Choong Kyo Jeong

According to our database1, Choong Kyo Jeong authored at least 13 papers between 2005 and 2014.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2014
High Capacity Mobile Multi-Hop Relay Network for Temporary Traffic Surge.
IEICE Trans. Inf. Syst., 2014

2013
A Contents Service Profit Model Based on the Quality of Experience and User Group Characteristics.
Proceedings of the Grid and Pervasive Computing - 8th International Conference, 2013

2012
Performance analysis of authentication and key distribution scheme for mobile multi-hop relay in IEEE 802.16j.
Pers. Ubiquitous Comput., 2012

2009
Hybrid Authentication and Key Distribution Scheme for Wireless Mobile Multi-Hop Networks.
IEICE Trans. Commun., 2009

Design of hybrid authentication scheme and key distribution for mobile multi-hop relay in IEEE 802.16j.
Proceedings of the 2009 Euro American conference on Telematics and Information Systems: New Opportunities to increase Digital Citizenship, 2009

2008
Optimal TCP segment size for mobile server access over wireless links of cellular networks.
Wirel. Commun. Mob. Comput., 2008

2007
Re-key Interval Optimization for Secure Group Communications.
J. Inf. Sci. Eng., 2007

Optimal Frame Payload Size for Mobile Communications over Wireless Links of Cellular Networks.
J. Inf. Sci. Eng., 2007

Bio-AdHoc Sensor Networks for Early Disaster Warning.
IEICE Trans. Commun., 2007

A Binding Framework Using the Dynamic Component Exchange Technique for Heterogeneous Services.
Proceedings of the 5th ACIS International Conference on Software Engineering Research, 2007

Design and Analysis of Bio-AdHoc Sensor Networks for Disaster Emergency Management Systems.
Proceedings of the 2007 International Conference on Wireless Networks, 2007

2005
Packet Diversity in Wireless Uplink Channels.
IEICE Trans. Commun., 2005

Design and Implementation of a Data Sharing Scheme with Security and Flexibility Applicable to Extended P2P Systems.
Proceedings of The 2005 International Conference on Security and Management, 2005


  Loading...