Namhi Kang

According to our database1, Namhi Kang authored at least 29 papers between 2004 and 2017.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2017
IoT-Cloud collaboration to establish a secure connection for lightweight devices.
Wirel. Networks, 2017

2016
Mutual Authentication Scheme in Secure Internet of Things Technology for Comfortable Lifestyle.
Sensors, 2016

Fine-Grained Support of Security Services for Resource Constrained Internet of Things.
Int. J. Distributed Sens. Networks, 2016

Rejuvenation of the IEC 61850 protocol stack for MMS.
Proceedings of the 2016 IEEE International Conference on Smart Grid Communications, 2016

2015
ESSE: Efficient Secure Session Establishment for Internet-Integrated Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2015

Comprehensive performance evaluation of distributed and dynamic mobility routing strategy.
Comput. Networks, 2015

Challenges in Deploying CoAP Over DTLS in Resource Constrained Environments.
Proceedings of the Information Security Applications - 16th International Workshop, 2015

2014
Lightweight secure communication for CoAP-enabled Internet of Things using delegated DTLS handshake.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2014

2013
Load-Balancing Proxy Mobile IPv6 Networks with Mobility Session Redirection.
IEEE Commun. Lett., 2013

2012
Effective DDoS attack defense scheme using web service performance measurement.
Proceedings of the Fourth International Conference on Ubiquitous and Future Networks, 2012

2010
Multimedia push-to-talk service in home networks.
IEEE Trans. Consumer Electron., 2010

Packaged HTTP: Reconsidering Web Efficiency.
Int. J. Adv. Comp. Techn., 2010

Multimedia Push-to-Talk Service over Wireless Mesh Networks.
Proceedings of the IEEE International Conference on Sensor Networks, 2010

2009
Mobility management based on proxy mobile IPv6 for multicasting services in home networks.
IEEE Trans. Consumer Electron., 2009

Enhanced Predictive Handover for Fast Proxy Mobile IPv6.
IEICE Trans. Commun., 2009

2008
A Novel Approach to Overlay Multicasting Schemes for Multi-Hop Ad-Hoc Networks.
IEICE Trans. Commun., 2008

Enhanced PMIPv6 Route Optimization Handover.
IEICE Trans. Commun., 2008

2007
Localized Proxy-MIPv6 with Route Optimization in IP-Based Networks.
IEICE Trans. Commun., 2007

Integrated Authentication Model for Network Access in Next Generation Networks.
IEICE Trans. Commun., 2007

H2O: Hierarchically Optimized Hybrid Routing Strategies for Multihop Wireless Networks.
Proceedings of the Information Networking. Towards Ubiquitous Networking and Services, 2007

2006
Heterogeneous Routing Protocol Coordinator for Mobile Ad Hoc Networks.
Proceedings of the Ubiquitous Computing Systems, Third International Symposium, 2006

Ubiquitous Zone (U-Zone) based Community Networking Technologies.
Proceedings of the Third Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks, 2006

A Short-Lived Key Selection Approach to Authenticate Data Origin of Multimedia Stream.
Proceedings of the Computational Science and Its Applications, 2006

Ubiquitous Zone Networking Technologies for Multi-hop Based Wireless Communications.
Proceedings of the Self-Organizing Systems, First International Workshop, 2006

2005
Differentiated authentication services for real-time multimedia streaming over the Internet.
PhD thesis, 2005

Security Analysis of DoS Vulnerability in Stream Authentication Schemes Using Hash Chaining.
IEICE Trans. Commun., 2005

Secure and Scalable Routing Protocol for Mobile Ad-Hoc Networks.
Proceedings of the Mobility Aware Technologies and Applications, 2005

MDS: Multiplexed Digital Signature for Real-Time Streaming over Multi-sessions.
Proceedings of the Information Networking, 2005

2004
DiffSig: Differentiated Digital Signature for Real-Time Multicast Packet Flows.
Proceedings of the Trust and Privacy in Digital Business, First International Conference, 2004


  Loading...