JooSeok Song
According to our database1,
JooSeok Song
authored at least 95 papers
between 1996 and 2019.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2019
Energy-efficient and secure mobile node reauthentication scheme for mobile wireless sensor networks.
EURASIP J. Wirel. Commun. Netw., 2019
Pseudonymous Mobile Node Reauthentication Scheme for Mobile Wireless Sensor Networks.
Proceedings of the ICIT 2019, 2019
Performance Evaluation: Two Flood-Cancellation Methods of the Blocking Expanding Ring Searches on the AODV/WiFi MANET Environment.
Proceedings of the 21st International Conference on Advanced Communication Technology, 2019
2018
2017
Wirel. Commun. Mob. Comput., 2017
Adaptive Data Placement for Improving Performance of Online Social Network Services in a Multicloud Environment.
Sci. Program., 2017
Sensors, 2017
Proceedings of the 7th International Conference on Communication and Network Security, 2017
An efficient and practical mobile node reauthentication scheme for mobile wireless sensor networks.
Proceedings of the 3rd International Conference on Communication and Information Processing, 2017
A social-aware caching algorithm for improving performance of online social network services in a multi-cloud environment.
Proceedings of the 3rd International Conference on Communication and Information Processing, 2017
2015
A Traffic Flow Theory Aided Physical Measurement-Based Sybil Nodes Detection Mechanism in Vehicular Ad-hoc Networks.
Int. J. Networked Distributed Comput., 2015
Proceedings of the 16th IEEE/ACIS International Conference on Software Engineering, 2015
Proceedings of the 9th International Conference on Ubiquitous Information Management and Communication, 2015
Proceedings of the 9th International Conference on Ubiquitous Information Management and Communication, 2015
A traffic flow theory based density adopted emergency message dissemination scheme for vehicular ad hoc networks.
Proceedings of the 2015 International Conference on Information Networking, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
Telecommun. Syst., 2014
A survey of traffic-based routing metrics in family of expected transmission count for self-organizing networks.
Comput. Electr. Eng., 2014
Proceedings of the 2014 IEEE Fourth International Conference on Big Data and Cloud Computing, 2014
Proceedings of the 2014 IEEE/ACIS 13th International Conference on Computer and Information Science, 2014
2013
Wirel. Pers. Commun., 2013
Wirel. Pers. Commun., 2013
Telecommun. Syst., 2013
A countermeasure against wormhole attacks in MANETs using analytical hierarchy process methodology.
Electron. Commer. Res., 2013
2012
A Cluster-based Countermeasure against Media Access Control Layer Attacks in IEEE 802.11 Ad Hoc Networks.
KSII Trans. Internet Inf. Syst., 2012
A Novel Pre-Authentication Scheme Based on Fast Channel Switching in IEEE 802.11 WLANs.
EURASIP J. Wirel. Commun. Netw., 2012
2011
Handling Malicious Flooding Attacks through Enhancement of Packet Processing Technique in Mobile Ad Hoc Networks.
J. Inf. Process. Syst., 2011
Proceedings of the IEEE 10th International Conference on Trust, 2011
Proceedings of the IEEE 10th International Conference on Trust, 2011
2010
IEEE Trans. Ind. Electron., 2010
IEEE Trans. Consumer Electron., 2010
TCP Aware Link Layer Agent for Seamless Vertical Handoff in the Cellular/WLAN Integrated Network.
IEEE Commun. Lett., 2010
2009
IEEE Trans. Wirel. Commun., 2009
An energy-efficient interface selection for multi-mode terminals by utilizing out-of-band paging channels.
Telecommun. Syst., 2009
Achievable Throughput-Based MAC Layer Handoff in IEEE 802.11 Wireless Local Area Networks.
EURASIP J. Wirel. Commun. Netw., 2009
A New Soft Handover Mechanism Using DCHs in High-Speed Downlink Packet Access Networks.
Proceedings of the Second International Symposium on Intelligent Information Technology and Security Informatics, 2009
Proceedings of the 2009 International Conference on Telecommunications, 2009
A cluster key management scheme utilizing time-based keys for wireless sensor networks.
Proceedings of the IADIS International Conference Applied Computing 2009, 2009
Proceedings of the Universal Access in Human-Computer Interaction. Addressing Diversity, 2009
2008
An enhanced TCP for upward vertical handoff in integrated WLAN and cellular networks.
Int. J. Commun. Syst., 2008
ABC<sup>2</sup>: A New Approach to Seamless Mobility Using Cellular Networks and WLANs.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008
2007
Photonic Netw. Commun., 2007
J. Comput. Sci. Technol., 2007
A Novel Vertical Handoff Scheme Based on Mobility Speed in Integrated WLAN and UMTS Networks.
IEICE Trans. Commun., 2007
Design and implementation of wireless PKI technology suitable for mobile phone in mobile-commerce.
Comput. Commun., 2007
Proceedings of the Wired/Wireless Internet Communications, 5th International Conference, 2007
Secure Dynamic Network Reprogramming Using Supplementary Hash in Wireless Sensor Networks.
Proceedings of the Ubiquitous Intelligence and Computing, 4th International Conference, 2007
Proceedings of the Information Security Practice and Experience, 2007
Proceedings of the Information Networking. Towards Ubiquitous Networking and Services, 2007
2006
Dropping Policy with Burst Retransmission to Improve the Throughput of TCP Over Optical Burst-switched Networks.
Photonic Netw. Commun., 2006
IEICE Trans. Commun., 2006
Dropping Policy for Improving the Throughput of TCP over Optical Burst-Switched Networks.
Proceedings of the Information Networking, 2006
Proceedings of the Information Security and Cryptology - ICISC 2006, 9th International Conference, Busan, Korea, November 30, 2006
Performance Improvement of TCP over Optical Burst Switching Networks with Drop Policy.
Proceedings of the Computational Science and Its Applications, 2006
A Routing Protocol for Throughput Enhancement and Energy Saving in Mobile Ad Hoc Networks.
Proceedings of the Computational Science and Its Applications, 2006
Proceedings of the Computational Science and Its Applications, 2006
Proceedings of the Computational Science, 2006
Maximum Lifetime Paths for the High Packet Delivery Ratio Using Fast Recovery in a Mobile Ad Hoc Network.
Proceedings of the Computational Science, 2006
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006
Message and Its Origin Authentication Protocol for Data Aggregation in Sensor Networks.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006
Proceedings of the Advanced Web and Network Technologies, and Applications, 2006
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006
2005
Dynamic Deflection Routing with Virtual Wavelength Assignment in Optical Burst-Switched Networks.
Photonic Netw. Commun., 2005
Contention-Based Limited Deflection Routing Protocol in Optical Burst-Switched Networks.
IEEE J. Sel. Areas Commun., 2005
2004
Combinatorial Mobiele IP: A new efficient mobility management using minimized paging and local registration in mobile IP environments.
Wirel. Networks, 2004
Proceedings of the Parallel and Distributed Computing: Applications and Technologies, 2004
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2004
Proceedings of the Computational Science, 2004
2003
Photonic Netw. Commun., 2003
Proceedings of the Computational Science and Its Applications, 2003
Proceedings of the Computational Science - ICCS 2003, 2003
Proceedings of the Web Communication Technologies and Internet-Related Social Issues, 2003
Proceedings of the Global Telecommunications Conference, 2003
2002
Proceedings of the Information Security and Cryptology, 2002
2001
Comput. Commun., 2001
2000
An adaptive call admission control in ATM networks using optimized measurements windows.
Comput. Commun., 2000
Performance of Location Caching Scheme to Support Call Locality in Wireless Networks.
Proceedings of the Advances in Computing Science, 2000
1999
Comput. Commun., 1999
Comput. Commun., 1999
An Overload Control of SCP in Advanced Intelligent Network with Fairness and Priority.
Comput. Commun., 1999
Proceedings of the Information Security and Cryptology, 1999
1998
A measurement-based admission control algorithm using variable-sized window in ATM networks.
Comput. Commun., 1998
Efficient and secure password-based authentication protocols against guessing attacks.
Comput. Commun., 1998
Performance analysis of queueing strategies with multiple priorities in multimedia PCS.
Proceedings of the Computers and Their Applications (CATA-98), 1998
1997
Security and efficiency in authentication protocols resistant to password guessing attack.
Proceedings of the 22nd IEEE Conference on Local Computer Networks (LCN '97), 1997
Proceedings of the Second IEEE Symposium on Computers and Communications (ISCC 1997), 1997
Proceedings of the Proceedings IEEE INFOCOM '97, 1997
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1997), 1997
1996
The Design and Verification of Services Feature Interaction Manager on AIN Using Z Schema.
Proceedings of the COMPSAC '96, 1996