Kyungho Son

According to our database1, Kyungho Son authored at least 10 papers between 2006 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
MyData Personal Data Store Model(PDS) to Enhance Information Security for Guarantee the Self-determination rights.
KSII Trans. Internet Inf. Syst., 2022

2020
Cyber-attack group analysis method based on association of cyber-attack information.
KSII Trans. Internet Inf. Syst., 2020

2017
Real threats using GTP protocol and countermeasures on a 4G mobile grid computing environment.
Int. J. Web Grid Serv., 2017

2016
SIP amplification attack analysis and detection in VoLTE service network.
Proceedings of the 2016 International Conference on Information Networking, 2016

2015
Simple and Provably Secure Anonymous Authenticated Key Exchange with a Binding Property.
IEICE Trans. Commun., 2015

Security Threats and Countermeasure Frame Using a Session Control Mechanism on VoLTE.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015

2012
A Privacy-Protecting Authentication Scheme for Roaming Services with Smart Cards.
IEICE Trans. Commun., 2012

2011
Secure Data Deletion for USB Flash Memory.
J. Inf. Sci. Eng., 2011

2008
User Set Estimation for Adaptive Resource Allocation in a Multiuser-OFDM System.
IEEE Trans. Wirel. Commun., 2008

2006
Confidence Value Based Multi Levels of Authentication for Ubiquitous Computing Environments.
Proceedings of the Computational Science and Its Applications, 2006


  Loading...