Sungik Jun

According to our database1, Sungik Jun authored at least 27 papers between 1995 and 2020.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2020
Dynamic Power Management for Heterogeneous Server Environments.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2020

2017
Energy efficiency for cloud computing system based on predictive optimization.
J. Parallel Distributed Comput., 2017

2016
Energy savings in processor based on prediction technique.
Proceedings of the 2016 International Conference on Information Networking, 2016

2015
Gaussian process for predicting CPU utilization and its application to energy efficiency.
Appl. Intell., 2015

EAP: Energy-Awareness Predictor in Multicore CPU.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2015

2008
Compact Implementation of SHA-1 Hash Function for Mobile Trusted Module.
Proceedings of the Information Security Applications, 9th International Workshop, 2008

Implementation of a TCG-Based Trusted Computing in Mobile Device.
Proceedings of the Trust, 2008

A resistance deviation-to-time interval converter for resistive sensors.
Proceedings of the 21st Annual IEEE International SoC Conference, SoCC 2008, 2008

The Need of MTM Interface Specification for the Trusted Mobile Platform.
Proceedings of the 2008 International Conference on Embedded Systems & Applications, 2008

Efficient Hardware Architecture of SHA-256 Algorithm for Trusted Mobile Computing.
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008

2007
A high performance NIDS using FPGA-based regular expression matching.
Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), 2007

Context-aware security service in RFID/USN environments using MAUT and extended GRBAC.
Proceedings of the Second IEEE International Conference on Digital Information Management (ICDIM), 2007

Authentication and Key Agreement Method for Home Networks Using a Smart Card.
Proceedings of the Computational Science and Its Applications, 2007

Improvement on TCG Attestation and Its Implication for DRM.
Proceedings of the Computational Science and Its Applications, 2007

Efficient Implementation of the Keyed-Hash Message Authentication Code Based on SHA-1 Algorithm for Mobile Trusted Computing.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007

2006
Low Power AES Hardware Architecture for Radio Frequency Identification.
Proceedings of the Advances in Information and Computer Security, 2006

A Security Management Framework with Roaming Coordinator for Pervasive Services.
Proceedings of the Autonomic and Trusted Computing, Third International Conference, 2006

2005
Efficient 3G/WLAN Interworking Techniques for Seamless Roaming Services with Location-Aware Authentication.
Proceedings of the NETWORKING 2005: Networking Technologies, 2005

Predictive Mobility Support with Secure Context Management for Vehicular Users.
Proceedings of the Network Control and Engineering for QoS, 2005

2004
A study on an efficient pre-resolution method for embedded Java system.
Proceedings of the IEEE International Conference on Virtual Environments, 2004

A Location-Aware Secure Interworking Architecture Between 3GPP and WLAN Systems.
Proceedings of the Information Security and Cryptology, 2004

2003
An efficient inverse multiplier/divider architecture for cryptography systems.
Proceedings of the 2003 International Symposium on Circuits and Systems, 2003

An Efficient Small Sized On-Card Verifier for Java Card.
Proceedings of the Computational Science and Its Applications, 2003

Implementation of an Elliptic Curve Cryptography Hardware Accelerator for Smart Cards.
Proceedings of the International Conference on Security and Management, 2003

2002
Implementation of ECC/ECDSA Cryptography Algorithms Based on Java Card.
Proceedings of the 22nd International Conference on Distributed Computing Systems, 2002

1998
Stand-by loading scheme: an effective software retrofit method for a switching system.
Proceedings of the Third IEEE Symposium on Computers and Communications (ISCC 1998), June 30, 1998

1995
Dynamic code binding for scalable operating system in distributed real-time systems.
Proceedings of the 2nd International Workshop on Real-Time Computing Systems and Applications, October 25, 1995


  Loading...