Ilsun You

According to our database1, Ilsun You
  • authored at least 201 papers between 2006 and 2017.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2017
Guest Editorial Special Issue on Insider Threats to Information Security, Digital Espionage, and Counter-Intelligence.
IEEE Systems Journal, 2017

Smart Collaborative Caching for Information-Centric IoT in Fog Computing.
Sensors, 2017

Efficient Management and Fast Handovers in Software Defined Wireless Networks Using UAVs.
IEEE Network, 2017

SACA: Self-Aware Communication Architecture for IoT Using Mobile Fog Servers.
Mobile Information Systems, 2017

The Social Relationship Based Adaptive Multi-Spray-and-Wait Routing Algorithm for Disruption Tolerant Network.
Mobile Information Systems, 2017

Energy efficient device discovery for reliable communication in 5G-based IoT and BSNs using unmanned aerial vehicles.
J. Network and Computer Applications, 2017

Enabling in-network aggregation by diffusion units for urban scale M2M networks.
J. Network and Computer Applications, 2017

Editorial.
J. Internet Serv. Inf. Secur., 2017

Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing.
Inf. Sci., 2017

A brief overview of intelligent mobility management for future wireless mobile networks.
EURASIP J. Wireless Comm. and Networking, 2017

Extension of MIH to Support FPMIPv6 for Optimized Heterogeneous Handover.
CoRR, 2017

SPFP: Ticket-based secure handover for fast proxy mobile IPv6 in 5G networks.
Computer Networks, 2017

A DVFS Based Energy-Efficient Tasks Scheduling in a Data Center.
IEEE Access, 2017

Smart Collaborative Connection Management for Identifier-Based Network.
IEEE Access, 2017

Secure and Efficient Protocol for Route Optimization in PMIPv6-Based Smart Home IoT Networks.
IEEE Access, 2017

Computational Offloading for Efficient Trust Management in Pervasive Online Social Networks Using Osmotic Computing.
IEEE Access, 2017

ISMA: Intelligent Sensing Model for Anomalies Detection in Cross Platform OSNs With a Case Study on IoT.
IEEE Access, 2017

SAT-FLOW: Multi-Strategy Flow Table Management for Software Defined Satellite Networks.
IEEE Access, 2017

A LDDoS-Aware Energy-Efficient Multipathing Scheme for Mobile Cloud Computing Systems.
IEEE Access, 2017

IP-based seamless handover scheme using ANDSF in an untrusted environment.
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017

Partition ORAMS Combined with Novel Client Eviction Mechanism.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

MIST 2017: 9th International Workshop on Managing Insider Security Threats.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Detecting and preventing selfish behaviour in mobile ad hoc network.
The Journal of Supercomputing, 2016

A Novel NTT-Based Authentication Scheme for 10-GHz Quantum Key Distribution Systems.
IEEE Trans. Industrial Electronics, 2016

Special issue on natural and secure computing in modern soft computing application.
Soft Comput., 2016

Long-term location privacy protection for location-based services in mobile cloud computing.
Soft Comput., 2016

An escrow-free online/offline HIBS scheme for privacy protection of people-centric sensing.
Security and Communication Networks, 2016

Designing Efficient Mobile Gateway for Impoverished Regions Based on Self-Learning Strategy.
Mobile Information Systems, 2016

Energy Efficient Data Dissemination in Multi-UAV Coordinated Wireless Sensor Networks.
Mobile Information Systems, 2016

The PMIPv6-Based Group Binding Update for IoT Devices.
Mobile Information Systems, 2016

New order preserving encryption model for outsourced databases in cloud environments.
J. Network and Computer Applications, 2016

Approaching green sensor field using queue-based optimization technique.
J. Network and Computer Applications, 2016

PSSRC: A Web Service Registration Cloud Based on Structured P2P and Semantics.
IJDWM, 2016

Special issue on security and privacy techniques in mobile cloud computing.
J. Ambient Intelligence and Humanized Computing, 2016

Innovative security technologies against insider threats and data leakage.
Int. J. Comput. Math., 2016

Adaptive authentication scheme for mobile devices in proxy MIPv6 networks.
IET Communications, 2016

Efficient Subversion of Symmetric Encryption with Random Initialization Vector.
IEICE Transactions, 2016

Special Section on Advanced Technologies for Homeland and Cyber Defense.
Intelligent Automation & Soft Computing, 2016

A security gateway application for End-to-End M2M communications.
Computer Standards & Interfaces, 2016

Residence Energy Control System Based on Wireless Smart Socket and IoT.
IEEE Access, 2016

TTP Based High-Efficient Multi-Key Exchange Protocol.
IEEE Access, 2016

Random Cladding with Feedback Mechanism for encrypting mobile messages.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016

A Wireless Body Sensor Network and Its Applications: Rehearsal with a Smartphone.
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016

MIST 2016: 8th International Workshop on Managing Insider Security Threats.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Ports Distribution Management for Privacy Protection inside Local Domain Name System.
Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, 2016

2015
Verifiable Auditing for Outsourced Database in Cloud Computing.
IEEE Trans. Computers, 2015

Intelligent technologies and applications for big data analytics.
Softw., Pract. Exper., 2015

Secure ubiquitous computing.
Pervasive and Mobile Computing, 2015

Innovative Mobile Internet Services and Applications.
Mobile Information Systems, 2015

Polymorphic Malicious JavaScript Code Detection for APT Attack Defence.
J. UCS, 2015

Editorial.
JoWUA, 2015

Editorial.
JoWUA, 2015

A secure data encryption method employing a sequential-logic style mechanism for a cloud system.
IJWGS, 2015

Modelling software fault management with runtime verification.
IJAHUC, 2015

The correlation study for parameters in four tuples.
IJAHUC, 2015

A profiling based task scheduling approach for multicore network processors.
Concurrency and Computation: Practice and Experience, 2015

Providing adaptive quality of security in quantum networks.
Proceedings of the 11th International Conference on Heterogeneous Networking for Quality, 2015

Business Process Merging Based on Topic Cluster and Process Structure Matching.
Proceedings of the Computational Intelligence and Intelligent Systems, 2015

The untrusted handover security of the S-PMIPv6 on LTE-A.
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015

Vulnerability Analysis on the CNG Crypto Library.
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015

An Enhanced Java-Based Mobile Device Theft Response System.
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015

Efficient Almost Strongly Universal Hash Function for Quantum Key Distribution - Extended Abstract.
Proceedings of the Information and Communication Technology, 2015

Removing Key Escrow from the LW-HIBE Scheme.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

MIST 2015: 7th International Workshop on Managing Insider Security Threats.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Cyber Threats to Industrial Control Systems.
Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, 2015

A Tutorial on Quantum Key Distribution.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015

An Escrow-Free Hierarchical Identity-Based Signature Scheme from Composite Order Bilinear Groups.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015

2014
Special Issue on Mobility and Intelligence Management Technologies for Wireless and Mobile Networks.
Wireless Personal Communications, 2014

A Lease Algorithm to Maintain Strong Mapping Cache Consistency.
Wireless Personal Communications, 2014

A secure wireless communication system integrating RSA, Diffie-Hellman PKDS, intelligent protection-key chains and a Data Connection Core in a 4G environment.
The Journal of Supercomputing, 2014

Intelligent healthcare service based on context inference using smart device.
Soft Comput., 2014

Opportunistic sharing scheme for spectrum allocation in wireless virtualization.
Soft Comput., 2014

Soft computing for security services in smart and ubiquitous environments.
Soft Comput., 2014

Editorial.
JoWUA, 2014

Editorial.
JoWUA, 2014

Advanced technologies for homeland defense and security.
J. Network and Computer Applications, 2014

Open Source Software Detection using Function-level Static Software Birthmark.
J. Internet Serv. Inf. Secur., 2014

Prosperity of IT security technologies in homeland defense.
J. Ambient Intelligence and Humanized Computing, 2014

Secure and distributed video surveillance via portable devices.
J. Ambient Intelligence and Humanized Computing, 2014

An Optimization-Based Scheme for Efficient Virtual Machine Placement.
International Journal of Parallel Programming, 2014

Towards cost efficient mobile service and information management in ubiquitous environment with cloud resource scheduling.
Int J. Information Management, 2014

An exploration of cache collaboration in information-centric network.
Int. J. Communication Systems, 2014

Special Section on Advances in IT Convergence Technologies.
Intelligent Automation & Soft Computing, 2014

ePASS: An expressive attribute-based signature scheme with privacy and an unforgeability guarantee for the Internet of Things.
Future Generation Comp. Syst., 2014

Special Issue: Mobile Internet Technologies and Services - Editorial.
Comput. Syst. Sci. Eng., 2014

A computer remote control system based on speech recognition technologies of mobile devices and wireless communication technologies.
Comput. Sci. Inf. Syst., 2014

Optimized Multilevel Threshold Selection Using Evolutionary Computing.
Proceedings of the 17th International Conference on Network-Based Information Systems, 2014

A Case Study for Potential Carpooling in Beijing.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014

Identifying Windows Installer Package Files for Detection of Pirated Software.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014

Thermal-Aware Task Placement with Dynamic Thermal Model in an Established Datacenter.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014

A Real-Time Intrusion Detection and Protection System at System Call Level under the Assistance of a Grid.
Proceedings of the Information and Communication Technology, 2014

A Design of Web Log Integration Framework Using NoSQL.
Proceedings of the Information and Communication Technology, 2014

Design and analysis of efficient multicast sender mobility scheme for Proxy mobile IPv6.
Proceedings of the 11th IEEE Consumer Communications and Networking Conference, 2014

Survey on distributed mobility management schemes for Proxy mobile IPv6.
Proceedings of the 11th IEEE Consumer Communications and Networking Conference, 2014

A random wrapping encryption method.
Proceedings of the 11th IEEE Consumer Communications and Networking Conference, 2014

A High-Speed Network Content Filtering System.
Proceedings of the Availability, Reliability, and Security in Information Systems, 2014

Building an Initialization Cipher Block with Two-Dimensional Operation and Random Parameters.
Proceedings of the Availability, Reliability, and Security in Information Systems, 2014

A Structure P2P Based Web Services Registry with Access and Control.
Proceedings of the Availability, Reliability, and Security in Information Systems, 2014

2013
Comparative Handover Performance Analysis of IPv6 Mobility Management Protocols.
IEEE Trans. Industrial Electronics, 2013

Hierarchical DHT and proportional replication based mobility management for large-scale mobile Internet.
Mathematical and Computer Modelling, 2013

Understanding urban dynamics based on pervasive sensing: An experimental study on traffic density and air pollution.
Mathematical and Computer Modelling, 2013

Special Issue on "Advances in mobile, ubiquitous and cognitive computing".
Mathematical and Computer Modelling, 2013

Information Security.
J. UCS, 2013

Optimizing the Joint Source/Network Coding for Video Streaming over Multi-hop Wireless Networks.
TIIS, 2013

Guest editorial: A brief overview of data leakage and insider threats.
Information Systems Frontiers, 2013

Mobile and internet services in ubiquitous and pervasive computing environments.
Inf. Sci., 2013

An efficient classification approach for large-scale mobile ubiquitous computing.
Inf. Sci., 2013

Modern cognitive and ubiquitous computing.
Neurocomputing, 2013

Probabilistic spatio-temporal inference for motion event understanding.
Neurocomputing, 2013

Cognitive and secure computing in Information Management.
Int J. Information Management, 2013

The throughput critical condition study for reliable multipath transport.
Comput. Sci. Inf. Syst., 2013

A topographic-awareness and situational-perception based mobility model with artificial bee colony algorithm for tactical MANET.
Comput. Sci. Inf. Syst., 2013

HMS: A Hierarchical Mapping System for the Locator/ID Separation Network.
Computing and Informatics, 2013

Inter-cluster Topology Control: An Evolutionary Game Perspective.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

A Novel Approach to Joint Source-Channel Coding for Scalable Video Transmission.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

Security Issues on the CNG Cryptography Library (Cryptography API: Next Generation).
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

A Remote Computer Control System Using Speech Recognition Technologies of Mobile Devices.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

On Performance Evaluation of Various Traffic Combination Based on Network Calculus.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

A Survey of Feature Extraction Techniques to Detect the Theft of Windows Applications.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

A Real-Time Privacy Amplification Scheme in Quantum Key Distribution.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

Syntactic Analysis for Monitoring Personal Information Leakage on Social Network Services: A Case Study on Twitter.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

Trustworthy Opportunistic Access to the Internet of Services.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

A Multiple-Key Management Scheme in Wireless Sensor Networks.
Proceedings of the Security Engineering and Intelligence Informatics, 2013

2012
Defending against insider threats and internal data leakage.
Security and Communication Networks, 2012

Advances in Network-based Information Systems.
Mobile Information Systems, 2012

A Brief Survey on Rootkit Techniques in Malicious Codes.
J. Internet Serv. Inf. Secur., 2012

Editorial: Advanced intelligent and security services in mobile and ubiquitous computing.
J. Intelligent Manufacturing, 2012

A chain-cluster based routing algorithm for wireless sensor networks.
J. Intelligent Manufacturing, 2012

Field architecture for traffic and mobility modelling in mobility management.
IJAHUC, 2012

Editorial.
Comput. Syst. Sci. Eng., 2012

DSSH: Digital signature based secure handover for network-based mobility management.
Comput. Syst. Sci. Eng., 2012

Editorial.
Comput. Syst. Sci. Eng., 2012

Grid transaction management and an efficient development kit.
Comput. Syst. Sci. Eng., 2012

An efficient deadlock prevention approach for service oriented transaction processing.
Computers & Mathematics with Applications, 2012

ACSP: A novel security protocol against counting attack for UHF RFID systems.
Computers & Mathematics with Applications, 2012

Towards context, cognitive, and secure computing.
Computers & Mathematics with Applications, 2012

Anomaly Teletraffic Intrusion Detection Systems on Hadoop-Based Platforms: A Survey of Some Problems and Solutions.
Proceedings of the 15th International Conference on Network-Based Information Systems, 2012

Exploring Urban Dynamics Based on Pervasive Sensing: Correlation Analysis of Traffic Density and Air Quality.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

Impacts of Internal Network Contexts on Performance of MANET Routing Protocols: A Case Study.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

Performance Analysis of Reliable Transmission on Multiple Paths and Single Path.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

Application-Aware Virtual Machine Placement in Data Centers.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

Survey on Route Optimization Schemes for Proxy Mobile IPv6.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

A Terrain-Awareness Based Mobility Model with Markov Random Disturbance for Tactical MANET.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

A Secure Secondary Backup Storage with an Isolated Authentication.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

Maintaining strong consistency for the identifier-to-locator mapping cache.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2012

Improving security level of LTE authentication and key agreement procedure.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2012

Recommendation of More Interests Based on Collaborative Filtering.
Proceedings of the IEEE 26th International Conference on Advanced Information Networking and Applications, 2012

Mobile Malware Threats and Defenses for Homeland Security.
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012

A Secure Distributed Video Surveillance System Based on Portable Devices.
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012

2011
Editorial: Special Issue on "Advances in Mobile IPv6 and Network-Based Localized Mobility Management".
Wireless Personal Communications, 2011

Enhancing QoS of Mobile Devices by a New Handover Process in PMIPv6 Networks.
Wireless Personal Communications, 2011

Next generation mobility management.
Wireless Communications and Mobile Computing, 2011

Energy-aware weighted graph based dynamic topology control algorithm.
Simulation Modelling Practice and Theory, 2011

A cross-layer protocol of spectrum mobility and handover in cognitive LTE networks.
Simulation Modelling Practice and Theory, 2011

Enhancing MISP with Fast Mobile IPv6 Security.
Mobile Information Systems, 2011

Emerging Wireless and Mobile Technologies.
Mobile Information Systems, 2011

Enhancing SVO Logic for Mobile IPv6 Security Protocols.
JoWUA, 2011

Addressing Insider Threats and Information Leakage.
JoWUA, 2011

A coordinated multiple channel assignment scheme and AP deployment for channel reuse in metropolitan scale wireless networks.
J. Network and Computer Applications, 2011

A pipeline-based approach for long transaction processing in web service environments.
IJWGS, 2011

Towards formal analysis of wireless LAN security with MIS protocol.
IJAHUC, 2011

Introduction to Special Section on Complex, Intelligent and Software Intensive Systems.
Computing and Informatics, 2011

A Tree-based Hierarchy Data Storage Framework in a Pervasive Space.
Computing and Informatics, 2011

Insider Threats are Getting Worse within Industries: Isolated Secondary Backup Required.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

Analysis of Optimal Query, Fairness and Replication for DHT-based Mobility Management.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

Improvements on Sequential Minimal Optimization Algorithm for Support Vector Machine Based on Semi-sparse Algorithm.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

SaMob: A Social Attributes Based Mobility Model for Ad Hoc Networks.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

An Effective Deadlock Prevention Mechanism for Distributed Transaction Management.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

ACSP: A Novel Security Protocol against Counting Attack for UHF RFID Systems.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

Trying Linear Network Coding on a Network Flow Processor.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

PPMLT: A Pipeline Based Processing Model of Long Transactions.
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications, 2011

IT Issues on Homeland Security and Defense.
Proceedings of the Availability, Reliability and Security for Business, Enterprise and Health Information Systems, 2011

Extended Spatio-temporal Relations between Moving and Non-moving Objects.
Proceedings of the Availability, Reliability and Security for Business, Enterprise and Health Information Systems, 2011

2010
Mobile and Wireless Networks.
Mobile Information Systems, 2010

Balanced bipartite graph based register allocation for network processors in mobile and wireless networks.
Mobile Information Systems, 2010

Editorial.
JoWUA, 2010

N-NEMO: A Comprehensive Network Mobility Solution in Proxy Mobile IPv6 Network.
JoWUA, 2010

Safe Authentication Protocol for Secure USB Memories.
JoWUA, 2010

caTBUA: Context-aware ticket-based binding update authentication protocol for trust-enabled mobile networks.
Int. J. Communication Systems, 2010

ESS-FH: Enhanced Security Scheme for Fast Handover in Hierarchical Mobile IPv6.
IEICE Transactions, 2010

A Special Issue of Intelligent Automation and Soft Computing - Forthcoming Multimedia & Intelligent Services In Ubiquitous And Pervasive Computing.
Intelligent Automation & Soft Computing, 2010

Context-Aware Workflow Management For Intelligent Navigation Applications In Pervasive Environments.
Intelligent Automation & Soft Computing, 2010

GridTDK: A Grid Transaction Development Kit.
Proceedings of the 13th International Conference on Network-Based Information Systems, 2010

Network mobility support in PMIPv6 network.
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, 2010

A Dynamic Host Selection Algorithm for Layered Data Storage Architecture in a Pervasive Space.
Proceedings of the CISIS 2010, 2010

Malware Obfuscation Techniques: A Brief Survey.
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010

Comments on a One-Way Hash Chain Based Authentication for FMIPv6.
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010

2009
An Enhanced Security Protocol for Fast Mobile IPv6.
IEICE Transactions, 2009

A Security Analysis on Kempf-Koodli's Security Scheme for Fast Mobile IPv6.
IEICE Transactions, 2009

Comments on Kang-Park's Security Scheme for Fast Handover in Hierarchical Mobile IPv6.
Proceedings of the Fourth International Conference on Frontier of Computer Science and Technology, 2009

The Study on Software Tamper Resistance for Securing a Game Service.
Proceedings of the 2009 International Conference on Complex, 2009

2008
A survey of NETLMM in all-IP-based wireless networks.
Proceedings of the 5th International Conference on Mobile Technology, 2008

2007
Advanced Agent-Delegated Route Optimization Protocol for Efficient Multimedia Services at Low-Battery Devices.
Proceedings of the Advances in Multimedia Modeling, 2007

Intelligent Home Network Authentication: S/Key-Based Home Device Authentication.
Proceedings of the Frontiers of High Performance Computing and Networking ISPA 2007 Workshops, 2007

Link Quality-Based (LQ-CDS) Construction in Smart Home Wireless Mesh Networks.
Proceedings of the Future Generation Communication and Networking, 2007

Design and Implementation of a Ubiquitous ECG Monitoring System Using SIP and the Zigbee Network.
Proceedings of the Future Generation Communication and Networking, 2007

A Ticket Based Binding Update Authentication Method for Trusted Nodes in Mobile IPv6 Domain.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007

2006
A One-Time Password Authentication Scheme for Secure Remote Access in Intelligent Home Networks.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2006

A Light Weight Authentication Protocol for Digital Home Networks.
Proceedings of the Computational Science and Its Applications, 2006

Improving the CGA-OMIPv6 Protocol for Low-Power Mobile Nodes.
Proceedings of the Computational Science and Its Applications, 2006

An Analysis on the Web Technologies for Dynamically Generating Web-Based User Interfaces in Ubiquitous Spaces.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006


  Loading...