Jangseong Kim

According to our database1, Jangseong Kim authored at least 10 papers between 2007 and 2013.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2013
A scalable and robust hierarchical key establishment for mission-critical applications over sensor networks.
Telecommun. Syst., 2013

A novel secure key paring protocol for RF4CE ubiquitous smart home systems.
Pers. Ubiquitous Comput., 2013

2012
A scalable and privacy-preserving child-care and safety service in a ubiquitous computing environment.
Math. Comput. Model., 2012

An Efficient and Secure Service Discovery Protocol for Ubiquitous Computing Environments.
IEICE Trans. Inf. Syst., 2012

2011
An efficient and scalable re-authentication protocol over wireless sensor network.
IEEE Trans. Consumer Electron., 2011

Location-Aware and Privacy-Preserving Approach for Child Safety in Ubiquitous Computing Environment.
IEICE Trans. Commun., 2011

2010
Three-Round Abuse-Free Optimistic Contract Signing with Everlasting Secrecy.
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010

A Privacy-Preserving Secure Service Discovery Protocol for Ubiquitous Computing Environments.
Proceedings of the Public Key Infrastructures, Services and Applications, 2010

Efficient sensor node authentication via 3GPP mobile communication networks.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2007
A Lightweight Privacy Preserving Authentication and Access Control Scheme for Ubiquitous Computing Environment.
Proceedings of the Information Security and Cryptology, 2007


  Loading...