Jong Wook Han

According to our database1, Jong Wook Han authored at least 37 papers between 2003 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
Design Considerations for an Intelligent Video Surveillance System Using Cloud Computing.
Proceedings of the Parallel and Distributed Computing, 2018

2016
Single authentication through in convergence space using collaborative smart cameras.
Secur. Commun. Networks, 2016

2014
Automated and coupled services of advanced smart surveillance systems toward green IT: tracking, retrieval and digital evidence.
J. Supercomput., 2014

Protection Method for Data Communication between ADS-B Sensor and Next-Generation Air Traffic Control Systems.
Inf., 2014

Flight Protection Data via Dynamic Sensor Networks.
Int. J. Distributed Sens. Networks, 2014

2013
A Based on Single Image Authentication System in Aviation Security.
Proceedings of the Multimedia and Ubiquitous Engineering, 2013

Trajectory Calculation Based on Position and Speed for Effective Air Traffic Flow Management.
Proceedings of the Multimedia and Ubiquitous Engineering, 2013

2012
Compact hardware architecture for first one detector using priority-based uniform partition.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2012

2011
Hybrid security protocol for wireless body area networks.
Wirel. Commun. Mob. Comput., 2011

For Aviation Security Using Surveillance System.
Proceedings of the Secure and Trust Computing, Data Management, and Applications, 2011

A new proposal for a digital evidence container for security convergence.
Proceedings of the 2011 IEEE International Conference on Control System, 2011

2009
Security technologies based on a home gateway for making smart homes secure.
Internet Res., 2009

Security policy specification for home network.
Int. J. Ad Hoc Ubiquitous Comput., 2009

Home Network Device Authentication: Device Authentication Framework and Device Certificate Profile.
Comput. J., 2009

A Study on Reliable Communication in ATN Environment.
Proceedings of the 2009 International Conference on Information & Knowledge Engineering, 2009

The Detection and Response Mechanism against Abnormal Traffic Attack in ATN Network.
Proceedings of the 2009 International Conference on Security & Management, 2009

Compact Design of a Combined MixColumn/InvMixColumn Transformation Module for AES.
Proceedings of the 2009 International Conference on Computer Design, 2009

Intelligent Pervasive Network Authentication: S/Key Based Device Authentication.
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009

2008
Protection Techniques of Secret Information in Non-tamper Proof Devices of Smart Home Network.
Proceedings of the Ubiquitous Intelligence and Computing, 5th International Conference, 2008

Time Stamp Protocol for Smart Environment Services.
Proceedings of the Ubiquitous Intelligence and Computing, 5th International Conference, 2008

Intelligent Security for Inter-space Surveillance Applications.
Proceedings of the 2008 International Conference on Multimedia and Ubiquitous Engineering (MUE 2008), 2008

The home device authentication system construction for pervasive home network.
Proceedings of the 5th Annual International Conference on Mobile and Ubiquitous Systems: Computing, 2008

The Traceback Method about DoS Attack in Open Grid Computing Environment.
Proceedings of the Second International Conference on Future Generation Communication and Networking, 2008

The Mechanism and Requirements for Detecting the Cross-Service Attack.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008

2007
Security Framework for Home Network: Authentication, Authorization, and Security Policy.
Proceedings of the Emerging Technologies in Knowledge Discovery and Data Mining, 2007

Intelligent Home Network Authentication: Home Device Authentication Using Device Certification.
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007

User Authentication for Multi Domain in Home Network Environments.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

Intelligent Home Network Authentication: S/Key-Based Home Device Authentication.
Proceedings of the Frontiers of High Performance Computing and Networking ISPA 2007 Workshops, 2007

Home Device Authentication Method Based on PKI.
Proceedings of the Future Generation Communication and Networking, 2007

Security Technologies Based on Home Gateway for Making Smart Home Secure.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007

Home Network Device Authentication: Device Authentication Framework and Device Certificate Profile.
Proceedings of the Advances in Web and Network Technologies, and Information Management, 2007

2006
A Security Model for Home Networks with Authority Delegation.
Proceedings of the Computational Science and Its Applications, 2006

Efficient and User Friendly Inter-domain Device Authentication/Access Control for Home Networks.
Proceedings of the Embedded and Ubiquitous Computing, International Conference, 2006

2005
Privacy enhanced access control mechanism for home networks.
Proceedings of the 12th IEEE International Conference on Electronics, 2005

2003
Analyses of Crypto Module for Gbps VPN System.
J. Inform. and Commun. Convergence Engineering, 2003

Enhancement of Image Quality in Screen Mark Attack of Watermark.
Proceedings of the Signal and Image Processing (SIP 2003), 2003

The encryption method to share a secret binary image and its decryption system.
Proceedings of the 1st Intenational Symposium on Information and Communication Technologies, 2003


  Loading...