Heasuk Jo

According to our database1, Heasuk Jo authored at least 7 papers between 2006 and 2012.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2012
Weakness and simple improvement of anonymous mutual authentication protocol with link-layer.
Proceedings of the CUBE International IT Conference & Exhibition, 2012

2011
Advanced Information Security Management Evaluation System.
KSII Trans. Internet Inf. Syst., 2011

2010
A Study on Comparative Analysis of the Information Security Management Systems.
Proceedings of the Computational Science and Its Applications, 2010

2009
Off-Line Password-Guessing Attack to Yang's and Huang's Authentication Schemes for Session Initiation Protocol.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009

Security Specification for Conversion Technologies of Heterogeneous DRM Systems.
Proceedings of the Information Security Practice and Experience, 2009

Security Weakness in a Provable Secure Authentication Protocol Given Forward Secure Session Key.
Proceedings of the Computational Science and Its Applications, 2009

2006
An Efficient Dispute Resolving Method for Digital Images.
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006


  Loading...