Filter
Conference contribution

Search results

  • 2007

    Context-aware service composition for mobile network environments

    Lee, C., Ko, S., Lee, S., Lee, W. & Helal, S., 2007, Ubiquitous Intelligence and Computing - 4th International Conference, UIC 2007, Proceedings. Springer Verlag, p. 941-952 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4611 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    14 Citations (Scopus)
  • Design and implementation of the UsMSS: User-centric secure multimedia service system in intelligent home

    Park, J. H., Lee, S., Lee, D. H., Lim, J., Hong, I. H. & Yang, L. T., 2007, Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007. p. 1233-1238 6 p. 4197448. (Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Design and implementation of the UsMSS: User-centric secure multimedia service system in intelligent home

    Park, J. H., Lee, S., Lee, D. H., Lim, J., Hong, I. H. & Yang, L. T., 2007, Proceedings - 21st International Conference on Advanced Information Networking and Applications, AINA 2007. p. 311-316 6 p. 4220909. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Direct chosen-ciphertext secure hierarchical ID-based encryption schemes

    Park, J. H. & Lee, D. H., 2007, Public Key Infrastructure - 4th European PKI Workshop: Theory and Practice, EuroPKl 2007, Proceedings. Springer Verlag, p. 94-109 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4582 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Discovering methodology and scenario to detect covert database system

    Lee, G. T., Lee, S., Tsomko, E. & Lee, S., 2007, Proceedings of Future Generation Communication and Networking, FGCN 2007. Institute of Electrical and Electronics Engineers Inc., p. 130-135 6 p. 4426217. (Proceedings of Future Generation Communication and Networking, FGCN 2007; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    15 Citations (Scopus)
  • Dynamic activation of role on RBAC for ubiquitous applications

    Kim, Y. G. & Lim, J., 2007, 2007 International Conference on Convergence Information Technology, ICCIT 2007. p. 1148-1153 6 p. 4420412. (2007 International Conference on Convergence Information Technology, ICCIT 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    14 Citations (Scopus)
  • Efficient an implementation method research of a smart card atomic operation

    Jun, E. A., Jung, S. W., Kim, J. G. & Lim, J. I., 2007, Computational Science and Its Applications - ICCSA 2007 - International Conference, Proceedings. PART 2 ed. Springer Verlag, p. 113-121 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4706 LNCS, no. PART 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Efficient certificateless signature schemes

    Choi, K. Y., Park, J. H., Hwang, J. Y. & Lee, D. H., 2007, Applied Cryptography and Network Security - 5th International Conference, ACNS 2007, Proceedings. Springer Verlag, p. 443-458 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4521 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    94 Citations (Scopus)
  • Efficient group key agreement for dynamic TETRA networks

    Su, M. L., Su, Y. L. & Dong, H. L., 2007, SOFSEM 2007: Theory and Practice of Computer Science - 33rd Conference on Current Trends in Theory and Practice of Computer Science, Proceedings. p. 400-409 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4362 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Embedded system modeling based on resource-oriented model

    Kim, J. H. & Choi, J. Y., 2007, Proceedings - 14th Annual IEEE International Conference and Workshops on the Engineering of Computer-Based Systems, ECBS 2007: Raising Expectations of Computer-Based Systems. p. 203-212 10 p. 4148935. (Proceedings of the International Symposium and Workshop on Engineering of Computer Based Systems).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Enhanced doubling attacks on signed-all-bits set recoding

    Kim, H. S., Kim, T. H., Ryoo, J. C., Han, D. G., Kim, H. W. & Lim, J., 2007, Information Security Theory and Practices: Smart Cards, Mobile and Ubiquitous Computing Systems - First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Proceedings. Sauveron, D., Markantonakis, K., Bilas, A. & Quisquater, J.-J. (eds.). Springer Verlag, p. 39-52 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4462 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Enhanced non-disjoint multi-path source routing protocol for wireless ad-hoc networks

    Kim, M. J., Lee, D. H. & Eom, Y. I., 2007, Computational Science and Its Applications - ICCSA 2007 - International Conference, Proceedings. PART 3 ed. Springer Verlag, p. 1187-1196 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4707 LNCS, no. PART 3).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    1 Citation (Scopus)
  • Fast secure communication establishing mechanism for aero-wireless networks

    Kim, K., Hong, J. & Lim, J., 2007, ICECS 2007 - 14th IEEE International Conference on Electronics, Circuits and Systems. p. 1360-1363 4 p. 4511251. (Proceedings of the IEEE International Conference on Electronics, Circuits, and Systems).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Formal embedded operating system model based on resource-based design framework

    Kim, J. H., Sim, J. H., Kim, C. J. & Choi, J. Y., 2007, Proceedings - 7th International Conference on Quality Software, QSIC 2007. p. 244-249 6 p. 4385502. (Proceedings - International Conference on Quality Software).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • Formal security policy model for a common criteria evaluation

    Park, J. & Choi, J. Y., 2007, 9th International Conference on Advanced Communication Technology, ICACT 2007. p. 277-281 5 p. 4195134. (International Conference on Advanced Communication Technology, ICACT; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Generalised category attack-improving histogram-based attack on JPEG LSB embedding

    Lee, K., Westfeld, A. & Lee, S., 2007, Information Hiding - 9th International Workshop, IH 2007, Revised Selected Papers. p. 378-391 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4567 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    25 Citations (Scopus)
  • Genetic algorithmic topology control for two-tiered wireless sensor networks

    Lee, D., Lee, W. & Kim, J., 2007, Computational Science - ICCS 2007 - 7th International Conference, Proceedings. PART 4 ed. Springer Verlag, p. 385-392 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4490 LNCS, no. PART 4).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Citations (Scopus)
  • Geometrically invariant image watermarking in the DWT domain

    Xiang, S. & Kim, H. J., 2007, Information Security Applications - 8th International Workshop, WISA 2007, Revised Selected Papers. Springer Verlag, p. 76-90 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4867 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Histogram-based image hashing scheme robust against geometric deformations

    Xiang, S., Kim, H. J. & Huang, J., 2007, MM and Sec'07 - Proceedings of the Multimedia and Security Workshop 2007. p. 121-128 8 p. (MM and Sec'07 - Proceedings of the Multimedia and Security Workshop 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    94 Citations (Scopus)
  • HMM-based approach for evaluating risk propagation

    Kim, Y. G. & Lim, J., 2007, Intelligence and Security Informatics - Pacific Asia Workshop, PAISI 2007, Proceedings. Springer Verlag, p. 325-326 2 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4430 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Impacts of repetitions and segment size variability on object-level throughput in T-DMB

    Choi, J., Yu, J., Lee, D., Kim, S., Lee, S. & Lee, W., 2007, Digest of Technical Papers - 2007 International Conference on Consumer Electronics, ICCE 2007. 4146247. (Digest of Technical Papers - IEEE International Conference on Consumer Electronics).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Key establishment scheme for sensor networks with low communication cost

    Kim, Y. H., Lee, H., Park, J. H., Yang, L. T. & Lee, D. H., 2007, Autonomic and Trusted Computing - 4th International Conference, ATC 2007, Proceedings. Springer Verlag, p. 441-448 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4610 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Citations (Scopus)
  • Location-aware random pair-wise keys scheme for wireless sensor networks

    Ji, Y. C., Yong, H. K., Lim, J. & Dong, H. L., 2007, Proceedings of the 3rd International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerU 2007. p. 31-36 6 p. 4279767. (Proceedings - 3rd International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerU 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • MBAL: A mobile beacon-assisted localization scheme for wireless sensor networks

    Kim, K. & Lee, W., 2007, Proceedings of 16th International Conference on Computer Communications and Networks 2007, ICCCN 2007. p. 57-62 6 p. 4317797. (Proceedings - International Conference on Computer Communications and Networks, ICCCN).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    76 Citations (Scopus)
  • Mobility driven vertical handover for mobile IPTV traffic in hybrid IEEE 802.11e/16e networks

    Choi, E., Lee, W. & Kim, J., 2007, Ubiquitous Intelligence and Computing - 4th International Conference, UIC 2007, Proceedings. Springer Verlag, p. 767-776 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4611 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Modeling and simulation for security risk propagation in critical information systems

    Kim, Y. G., Jeong, D., Park, S. H., Lim, J. & Baik, D. K., 2007, Computational Intelligence and Security - International Conference, CIS 2006, Revised Selected Papers. Springer Verlag, p. 858-868 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4456 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • Optimized cryptographic binding protocol using MIPv6 over IEEE 802.16e

    Park, H. S., Lim, S. H., Yun, S., Yi, O. & Lim, J., 2007, ISCIT 2007 - 2007 International Symposium on Communications and Information Technologies Proceedings. p. 1225-1230 6 p. 4392204. (ISCIT 2007 - 2007 International Symposium on Communications and Information Technologies Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Password recovery using an evidence collection tool and countermeasures

    Lee, S., Savoldi, A., Lee, S. & Lim, J., 2007, Proceedings - 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2007.. p. 97-102 6 p. 4457662. (Proceedings - 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2007.; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    12 Citations (Scopus)
  • Performance evaluation model for the face recognition system

    Shin, Y. N., Kim, J., Lee, Y. J., Shin, W. & Choi, J., 2007, Proceedings of the Frontiers in the Convergence of Bioscience and Information Technologies, FBIT 2007. p. 704-708 5 p. 4524191. (Proceedings of the Frontiers in the Convergence of Bioscience and Information Technologies, FBIT 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Power saving medium access for beacon-enabled IEEE 802.15.4 LR-WPANs

    Joongheon, K. & Wonjun, L., 2007, Human Interface and the Management of Information: Interacting in Information Environments - Symposium on Human Interface 2007. Held as Part of HCI International 2007, Proceedings. PART 2 ed. p. 555-562 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4558 LNCS, no. PART 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • PPIDS: Privacy preserving intrusion detection system

    Park, H. A., Lee, D. H., Lim, J. & Cho, S. H., 2007, Intelligence and Security Informatics - Pacific Asia Workshop, PAISI 2007, Proceedings. Springer Verlag, p. 269-274 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4430 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    11 Citations (Scopus)
  • Preimage attack on the parallel FFT-hashing function

    Donghoon, C., Moti, Y., Jaechul, S., Seokhie, H. & Sangjin, L., 2007, Information Security and Privacy - 12th Australasian Conference, ACISP 2007, Proceedings. p. 59-67 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4586 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Q+-Algorithm: An enhanced RFID tag collision arbitration algorithm

    Lee, D., Kim, K. & Lee, W., 2007, Ubiquitous Intelligence and Computing - 4th International Conference, UIC 2007, Proceedings. Springer Verlag, p. 23-32 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4611 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    37 Citations (Scopus)
  • Quantitative risk analysis and evaluation in information systems: A case study

    Kim, Y. G. & Lim, J., 2007, Computational Science - ICCS 2007 - 7th International Conference, Proceedings. PART 3 ed. Springer Verlag, p. 1040-1047 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4489 LNCS, no. PART 3).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    3 Citations (Scopus)
  • Related-key amplified boomerang attacks on the full-round eagle-64 and eagle-128

    Jeong, K., Lee, C., Sung, J., Hong, S. & Lim, J., 2007, Information Security and Privacy - 12th Australasian Conference, ACISP 2007, Proceedings. Springer Verlag, p. 143-157 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4586 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Citations (Scopus)
  • Related-key rectangle attacks on reduced AES-192 and AES-256

    Kim, J., Hong, S. & Preneel, B., 2007, Fast Software Encryption - 14th International Workshop, FSE 2007. Springer Verlag, p. 225-241 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4593 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    77 Citations (Scopus)
  • RFID privacy protection scheme for secure ubiquitous computing

    Kim, H. S., Oh, J. H. & Choi, J. Y., 2007, Proceedings of the 1st International Workshop on RFID Technology - Concepts, Applications, Challenges IWRT 2007; In Conjunction with ICEIS 2007. p. 117-124 8 p. (Proceedings of the 1st International Workshop on RFID Technology - Concepts, Applications, Challenges IWRT 2007; In Conjunction with ICEIS 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Secure and efficient password-based authenticated key exchange protocol for two-server architecture

    Jun, H. L. & Dong, H. L., 2007, 2007 International Conference on Convergence Information Technology, ICCIT 2007. p. 2102-2107 6 p. 4420564. (2007 International Conference on Convergence Information Technology, ICCIT 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • Secure Mobile RFID system against privacy and security problems

    Il, J. K., Eun, Y. C. & Dong, H. L., 2007, Proceedings of the 3rd International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerU 2007. p. 67-72 6 p. 4279773. (Proceedings - 3rd International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerU 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    13 Citations (Scopus)
  • Secure signed radix-r recoding methods for constrained-embedded devices

    Han, D. G., Kim, S. K., Kim, H. W., Chung, K. I. & Lim, J., 2007, Information Security Practice and Experience - Third International Conference, ISPEC 2007, Proceedings. Springer Verlag, p. 238-253 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4464 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Secure similarity search

    Park, H. A., Kim, B. H., Lee, D. H., Chung, Y. D. & Zhan, J., 2007, Proceedings - 2007 IEEE International Conference on Granular Computing, GrC 2007. p. 598-604 7 p. 4403170. (Proceedings - 2007 IEEE International Conference on Granular Computing, GrC 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    35 Citations (Scopus)
  • Security and handover designs for VoWLAN system

    Kim, M. Y., Lim, M., Sohn, J. S. & Lee, D. H., 2007, Managing Next Generation Networks and Services - 10th Asia-Pacific Network Operations and Management Symposium, APNOMS 2007, Proceedings. Springer Verlag, p. 447-456 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4773 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Security and privacy analysis of RFID authentication protocol for ubiquitous computing

    Kim, H. S. & Choi, J. Y., 2007, Proceedings of 16th International Conference on Computer Communications and Networks 2007, ICCCN 2007. p. 1359-1363 5 p. 4318010. (Proceedings - International Conference on Computer Communications and Networks, ICCCN).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Security assessment for application network services using fault injection

    Kang, H. & Lee, D. H., 2007, Intelligence and Security Informatics - Pacific Asia Workshop, PAISI 2007, Proceedings. Springer Verlag, p. 172-183 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4430 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Self-updating: Strong privacy protection protocol for RFID-tagged banknotes

    Choi, E. Y., Lee, S. M. & Lee, D. H., 2007, Ubiquitous Intelligence and Computing - 4th International Conference, UIC 2007, Proceedings. Springer Verlag, p. 1171-1180 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4611 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • SPA countermeasure based on unsigned left-to-right recodings

    Kim, S. K., Han, D. G., Kim, H. W., Chung, K. I. L. & Lim, J., 2007, Autonomic and Trusted Computing - 4th International Conference, ATC 2007, Proceedings. Springer Verlag, p. 286-295 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4610 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • The design and verification of RFID authentication protocol for ubiquitous computing

    Kim, H. S. & Choi, J. Y., 2007, Proceedings DEXA 2007 18th International Workshop on Database and Expert Systems Applications. p. 693-697 5 p. 4312983. (Proceedings - International Workshop on Database and Expert Systems Applications, DEXA).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Traffic flow based EDCF for QoS enhancement in IEEE 802.11e wireless LAN

    Choi, E., Lee, W. & Shih, T. K., 2007, Proceedings - 21st International Conference on Advanced Information Networking and Applications, AINA 2007. p. 467-473 7 p. 4220929. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Citations (Scopus)
  • Trapdoor-based mutual authentication scheme without cryptographic primitives in RFID tags

    Lee, H., Eun, Y. C., Lee, S. M. & Dong, H. L., 2007, Proceedings of the 3rd International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerU 2007. p. 73-78 6 p. 4279774. (Proceedings - 3rd International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerU 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Verification method of network simulation for pervasive environments

    Cho, K., Lee, J., Lim, J. & Moon, J., 2007, Proceedings of the 3rd International Conference on Security and Privacy in Communication Networks, SecureComm. p. 155-161 7 p. 4550323. (Proceedings of the 3rd International Conference on Security and Privacy in Communication Networks, SecureComm).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution