dblp.uni-trier.dewww.uni-trier.de

Dong-Kyoo Kim Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo

*2009
16EEMuhammad Ikram, Aminul Haque Chowdhury, Bilal Zafar, Hyon-Soo Cha, Ki-Hyung Kim, Seung-Wha Yoo, Dong-Kyoo Kim: A simple lightweight authentic bootstrapping protocol for IPv6-based low rate wireless personal area networks (6LoWPANs). IWCMC 2009: 937-941
2008
15EESyed Rehan Afzal, Subir K. Biswas, Jong-bin Koh, Taqi Raza, Gunhee Lee, Dong-Kyoo Kim: RSRP: A Robust Secure Routing Protocol for Mobile Ad Hoc Networks. WCNC 2008: 2313-2318
2006
14EESong-hwa Chae, Wonil Kim, Dong-Kyoo Kim: uT-RBAC: Ubiquitous Role-Based Access Control Model. IEICE Transactions 89-A(1): 238-239 (2006)
2005
13EEGunhee Lee, Wonil Kim, Dong-Kyoo Kim: An Effective Method for Location Privacy in Ubiquitous Computing. EUC Workshops 2005: 1006-1015
12EEJungtae Kim, Gunhee Lee, Jung-Taek Seo, Eung Ki Park, Choonsik Park, Dong-Kyoo Kim: Y-AOI: Y-Means Based Attribute Oriented Induction Identifying Root Cause for IDSs. FSKD (2) 2005: 205-214
11EEJungtae Kim, Gunhee Lee, Jung-Taek Seo, Eung Ki Park, Choonsik Park, Dong-Kyoo Kim: An Alert Reasoning Method for Intrusion Detection System Using Attribute Oriented Induction. ICOIN 2005: 72-79
10EESong-hwa Chae, Wonil Kim, Dong-Kyoo Kim: Role-Based Access Control Model for Ubiquitous Computing Environment. WISA 2005: 354-363
2004
9EESihn-hye Park, Wonil Kim, Dong-Kyoo Kim: Autonomic Protection System Using Adaptive Security Policy. ICCSA (3) 2004: 896-905
8EEGunhee Lee, Wonil Kim, Dong-Kyoo Kim: A Novel Method to Support User's Consent in Usage Control for Stable Trust in E-business. ICCSA (3) 2004: 906-914
7EESoon-Dong Kim, Man-Pyo Hong, Dong-Kyoo Kim: A Study on Marking Bit Size for Path Identification Method: Deploying the Pi Filter at the End Host. ICCSA (4) 2004: 611-616
6EEJongwoon Park, Gunhee Lee, Sangha Lee, Dong-Kyoo Kim: RPS: An Extension of Reference Monitor to Prevent Race-Attacks. PCM (1) 2004: 556-563
5EESong-hwa Chae, Wonil Kim, Dong-Kyoo Kim: Efficient Role Based Access Control Method in Wireless Environment. PWC 2004: 431-439
4EEGunhee Lee, Wonil Kim, Dong-Kyoo Kim, Hongjin Yeh: Effective Web-Related Resource Security Using Distributed Role Hierarchy. WAIM 2004: 87-96
2003
3EEGunhee Lee, Hongjin Yeh, Wonil Kim, Dong-Kyoo Kim: Web Security Using Distributed Role Hierarchy. GCC (1) 2003: 1087-1090
2EESong-hwa Chae, Wonil Kim, Dong-Kyoo Kim: A Novel Approach to Role-Based Access Control. International Conference on Computational Science 2003: 1060-1068
2000
1 Seong-Won Yuk, Dong-Ho Cho, Min-Gyu Kang, Dong-Kyoo Kim, Byung-Cheol Shin: Adaptive Redundancy Control for Systematic Erasure Code Based Real Time Data Transmission in Internet. ICC (3) 2000: 1769-1773

Coauthor Index

1Syed Rehan Afzal [15]
2Subir K. Biswas [15]
3Hyon-Soo Cha [16]
4Song-hwa Chae [2] [5] [10] [14]
5Dong-Ho Cho [1]
6Aminul Haque Chowdhury [16]
7Man-Pyo Hong [7]
8Muhammad Ikram [16]
9Min-Gyu Kang [1]
10Jungtae Kim [11] [12]
11Ki-Hyung Kim [16]
12Soon-Dong Kim [7]
13Wonil Kim [2] [3] [4] [5] [8] [9] [10] [13] [14]
14Jong-bin Koh [15]
15Gunhee Lee [3] [4] [6] [8] [11] [12] [13] [15]
16Sangha Lee [6]
17Choonsik Park [11] [12]
18Eung Ki Park [11] [12]
19Jongwoon Park [6]
20Sihn-hye Park [9]
21Taqi Raza [15]
22Jung-Taek Seo [11] [12]
23Byung-Cheol Shin [1]
24Hongjin Yeh [3] [4]
25Seung-Wha Yoo [16]
26Seong-Won Yuk [1]
27Bilal Zafar [16]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)