DongGook Park

According to our database1, DongGook Park authored at least 15 papers between 1998 and 2013.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2013
An Approach for a Self-Growing Agricultural Knowledge Cloud in Smart Agriculture.
Proceedings of the Multimedia and Ubiquitous Engineering, 2013

2012
A taxonomy of secure data aggregation in wireless sensor networks.
Int. J. Commun. Networks Distributed Syst., 2012

2010
Mitigating Sandwich Attacks Against a Secure Key Management Scheme in Wireless Sensor Networks for PCS/SCADA.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010

2009
Improving a Forward & Backward Secure Key Management Scheme for Wireless Sensor Networks.
J. Inform. and Commun. Convergence Engineering, 2009

A Forward & Backward Secure Key Management in Wireless Sensor Networks for PCS/SCADA.
J. Inform. and Commun. Convergence Engineering, 2009

Implementation of an XML-Based Multimedia Pests Information System for USN Environment.
Proceedings of the 10th ACIS International Conference on Software Engineering, 2009

A Forward and Backward Secure Key Management in Wireless Sensor Networks for PCS/SCADA.
Proceedings of the Sensor Systems and Software, 2009

2006
A Novel Approach for Similarity Measure Schemes Based on Multiple Moving Objects in Video Databases.
Proceedings of the Computational Science, 2006

2005
New Key Management Systems for Multilevel Security.
Proceedings of the Computational Science and Its Applications, 2005

2001
Cryptographic Salt: A Countermeasure against Denial-of-Service Attacks.
Proceedings of the Information Security and Privacy, 6th Australasian Conference, 2001

2000
Forward Secrecy and Its Application to Future Mobile Communications Security.
Proceedings of the Public Key Cryptography, 2000

Key Recovery in Third Generation Wireless Communication Systems.
Proceedings of the Public Key Cryptography, 2000

Classification of Authentication Protocols: A Practical Approach.
Proceedings of the Information Security, Third International Workshop, 2000

Micropayments for Wireless Communications.
Proceedings of the Information Security and Cryptology, 2000

1998
Public key protocols for wireless communications.
Proceedings of the 1st International Conference on Information Security and Cryptology, 1998


  Loading...