JooSeok Song

According to our database1, JooSeok Song authored at least 95 papers between 1996 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
Energy-efficient and secure mobile node reauthentication scheme for mobile wireless sensor networks.
EURASIP J. Wirel. Commun. Netw., 2019

Pseudonymous Mobile Node Reauthentication Scheme for Mobile Wireless Sensor Networks.
Proceedings of the ICIT 2019, 2019

Performance Evaluation: Two Flood-Cancellation Methods of the Blocking Expanding Ring Searches on the AODV/WiFi MANET Environment.
Proceedings of the 21st International Conference on Advanced Communication Technology, 2019

2018
Improved yoking proof protocols for preserving anonymity.
Int. J. Inf. Sec., 2018

2017
A Dual Key-Based Activation Scheme for Secure LoRaWAN.
Wirel. Commun. Mob. Comput., 2017

Adaptive Data Placement for Improving Performance of Online Social Network Services in a Multicloud Environment.
Sci. Program., 2017

An Efficient Location Verification Scheme for Static Wireless Sensor Networks.
Sensors, 2017

A Simple and Efficient Replay Attack Prevention Scheme for LoRaWAN.
Proceedings of the 7th International Conference on Communication and Network Security, 2017

An efficient and practical mobile node reauthentication scheme for mobile wireless sensor networks.
Proceedings of the 3rd International Conference on Communication and Information Processing, 2017

A social-aware caching algorithm for improving performance of online social network services in a multi-cloud environment.
Proceedings of the 3rd International Conference on Communication and Information Processing, 2017

2015
A Traffic Flow Theory Aided Physical Measurement-Based Sybil Nodes Detection Mechanism in Vehicular Ad-hoc Networks.
Int. J. Networked Distributed Comput., 2015

Trend of centralization in Bitcoin's distributed network.
Proceedings of the 16th IEEE/ACIS International Conference on Software Engineering, 2015

Cluster based emergency message dissemination scheme for vehicular ad hoc networks.
Proceedings of the 9th International Conference on Ubiquitous Information Management and Communication, 2015

An efficient offline grouping proof protocol using multiple types of tags.
Proceedings of the 9th International Conference on Ubiquitous Information Management and Communication, 2015

A traffic flow theory based density adopted emergency message dissemination scheme for vehicular ad hoc networks.
Proceedings of the 2015 International Conference on Information Networking, 2015

POSTER: A Password-based Authentication by Splitting Roles of User Interface.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

POSTER: Page Table Manipulation Attack.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
A cluster-based countermeasure against blackhole attacks in MANETs.
Telecommun. Syst., 2014

A survey of traffic-based routing metrics in family of expected transmission count for self-organizing networks.
Comput. Electr. Eng., 2014

Centralized Payment System Using Social Networks Account.
Proceedings of the 2014 IEEE Fourth International Conference on Big Data and Cloud Computing, 2014

A public key based PMIPv6 authentication scheme.
Proceedings of the 2014 IEEE/ACIS 13th International Conference on Computer and Information Science, 2014

2013
A Novel Robust Routing Scheme Against Rushing Attacks in Wireless Ad Hoc Networks.
Wirel. Pers. Commun., 2013

Time-Efficient Handover Using Enhanced Route Optimization in Global PMIPv6.
Wirel. Pers. Commun., 2013

A novel scheme to prevent MAC layer misbehavior in IEEE 802.11 ad hoc networks.
Telecommun. Syst., 2013

A countermeasure against wormhole attacks in MANETs using analytical hierarchy process methodology.
Electron. Commer. Res., 2013

2012
A Cluster-based Countermeasure against Media Access Control Layer Attacks in IEEE 802.11 Ad Hoc Networks.
KSII Trans. Internet Inf. Syst., 2012

A Novel Pre-Authentication Scheme Based on Fast Channel Switching in IEEE 802.11 WLANs.
EURASIP J. Wirel. Commun. Netw., 2012

2011
Handling Malicious Flooding Attacks through Enhancement of Packet Processing Technique in Mobile Ad Hoc Networks.
J. Inf. Process. Syst., 2011

Time-Based Detection and Location of Wormhole Attacks in Wireless Ad Hoc Networks.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Energy-Efficiency Media Independent Handover Mechanism.
Proceedings of the IEEE 10th International Conference on Trust, 2011

2010
Group Connectivity Model for Industrial Wireless Sensor Networks.
IEEE Trans. Ind. Electron., 2010

Novel defense mechanism against data flooding attacks in wireless ad hoc networks.
IEEE Trans. Consumer Electron., 2010

TCP Aware Link Layer Agent for Seamless Vertical Handoff in the Cellular/WLAN Integrated Network.
IEEE Commun. Lett., 2010

2009
Location-based pairwise key predistribution for wireless sensor networks.
IEEE Trans. Wirel. Commun., 2009

An energy-efficient interface selection for multi-mode terminals by utilizing out-of-band paging channels.
Telecommun. Syst., 2009

A New Soft Handover Mechanism using DCHs in 3GPP HSDPA Networks.
J. Networks, 2009

Energy-Efficient Vertical Handover Mechanism.
IEICE Trans. Commun., 2009

Achievable Throughput-Based MAC Layer Handoff in IEEE 802.11 Wireless Local Area Networks.
EURASIP J. Wirel. Commun. Netw., 2009

A New Soft Handover Mechanism Using DCHs in High-Speed Downlink Packet Access Networks.
Proceedings of the Second International Symposium on Intelligent Information Technology and Security Informatics, 2009

TSA: Time Series Adaptation for enhanced Cell Reselection in UMTS.
Proceedings of the 2009 International Conference on Telecommunications, 2009

A cluster key management scheme utilizing time-based keys for wireless sensor networks.
Proceedings of the IADIS International Conference Applied Computing 2009, 2009

On the Privacy-Preserving HCI Issues.
Proceedings of the Universal Access in Human-Computer Interaction. Addressing Diversity, 2009

2008
An enhanced TCP for upward vertical handoff in integrated WLAN and cellular networks.
Int. J. Commun. Syst., 2008

ABC<sup>2</sup>: A New Approach to Seamless Mobility Using Cellular Networks and WLANs.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

2007
A dynamic load-aware congestion control scheme in optical burst switching networks.
Photonic Netw. Commun., 2007

Smart Proactive Caching Scheme for Fast Authenticated Handoff in Wireless LAN.
J. Comput. Sci. Technol., 2007

A Novel Vertical Handoff Scheme Based on Mobility Speed in Integrated WLAN and UMTS Networks.
IEICE Trans. Commun., 2007

Design and implementation of wireless PKI technology suitable for mobile phone in mobile-commerce.
Comput. Commun., 2007

Location-Aware Signaling Protocol for WWAN and WLAN Interworking.
Proceedings of the Wired/Wireless Internet Communications, 5th International Conference, 2007

Secure Dynamic Network Reprogramming Using Supplementary Hash in Wireless Sensor Networks.
Proceedings of the Ubiquitous Intelligence and Computing, 4th International Conference, 2007

A Time-Based Key Management Protocol for Wireless Sensor Networks.
Proceedings of the Information Security Practice and Experience, 2007

Dynamic Routing Algorithm for Asymmetric Link in Mobile Ad Hoc Networks.
Proceedings of the Information Networking. Towards Ubiquitous Networking and Services, 2007

2006
Dropping Policy with Burst Retransmission to Improve the Throughput of TCP Over Optical Burst-switched Networks.
Photonic Netw. Commun., 2006

Peak Load-Based Congestion Control Scheme in Optical Burst Switching Networks.
IEICE Trans. Commun., 2006

Dropping Policy for Improving the Throughput of TCP over Optical Burst-Switched Networks.
Proceedings of the Information Networking, 2006

An Efficient Scheme for Detecting Malicious Nodes in Mobile Ad Hoc Networks.
Proceedings of the Information Security and Cryptology - ICISC 2006, 9th International Conference, Busan, Korea, November 30, 2006

Performance Improvement of TCP over Optical Burst Switching Networks with Drop Policy.
Proceedings of the Computational Science and Its Applications, 2006

A Routing Protocol for Throughput Enhancement and Energy Saving in Mobile Ad Hoc Networks.
Proceedings of the Computational Science and Its Applications, 2006

Cluster-Based Certificate Chain for Mobile Ad Hoc Networks.
Proceedings of the Computational Science and Its Applications, 2006

Novel Congestion Control Scheme in Next-Generation Optical Networks.
Proceedings of the Computational Science, 2006

Maximum Lifetime Paths for the High Packet Delivery Ratio Using Fast Recovery in a Mobile Ad Hoc Network.
Proceedings of the Computational Science, 2006

Congestion Control Scheme based on Peak Load in Optical Burst Switching Networks.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

Message and Its Origin Authentication Protocol for Data Aggregation in Sensor Networks.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006

A Self-management Framework for Wireless Sensor Networks.
Proceedings of the Advanced Web and Network Technologies, and Applications, 2006

Location-Aware Key Management Using Multi-layer Grids for Wireless Sensor Networks.
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006

2005
Dynamic Deflection Routing with Virtual Wavelength Assignment in Optical Burst-Switched Networks.
Photonic Netw. Commun., 2005

Contention-Based Limited Deflection Routing Protocol in Optical Burst-Switched Networks.
IEEE J. Sel. Areas Commun., 2005

2004
Combinatorial Mobiele IP: A new efficient mobility management using minimized paging and local registration in mobile IP environments.
Wirel. Networks, 2004

Cost-Effective Deflection Routing Algorithm in Optical Burst Switching Networks.
Proceedings of the Parallel and Distributed Computing: Applications and Technologies, 2004

Design and Analysis of Improved GSM Authentication Protocol for Roaming Users.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2004

Limited Deflection Routing with QoS-Support.
Proceedings of the Computational Science, 2004

2003
A Study on Deflection Routing in Optical Burst-Switched Networks.
Photonic Netw. Commun., 2003

Lambda GLSP setup with QoS requirements in optical Internet.
Comput. Commun., 2003

Secure and Scalable Mobile IP Registration Scheme Using PKI.
Proceedings of the Computational Science and Its Applications, 2003

Performance Improvement of Deflection Routing in Optical Burst Switching Networks.
Proceedings of the Computational Science - ICCS 2003, 2003

New Adaptive Trust Models against DDoS: Back-Up CA and Mesh PKI.
Proceedings of the Web Communication Technologies and Internet-Related Social Issues, 2003

Contention-based limited deflection routing in OBS networks.
Proceedings of the Global Telecommunications Conference, 2003

2002
A Model for Embedding and Authorizing Digital Signatures in Printed Documents.
Proceedings of the Information Security and Cryptology, 2002

2001
High-speed PVC-based handover control in wireless ATM networks.
Comput. Commun., 2001

2000
An adaptive call admission control in ATM networks using optimized measurements windows.
Comput. Commun., 2000

IN service provision using VLR in IMT-2000 network.
Comput. Commun., 2000

Performance of Location Caching Scheme to Support Call Locality in Wireless Networks.
Proceedings of the Advances in Computing Science, 2000

1999
Clarifying Straight Replays and Forced Delays.
ACM SIGOPS Oper. Syst. Rev., 1999

A complete test sequence using cyclic sequence for conformance testing.
Comput. Commun., 1999

An integrated admission control based on measurements in ATM networks.
Comput. Commun., 1999

An Overload Control of SCP in Advanced Intelligent Network with Fairness and Priority.
Comput. Commun., 1999

Preventing Double-Spent Coins from Revealing User's Whole Secret.
Proceedings of the Information Security and Cryptology, 1999

1998
A measurement-based admission control algorithm using variable-sized window in ATM networks.
Comput. Commun., 1998

Efficient and secure password-based authentication protocols against guessing attacks.
Comput. Commun., 1998

Performance analysis of queueing strategies with multiple priorities in multimedia PCS.
Proceedings of the Computers and Their Applications (CATA-98), 1998

1997
Security and efficiency in authentication protocols resistant to password guessing attack.
Proceedings of the 22nd IEEE Conference on Local Computer Networks (LCN '97), 1997

A modeling of security management system for electronic data interchange.
Proceedings of the Second IEEE Symposium on Computers and Communications (ISCC 1997), 1997

An Adaptable and Reliable Authentication Protocol for Communication Networks.
Proceedings of the Proceedings IEEE INFOCOM '97, 1997

Overload Cntrol of SCP in Advanced Intelligent Network with Fairness and Priority.
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1997), 1997

1996
The Design and Verification of Services Feature Interaction Manager on AIN Using Z Schema.
Proceedings of the COMPSAC '96, 1996


  Loading...