Seung Jo Han

According to our database1, Seung Jo Han authored at least 33 papers between 2004 and 2015.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
Signal Processing for Tracking of Moving Object in Multi-Impulse Radar Network System.
Int. J. Distributed Sens. Networks, 2015

2014
SVD based improved secret fragment visible mosaic image generation for information hiding.
Multim. Tools Appl., 2014

2013
Design of modified Sierpinski fractal based miniaturized patch antenna.
Proceedings of the International Conference on Information Networking 2013, 2013

2010
Securing Mobile IP Registration Messages in Residential Networks.
J. Inform. and Commun. Convergence Engineering, 2010

Kerberos based authentication for inter-domain roaming in wireless heterogeneous network.
Comput. Math. Appl., 2010

A Novel Cross Layer Intrusion Detection System in MANET.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010

Secure Mobile IP Communication in Residential Networks.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010

2009
Robust and secure routing scheme for wireless multihop network.
Pers. Ubiquitous Comput., 2009

A Secure Intrusion Detection System with Authentication in Mobile Ad hoc Network.
Proceedings of the 2009 Pacific-Asia Conference on Circuits, Communications and Systems, 2009

Kerberos Based Authentication Protocol with Improved Identity Protection in 3G Network.
Proceedings of the 2009 Pacific-Asia Conference on Circuits, Communications and Systems, 2009

QoS Assurance of Multimedia Traffic in Residential Network with Hybrid Co-ordination Function and Queuing Disciplines.
Proceedings of the 2009 Pacific-Asia Conference on Circuits, Communications and Systems, 2009

2008
Investigation of Secure Framework for Multipath MANET.
Proceedings of the 2008 International Conference on Multimedia and Ubiquitous Engineering (MUE 2008), 2008

Investigating voice communication over multipath wireless mobile ad hoc network.
Proceedings of the 2nd International Conference on Ubiquitous Information Management and Communication, 2008

Multipath Routing Scheme for Wireless Multihop Network.
Proceedings of the Computational Science and Its Applications - ICCSA 2008, International Conference, Perugia, Italy, June 30, 2008

Heuristic Features for Color Correlogram for Image Retrieval.
Proceedings of the Selected Papers of the Sixth International Conference on Computational Sciences and Its Applications, 2008

Investigating Authentication Architecture Based on Mobility in Heterogeneous Network.
Proceedings of the Second International Conference on Future Generation Communication and Networking, 2008

Investigating Secure Framework for Hybrid Multipath Ad Hoc Network.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

2007
Streaming Media Securely over Multipath Multihop Wireless Network.
Proceedings of the Emerging Technologies in Knowledge Discovery and Data Mining, 2007

Investigation of Secure Media Streaming over Wireless Access Network.
Proceedings of the Information Networking. Towards Ubiquitous Networking and Services, 2007

Investigating Media Streaming in Multipath Multihop Wireless Network.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007

Using Intrinsic Object Attributes for Incremental Content Based Image Retrieval with Histograms.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007

Secure Multipath Routing Scheme for Mobile Ad Hoc Network.
Proceedings of the Third IEEE International Symposium on Dependable, 2007

2006
Investigating Authentication Mechanisms for Wireless Mobile Network.
Proceedings of the Ubiquitous Intelligence and Computing, Third International Conference, 2006

Using One-Time Password Based Authentication for Wireless IP Network.
Proceedings of the Intelligence and Security Informatics, 2006

Design of WLAN Secure System Against Weaknesses of the IEEE 802.1x.
Proceedings of the Advances in Hybrid Information Technology, 2006

Authentication Mechanism Using One-Time Password for 802.11 Wireless LAN.
Proceedings of the Computer Science, 2006

2005
TCP-Friendly Congestion Control over Heterogeneous Wired/Wireless IP Network.
Proceedings of the Advances in Multimedia Information Processing, 2005

Evaluation of Audio Streaming in Secure Wireless Access Network.
Proceedings of the Advances in Informatics, 2005

Anomaly Intrusion Detection for System Call Using the Soundex Algorithm and Neural Networks.
Proceedings of the 10th IEEE Symposium on Computers and Communications (ISCC 2005), 2005

Framework for Secure Audio Streaming to Wireless Access Network.
Proceedings of the Systems Communications 2005 (ICW / ICHSN / ICMCS / SENET 2005), 2005

Performance Analysis of Audio Streaming in Secure Wireless Access Network.
Proceedings of the 4th Annual ACIS International Conference on Computer and Information Science (ICIS 2005), 2005

2004
Vehicle Tracking Using Image Processing Techniques.
Proceedings of the Rough Sets and Current Trends in Computing, 2004

Image Corner Detection Using Radon Transform.
Proceedings of the Computational Science and Its Applications, 2004


  Loading...