [3] |
6 | Jeog-bae Lee | [3] |