Analysis of Public Key Infrastructure Systems for Authentication.
Jae-Woo Kim, Han-Jin Cho, Il-Sun Hwang, Sung-Yul Park, Jae-Kwang Lee: Analysis of Public Key Infrastructure Systems for Authentication. PDPTA 1999: 187-192
View ArticleAn Implementation of Vulnerability Evaluation System for Network Security on CC.
Jeom Goo Kim, Young-Cheol Lee, Jae-Kwang Lee: An Implementation of Vulnerability Evaluation System for Network Security on CC. PDPTA 2000
View ArticleEfficient Key Distribution Protocol for Secure Multicast Communication.
Bonghan Kim, Han-Jin Cho, Jae-Kwang Lee: Efficient Key Distribution Protocol for Secure Multicast Communication. ICCSA (1) 2004: 1007-1016
View ArticleApplied Research of Active Network to Control Network Traffic in Virtual...
Won Goo Lee, Jae-Kwang Lee: Applied Research of Active Network to Control Network Traffic in Virtual Battlefield. ICCSA (1) 2004: 254-261
View ArticleA Study on User Authorization for Grid Resources.
Seoung-Hyeon Lee, Won Goo Lee, Jae-Kwang Lee: A Study on User Authorization for Grid Resources. J. Inform. and Commun. Convergence Engineering 2(2): 128-131 (2004)
View ArticleV-TCP: A Novel TCP Enhancement Technique for Wireless Mobile Environments.
Dhinaharan Nagamalai, Dong-Ho Kang, Ki-Young Moon, Jae-Kwang Lee: V-TCP: A Novel TCP Enhancement Technique for Wireless Mobile Environments. ICOIN 2005: 122-131
View ArticleSCTP over High Speed Wide Area Networks.
Dhinaharan Nagamalai, Seoung-Hyeon Lee, Won Goo Lee, Jae-Kwang Lee: SCTP over High Speed Wide Area Networks. ICN (1) 2005: 628-634
View ArticleV-TCP: A Novel TCP Enhancement Technique.
Dhinaharan Nagamalai, Beatrice Cynthia Dhinakaran, Byoung-Sun Choi, Jae-Kwang Lee: V-TCP: A Novel TCP Enhancement Technique. ICN (2) 2005: 125-132
View ArticleFulltext-Image Watermarking Using Improved DWT and HVS Based on JPEG...
Won Goo Lee, Byung-Sun Choi, Seoung-Hyeon Lee, Jae-Kwang Lee: Fulltext-Image Watermarking Using Improved DWT and HVS Based on JPEG Compression. AWIC 2005: 254-259
View ArticleSecurity Threats and Countermeasures in WLAN.
Dhinaharan Nagamalai, Beatrice Cynthia Dhinakaran, P. Sasikala, Seoung-Hyeon Lee, Jae-Kwang Lee: Security Threats and Countermeasures in WLAN. AINTEC 2005: 168-182
View ArticleRandom Visitor: A Defense Against Identity Attacks in P2P Overlay Networks.
Jabeom Gu, Jaehoon Nah, Cheoljoo Chae, Jae-Kwang Lee, Jongsoo Jang: Random Visitor: A Defense Against Identity Attacks in P2P Overlay Networks. WISA 2006: 282-296
View ArticleVO Authentication Framework in Grid Environment Using Digital Signature.
Seoung-Hyeon Lee, Byung-Sun Choi, Jae-Seung Lee, Ki-Young Moon, Jae-Kwang Lee: VO Authentication Framework in Grid Environment Using Digital Signature. ICCSA (2) 2006: 945-953
View ArticleInformation Security Applications, 7th International Workshop, WISA 2006,...
Jae-Kwang Lee, Okyeon Yi, Moti Yung: Information Security Applications, 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers. Lecture Notes in Computer...
View ArticleMulti Layer Approach to Defend DDoS Attacks Caused by Spam.
Dhinaharan Nagamalai, Beatrice Cynthia Dhinakaran, Jae-Kwang Lee: Multi Layer Approach to Defend DDoS Attacks Caused by Spam. MUE 2007: 97-102
View ArticleA Study of Defense DDoS Attacks Using IP Traceback.
Cheol-Joo Chae, Seoung-Hyeon Lee, Jae-Seung Lee, Jae-Kwang Lee: A Study of Defense DDoS Attacks Using IP Traceback. IPC 2007: 402-408
View ArticleA Security Framework for Secure Home Networking in Ubiquitous Computing.
Woon-Gu Lee, Cheol-Joo Chae, Sang-Kuk Kim, Mu-Yeong Kang, Jae-Kwang Lee: A Security Framework for Secure Home Networking in Ubiquitous Computing. IPC 2007: 394-397
View ArticleAn Empirical Study of Spam and Spam Vulnerable email Accounts.
Beatrice Cynthia Dhinakaran, Cheol-Joo Chae, Jae-Kwang Lee: An Empirical Study of Spam and Spam Vulnerable email Accounts. FGCN (1) 2007: 408-413
View ArticleStudy on IP Traceback System for DDoS.
Cheol-Joo Chae, Bonghan Kim, Jae-Kwang Lee: Study on IP Traceback System for DDoS. ICEIS (3-1) 2008: 279-282
View ArticleA Study on the Efficient Mutual Authentication Mechanism Using the Agent Server.
Sang-Wook Choi, Cheol-Joo Chae, Jae-Kwang Lee: A Study on the Efficient Mutual Authentication Mechanism Using the Agent Server. FGCN (1) 2008: 485-488
View ArticleThe Traceback Method about DoS Attack in Open Grid Computing Environment.
Seoung-Hyeon Lee, Cheol-Joo Chae, Deok-Gyu Lee, Jong Wook Han, Jae-Kwang Lee: The Traceback Method about DoS Attack in Open Grid Computing Environment. FGCN (1) 2008: 391-394
View Article
More Pages to Explore .....