Goo Yeon Lee

According to our database1, Goo Yeon Lee authored at least 34 papers between 1990 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Security Management Suitable for Lifecycle of Personal Information in Multi-User IoT Environment.
Sensors, 2021

2020
Attack Detection Using Network Coding in IoT Environment.
Sensors, 2020

2019
Designing the GDPR Compliant Consent Procedure for Personal Information Collection in the IoT Environment.
Proceedings of the 2019 IEEE International Congress on Internet of Things, 2019

2014
Signal Interference of Ubiquitous Wireless Networks on Data Throughput.
Proceedings of the Frontier and Innovation in Future Computing and Communications, 2014

2013
A Contents Service Profit Model Based on the Quality of Experience and User Group Characteristics.
Proceedings of the Grid and Pervasive Computing - 8th International Conference, 2013

Conversion Profit Analysis of Cloud Computer for Integrated Campus Web Services.
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013

2012
Performance analysis of authentication and key distribution scheme for mobile multi-hop relay in IEEE 802.16j.
Pers. Ubiquitous Comput., 2012

2011
Simple, Practical, and Effective Opportunistic Routing for Short-Haul Multi-Hop Wireless Networks.
IEEE Trans. Wirel. Commun., 2011

2009
Hybrid Location-Update Scheme for Mobile Networks.
IEEE Trans. Veh. Technol., 2009

Hybrid Authentication and Key Distribution Scheme for Wireless Mobile Multi-Hop Networks.
IEICE Trans. Commun., 2009

Design of hybrid authentication scheme and key distribution for mobile multi-hop relay in IEEE 802.16j.
Proceedings of the 2009 Euro American conference on Telematics and Information Systems: New Opportunities to increase Digital Citizenship, 2009

2008
Optimal TCP segment size for mobile server access over wireless links of cellular networks.
Wirel. Commun. Mob. Comput., 2008

A Scalable and Practical Authentication Protocol in Mobile IP.
IEICE Trans. Commun., 2008

Wireless Certificate Management Protocol Supporting Mobile Phones.
Proceedings of the 2008 IEEE Congress on Services, Part I, 2008

Authentication for WiFi - WiBbro-based BWAN interworking.
Proceedings of the 9th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2008

2007
Re-key Interval Optimization for Secure Group Communications.
J. Inf. Sci. Eng., 2007

Optimal Frame Payload Size for Mobile Communications over Wireless Links of Cellular Networks.
J. Inf. Sci. Eng., 2007

Bio-AdHoc Sensor Networks for Early Disaster Warning.
IEICE Trans. Commun., 2007

Efficient Location Management Scheme using MLR considering Local Usages.
Proceedings of the Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2007

Design and Analysis of Bio-AdHoc Sensor Networks for Disaster Emergency Management Systems.
Proceedings of the 2007 International Conference on Wireless Networks, 2007

Prevention of Black-Hole Attack using One-Way Hash Chain Scheme in Ad-Hoc Networks.
Proceedings of the Information Networking. Towards Ubiquitous Networking and Services, 2007

2006
Optimal Group Number for Minimizing Average Paging Delay.
IEICE Trans. Commun., 2006

Multi-states based hybrid location update strategy in wireless communication system.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2006

Extended Authentication Integrating Scheme for Beyond 3G Wireless Networks.
Proceedings of the Computer and Information Sciences, 2006

2005
Packet Diversity in Wireless Uplink Channels.
IEICE Trans. Commun., 2005

Design and Implementation of a Data Sharing Scheme with Security and Flexibility Applicable to Extended P2P Systems.
Proceedings of The 2005 International Conference on Security and Management, 2005

2003
Performance Analysis of an Modified Time-Based Location Registration Scheme.
Proceedings of the 28th Annual IEEE Conference on Local Computer Networks (LCN 2003), 2003

2002
Numerical analysis of optimum timer value for time-based location registration scheme.
IEEE Commun. Lett., 2002

Optimal time-interval for time-based location update in mobile communications.
Proceedings of the Global Telecommunications Conference, 2002

Efficient rekey interval for minimum cost on secure multicast system using group key.
Proceedings of the Global Telecommunications Conference, 2002

Mutual authentication protocols for the virtual home environment in 3G mobile network.
Proceedings of the Global Telecommunications Conference, 2002

2000
Optimization Paging Cost by Dynamic Cell Grouping in Mobile Network.
Proceedings of the Proceedings 27th Conference on Local Computer Networks, 2000

1993
Design and performance analysis of an asynchronous non-blocking switch with window policy.
Telecommun. Syst., 1993

1990
Delay Analysis of the ISDN D-Channel Access Protocol.
Comput. Networks ISDN Syst., 1990


  Loading...