Keun-Ho Lee

According to our database1, Keun-Ho Lee authored at least 20 papers between 2002 and 2021.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Reproduction based Multi-Contents Distribution Platform.
KSII Trans. Internet Inf. Syst., 2021

2019
Safe and convenient personal authentication method using Moiré 3D authentication based on biometric authentication.
Clust. Comput., 2019

2018
Constructing a secure hacking-resistant IoT U-healthcare environment.
J. Comput. Virol. Hacking Tech., 2018

2016
2-Channel authentication technique using cardiac impulse based OTP.
J. Comput. Virol. Hacking Tech., 2016

Cloud computing for ubiquitous computing on M2M and IoT environment mobile application.
Clust. Comput., 2016

Ubiquitous Computing for Cloud Infrastructure to Mobile Application in IoT Environment.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2016

2015
Vulnerabilities of intelligent automobiles using TPEG update based on T-DMB and its countermeasures.
J. Comput. Virol. Hacking Tech., 2015

Cloud infrastructure for ubiquitous M2M and IoT environment mobile application.
Clust. Comput., 2015

An effective implementation scheme of a layer overlay representation of a hologram video technology in an M2M application environment.
Clust. Comput., 2015

The Packet Filtering Method with Packet Delay Distribution Forecasting for Stability and Synchronization in a Heterogeneous Network.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2015

2013
An Efficient Cluster Authentication Scheme Based on VANET Environment in M2M Application.
Int. J. Distributed Sens. Networks, 2013

2008
Region-based Shadow Registration Scheme for Efficient Mobility Management in the SIP.
J. Inf. Sci. Eng., 2008

The Statistical Failure Analysis for the Design of Robust SRAM in Nano-Scale Era.
Proceedings of the 9th International Symposium on Quality of Electronic Design (ISQED 2008), 2008

2007
Authentication Protocol Using Threshold Certification in Hierarchical-cluser-based Ad Hoc Networks.
J. Inf. Sci. Eng., 2007

2006
Hierarchical Cluster Configuration Scheme for Scalable Ad Hoc Networks.
Proceedings of the Computational Science and Its Applications, 2006

Threshold Authenticated Key Configuration Scheme Based on Multi-layer Clustering in Mobile Ad Hoc.
Proceedings of the Advanced Web and Network Technologies, and Applications, 2006

2005
Authentication Based on Multilayer Clustering in Ad Hoc Networks.
EURASIP J. Wirel. Commun. Netw., 2005

Efficient Mobility Management for Multimedia Service in Wireless IP Networks.
Proceedings of the 4th Annual ACIS International Conference on Computer and Information Science (ICIS 2005), 2005

2003
Investigation of the capacitance deviation due to metal-fills and the effective interconnect geometry modeling.
Proceedings of the 4th International Symposium on Quality of Electronic Design (ISQED 2003), 2003

2002
Characterizing the Current Degradation of Abnormally Structured MOS Transistors Using a 3D Poisson Solver.
Proceedings of the 3rd International Symposium on Quality of Electronic Design, 2002


  Loading...