Iksu Kim

According to our database1, Iksu Kim authored at least 7 papers between 2007 and 2015.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
Hash-Based Password Authentication Protocol Against Phishing and Pharming Attacks.
J. Inf. Sci. Eng., 2015

Estimating Illumination Distribution to Generate Realistic Shadows in Augmented Reality.
KSII Trans. Internet Inf. Syst., 2015

2012
Agent-based honeynet framework for protecting servers in campus networks.
IET Inf. Secur., 2012

Keypad against brute force attacks on smartphones.
IET Inf. Secur., 2012

A Security Framework for Blocking New Types of Internet Worms in Ubiquitous Computing Environments.
Proceedings of the Computational Science and Its Applications - ICCSA 2012, 2012

2011
Towards a smart service based on a context-aware workflow model in u-agriculture.
Int. J. Web Grid Serv., 2011

2007
The DecoyPort: Redirecting Hackers to Honeypots.
Proceedings of the Network-Based Information Systems, First International Conference, 2007


  Loading...