Moon-Seog Jun

According to our database1, Moon-Seog Jun authored at least 33 papers between 2003 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
Design of a Symmetry Protocol for the Efficient Operation of IP Cameras in the IoT Environment.
Symmetry, 2019

2017
An Efficient Secure Scheme Based on Hierarchical Topology in the Smart Home Environment.
Symmetry, 2017

2016
A Design of Secure Authentication Method Using Zero Knowledge Proof in Smart-Home Environment.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2016

A Design of Secure Authentication Method with Bio-Information in the Car Sharing Environment.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2016

A Design of Key Agreement Scheme Between Lightweight Devices in IoT Environment.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2016

2015
Design of Data Communication Scheme for Privacy Protection in Smart IoT Environment.
Smart Comput. Rev., 2015

User Authentication Method Design Based on Biometrics in a Multi-cloud Environment.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2015

Design of Exploitable Automatic Verification System for Secure Open Source Software.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2015

Design of Authentication Protocol Based on Distance-Bounding and Zero-Knowledge for Anonymity in VANET.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2015

PUF-Based Privacy Protection Method in VANET Environment.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2015

2011
A New Privacy Scheme for Providing Anonymity Techniques on Sensor Network.
Smart Comput. Rev., 2011

A Fast Authentication System for Home Network Devices Using Two Dimension Array.
Smart Comput. Rev., 2011

A Study on Group Key Agreement in Sensor Network Environments Using Two-Dimensional Arrays.
Sensors, 2011

Real-Time Monitoring System Using Location Based Service.
Proceedings of the Ubiquitous Computing and Multimedia Applications, 2011

A Privacy Technique for Providing Anonymity to Sensor Nodes in a Sensor Network.
Proceedings of the Ubiquitous Computing and Multimedia Applications, 2011

The Entrance Authentication and Tracking Systems Using Object Extraction and the RFID Tag.
Proceedings of the Ubiquitous Computing and Multimedia Applications, 2011

Design and Materialization of Location Based Motion Detection System in USN Environments.
Proceedings of the Ubiquitous Computing and Multimedia Applications, 2011

Realization of Integrated Service for Zoos Using RFID/USN Based Location Tracking Technology.
Proceedings of the Ubiquitous Computing and Multimedia Applications, 2011

Study on Group Key Agreement Using Two-Dimensional Array in Sensor Network Environment.
Proceedings of the Ubiquitous Computing and Multimedia Applications, 2011

An Enhanced Data Privacy Mechanism Suitable for Ubiquitous Sensor Networks.
Proceedings of the Grid and Distributed Computing, 2011

RFID Mutual Authentication Protocols Using Key Exchange Based on Hash Functions.
Proceedings of the Grid and Distributed Computing, 2011

2010
A Study on Home Network User Authentication Using Token-Based OTP.
Proceedings of the Security-Enriched Urban Computing and Smart Grid, 2010

A Mechanism to Prevent RP Phishing in OpenID System.
Proceedings of the 9th IEEE/ACIS International Conference on Computer and Information Science, 2010

Security Protocol Design for Electronic-Cash Transactions in a Mobile-PKI Environment.
Proceedings of the 9th IEEE/ACIS International Conference on Computer and Information Science, 2010

2009
Design and Implementation of Security Protocol for Home-Network.
Proceedings of the 10th ACIS International Conference on Software Engineering, 2009

Design and Implementation of Multi Authentication Mechanism for Secure Electronic Commerce.
Proceedings of the 10th ACIS International Conference on Software Engineering, 2009

2008
A Design of One-Time Password Mechanism Using Public Key Infrastructure.
Proceedings of the NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008, 2008

2006
Digital Video WaterMarking System Using Audio Information of Image Discrete Frequency on Improved Security Through Pre-Preocessing.
Proceedings of the 2006 International Conference on Data Mining, 2006

A Study on DRM System for On/Off Line Key Authentication.
Proceedings of the 2006 International Conference on Security & Management, 2006

Design and Verification of Security API Structure Based on PKCS #11.
Proceedings of the Sixth International Conference on Computer and Information Technology (CIT 2006), 2006

2004
A Multimedia Database System Using Mobile Indexing Agent in Wireless Network.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2004

2003
VDTS: The Design of Real-Time Virus Detection and Tracing Systems.
Proceedings of the International Conference on Security and Management, 2003

The Design of WEB Stegodata Detection Systems Using Intrusion Detection Systems.
Proceedings of the International Conference on Security and Management, 2003


  Loading...