2009 |
25 | EE | Abedelaziz Mohaisen,
Dowon Hong,
DaeHun Nyang:
Privacy in Location Based Services: Primitives Toward the Solution
CoRR abs/0903.2682: (2009) |
2008 |
24 | EE | Abedelaziz Mohaisen,
Ik Rae Jeong,
Dowon Hong,
Nam-Su Jho,
DaeHun Nyang:
Data Randomization for Lightweight Secure Data Aggregation in Sensor Network.
UIC 2008: 338-351 |
23 | EE | Abedelaziz Mohaisen,
YoungJae Maeng,
Joenil Kang,
DaeHun Nyang,
KyungHee Lee,
Dowon Hong,
JongWook Han:
Protection Techniques of Secret Information in Non-tamper Proof Devices of Smart Home Network.
UIC 2008: 548-562 |
22 | EE | Tamer AbuHmed,
Abedelaziz Mohaisen,
DaeHun Nyang:
A Survey on Deep Packet Inspection for Intrusion Detection Systems
CoRR abs/0803.0037: (2008) |
21 | EE | Abedelaziz Mohaisen,
DaeHun Nyang,
KyungHee Lee:
Hierarchical Grid-Based Pairwise Key Pre-distribution in Wireless Sensor Networks
CoRR abs/0803.1111: (2008) |
20 | EE | Abedelaziz Mohaisen,
DaeHun Nyang,
Tamer AbuHmed:
Two-level Key Pool Design-based Random Key Pre-distribution in Wireless Sensor Networks.
TIIS 2(5): 222-238 (2008) |
2007 |
19 | EE | DaeHun Nyang,
KyungHee Lee:
Fuzzy Face Vault: How to Implement Fuzzy Vault with Weighted Features.
HCI (5) 2007: 491-496 |
18 | EE | Young-Geun Choi,
Jeonil Kang,
DaeHun Nyang:
Proactive Code Verification Protocol in Wireless Sensor Network.
ICCSA (2) 2007: 1085-1096 |
17 | EE | Jeonil Kang,
DaeHun Nyang,
Abedelaziz Mohaisen,
Young-Geun Choi,
KoonSoon Kim:
Certificate Issuing Using Proxy and Threshold Signatures in Self-initialized Ad Hoc Network.
ICCSA (3) 2007: 886-899 |
16 | EE | Abedelaziz Mohaisen,
DaeHun Nyang,
YoungJae Maeng,
KyungHee Lee:
Structures for Communication-Efficient Public Key Revocation in Ubiquitous Sensor Network.
MSN 2007: 822-833 |
15 | EE | Abedelaziz Mohaisen,
YoungJae Maeng,
DaeHun Nyang:
On Grid-Based Key Pre-distribution: Toward a Better Connectivity in Wireless Sensor Network.
PAKDD Workshops 2007: 527-537 |
14 | EE | YoungJae Maeng,
Abedelaziz Mohaisen,
DaeHun Nyang:
Secret Key Revocation in Sensor Networks.
UIC 2007: 1222-1232 |
13 | EE | Sinkyu Kim,
Jae-Woo Choi,
DaeHun Nyang,
GeneBeck Hahn,
JooSeok Song:
Smart Proactive Caching Scheme for Fast Authenticated Handoff in Wireless LAN.
J. Comput. Sci. Technol. 22(3): 476-480 (2007) |
2006 |
12 | EE | Zhu Lei,
DaeHun Nyang,
KyungHee Lee,
Hyotaek Lim:
Fair Reputation Evaluating Protocol for Mobile Ad Hoc Network.
CIS 2006: 683-693 |
11 | EE | HongKi Lee,
DaeHun Nyang,
JooSeok Song:
Message and Its Origin Authentication Protocol for Data Aggregation in Sensor Networks.
EUC Workshops 2006: 281-290 |
10 | EE | Abedelaziz Mohaisen,
DaeHun Nyang:
Hierarchical Grid-Based Pairwise Key Predistribution Scheme for Wireless Sensor Networks.
EWSN 2006: 83-98 |
9 | EE | JiHyung Lim,
DaeHun Nyang,
Jeonil Kang,
KyungHee Lee,
Hyotaek Lim:
Distributed Certificate Authority Under the GRID-Location Aided Routing Protocol.
ICCSA (4) 2006: 380-387 |
8 | EE | DaeHun Nyang,
Abedelaziz Mohaisen:
Cooperative Public Key Authentication Protocol in Wireless Sensor Network.
UIC 2006: 864-873 |
2005 |
7 | EE | Jeonil Kang,
DaeHun Nyang:
RFID Authentication Protocol with Strong Resistance Against Traceability and Denial of Service Attacks.
ESAS 2005: 164-175 |
6 | EE | JuSung Park,
Jeonil Kang,
DaeHun Nyang:
Selective Collision Based Medium Access Control Protocol for Proactive Protection of Privacy for RFID.
EUC Workshops 2005: 383-392 |
5 | EE | Jeonil Kang,
DaeHun Nyang,
KyungHee Lee:
Two Factor Face Authentication Scheme with Cancelable Feature.
IWBRS 2005: 67-76 |
2004 |
4 | EE | Hyotaek Lim,
DaeHun Nyang,
David Hung-Chang Du:
An Efficient Video Prefix-Caching Scheme in Wide Area Networks.
ICOIN 2004: 679-688 |
3 | EE | You Sung Kang,
KyungHee Oh,
ByungHo Chung,
Kyoil Chung,
DaeHun Nyang:
Analysis and Countermeasure on Vulnerability of WPA Key Exchange Mechanism.
ICOIN 2004: 915-924 |
1999 |
2 | | DaeHun Nyang,
JooSeok Song:
Preventing Double-Spent Coins from Revealing User's Whole Secret.
ICISC 1999: 30-37 |
1 | EE | DaeHun Nyang,
S. Y. Lim,
JooSeok Song:
A complete test sequence using cyclic sequence for conformance testing.
Computer Communications 22(15-16): 1447-1456 (1999) |