Namje Park

Orcid: 0000-0003-4434-8933

According to our database1, Namje Park authored at least 89 papers between 2003 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Proposal of a Token-Based Node Selection Mechanism for Node Distribution of Mobility IoT Blockchain Nodes.
Sensors, October, 2023

2022
Short-Term Energy Forecasting Using Machine-Learning-Based Ensemble Voting Regression.
Symmetry, 2022

De-Identification Mechanism of User Data in Video Systems According to Risk Level for Preventing Leakage of Personal Healthcare Information.
Sensors, 2022

Lightweight knowledge-based authentication model for intelligent closed circuit television in mobile personal computing.
Pers. Ubiquitous Comput., 2022

Role-based Access Control Video Surveillance Mechanism Modeling in Smart Contract Environment.
Trans. Emerg. Telecommun. Technol., 2022

2021
Preemptive Prediction-Based Automated Cyberattack Framework Modeling.
Symmetry, 2021

Web-Browsing Application Using Web Scraping Technology in Korean Network Separation Application.
Symmetry, 2021

Blockchain based privacy preserving multimedia intelligent video surveillance using secure Merkle tree.
Multim. Tools Appl., 2021

2020
A Face Image Virtualization Mechanism for Privacy Intrusion Prevention in Healthcare Video Surveillance Systems.
Symmetry, 2020

IoT-Blockchain Enabled Optimized Provenance System for Food Industry 4.0 Using Advanced Deep Learning.
Sensors, 2020

CCTV-RFID enabled multifactor authentication model for secure differential level video access control.
Multim. Tools Appl., 2020

Framework for assessing responsiveness to personal data breaches based on Capture-the-Flag.
J. Multim. Inf. Syst., 2020

2018
Electronic identity information hiding methods using a secret sharing scheme in multimedia-centric internet of things environment.
Pers. Ubiquitous Comput., 2018

De-identification of metering data for smart grid personal security in intelligent CCTV-based P2P cloud computing environment.
Peer-to-Peer Netw. Appl., 2018

2017
Erratum to: Geocasting-based synchronization of Almanac on the maritime cloud for distributed smart surveillance.
J. Supercomput., 2017

Geocasting-based synchronization of Almanac on the maritime cloud for distributed smart surveillance.
J. Supercomput., 2017

A Study on De-Identification of Metering Data for Smart Grid Personal Security in Cloud Environment.
J. Multim. Inf. Syst., 2017

2016
Mutual Authentication Scheme in Secure Internet of Things Technology for Comfortable Lifestyle.
Sensors, 2016

An Enhanced Lightweight Anonymous Authentication Scheme for a Scalable Localization Roaming Service in Wireless Sensor Networks.
Sensors, 2016

Mobile middleware platform for secure vessel traffic system in IoT service environment.
Secur. Commun. Networks, 2016

Security and Privacy Mechanisms for Sensor Middleware and Application in Internet of Things (IoT).
Int. J. Distributed Sens. Networks, 2016

Geocasting-Based Almanac Synchronization Method for Secure Maritime Cloud.
Proceedings of the Information Security Applications - 17th International Workshop, 2016

Slowloris DoS Countermeasure over WebSocket.
Proceedings of the Information Security Applications - 17th International Workshop, 2016

2015
Inter-vessel traffic service data exchange format protocol security enhancement of user authentication scheme in mobile VTS middleware platform.
Proceedings of the 17th Asia-Pacific Network Operations and Management Symposium, 2015

2014
Performance Improvement Based Authentication Protocol for Intervessel Traffic Service Data Exchange Format Protocol Based on U-Navigation System in WoT Environment.
J. Appl. Math., 2014

Implementation of load management application system using smart grid privacy policy in energy management service environment.
Clust. Comput., 2014

The Improvement for Performance of Inter-VTS Data Exchange Format Protocol in VTS System.
Proceedings of the Frontier and Innovation in Future Computing and Communications, 2014

2013
The Architecture Design of Semantic Based Open USN Service Platform Model.
Proceedings of the Mobile, Ubiquitous, and Intelligent Computing, 2013

Security Analysis on a Group Key Transfer Protocol Based on Secret Sharing.
Proceedings of the Mobile, Ubiquitous, and Intelligent Computing, 2013

Development of STEAM Education Program Centering on Non-traditional Energy.
Proceedings of the Mobile, Ubiquitous, and Intelligent Computing, 2013

Result of Implementing STEAM Program and Analysis of Effectiveness for Smart Grid's Education.
Proceedings of the Mobile, Ubiquitous, and Intelligent Computing, 2013

Analysis of Cyber Attacks and Security Intelligence.
Proceedings of the Mobile, Ubiquitous, and Intelligent Computing, 2013

Use-Cases and Service Modeling Analysis of Open Ubiquitous Sensor Network Platform in Semantic Environment.
Proceedings of the Mobile, Ubiquitous, and Intelligent Computing, 2013

Creation Mechanism for Access Group Based on User Privacy Policy-Based Protection.
Proceedings of the Mobile, Ubiquitous, and Intelligent Computing, 2013

Implementation of Load Management Application System in Energy Management Service.
Proceedings of the Mobile, Ubiquitous, and Intelligent Computing, 2013

Access Control Technique of Illegal Harmful Contents for Elementary Schoolchild Online Protection.
Proceedings of the Grid and Pervasive Computing - 8th International Conference, 2013

Development of STEAM Program and Teaching Method for Using LEGO Line Tracer Robot in Elementary School.
Proceedings of the Grid and Pervasive Computing - 8th International Conference, 2013

Cryptanalysis of an Authenticated Group Key Transfer Protocol Based on Secret Sharing.
Proceedings of the Grid and Pervasive Computing - 8th International Conference, 2013

The Concept of Delegation of Authorization and Its Expansion for Multi Domain Smart Grid System.
Proceedings of the Grid and Pervasive Computing - 8th International Conference, 2013

Design of J-VTS Middleware Based on IVEF Protocol.
Proceedings of the Grid and Pervasive Computing - 8th International Conference, 2013

Development of the STEAM-Based Media Education Materials for Prevention of Media Dysfunction in Elementary School.
Proceedings of the Grid and Pervasive Computing - 8th International Conference, 2013

2012
Cell phone-based mobile RFID: models, mechanisms and its security.
Int. J. Radio Freq. Identif. Technol. Appl., 2012

Computer Education's Teaching-Learning Methods Using Educational Programming Language Based on STEAM Education.
Proceedings of the Network and Parallel Computing, 9th IFIP International Conference, 2012

Detection and Mitigation of Web Application Vulnerabilities Based on Security Testing.
Proceedings of the Network and Parallel Computing, 9th IFIP International Conference, 2012

Mobile RFID/NFC Linkage Based on UHF/HF Dual Band's Integration in U-Sensor Network Era.
Proceedings of the Information Technology Convergence, Secure and Trust Computing, and Data Management, 2012

Weaknesses of a Dynamic ID-Based Remote User Authentication Scheme with Session Key Agreement for Multi-server Environment.
Proceedings of the Information Technology Convergence, Secure and Trust Computing, and Data Management, 2012

Elementary Education of Creativity Improvement Using Rube Goldberg's Invention.
Proceedings of the Information Technology Convergence, Secure and Trust Computing, and Data Management, 2012

Customizing Data Analysis Using Forensic Approach in Personalized RFID for Access Control of Student's Harmful Contents.
Proceedings of the Information Technology Convergence, Secure and Trust Computing, and Data Management, 2012

2011
Implementation of terminal middleware platform for mobile RFID computing.
Int. J. Ad Hoc Ubiquitous Comput., 2011

Customized Healthcare Infrastructure Using Privacy Weight Level Based on Smart Device.
Proceedings of the Convergence and Hybrid Information Technology, 2011

Secure UHF/HF Dual-Band RFID : Strategic Framework Approaches and Application Solutions.
Proceedings of the Computational Collective Intelligence. Technologies and Applications, 2011

Secure RFID Personal Data Management Using Privacy Reference Profile.
Proceedings of the Future Generation Information Technology, 2011

USN Middleware Access Control of Sensor Network and Selective Encryption of Information.
Proceedings of the Future Generation Information Technology, 2011

A Study on the Secure Home Healthcare Wireless Service.
Proceedings of the Future Generation Information Technology, 2011

Information Technology Security Evaluation Using CERT C Secure Coding Standard.
Proceedings of the Future Generation Information Technology, 2011

Experiment and Verification of Teaching Fractal Geometry Concepts Using a Logo-Based Framework for Elementary School Children.
Proceedings of the Future Generation Information Technology, 2011

2010
Secure RFID Application Data Management Using All-Or-Nothing Transform Encryption.
Proceedings of the Wireless Algorithms, 2010

Mobile Platform for Networked RFID Applications.
Proceedings of the Seventh International Conference on Information Technology: New Generations, 2010

Security Scheme for Managing a Large Quantity of Individual Information in RFID Environment.
Proceedings of the Information Computing and Applications - International Conference, 2010

AONT Encryption Based Application Data Management in Mobile RFID Environment.
Proceedings of the Computational Collective Intelligence. Technologies and Applications, 2010

Harmful Adult Multimedia Contents Filtering Method in Mobile RFID Service Environment.
Proceedings of the Computational Collective Intelligence. Technologies and Applications, 2010

2008
Policy and role based mobile RFID user privacy data management system.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, 2008

Enforcing security in mobile RFID networks multilateral approaches and solutions.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, 2008

Multilateral Approaches to the Mobile RFID Security Problem Using Web Service.
Proceedings of the Progress in WWW Research and Development, 2008

2007
Privacy Preserving Enhanced Service Mechanism in Mobile RFID Network.
Proceedings of the Advances in Intelligent Web Mastering, Proceedings of the 5th Atlantic Web Intelligence Conference - AWIC 2007, Fontainebleau, France, June 25, 2007

2006
A Layered Approach to Design of Light-Weight Middleware Systems for Mobile RFID Security (SMRM : Secure Mobile RFID Middleware System).
Proceedings of the Management of Integrated End-to-End Communications and Services, 2006

Security Techniques Based on EPC Gen2 Tag for Secure Mobile RFID Network Services.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2006

Security Analysis and Implementation Leveraging Globally Networked RFIDs.
Proceedings of the Personal Wireless Communications, 2006

XML-Signcryption Based LBS Security Protocol Acceleration Methods in Mobile Distributed Computing.
Proceedings of the Computational Science and Its Applications, 2006

An RFID System Based MCLT System with Improved Privacy.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006

WIPI Mobile Platform with Secure Service for Mobile RFID Network Environment.
Proceedings of the Advanced Web and Network Technologies, and Applications, 2006

2005
Trusted Certificate Validation Scheme for Open LBS Application Based on XML Web Services.
J. Inf. Process. Syst., 2005

Security Frameworks for Open LBS Based on Web Services Security Mechanism.
Proceedings of the Parallel and Distributed Processing and Applications, 2005

An efficient software-based security acceleration methods for open LBS services.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2005

An enhanced LBS security protocol in wireless networks.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2005

A secure and privacy enhanced LBS security elements based on KLP.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2005

A Security Acceleration Using XML Signcryption Scheme in Mobile Grid Web Services.
Proceedings of the Web Engineering, 5th International Conference, 2005

Implementation of Streamlining PKI System for Web Services.
Proceedings of the Computational Science and Its Applications, 2005

Open Location-Based Service Using Secure Middleware Infrastructure in Web Services.
Proceedings of the Computational Science and Its Applications, 2005

XML-Based Digital Signature Accelerator in Open Mobile Grid Computing.
Proceedings of the Grid and Cooperative Computing - GCC 2005, 4th International Conference, Beijing, China, November 30, 2005

XML-Based Security Acceleration Methods Supporting Fast Mobile Grid.
Proceedings of the E-Commerce and Web Technologies: 6th International Conference, 2005

XKMS-Based Key Management for Open LBS in Web Services Environment.
Proceedings of the Advances in Web Intelligence Third International Atlantic Web IntelligenceConference, 2005

2004
XML key management system for Web-based business application.
Proceedings of the Managing Next Generation Convergence Networks and Services, 2004

Development of XKMS-Based Service Component for Using PKI in XML Web Services Environment.
Proceedings of the Computational Science and Its Applications, 2004

An Integrated XML Security Mechanism for Mobile Grid Application.
Proceedings of the Computational Science and Its Applications, 2004

A XKMS-Based Security Framework for Mobile Grid into the XML Web Services.
Proceedings of the Computational Science, 2004

Middleware Framework for Secure Grid Application in Mobile Web Services Environment.
Proceedings of the Grid and Cooperative Computing, 2004

2003
Certificate validation service using XKMS for computational grid.
Proceedings of the 2003 ACM Workshop on XML Security, Fairfax, VA, USA, October 31, 2003, 2003

Certificate Validation Scheme of Open Grid Service Usage XKMS.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003


  Loading...