Kijoon Chae

According to our database1, Kijoon Chae
  • authored at least 67 papers between 1990 and 2018.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
CSDSM: Cognitive switch-based DDoS sensing and mitigation in SDN-driven CDNi word.
Comput. Sci. Inf. Syst., 2018

2017
A Secure and Efficient Key Authentication using Bilinear Pairing for NFC Mobile Payment Service.
Wireless Personal Communications, 2017

Secure and structured IoT smart grid system management.
IJWGS, 2017

Lightweight Authentication for Distributed Mobile P2P Communications.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2017

Enhanced password processing scheme based on visual cryptography and OCR.
Proceedings of the 2017 International Conference on Information Networking, 2017

2016
Security system architecture for data integrity based on a virtual smart meter overlay in a smart grid system.
Soft Comput., 2016

Authentication for Mobile Open IPTV Service Security.
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016

A Group Authentication Scheme Based on Lagrange Interpolation Polynomial.
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016

Securing information flow in content delivery networks with visual and quantum cryptography.
Proceedings of the 2016 International Conference on Information Networking, 2016

An anonymous IP-based privacy protection routing mechanism for CDNi.
Proceedings of the 2016 International Conference on Information Networking, 2016

2015
Authentication and Key Management Based on Kerberos for M2M Mobile Open IPTV Security.
Intelligent Automation & Soft Computing, 2015

Secure Authentication for Structured Smart Grid System.
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015

An efficient defense mechanism for spoofed IP attack in SDN based CDNi.
Proceedings of the 2015 International Conference on Information Networking, 2015

Key management mechanism in ALTO/SDN based CDNi architecture.
Proceedings of the 2015 International Conference on Information Networking, 2015

2014
Pairwise and group key setup mechanism for secure machine-to-machine communication.
Comput. Sci. Inf. Syst., 2014

OCPM: Ortho code privacy mechanism in smart grid using ring communication architecture.
Ad Hoc Networks, 2014

Multi-defense Mechanism against DDoS in SDN Based CDNi.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014

Service Security for Smart Grid System.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014

Data aggregation using temporal and spatial correlations in Advanced Metering Infrastructure.
Proceedings of the International Conference on Information Networking 2014, 2014

2013
Code updates based on minimal backbone and group key management for secure sensor networks.
Mathematical and Computer Modelling, 2013

Secure and Lightweight Key Distribution with ZigBee Pro for Ubiquitous Sensor Networks.
IJDSN, 2013

Key management approach for secure mobile open IPTV service.
Comput. Sci. Inf. Syst., 2013

Secure Aggregation and Attack Detection for Smart Grid System.
Proceedings of the 16th International Conference on Network-Based Information Systems, 2013

Key Establishment and Management for Secure Cellular Machine-to-Machine Communication.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

An enhanced measurement transmission scheme for privacy protection in smart grid.
Proceedings of the International Conference on Information Networking 2013, 2013

2012
An Improved Security Approach Based on Kerberos for M2M Open IPTV System.
Proceedings of the 15th International Conference on Network-Based Information Systems, 2012

An enhanced key management using ZigBee Pro for wireless sensor networks.
Proceedings of the 2012 International Conference on Information Networking, 2012

2011
Distributed authentication mechanism for secure channel establishment in ubiquitous medical sensor networks.
Mobile Information Systems, 2011

Secure Code Dissemination Using Energy-Efficient Minimal Virtual Backbone in Sensor Networks.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

A joint congestion control, routing, and scheduling algorithm in multihop wireless networks with heterogeneous flows.
Proceedings of the 2011 International Conference on Information Networking, 2011

2010
DMP: Detouring Using Multiple Paths against Jamming Attack for Ubiquitous Networking System.
Sensors, 2010

Adaptive Data Mining Approach for Flow Redirection in Multihomed Mobile Router.
International Journal of Information Technology and Decision Making, 2010

Energy-Efficient Code Dissemination Using Minimal Virtual Backbone in Sensor Networks.
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010

2009
An efficient data fusion and assurance mechanism using temporal and spatial correlations for home automation networks.
IEEE Trans. Consumer Electronics, 2009

A Fault Management and Monitoring Mechanism for Secure Medical Sensor Network.
IJCSA, 2009

Attack Classification Based on Data Mining Technique and Its Application for Reliable Medical Sensor Communication.
IJCSA, 2009

2008
An Abnormal Area Scanning for Scalable and Energy-Efficient and Secure SensorNet Management.
Proceedings of the 2008 International Conference on Multimedia and Ubiquitous Engineering (MUE 2008), 2008

A secure and delay-efficient scheme for NetLMM.
Proceedings of the 5th International Conference on Mobile Technology, 2008

2007
Integrated Notification Architecture Based on Overlay Against DDoS Attacks on Convergence Network.
Proceedings of the Software Technologies for Embedded and Ubiquitous Systems, 2007

An Energy-Efficient Sensor Routing with low latency, scalability in Wireless Sensor Networks.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

2006
Proactive Defense Mechanism against IP Spoofing Traffic on a NEMO Environment.
IEICE Transactions, 2006

A Key Management Based on Multiple Regression in Hierarchical Sensor Network.
Proceedings of the Information Security Applications, 7th International Workshop, 2006

Security Enhancement Mechanism for Ad-Hoc OLSR Protocol.
Proceedings of the Information Networking, 2006

Home Gateway with Automated Real-Time Intrusion Detection for Secure Home Networks.
Proceedings of the Computational Science and Its Applications, 2006

A New Key Management Scheme for Distributed Encrypted Storage Systems.
Proceedings of the Computational Science and Its Applications, 2006

Overlapped Detection Via Approximate Entropy Estimation Against Flooding Attack in Mobile Sensor Networks.
Proceedings of the Computational Science, 2006

Pairwise Key Setup and Authentication Utilizing Deployment Information for Secure Sensor Network.
Proceedings of the High Performance Computing and Communications, 2006

Key Establishment and Authentication Mechanism for Secure Sensor Networks.
Proceedings of the Advanced Web and Network Technologies, and Applications, 2006

2005
An energy-efficient sensor routing scheme for home automation networks.
IEEE Trans. Consumer Electronics, 2005

A Fast Defense Mechanism Against IP Spoofing Traffic in a NEMO Environment.
Proceedings of the Information Networking, 2005

A Scalable Mutual Authentication and Key Distribution Mechanism in a NEMO Environment.
Proceedings of the Computational Science and Its Applications, 2005

A Secure User Authentication Method in Networked Intelligent Manufacturing Systems.
Proceedings of the 4th International Conference on Cyberworlds (CW 2005), 2005

2004
A Combined Data Mining Approach for DDoS Attack Detection.
Proceedings of the Information Networking, 2004

Detection and Identification Mechanism against Spoofed Traffic Using Distributed Agents.
Proceedings of the Computational Science and Its Applications, 2004

2003
Design of Security Enforcement Engine for Active Nodes in Active Networks.
Proceedings of the Information Networking, 2003

A Ticket-Based AAA Security Mechanism in Mobile IP Network.
Proceedings of the Computational Science and Its Applications, 2003

Secure Firewall Traversal in Mobile IP Network.
Proceedings of the Computational Science - ICCS 2003, 2003

Refundable Electronic Cash for Mobile Commerce.
Proceedings of the Web Communication Technologies and Internet-Related Social Issues, 2003

2002
The Chamois Reconfigurable Data-Mining Architecture.
Journal of Object Technology, 2002

The Chamois Component-Based Knowledge Engineering Framework.
IEEE Computer, 2002

Flow Admission Control for MPLS Support of DiffServ.
Proceedings of the Information Networking, 2002

2001
Differentiated Link Based QoS Routing Algorithms for Multimedia Traffic in MPLS Networks.
Proceedings of the 15th International Conference on Information Networking, 2001

Integrated Transport Layer Security: End-to-End Security Model between WTLS and TLS.
Proceedings of the 15th International Conference on Information Networking, 2001

Security Enhancement on Mobile Commerce.
Proceedings of the Human Society and the Internet, 2001

2000
An Efficient Public-key Based Authentication with Mobile-IP in E-commerce.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2000

1999
Predictive and Adaptive Bandwidth Reservation Strategies in Wireless Networks.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1999

1990
Performance evaluation of FDDI network and interconnected heterogeneous networks.
Proceedings of the 15th Conference on Local Computer Networks, 1990


  Loading...