Inkyung Jeun

According to our database1, Inkyung Jeun authored at least 14 papers between 2004 and 2013.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2013
Collecting and Filtering Out Phishing Suspicious URLs Using SpamTrap System.
Proceedings of the Grid and Pervasive Computing - 8th International Conference, 2013

2012
Database Encryption Implementation and Analysis Using Graphics Processing Unit.
Proceedings of the Third FTRA International Conference on Mobile, 2012

Enhanced Password-Based User Authentication Using Smart Phone.
Proceedings of the Advances in Grid and Pervasive Computing - 7th International Conference, 2012

2011
Enhanced Code-Signing Scheme for Smartphone Applications.
Proceedings of the Future Generation Information Technology, 2011

2010
A Trustworthy ID Management Mechanism in Open Market.
Proceedings of the Information Security, 2010

BioID: Biometric-Based Identity Management.
Proceedings of the Information Security, 2010

2009
A Study of International Trend Analysis on Web Service Vulnerabilities in OWASP and WASC.
Proceedings of the Advances in Information Security and Assurance, 2009

Criteria for Evaluating the Privacy Protection Level of Identity Management Services.
Proceedings of the Third International Conference on Emerging Security Information, 2009

Analysis of the OPENID from a privacy law perspective.
Proceedings of the IADIS International Conference Applied Computing 2009, 2009

2008
A New Anti-phishing Method in OpenID.
Proceedings of the Second International Conference on Emerging Security Information, 2008

2007
Mixed Key Management Using Hamming Distance for Mobile Ad-Hoc Networks.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007

2006
Efficient Attribute Authentication in Wireless Mobile Networks.
Proceedings of the Frontiers of High Performance Computing and Networking, 2006

2004
Asia PKI Interoperability Guideline.
Proceedings of the ISSE 2004, 2004

A Best Practice for Root CA Key Update in PKI.
Proceedings of the Applied Cryptography and Network Security, 2004


  Loading...