Jaehoon Nah

According to our database1, Jaehoon Nah authored at least 25 papers between 2001 and 2010.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2010
A Freshness Based Persistent Assurance Scheme for Secure Scalable Media Distribution.
Proceedings of the Cooperative Design, Visualization, and Engineering, 2010

2009
Protecting IPTV Service Network against Malicious Rendezvous Point.
Proceedings of the Information Security Applications, 10th International Workshop, 2009

Security Requirements for Scalable IPTV Services.
Proceedings of the 2009 International Conference on Security & Management, 2009

2008
Random Visitor: Defense against Identity Attacks in P2P Networks.
IEICE Trans. Inf. Syst., 2008

2007
An Optimized Time-constraint Job Distribution Scheme in Group based P2P Networks.
Proceedings of the 5th ACIS International Conference on Software Engineering Research, 2007

Public Key Management Framework for Two-tier Super Peer Architecture.
Proceedings of the 27th International Conference on Distributed Computing Systems Workshops (ICDCS 2007 Workshops), 2007

An Optimized Time-Constraint Job Scheduling in Group Based P2P Computing Networks.
Proceedings of the 2007 International Conference on Communications in Computing, 2007

Performance Prediction in Peer-to-Peer MultiAgent Networks.
Proceedings of the Agents and Peer-to-Peer Computing, 6th International Workshop, 2007

2006
Random Visitor: A Defense Against Identity Attacks in P2P Overlay Networks.
Proceedings of the Information Security Applications, 7th International Workshop, 2006

Effective Control of Abnormal Neighbor Discovery Congestion on IPv6 Local Area Network.
Proceedings of the Ubiquitous Intelligence and Computing, Third International Conference, 2006

A Protocol Switching Scheme for Developing Network Management Applications.
Proceedings of the Information Networking, 2006

Configuration Management Policy in QoS-Constrained Grid Networks.
Proceedings of the Management of Convergence Networks and Services, 2006

2005
An automatic security test engine for IPv6 network.
Int. J. Wirel. Mob. Comput., 2005

Efficient 3G/WLAN Interworking Techniques for Seamless Roaming Services with Location-Aware Authentication.
Proceedings of the NETWORKING 2005: Networking Technologies, 2005

2004
Security Clustering: A Network-Wide Secure Computing Mechanism in Pervasive Computing.
Proceedings of the NETWORKING 2004, 2004

The efficient communications for VPN access of mobile nodes over mobile IPV6.
Proceedings of the IADIS International Conference WWW/Internet 2004, 2004

The Implementation of IPsec-Based Internet Security System in IPv4/IPv6 Network.
Proceedings of the Artificial Intelligence and Simulation, 2004

2003
An Automatic Security Evaluation System for IPv6 Network.
Proceedings of the Information Security Applications, 4th International Workshop, 2003

Mobile PKI: A PKI-Based Authentication Framework for the Next Generation Mobile Communications.
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003

2002
A Study of Security Association Management Oriented to IP Security.
Proceedings of the Information Networking, 2002

Design and Analysis of Hierarchical VPN Based on SCG.
Proceedings of the Information Networking, 2002

Security Policy Deployment in IPsec.
Proceedings of the Information Networking, 2002

2001
Web-based Security Management System for IPsec.
Proceedings of the Fifth IASTED International Conference Internet and Multimedia Systems and Applications (IMSA 2001), 2001

The group security association for secure multicasting.
Proceedings of the Proceedings 9th IEEE International Conference on Networks, 2001

C-ISCAP: Controlled-Internet Secury Connectivity Assurance Platform.
Proceedings of the ICEIS 2001, 2001


  Loading...