Jiyoung Lim

According to our database1, Jiyoung Lim
  • authored at least 33 papers between 1999 and 2018.
  • has a "Dijkstra number"2 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Dynamic Group Key Management for Efficient Fog Computing.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2018

2017
Secure and structured IoT smart grid system management.
IJWGS, 2017

Lightweight Authentication for Distributed Mobile P2P Communications.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2017

2016
Security system architecture for data integrity based on a virtual smart meter overlay in a smart grid system.
Soft Comput., 2016

Authentication for Mobile Open IPTV Service Security.
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016

Search result diversification using data envelopment analysis.
Proceedings of the Sixth International Conference on Emerging Databases: Technologies, 2016

2015
Utilizing a Bluetooth remote lock system for a smartphone.
Pervasive and Mobile Computing, 2015

Authentication and Key Management Based on Kerberos for M2M Mobile Open IPTV Security.
Intelligent Automation & Soft Computing, 2015

An Enhanced Java-Based Mobile Device Theft Response System.
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015

Secure Authentication for Structured Smart Grid System.
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015

2014
A computer remote control system based on speech recognition technologies of mobile devices and wireless communication technologies.
Comput. Sci. Inf. Syst., 2014

Pairwise and group key setup mechanism for secure machine-to-machine communication.
Comput. Sci. Inf. Syst., 2014

A Remote Lock System Using Bluetooth Communication.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014

Service Security for Smart Grid System.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014

2013
Code updates based on minimal backbone and group key management for secure sensor networks.
Mathematical and Computer Modelling, 2013

A real-time location-based SNS smartphone application for the disabled population.
Comput. Sci. Inf. Syst., 2013

Key management approach for secure mobile open IPTV service.
Comput. Sci. Inf. Syst., 2013

Secure Aggregation and Attack Detection for Smart Grid System.
Proceedings of the 16th International Conference on Network-Based Information Systems, 2013

A Remote Computer Control System Using Speech Recognition Technologies of Mobile Devices.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

Key Establishment and Management for Secure Cellular Machine-to-Machine Communication.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

2012
Anomaly Teletraffic Intrusion Detection Systems on Hadoop-Based Platforms: A Survey of Some Problems and Solutions.
Proceedings of the 15th International Conference on Network-Based Information Systems, 2012

An Improved Security Approach Based on Kerberos for M2M Open IPTV System.
Proceedings of the 15th International Conference on Network-Based Information Systems, 2012

Group Key Management for Secure Mobile IPTV Service.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

Design and Implementation of Location-Based SNS Smartphone Application for the Disabled Population.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

2011
Distributed authentication mechanism for secure channel establishment in ubiquitous medical sensor networks.
Mobile Information Systems, 2011

Secure Code Dissemination Using Energy-Efficient Minimal Virtual Backbone in Sensor Networks.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

2010
Energy-Efficient Code Dissemination Using Minimal Virtual Backbone in Sensor Networks.
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010

2007
Advanced Agent-Delegated Route Optimization Protocol for Efficient Multimedia Services at Low-Battery Devices.
Proceedings of the Advances in Multimedia Modeling, 2007

2006
Home Gateway with Automated Real-Time Intrusion Detection for Secure Home Networks.
Proceedings of the Computational Science and Its Applications, 2006

2003
Design of Security Enforcement Engine for Active Nodes in Active Networks.
Proceedings of the Information Networking, 2003

2002
Flow Admission Control for MPLS Support of DiffServ.
Proceedings of the Information Networking, 2002

2001
Differentiated Link Based QoS Routing Algorithms for Multimedia Traffic in MPLS Networks.
Proceedings of the 15th International Conference on Information Networking, 2001

1999
Predictive and Adaptive Bandwidth Reservation Strategies in Wireless Networks.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1999


  Loading...