Jeonil Kang

According to our database1, Jeonil Kang authored at least 15 papers between 2005 and 2020.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Catch Me If You Can: Rogue Access Point Detection Using Intentional Channel Interference.
IEEE Trans. Mob. Comput., 2020

2018
Digitalseal: a Transaction Authentication Tool for Online and Offline Transactions.
Proceedings of the 2018 IEEE International Conference on Acoustics, 2018

2017
A Privacy-Preserving Mobile Payment System for Mass Transit.
IEEE Trans. Intell. Transp. Syst., 2017

Highly-accurate rogue access point detection using intentional channel interference: poster.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017

Rogue Access Point Detector Using Characteristics of Channel Overlapping in 802.11n.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

2014
Keylogging-Resistant Visual Authentication Protocols.
IEEE Trans. Mob. Comput., 2014

Two-factor face authentication using matrix permutation transformation and a user password.
Inf. Sci., 2014

2011
A Software-Based Group Attestation for Wireless Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2011

2008
Protection Techniques of Secret Information in Non-tamper Proof Devices of Smart Home Network.
Proceedings of the Ubiquitous Intelligence and Computing, 5th International Conference, 2008

2007
Certificate Issuing Using Proxy and Threshold Signatures in Self-initialized Ad Hoc Network.
Proceedings of the Computational Science and Its Applications, 2007

Proactive Code Verification Protocol in Wireless Sensor Network.
Proceedings of the Computational Science and Its Applications, 2007

2006
Distributed Certificate Authority Under the GRID-Location Aided Routing Protocol.
Proceedings of the Computational Science and Its Applications, 2006

2005
Two Factor Face Authentication Scheme with Cancelable Feature.
Proceedings of the Advances in Biometric Person Authentication, 2005

Selective Collision Based Medium Access Control Protocol for Proactive Protection of Privacy for RFID.
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005

RFID Authentication Protocol with Strong Resistance Against Traceability and Denial of Service Attacks.
Proceedings of the Security and Privacy in Ad-hoc and Sensor Networks, 2005


  Loading...