Young-Ju Han

According to our database1, Young-Ju Han authored at least 26 papers between 2004 and 2010.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2010
A Light-Weighted Misused Key Detection in Wireless Sensor Networks.
Proceedings of the Computational Science and Its Applications, 2010

SecDEACH: Secure and Resilient Dynamic Clustering Protocol Preserving Data Privacy in WSNs.
Proceedings of the Computational Science and Its Applications, 2010

2009
An Energy Efficient Concentric Clustering Scheme in Wireless Sensor Networks.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009

Eperfi: Design and Implementation of End-to-End Network Performance Measurement and Diagnosis System for High-Speed Networks.
Proceedings of the Communication and Networking, 2009

Architecture of Context-Aware Workflow Authorization Management Systems for Workflow-Based Systems.
Proceedings of the Management Enabling the Future Internet for Changing Business and New Computing Services, 2009

2008
A Misused Key Detection Mechanism for Hierarchical Routings in Wireless Sensor Network.
Proceedings of the NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008, 2008

DTPD: Data Transfer Tool Performance Diagnosis System in High Speed Networks.
Proceedings of the Challenges for Next Generation Network Operations and Service Management, 2008

Extended Concentric-Clustering Routing Scheme Adapted to Various Environments of Sensor Networks.
Proceedings of the Challenges for Next Generation Network Operations and Service Management, 2008

2007
The Concentric-Cluster Routing Scheme Adapted to Large-scale Sensor Networks.
Proceedings of the MoMM'2007, 2007

Local Authentication Scheme Based on AAA in Mobile IPv6 Networks.
Proceedings of the Advances in Multimedia Modeling, 2007

PKG-MIB: Private-Mib for Package-Based Linux Systems in a Large Scale Management Domain.
Proceedings of the Agent and Multi-Agent Systems: Technologies and Applications, 2007

Design and Implementation of Context-Aware Security Management System for Ubiquitous Computing Environment.
Proceedings of the Frontiers of High Performance Computing and Networking ISPA 2007 Workshops, 2007

MANET ID : Improvement on Group Communications and ZRP.
Proceedings of the Second International Conference on Systems and Networks Communications (ICSNC 2007), 2007

N-Dimensional Grid-Based Key Predistribution in Wireless Sensor Networks.
Proceedings of the Computational Science and Its Applications, 2007

Energy-Efficient Distance Based Clustering Routing Scheme for Wireless Sensor Networks.
Proceedings of the Computational Science and Its Applications, 2007

Risk Assessment Method Based on Business Process-Oriented Asset Evaluation for Information System Security.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007

Context-Aware Security Management System for Pervasive Computing Environment.
Proceedings of the Modeling and Using Context, 2007

Architecture of Context-Aware Integrated Security Management Systems for Smart Home Environment.
Proceedings of the Managing Next Generation Networks and Services, 2007

Energy-Efficient Distance Based Clustering Routing Scheme for Long-Term Lifetime of Multi-hop Wireless Sensor Networks.
Proceedings of the Managing Next Generation Networks and Services, 2007

2006
Modeling Active Cyber Attack for Network Vulnerability Assessment.
Proceedings of the Frontiers of High Performance Computing and Networking, 2006

Context-Role Based Access Control for Context-Aware Application.
Proceedings of the High Performance Computing and Communications, 2006

2005
New Binding Update Method using GDMHA in Hierarchical Mobile IPv6.
Proceedings of the Computational Science and Its Applications, 2005

2004
SVAM: The Scalable Vulnerability Analysis Model Based on Active Networks.
Proceedings of the Information Networking, 2004

A Fine-Grained Taxonomy of Security Vulnerability in Active Network Environments.
Proceedings of the Computational Science and Its Applications, 2004

A Fine-Grained Taxonomy of Security Vulnerability in Active Network Environments.
Proceedings of the Computational Science and Its Applications, 2004

The Vulnerability Assessment for Active Networks; Model, Policy, Procedures, and Performance Evaluations.
Proceedings of the Computational Science and Its Applications, 2004


  Loading...