Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Jong Wook Han
@inproceedings{DBLP:conf/pdcat/LimLHK18, author = {Kyung{-}Soo Lim and Seoung{-}Hyeon Lee and Jong Wook Han and Geon Woo Kim}, editor = {Jong Hyuk Park and Hong Shen and Yunsick Sung and Hui Tian}, title = {Design Considerations for an Intelligent Video Surveillance System Using Cloud Computing}, booktitle = {Parallel and Distributed Computing, Applications and Technologies, 19th International Conference, {PDCAT} 2018, Jeju Island, South Korea, August 20-22, 2018, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {931}, pages = {84--89}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-981-13-5907-1\_9}, doi = {10.1007/978-981-13-5907-1\_9}, timestamp = {Thu, 28 Nov 2019 09:18:00 +0100}, biburl = {https://dblp.org/rec/conf/pdcat/LimLHK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/KimHLK16, author = {Geon Woo Kim and Jong Wook Han and Deok{-}Gyu Lee and Sang Wook Kim}, title = {Single authentication through in convergence space using collaborative smart cameras}, journal = {Secur. Commun. Networks}, volume = {9}, number = {6}, pages = {561--570}, year = {2016}, url = {https://doi.org/10.1002/sec.1007}, doi = {10.1002/SEC.1007}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/KimHLK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/LeeH14, author = {Deok{-}Gyu Lee and Jong Wook Han}, title = {Flight Protection Data via Dynamic Sensor Networks}, journal = {Int. J. Distributed Sens. Networks}, volume = {10}, year = {2014}, url = {https://doi.org/10.1155/2014/509313}, doi = {10.1155/2014/509313}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdsn/LeeH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/information/LeeKHL14, author = {Seoung{-}Hyeon Lee and Yong{-}Kyun Kim and Jong Wook Han and Deok{-}Gyu Lee}, title = {Protection Method for Data Communication between {ADS-B} Sensor and Next-Generation Air Traffic Control Systems}, journal = {Inf.}, volume = {5}, number = {4}, pages = {622--633}, year = {2014}, url = {https://doi.org/10.3390/info5040622}, doi = {10.3390/INFO5040622}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/information/LeeKHL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/ParkLHK14, author = {Su{-}Wan Park and Deok{-}Gyu Lee and Jong Wook Han and Jeong{-}Nyeo Kim}, title = {Automated and coupled services of advanced smart surveillance systems toward green {IT:} tracking, retrieval and digital evidence}, journal = {J. Supercomput.}, volume = {69}, number = {3}, pages = {1215--1234}, year = {2014}, url = {https://doi.org/10.1007/s11227-014-1164-3}, doi = {10.1007/S11227-014-1164-3}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tjs/ParkLHK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mue/LeeH13, author = {Deok{-}Gyu Lee and Jong Wook Han}, editor = {James J. Park and Joseph Kee{-}Yin Ng and Hwa{-}Young Jeong and Agustinus Borgy Waluyo}, title = {A Based on Single Image Authentication System in Aviation Security}, booktitle = {Multimedia and Ubiquitous Engineering, {MUE} 2013, May 9-11, 2013, Seoul, Korea}, series = {Lecture Notes in Electrical Engineering}, volume = {240}, pages = {293--302}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-94-007-6738-6\_37}, doi = {10.1007/978-94-007-6738-6\_37}, timestamp = {Sun, 04 Jun 2017 10:10:13 +0200}, biburl = {https://dblp.org/rec/conf/mue/LeeH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mue/KimLH13, author = {Yong{-}Kyun Kim and Deok{-}Gyu Lee and Jong Wook Han}, editor = {James J. Park and Joseph Kee{-}Yin Ng and Hwa{-}Young Jeong and Agustinus Borgy Waluyo}, title = {Trajectory Calculation Based on Position and Speed for Effective Air Traffic Flow Management}, booktitle = {Multimedia and Ubiquitous Engineering, {MUE} 2013, May 9-11, 2013, Seoul, Korea}, series = {Lecture Notes in Electrical Engineering}, volume = {240}, pages = {377--384}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-94-007-6738-6\_47}, doi = {10.1007/978-94-007-6738-6\_47}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mue/KimLH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ictc/KimH12a, author = {Mooseop Kim and Jong Wook Han}, title = {Compact hardware architecture for first one detector using priority-based uniform partition}, booktitle = {International Conference on Information and Communication Technology Convergence, {ICTC} 2012, "Global Open Innovation Summit for Smart {ICT} Convergence", Jeju Island, Korea, October 15-17, 2012}, pages = {179--180}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ICTC.2012.6386811}, doi = {10.1109/ICTC.2012.6386811}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/ictc/KimH12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wicomm/JangLHP11, author = {Chol Soon Jang and Deok{-}Gyu Lee and Jong Wook Han and Jong Hyuk Park}, title = {Hybrid security protocol for wireless body area networks}, journal = {Wirel. Commun. Mob. Comput.}, volume = {11}, number = {2}, pages = {277--288}, year = {2011}, url = {https://doi.org/10.1002/wcm.884}, doi = {10.1002/WCM.884}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wicomm/JangLHP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsce/LimLH11, author = {Kyung{-}Soo Lim and Deok{-}Gyu Lee and Jong Wook Han}, title = {A new proposal for a digital evidence container for security convergence}, booktitle = {2011 {IEEE} International Conference on Control System, Computing and Engineering, Penang, Malaysia, November 25-27, 2011}, pages = {171--175}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ICCSCE.2011.6190517}, doi = {10.1109/ICCSCE.2011.6190517}, timestamp = {Wed, 16 Oct 2019 14:14:57 +0200}, biburl = {https://dblp.org/rec/conf/iccsce/LimLH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sta/LeeH11, author = {Deok{-}Gyu Lee and Jong Wook Han}, editor = {Changhoon Lee and Jean{-}Marc Seigneur and James J. Park and Roland R. Wagner}, title = {For Aviation Security Using Surveillance System}, booktitle = {Secure and Trust Computing, Data Management, and Applications - {STA} 2011 Workshops: {IWCS} 2011 and {STAVE} 2011, Loutraki, Greece, June 28-30, 2011. Proceedings}, series = {Communications in Computer and Information Science}, volume = {187}, pages = {103--115}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22365-5\_14}, doi = {10.1007/978-3-642-22365-5\_14}, timestamp = {Mon, 08 Apr 2019 13:00:14 +0200}, biburl = {https://dblp.org/rec/conf/sta/LeeH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/LeeLHK09, author = {Yun{-}kyung Lee and Deok{-}Gyu Lee and Jong Wook Han and Tai{-}Hoon Kim}, title = {Home Network Device Authentication: Device Authentication Framework and Device Certificate Profile}, journal = {Comput. J.}, volume = {52}, number = {8}, pages = {871--877}, year = {2009}, url = {https://doi.org/10.1093/comjnl/bxn038}, doi = {10.1093/COMJNL/BXN038}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/LeeLHK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijahuc/KimLHK09, author = {Geon Woo Kim and Deok{-}Gyu Lee and Jong Wook Han and Sang Wook Kim}, title = {Security policy specification for home network}, journal = {Int. J. Ad Hoc Ubiquitous Comput.}, volume = {4}, number = {6}, pages = {372--378}, year = {2009}, url = {https://doi.org/10.1504/IJAHUC.2009.028665}, doi = {10.1504/IJAHUC.2009.028665}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijahuc/KimLHK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/intr/KimLHLK09, author = {Geon Woo Kim and Deok{-}Gyu Lee and Jong Wook Han and Seung Hyun Lee and Sang Wook Kim}, title = {Security technologies based on a home gateway for making smart homes secure}, journal = {Internet Res.}, volume = {19}, number = {2}, pages = {209--226}, year = {2009}, url = {https://doi.org/10.1108/10662240910952355}, doi = {10.1108/10662240910952355}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/intr/KimLHLK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccnc/LeeHPL10, author = {Deok{-}Gyu Lee and Jong Wook Han and Doo{-}Soon Park and Im{-}Yeong Lee}, title = {Intelligent Pervasive Network Authentication: S/Key Based Device Authentication}, booktitle = {6th {IEEE} Consumer Communications and Networking Conference, {CCNC} 2009, Las Vegas, NV, USA, 10-13 Jan., 2009}, pages = {1--5}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/CCNC.2009.4784994}, doi = {10.1109/CCNC.2009.4784994}, timestamp = {Mon, 09 Aug 2021 14:54:01 +0200}, biburl = {https://dblp.org/rec/conf/ccnc/LeeHPL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cdes/JeonH09, author = {Yong{-}Sung Jeon and Jong Wook Han}, editor = {Hamid R. Arabnia and Ashu M. G. Solo}, title = {Compact Design of a Combined MixColumn/InvMixColumn Transformation Module for {AES}}, booktitle = {Proceedings of the 2009 International Conference on Computer Design, {CDES} 2009, July 13-16, 2009, Las Vegas Nevada, {USA}}, pages = {38--41}, publisher = {{CSREA} Press}, year = {2009}, timestamp = {Thu, 09 Jan 2014 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cdes/JeonH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csreaSAM/OhLHP09, author = {Seung{-}Hee Oh and Deok{-}Gyu Lee and Jong Wook Han and Jong Hyuk Park}, editor = {Hamid R. Arabnia and Kevin Daimi}, title = {The Detection and Response Mechanism against Abnormal Traffic Attack in {ATN} Network}, booktitle = {Proceedings of the 2009 International Conference on Security {\&} Management, {SAM} 2009, July 13-16, 2009, Las Vegas Nevada, USA, 2 Volumes}, pages = {535--540}, publisher = {{CSREA} Press}, year = {2009}, timestamp = {Wed, 04 Nov 2009 14:56:55 +0100}, biburl = {https://dblp.org/rec/conf/csreaSAM/OhLHP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ike/KimH09, author = {Do{-}woo Kim and Jong Wook Han}, editor = {Hamid R. Arabnia and Ray R. Hashemi and Frederick I. Moxley}, title = {A Study on Reliable Communication in {ATN} Environment}, booktitle = {Proceedings of the 2009 International Conference on Information {\&} Knowledge Engineering, {IKE} 2009, July 13-16, 2009, Las Vegas Nevada, USA, 2 Volumes}, pages = {370--373}, publisher = {{CSREA} Press}, year = {2009}, timestamp = {Thu, 09 Jan 2014 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ike/KimH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apscc/OhLH08, author = {Seung{-}Hee Oh and Deok{-}Gyu Lee and Jong Wook Han}, title = {The Mechanism and Requirements for Detecting the Cross-Service Attack}, booktitle = {Proceedings of the 3rd {IEEE} Asia-Pacific Services Computing Conference, {APSCC} 2008, Yilan, Taiwan, 9-12 December 2008}, pages = {656--661}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/APSCC.2008.46}, doi = {10.1109/APSCC.2008.46}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/apscc/OhLH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgcn/LeeCLHL08, author = {Seoung{-}Hyeon Lee and Cheol{-}Joo Chae and Deok{-}Gyu Lee and Jong Wook Han and Jae{-}Kwang Lee}, title = {The Traceback Method about DoS Attack in Open Grid Computing Environment}, booktitle = {The Second International Conference on Future Generation Communication and Networking, {FGCN} 2008, Volume 1, Main Conference, Hainan Island, China, December 13-15, 2008}, pages = {391--394}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/FGCN.2008.144}, doi = {10.1109/FGCN.2008.144}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fgcn/LeeCLHL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobiquitous/LeeLHK08, author = {Yun{-}kyung Lee and Deok{-}Gyu Lee and Jong Wook Han and Jeong{-}Nyeo Kim}, editor = {Vinny Cahill}, title = {The home device authentication system construction for pervasive home network}, booktitle = {5th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking, and Services, MobiQuitous 2008, July 21-25, 2008, Dublin, Ireland}, publisher = {{ICST} / {ACM}}, year = {2008}, url = {https://doi.org/10.4108/ICST.MOBIQUITOUS2008.3858}, doi = {10.4108/ICST.MOBIQUITOUS2008.3858}, timestamp = {Tue, 27 Nov 2018 10:40:37 +0100}, biburl = {https://dblp.org/rec/conf/mobiquitous/LeeLHK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mue/KimLHK08, author = {Geon Woo Kim and Deok{-}Gyu Lee and Jong Wook Han and Sang Wook Kim}, title = {Intelligent Security for Inter-space Surveillance Applications}, booktitle = {2008 International Conference on Multimedia and Ubiquitous Engineering {(MUE} 2008), 24-26 April 2008, Busan, Korea}, pages = {419--422}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/MUE.2008.22}, doi = {10.1109/MUE.2008.22}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mue/KimLHK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uic/MohaisenMKNLHH08, author = {Abedelaziz Mohaisen and YoungJae Maeng and Jeonil Kang and DaeHun Nyang and KyungHee Lee and Dowon Hong and Jong Wook Han}, editor = {Frode Eika Sandnes and Yan Zhang and Chunming Rong and Laurence Tianruo Yang and Jianhua Ma}, title = {Protection Techniques of Secret Information in Non-tamper Proof Devices of Smart Home Network}, booktitle = {Ubiquitous Intelligence and Computing, 5th International Conference, {UIC} 2008, Oslo, Norway, June 23-25, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5061}, pages = {548--562}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-69293-5\_43}, doi = {10.1007/978-3-540-69293-5\_43}, timestamp = {Thu, 01 Feb 2024 20:40:31 +0100}, biburl = {https://dblp.org/rec/conf/uic/MohaisenMKNLHH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uic/LeeHPYJ08, author = {Deok{-}Gyu Lee and Jong Wook Han and Jong Hyuk Park and Sang{-}Soo Yeo and Young{-}Sik Jeong}, editor = {Frode Eika Sandnes and Yan Zhang and Chunming Rong and Laurence Tianruo Yang and Jianhua Ma}, title = {Time Stamp Protocol for Smart Environment Services}, booktitle = {Ubiquitous Intelligence and Computing, 5th International Conference, {UIC} 2008, Oslo, Norway, June 23-25, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5061}, pages = {591--601}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-69293-5\_46}, doi = {10.1007/978-3-540-69293-5\_46}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uic/LeeHPYJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apweb/LeeLHC07, author = {Yun{-}kyung Lee and Deok{-}Gyu Lee and Jong Wook Han and Kyo{-}Il Chung}, editor = {Kevin Chen{-}Chuan Chang and Wei Wang and Lei Chen and Clarence A. Ellis and Ching{-}Hsien Hsu and Ah Chung Tsoi and Haixun Wang}, title = {Home Network Device Authentication: Device Authentication Framework and Device Certificate Profile}, booktitle = {Advances in Web and Network Technologies, and Information Management, APWeb/WAIM 2007 International Workshops: {DBMAN} 2007, WebETrends 2007, {PAIS} 2007 and {ASWAN} 2007, Huang Shan, China, June 16-18, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4537}, pages = {573--582}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72909-9\_64}, doi = {10.1007/978-3-540-72909-9\_64}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/apweb/LeeLHC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/euc/KimLHK07, author = {Geon Woo Kim and Deok{-}Gyu Lee and Jong Wook Han and Sang Wook Kim}, editor = {Mieso K. Denko and Chi{-}Sheng Shih and Kuan{-}Ching Li and Shiao{-}Li Tsao and Qing{-}An Zeng and Soo{-}Hyun Park and Young{-}Bae Ko and Shih{-}Hao Hung and Jong Hyuk Park}, title = {Security Technologies Based on Home Gateway for Making Smart Home Secure}, booktitle = {Emerging Directions in Embedded and Ubiquitous Computing, {EUC} 2007 Workshops: TRUST, WSOC, NCUS, UUWSN, USN, ESO, and SECUBIQ, Taipei, Taiwan, December 17-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4809}, pages = {124--135}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77090-9\_12}, doi = {10.1007/978-3-540-77090-9\_12}, timestamp = {Wed, 22 Jun 2022 09:02:26 +0200}, biburl = {https://dblp.org/rec/conf/euc/KimLHK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgcn/LeeLH07, author = {Yun{-}kyung Lee and Deok{-}Gyu Lee and Jong Wook Han}, title = {Home Device Authentication Method Based on {PKI}}, booktitle = {Future Generation Communication and Networking, {FGCN} 2007, Ramada Plaza Jeju, Jeju-Island, Korea, December 6-8, 2007, Proceedings}, pages = {7--11}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/FGCN.2007.143}, doi = {10.1109/FGCN.2007.143}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fgcn/LeeLH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispa/LeeYKLHC07, author = {Deok{-}Gyu Lee and Ilsun You and Sang{-}Choon Kim and Yun{-}kyung Lee and Jong Wook Han and Kyo{-}Il Chung}, editor = {Parimala Thulasiraman and Xubin He and Tony Li Xu and Mieso K. Denko and Ruppa K. Thulasiram and Laurence Tianruo Yang}, title = {Intelligent Home Network Authentication: S/Key-Based Home Device Authentication}, booktitle = {Frontiers of High Performance Computing and Networking {ISPA} 2007 Workshops, {ISPA} 2007 International Workshops SSDSN, UPWN, WISH, SGC, ParDMCom, HiPCoMB, and {IST-AWSN} Niagara Falls, Canada, August 28 - September 1, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4743}, pages = {214--223}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74767-3\_23}, doi = {10.1007/978-3-540-74767-3\_23}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/ispa/LeeYKLHC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mue/LeeHP07, author = {Deok{-}Gyu Lee and Jong Wook Han and Jong Hyuk Park}, title = {User Authentication for Multi Domain in Home Network Environments}, booktitle = {2007 International Conference on Multimedia and Ubiquitous Engineering {(MUE} 2007), 26-28 April 2007, Seoul, Korea}, pages = {89--96}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/MUE.2007.214}, doi = {10.1109/MUE.2007.214}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mue/LeeHP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/otm/LeeLHPL07, author = {Deok{-}Gyu Lee and Yun{-}kyung Lee and Jong Wook Han and Jong Hyuk Park and Im{-}Yeong Lee}, editor = {Robert Meersman and Zahir Tari}, title = {Intelligent Home Network Authentication: Home Device Authentication Using Device Certification}, booktitle = {On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA, and IS, {OTM} Confederated International Conferences CoopIS, DOA, ODBASE, GADA, and {IS} 2007, Vilamoura, Portugal, November 25-30, 2007, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {4804}, pages = {1688--1700}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76843-2\_40}, doi = {10.1007/978-3-540-76843-2\_40}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/otm/LeeLHPL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pakdd/KimLHKK07, author = {Geon Woo Kim and Deok{-}Gyu Lee and Jong Wook Han and Sang{-}Choon Kim and Sang Wook Kim}, editor = {Takashi Washio and Zhi{-}Hua Zhou and Joshua Zhexue Huang and Xiaohua Hu and Jinyan Li and Chao Xie and Jieyue He and Deqing Zou and Kuan{-}Ching Li and M{\'{a}}rio M. Freire}, title = {Security Framework for Home Network: Authentication, Authorization, and Security Policy}, booktitle = {Emerging Technologies in Knowledge Discovery and Data Mining, {PAKDD} 2007, International Workshops, Nanjing, China, May 22-25, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4819}, pages = {621--628}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77018-3\_61}, doi = {10.1007/978-3-540-77018-3\_61}, timestamp = {Fri, 09 Apr 2021 17:11:17 +0200}, biburl = {https://dblp.org/rec/conf/pakdd/KimLHKK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/euc/HwangLH06, author = {Jin{-}Bum Hwang and Hyungkyu Lee and Jong Wook Han}, editor = {Edwin Hsing{-}Mean Sha and Sung{-}Kook Han and Cheng{-}Zhong Xu and Moon{-}hae Kim and Laurence Tianruo Yang and Bin Xiao}, title = {Efficient and User Friendly Inter-domain Device Authentication/Access Control for Home Networks}, booktitle = {Embedded and Ubiquitous Computing, International Conference, {EUC} 2006, Seoul, Korea, August 1-4, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4096}, pages = {131--140}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11802167\_15}, doi = {10.1007/11802167\_15}, timestamp = {Mon, 20 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/euc/HwangLH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsa/HwangH06, author = {Jin{-}Bum Hwang and Jong Wook Han}, editor = {Marina L. Gavrilova and Osvaldo Gervasi and Vipin Kumar and Chih Jeng Kenneth Tan and David Taniar and Antonio Lagan{\`{a}} and Youngsong Mun and Hyunseung Choo}, title = {A Security Model for Home Networks with Authority Delegation}, booktitle = {Computational Science and Its Applications - {ICCSA} 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {3983}, pages = {360--369}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11751632\_39}, doi = {10.1007/11751632\_39}, timestamp = {Thu, 28 Apr 2022 16:17:38 +0200}, biburl = {https://dblp.org/rec/conf/iccsa/HwangH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icecsys/HwangH05, author = {Jin{-}Bum Hwang and Jong Wook Han}, title = {Privacy enhanced access control mechanism for home networks}, booktitle = {12th {IEEE} International Conference on Electronics, Circuits, and Systems, {ICECS} 2005, Gammarth, Tunisia, December 11-14, 2005}, pages = {1--4}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/ICECS.2005.4633550}, doi = {10.1109/ICECS.2005.4633550}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/icecsys/HwangH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jicce/KimH03, author = {Jung{-}Tae Kim and Jong Wook Han}, title = {Analyses of Crypto Module for Gbps {VPN} System}, journal = {J. Inform. and Commun. Convergence Engineering}, volume = {1}, number = {4}, pages = {213--216}, year = {2003}, url = {http://www.koreascience.or.kr/article/ArticleFullRecord.jsp?cn=E1ICAW\_2003\_v1n4\_213}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jicce/KimH03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isict/LeeHB03, author = {Sang{-}Su Lee and Jong Wook Han and Hyo{-}wook Bae}, title = {The encryption method to share a secret binary image and its decryption system}, booktitle = {Proceedings of the 1st Intenational Symposium on Information and Communication Technologies, Dublin, Ireland, September 24-26, 2003}, series = {{ACM} International Conference Proceeding Series}, volume = {49}, pages = {94--99}, publisher = {Trinity College Dublin}, year = {2003}, url = {https://dl.acm.org/citation.cfm?id=963619}, timestamp = {Mon, 26 Nov 2018 17:05:49 +0100}, biburl = {https://dblp.org/rec/conf/isict/LeeHB03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sip/KimHR03, author = {Ki Hyun Kim and Jong Wook Han and Yong Man Ro}, editor = {M. H. Hamza}, title = {Enhancement of Image Quality in Screen Mark Attack of Watermark}, booktitle = {Signal and Image Processing {(SIP} 2003), Proceedings of the {IASTED} International Conference, August 13-15, 2003, Honolulu, HI, {USA}}, pages = {66--70}, publisher = {{IASTED/ACTA} Press}, year = {2003}, url = {http://www.actapress.com/Abstract.aspx?paperId=15667}, timestamp = {Thu, 09 Jan 2014 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sip/KimHR03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.