Graduate School of Information Study

  • Postal address

    Korea, Republic of

Filter
Conference contribution

Search results

  • 2008

    The design of framework for detecting an insider's leak of confidential information

    Baek, E., Kim, Y., Sung, J. & Lee, S., 2008 Jan 21, e-Forensics 2008 - Proceedings of the 1st International Conference on Forensic Applications and Techniques in Telecommunications, Information, and Multimedia and Workshop. Association for Computing Machinery, Inc, 1363236. (e-Forensics 2008 - Proceedings of the 1st International Conference on Forensic Applications and Techniques in Telecommunications, Information, and Multimedia and Workshop).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • The evidence collection of DoS attack in WLAN by using WLAN forensic profiling system

    Yim, D., Lim, J. Y., Yun, S., Lim, S. H., Yi, O. & Lim, J., 2008, Proceedings of the International Conference on Information Science and Security, ICISS 2008. IEEE Computer Society, p. 197-204 8 p. 4438234. (Proceedings of the International Conference on Information Science and Security, ICISS 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • USBPassOn: Secure USB Thumb Drive forensic toolkit

    Lee, K. G., Lee, H. W., Park, C. W., Bang, J. W., Kim, K. Y. & Lee, S., 2008, Proceedings of the 2008 2nd International Conference on Future Generation Communication and Networking, FGCN 2008. p. 279-282 4 p. 4734222. (Proceedings of the 2008 2nd International Conference on Future Generation Communication and Networking, FGCN 2008; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Citations (Scopus)
  • User authentication mechanism using java card for personalized IPTV services

    Park, Y. K., Lim, S. H., Yi, O., Lee, S. & Kim, S. H., 2008, Proceedings - 2008 International Conference on Convergence and Hybrid Information Technology, ICHIT 2008. p. 618-626 9 p. 4622895. (Proceedings - 2008 International Conference on Convergence and Hybrid Information Technology, ICHIT 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • Using cross-layer heuristic and network coding to improve throughput in multicast wireless mesh networks

    Do, T. M. V., Nguyen, H. C., Wonjun, L. & Ha, Q. T., 2008, 2008 International Conference on Information Networking, ICOIN. 4472771. (2008 International Conference on Information Networking, ICOIN).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • Watermarking security incorporating natural scene statistics

    Ni, J., Zhang, R., Fang, C., Huang, J., Wang, C. & Kim, H. J., 2008, Information Hiding - 10th International Workshop, IH 2008, Revised Selected Papers. Springer Verlag, p. 132-146 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5284 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Weaknesses analysis and countermeasure of a verifier-based key agreement protocol

    Kim, H. S., Seo, S. & Choi, J. Y., 2008, Proceedings - 10th IEEE International Conference on High Performance Computing and Communications, HPCC 2008. p. 1015-1018 4 p. 4637818. (Proceedings - 10th IEEE International Conference on High Performance Computing and Communications, HPCC 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2007

    A digital ID purse mechanism using USIM in a mobile environment

    Song, D., Lim, S. H., Yi, O. & Lim, J., 2007, Innovations'07: 4th International Conference on Innovations in Information Technology, IIT. IEEE Computer Society, p. 670-674 5 p. 4430424. (Innovations'07: 4th International Conference on Innovations in Information Technology, IIT).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • A field guide to hidden accounting information detection

    Kim, Y., Bang, J., Lee, G. T., Lee, S. J. & Lim, J., 2007, Proceedings of Future Generation Communication and Networking, FGCN 2007. Institute of Electrical and Electronics Engineers Inc., p. 146-150 5 p. 4426220. (Proceedings of Future Generation Communication and Networking, FGCN 2007; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • A light-weight security protocol for RFID system

    Oh, J. H., Kim, H. S. & Choi, J. Y., 2007, Personal Wireless Communications: The 12th IFIP International Conference on Personal Wireless Communications (PWC 2007), Prague, Czech Republic, September 2007. Bestak, R., Simak, B. & Kozlowska, E. (eds.). p. 384-395 12 p. (IFIP International Federation for Information Processing; vol. 245).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • An efficient password-based e-mail protocol for encrypted e-mail transmissions on mobile equipment

    Kwon, J. O., Jeong, I. R., Sakurai, K. & Lee, D. H., 2007, Digest of Technical Papers - 2007 International Conference on Consumer Electronics, ICCE 2007. 4146128. (Digest of Technical Papers - IEEE International Conference on Consumer Electronics).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • An innocuous visual cryptography scheme

    Kim, H. J., Sachnev, V., Choi, S. J. & Xiang, S., 2007, 8th International Workshop on Image Analysis for Multimedia Interactive Services, WIAMIS 2007. 4279173. (8th International Workshop on Image Analysis for Multimedia Interactive Services, WIAMIS 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Citations (Scopus)
  • Anonymous and traceable communication using tamper-proof device for vehicular Ad hoc Networks

    Kim, B. H., Choi, K. Y., Lee, J. H. & Lee, D. H., 2007, 2007 International Conference on Convergence Information Technology, ICCIT 2007. p. 681-686 6 p. 4420338. (2007 International Conference on Convergence Information Technology, ICCIT 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    12 Citations (Scopus)
  • Ant colony optimization for satellite customer assignment

    Kim, S. S., Kim, H. J., Mani, V. & Kim, C. H., 2007, Ubiquitous Convergence Technology - First International Conference, ICUCT 2006, Revised Selected Papers. p. 170-179 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4412 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Approach of the secure communication mechanism in aero-wireless environment

    Kim, K., Hong, J. & Lim, J., 2007, Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007. p. 1070-1075 6 p. 4197419. (Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • A practical inter-sensor broadcast authentication scheme

    Kim, J. W., Kim, Y. H., Lee, H. & Lee, D. H., 2007, Universal Access in Human-Computer Interaction: Coping with Diversity - 4th International Conference on Universal Access in Human-Computer Interaction, UAHCI 2007. Held as Part of HCI Int. 2007 Proc.. PART 1 ed. Springer Verlag, p. 399-405 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4554 LNCS, no. PART 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • A secure and efficient key management scheme for wireless sensor networks

    Kim, Y. H., Lee, H. & Lee, D. H., 2007, Proceedings of the 3rd International Conference on Security and Privacy in Communication Networks, SecureComm. p. 162-167 6 p. 4550324. (Proceedings of the 3rd International Conference on Security and Privacy in Communication Networks, SecureComm).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • A secure communication protocol for low-cost RFID system

    Oh, J. H., Kim, H. S. & Choi, J. Y., 2007, CIT 2007: 7th IEEE International Conference on Computer and Information Technology. p. 949-954 6 p. 4385207. (CIT 2007: 7th IEEE International Conference on Computer and Information Technology).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • A secure handover protocol design in wireless networks with formal verification

    Lim, S. H., Bang, K. S., Yi, O. & Lim, J., 2007, Wired/Wireless Internet Communications - 5th International Conference, WWIC 2007, Proceedings. Springer Verlag, p. 67-78 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4517 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    13 Citations (Scopus)
  • Automated grocery ordering systems for smart home

    Hong, K. S., Kim, H. J. & Lee, C., 2007, Proceedings of Future Generation Communication and Networking, FGCN 2007. Institute of Electrical and Electronics Engineers Inc., p. 87-92 6 p. 4426209. (Proceedings of Future Generation Communication and Networking, FGCN 2007; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • Bogus data filtering in sensor networks

    Kim, Y. H., Park, J. H., Lee, D. H. & Lim, J., 2007, Emerging Technologies in Knowledge Discovery and Data Mining - PAKDD 2007 International Workshops, Revised Selected Papers. Springer Verlag, p. 629-635 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4819 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Bridging OSGi islands through SLP protocol

    Lee, C., Yi, J. & Lee, W., 2007, Ubiquitous Intelligence and Computing - 4th International Conference, UIC 2007, Proceedings. Springer Verlag, p. 787-797 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4611 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Certificateless public key encryption in the selective-ID security model (without random oracles)

    Park, J. H., Choi, K. Y., Hwang, J. Y. & Lee, D. H., 2007, Pairing-Based Cryptography - Pairing 2007 - First International Conference, Proceedings. p. 60-82 23 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4575 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    21 Citations (Scopus)
  • Classification of key management schemes for wireless sensor networks

    Lee, H., Kim, Y. H., Lee, D. H. & Lim, J., 2007, Advances in Web and Network Technologies, and Information Management - APWeb/WAIM 2007 International Workshops DBMAN 2007, WebETrends 2007, PAIS 2007 and ASWAN 2007, Proceedings. Springer Verlag, p. 664-673 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4537 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • Comparative evaluation of probabilistic and deterministic tag anti-collision protocols for RFID networks

    Choi, J. & Lee, W., 2007, Emerging Direction in Embedded and Ubiquitous Computing - EUC 2007 Workshops: TRUST, WSOC NCUS, UUWSN, USN, ESO, and SECUBIQ, Proceedings. Denko, M. K., Denko, M. K., Denko, M. K., Shih, C-S., Shih, C-S., Shih, C-S., Li, K-C., Li, K-C., Li, K-C., Tsao, S-L., Tsao, S-L., Tsao, S-L., Zeng, Q-A., Zeng, Q-A., Zeng, Q-A., Park, S-H., Park, S-H., Park, S-H., Ko, Y-B., Ko, Y-B., Ko, Y-B., Hung, S-H., Hung, S-H., Hung, S-H., Park, J. H., Park, J. H. & Park, J. H. (eds.). Springer Verlag, p. 538-549 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4809 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    8 Citations (Scopus)
  • Context-aware service composition for mobile network environments

    Lee, C., Ko, S., Lee, S., Lee, W. & Helal, S., 2007, Ubiquitous Intelligence and Computing - 4th International Conference, UIC 2007, Proceedings. Springer Verlag, p. 941-952 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4611 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    14 Citations (Scopus)
  • Design and implementation of the UsMSS: User-centric secure multimedia service system in intelligent home

    Park, J. H., Lee, S., Lee, D. H., Lim, J., Hong, I. H. & Yang, L. T., 2007, Proceedings - 21st International Conference on Advanced Information Networking and Applications, AINA 2007. p. 311-316 6 p. 4220909. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Design and implementation of the UsMSS: User-centric secure multimedia service system in intelligent home

    Park, J. H., Lee, S., Lee, D. H., Lim, J., Hong, I. H. & Yang, L. T., 2007, Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007. p. 1233-1238 6 p. 4197448. (Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Direct chosen-ciphertext secure hierarchical ID-based encryption schemes

    Park, J. H. & Lee, D. H., 2007, Public Key Infrastructure - 4th European PKI Workshop: Theory and Practice, EuroPKl 2007, Proceedings. Springer Verlag, p. 94-109 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4582 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Discovering methodology and scenario to detect covert database system

    Lee, G. T., Lee, S., Tsomko, E. & Lee, S., 2007, Proceedings of Future Generation Communication and Networking, FGCN 2007. Institute of Electrical and Electronics Engineers Inc., p. 130-135 6 p. 4426217. (Proceedings of Future Generation Communication and Networking, FGCN 2007; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Citations (Scopus)
  • Dynamic activation of role on RBAC for ubiquitous applications

    Kim, Y. G. & Lim, J., 2007, 2007 International Conference on Convergence Information Technology, ICCIT 2007. p. 1148-1153 6 p. 4420412. (2007 International Conference on Convergence Information Technology, ICCIT 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    13 Citations (Scopus)
  • Efficient an implementation method research of a smart card atomic operation

    Jun, E. A., Jung, S. W., Kim, J. G. & Lim, J. I., 2007, Computational Science and Its Applications - ICCSA 2007 - International Conference, Proceedings. PART 2 ed. Springer Verlag, p. 113-121 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4706 LNCS, no. PART 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Efficient certificateless signature schemes

    Choi, K. Y., Park, J. H., Hwang, J. Y. & Lee, D. H., 2007, Applied Cryptography and Network Security - 5th International Conference, ACNS 2007, Proceedings. Springer Verlag, p. 443-458 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4521 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    90 Citations (Scopus)
  • Efficient group key agreement for dynamic TETRA networks

    Su, M. L., Su, Y. L. & Dong, H. L., 2007, SOFSEM 2007: Theory and Practice of Computer Science - 33rd Conference on Current Trends in Theory and Practice of Computer Science, Proceedings. p. 400-409 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4362 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Embedded system modeling based on resource-oriented model

    Kim, J. H. & Choi, J. Y., 2007, Proceedings - 14th Annual IEEE International Conference and Workshops on the Engineering of Computer-Based Systems, ECBS 2007: Raising Expectations of Computer-Based Systems. p. 203-212 10 p. 4148935. (Proceedings of the International Symposium and Workshop on Engineering of Computer Based Systems).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Enhanced doubling attacks on signed-all-bits set recoding

    Kim, H. S., Kim, T. H., Ryoo, J. C., Han, D. G., Kim, H. W. & Lim, J., 2007, Information Security Theory and Practices: Smart Cards, Mobile and Ubiquitous Computing Systems - First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Proceedings. Sauveron, D., Markantonakis, K., Bilas, A. & Quisquater, J-J. (eds.). Springer Verlag, p. 39-52 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4462 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Enhanced non-disjoint multi-path source routing protocol for wireless ad-hoc networks

    Kim, M. J., Lee, D. H. & Eom, Y. I., 2007, Computational Science and Its Applications - ICCSA 2007 - International Conference, Proceedings. PART 3 ed. Springer Verlag, p. 1187-1196 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4707 LNCS, no. PART 3).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Fast secure communication establishing mechanism for aero-wireless networks

    Kim, K., Hong, J. & Lim, J., 2007, ICECS 2007 - 14th IEEE International Conference on Electronics, Circuits and Systems. p. 1360-1363 4 p. 4511251. (Proceedings of the IEEE International Conference on Electronics, Circuits, and Systems).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Formal embedded operating system model based on resource-based design framework

    Kim, J. H., Sim, J. H., Kim, C. J. & Choi, J. Y., 2007, Proceedings - 7th International Conference on Quality Software, QSIC 2007. p. 244-249 6 p. 4385502. (Proceedings - International Conference on Quality Software).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Formal security policy model for a common criteria evaluation

    Park, J. & Choi, J. Y., 2007, 9th International Conference on Advanced Communication Technology, ICACT 2007. p. 277-281 5 p. 4195134. (International Conference on Advanced Communication Technology, ICACT; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Generalised category attack-improving histogram-based attack on JPEG LSB embedding

    Lee, K., Westfeld, A. & Lee, S., 2007, Information Hiding - 9th International Workshop, IH 2007, Revised Selected Papers. p. 378-391 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4567 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    23 Citations (Scopus)
  • Genetic algorithmic topology control for two-tiered wireless sensor networks

    Lee, D., Lee, W. & Kim, J., 2007, Computational Science - ICCS 2007 - 7th International Conference, Proceedings. PART 4 ed. Springer Verlag, p. 385-392 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4490 LNCS, no. PART 4).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • Geometrically invariant image watermarking in the DWT domain

    Xiang, S. & Kim, H. J., 2007, Information Security Applications - 8th International Workshop, WISA 2007, Revised Selected Papers. Springer Verlag, p. 76-90 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4867 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Histogram-based image hashing scheme robust against geometric deformations

    Xiang, S., Kim, H. J. & Huang, J., 2007, MM and Sec'07 - Proceedings of the Multimedia and Security Workshop 2007. p. 121-128 8 p. (MM and Sec'07 - Proceedings of the Multimedia and Security Workshop 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    82 Citations (Scopus)
  • HMM-based approach for evaluating risk propagation

    Kim, Y. G. & Lim, J., 2007, Intelligence and Security Informatics - Pacific Asia Workshop, PAISI 2007, Proceedings. Springer Verlag, p. 325-326 2 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4430 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Impacts of repetitions and segment size variability on object-level throughput in T-DMB

    Choi, J., Yu, J., Lee, D., Kim, S., Lee, S. & Lee, W., 2007, Digest of Technical Papers - 2007 International Conference on Consumer Electronics, ICCE 2007. 4146247. (Digest of Technical Papers - IEEE International Conference on Consumer Electronics).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Key establishment scheme for sensor networks with low communication cost

    Kim, Y. H., Lee, H., Park, J. H., Yang, L. T. & Lee, D. H., 2007, Autonomic and Trusted Computing - 4th International Conference, ATC 2007, Proceedings. Springer Verlag, p. 441-448 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4610 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Citations (Scopus)
  • Location-aware random pair-wise keys scheme for wireless sensor networks

    Ji, Y. C., Yong, H. K., Lim, J. & Dong, H. L., 2007, Proceedings of the 3rd International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerU 2007. p. 31-36 6 p. 4279767. (Proceedings - 3rd International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerU 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • MBAL: A mobile beacon-assisted localization scheme for wireless sensor networks

    Kim, K. & Lee, W., 2007, Proceedings of 16th International Conference on Computer Communications and Networks 2007, ICCCN 2007. p. 57-62 6 p. 4317797. (Proceedings - International Conference on Computer Communications and Networks, ICCCN).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    70 Citations (Scopus)
  • Mobility driven vertical handover for mobile IPTV traffic in hybrid IEEE 802.11e/16e networks

    Choi, E., Lee, W. & Kim, J., 2007, Ubiquitous Intelligence and Computing - 4th International Conference, UIC 2007, Proceedings. Springer Verlag, p. 767-776 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4611 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution