BibTeX records: Jungchan Na

download as .bib file

@inproceedings{DBLP:conf/mue/SohnNL17,
  author       = {Seon{-}Gyoung Sohn and
                  Jungchan Na and
                  Kyung{-}Soo Lim},
  editor       = {James Jong Hyuk Park and
                  Shu{-}Ching Chen and
                  Kim{-}Kwang Raymond Choo},
  title        = {Development of Unidirectional Security Gateway Satisfying Security
                  Functional Requirements},
  booktitle    = {Advanced Multimedia and Ubiquitous Engineering - MUE/FutureTech 2017,
                  Seoul, Korea, 22-24 May 2017},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {448},
  pages        = {709--714},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-981-10-5041-1\_113},
  doi          = {10.1007/978-981-10-5041-1\_113},
  timestamp    = {Wed, 22 Jul 2020 12:38:11 +0200},
  biburl       = {https://dblp.org/rec/conf/mue/SohnNL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ictc/HeoN16,
  author       = {Youngjun Heo and
                  Jungchan Na},
  title        = {Development of unidirectional security gateway appliance using intel
                  82580EB {NIC} interface},
  booktitle    = {International Conference on Information and Communication Technology
                  Convergence, {ICTC} 2016, Jeju Island, South Korea, October 19-21,
                  2016},
  pages        = {1194--1196},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICTC.2016.7763404},
  doi          = {10.1109/ICTC.2016.7763404},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/ictc/HeoN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/SimN14,
  author       = {Jaebum Sim and
                  Jungchan Na},
  title        = {Secure firmware architecture using virtual hard disks},
  booktitle    = {10th International Conference on Information Assurance and Security,
                  {IAS} 2014, Okinawa, Japan, November 28-30, 2014},
  pages        = {66--70},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ISIAS.2014.7064622},
  doi          = {10.1109/ISIAS.2014.7064622},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/SimN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ncm/KimN08,
  author       = {Jonghyun Kim and
                  Jungchan Na},
  editor       = {Jinhwa Kim and
                  Dursun Delen and
                  Jinsoo Park and
                  Franz Ko and
                  Yun Ji Na},
  title        = {An Efficient Algorithm for Intrusion Source Identification},
  booktitle    = {{NCM} 2008, The Fourth International Conference on Networked Computing
                  and Advanced Information Management, Gyeongju, Korea, September 2-4,
                  2008 - Volume 2},
  pages        = {188--190},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/NCM.2008.198},
  doi          = {10.1109/NCM.2008.198},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ncm/KimN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ncm/RyuN08,
  author       = {Jongho Ryu and
                  Jungchan Na},
  editor       = {Jinhwa Kim and
                  Dursun Delen and
                  Jinsoo Park and
                  Franz Ko and
                  Yun Ji Na},
  title        = {Security Requirement for Cyber Attack Traceback},
  booktitle    = {{NCM} 2008, The Fourth International Conference on Networked Computing
                  and Advanced Information Management, Gyeongju, Korea, September 2-4,
                  2008 - Volume 2},
  pages        = {653--658},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/NCM.2008.188},
  doi          = {10.1109/NCM.2008.188},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ncm/RyuN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ACISicis/KimKN05,
  author       = {Geonlyang Kim and
                  Jinoh Kim and
                  Jungchan Na},
  title        = {Design and Implementation of Policy Decision Point in Policy-Based
                  Network},
  booktitle    = {4th Annual {ACIS} International Conference on Computer and Information
                  Science {(ICIS} 2005), 14-16 July 2005, Jeju Island, South Korea},
  pages        = {534--538},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/ICIS.2005.46},
  doi          = {10.1109/ICIS.2005.46},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ACISicis/KimKN05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ciit/KimKNJ04,
  author       = {Geonlyang Kim and
                  Jinoh Kim and
                  Jungchan Na and
                  Jongsoo Jang},
  editor       = {M. H. Hamza},
  title        = {Role-based policy distribution techniques in policy-based networks},
  booktitle    = {{IASTED} International Conference on Communications, Internet, and
                  Information Technology, November 22 - 24, 2004, St. Thomas, {US} Virgin
                  Islands, {USA}},
  pages        = {103--107},
  publisher    = {{IASTED/ACTA} Press},
  year         = {2004},
  timestamp    = {Thu, 05 Jul 2018 07:27:58 +0200},
  biburl       = {https://dblp.org/rec/conf/ciit/KimKNJ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics