Kijoon Chae

Orcid: 0000-0002-6045-5192

According to our database1, Kijoon Chae authored at least 87 papers between 1990 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Cell Based Raft Algorithm for Optimized Consensus Process on Blockchain in Smart Data Market.
IEEE Access, 2022

Hierarchical Blockchain-Based Group and Group Key Management Scheme Exploiting Unmanned Aerial Vehicles for Urban Computing.
IEEE Access, 2022

2021
Selective blockchain system for secure and efficient D2D communication.
J. Netw. Comput. Appl., 2021

Efficient and Secure Blockchain System for Digital Content Trading.
IEEE Access, 2021

Improved Raft Algorithm exploiting Federated Learning for Private Blockchain performance enhancement.
Proceedings of the International Conference on Information Networking, 2021

2020
AFRL: Adaptive federated reinforcement learning for intelligent jamming defense in FANET.
J. Commun. Networks, 2020

Federated Learning-Based Cognitive Detection of Jamming Attack in Flying Ad-Hoc Network.
IEEE Access, 2020

Design of Blockchain System for Protection of Personal Information in Digital Content Trading Environment.
Proceedings of the 2020 International Conference on Information Networking, 2020

Randomly Elected Blockchain System based on Grouping Verifiers for Efficiency and Security.
Proceedings of the 22nd International Conference on Advanced Communication Technology, 2020

2019
On-Device AI-Based Cognitive Detection of Bio-Modality Spoofing in Medical Cyber Physical System.
IEEE Access, 2019

Binarized Multi-Factor Cognitive Detection of Bio-Modality Spoofing in Fog Based Medical Cyber-Physical System.
Proceedings of the 33rd International Conference on Information Networking, 2019

SEFL: Selective Ensemble Fuzzy Learner for Cognitive Detection of Bio-Modality Spoofing in MCPS.
Proceedings of the 21st International Conference on Advanced Communication Technology, 2019

2018
CSDSM: Cognitive switch-based DDoS sensing and mitigation in SDN-driven CDNi word.
Comput. Sci. Inf. Syst., 2018

Dynamic Group Key Management for Efficient Fog Computing.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2018

Authorization based on mobile whitelist in devices for device-to-device communications.
Proceedings of the 2018 International Conference on Information Networking, 2018

RMBC: Randomized mesh blockchain using DBFT consensus algorithm.
Proceedings of the 2018 International Conference on Information Networking, 2018

Secure medical image-sharing mechanism based on visual cryptography in EHR system.
Proceedings of the 20th International Conference on Advanced Communication Technology, 2018

Evolving neural network intrusion detection system for MCPS.
Proceedings of the 20th International Conference on Advanced Communication Technology, 2018

Selective fuzzy ensemble learner for cognitive detection of bio-identifiable modality spoofing in MCPS.
Proceedings of the 20th International Conference on Advanced Communication Technology, 2018

NRIT: Non-redundant indirect trust search algorithm for a cross-domain based CDNi-P2P architecture.
Proceedings of the 20th International Conference on Advanced Communication Technology, 2018

2017
A Secure and Efficient Key Authentication using Bilinear Pairing for NFC Mobile Payment Service.
Wirel. Pers. Commun., 2017

Secure and structured IoT smart grid system management.
Int. J. Web Grid Serv., 2017

Lightweight Authentication for Distributed Mobile P2P Communications.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2017

Enhanced password processing scheme based on visual cryptography and OCR.
Proceedings of the 2017 International Conference on Information Networking, 2017

2016
Security system architecture for data integrity based on a virtual smart meter overlay in a smart grid system.
Soft Comput., 2016

Authentication for Mobile Open IPTV Service Security.
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016

A Group Authentication Scheme Based on Lagrange Interpolation Polynomial.
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016

Securing information flow in content delivery networks with visual and quantum cryptography.
Proceedings of the 2016 International Conference on Information Networking, 2016

An anonymous IP-based privacy protection routing mechanism for CDNi.
Proceedings of the 2016 International Conference on Information Networking, 2016

2015
Authentication and Key Management Based on Kerberos for M2M Mobile Open IPTV Security.
Intell. Autom. Soft Comput., 2015

Secure Authentication for Structured Smart Grid System.
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015

An efficient defense mechanism for spoofed IP attack in SDN based CDNi.
Proceedings of the 2015 International Conference on Information Networking, 2015

Key management mechanism in ALTO/SDN based CDNi architecture.
Proceedings of the 2015 International Conference on Information Networking, 2015

2014
Pairwise and group key setup mechanism for secure machine-to-machine communication.
Comput. Sci. Inf. Syst., 2014

OCPM: Ortho code privacy mechanism in smart grid using ring communication architecture.
Ad Hoc Networks, 2014

Multi-defense Mechanism against DDoS in SDN Based CDNi.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014

Service Security for Smart Grid System.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014

Data aggregation using temporal and spatial correlations in Advanced Metering Infrastructure.
Proceedings of the International Conference on Information Networking 2014, 2014

2013
Code updates based on minimal backbone and group key management for secure sensor networks.
Math. Comput. Model., 2013

Secure and Lightweight Key Distribution with ZigBee Pro for Ubiquitous Sensor Networks.
Int. J. Distributed Sens. Networks, 2013

Key management approach for secure mobile open IPTV service.
Comput. Sci. Inf. Syst., 2013

Secure Aggregation and Attack Detection for Smart Grid System.
Proceedings of the 16th International Conference on Network-Based Information Systems, 2013

Key Establishment and Management for Secure Cellular Machine-to-Machine Communication.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

An enhanced measurement transmission scheme for privacy protection in smart grid.
Proceedings of the International Conference on Information Networking 2013, 2013

2012
An Improved Security Approach Based on Kerberos for M2M Open IPTV System.
Proceedings of the 15th International Conference on Network-Based Information Systems, 2012

An enhanced key management using ZigBee Pro for wireless sensor networks.
Proceedings of the 2012 International Conference on Information Networking, 2012

2011
Distributed authentication mechanism for secure channel establishment in ubiquitous medical sensor networks.
Mob. Inf. Syst., 2011

Secure Code Dissemination Using Energy-Efficient Minimal Virtual Backbone in Sensor Networks.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

A joint congestion control, routing, and scheduling algorithm in multihop wireless networks with heterogeneous flows.
Proceedings of the 2011 International Conference on Information Networking, 2011

2010
DMP: Detouring Using Multiple Paths against Jamming Attack for Ubiquitous Networking System.
Sensors, 2010

Adaptive Data Mining Approach for Flow Redirection in Multihomed Mobile Router.
Int. J. Inf. Technol. Decis. Mak., 2010

Energy-Efficient Code Dissemination Using Minimal Virtual Backbone in Sensor Networks.
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010

2009
An efficient data fusion and assurance mechanism using temporal and spatial correlations for home automation networks.
IEEE Trans. Consumer Electron., 2009

A Fault Management and Monitoring Mechanism for Secure Medical Sensor Network.
Int. J. Comput. Sci. Appl., 2009

Attack Classification Based on Data Mining Technique and Its Application for Reliable Medical Sensor Communication.
Int. J. Comput. Sci. Appl., 2009

2008
An Abnormal Area Scanning for Scalable and Energy-Efficient and Secure SensorNet Management.
Proceedings of the 2008 International Conference on Multimedia and Ubiquitous Engineering (MUE 2008), 2008

A secure and delay-efficient scheme for NetLMM.
Proceedings of the 5th International Conference on Mobile Technology, 2008

2007
Integrated Notification Architecture Based on Overlay Against DDoS Attacks on Convergence Network.
Proceedings of the Software Technologies for Embedded and Ubiquitous Systems, 2007

An Energy-Efficient Sensor Routing with low latency, scalability in Wireless Sensor Networks.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

2006
Proactive Defense Mechanism against IP Spoofing Traffic on a NEMO Environment.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006

A Key Management Based on Multiple Regression in Hierarchical Sensor Network.
Proceedings of the Information Security Applications, 7th International Workshop, 2006

Security Enhancement Mechanism for Ad-Hoc OLSR Protocol.
Proceedings of the Information Networking, 2006

Home Gateway with Automated Real-Time Intrusion Detection for Secure Home Networks.
Proceedings of the Computational Science and Its Applications, 2006

A New Key Management Scheme for Distributed Encrypted Storage Systems.
Proceedings of the Computational Science and Its Applications, 2006

Overlapped Detection Via Approximate Entropy Estimation Against Flooding Attack in Mobile Sensor Networks.
Proceedings of the Computational Science, 2006

Pairwise Key Setup and Authentication Utilizing Deployment Information for Secure Sensor Network.
Proceedings of the High Performance Computing and Communications, 2006

Key Establishment and Authentication Mechanism for Secure Sensor Networks.
Proceedings of the Advanced Web and Network Technologies, and Applications, 2006

2005
An energy-efficient sensor routing scheme for home automation networks.
IEEE Trans. Consumer Electron., 2005

A Fast Defense Mechanism Against IP Spoofing Traffic in a NEMO Environment.
Proceedings of the Information Networking, 2005

A Scalable Mutual Authentication and Key Distribution Mechanism in a NEMO Environment.
Proceedings of the Computational Science and Its Applications, 2005

A Secure User Authentication Method in Networked Intelligent Manufacturing Systems.
Proceedings of the 4th International Conference on Cyberworlds (CW 2005), 2005

Cluster-based Security Mechanism for Sensor Network Communication.
Proceedings of the New Trends in Computer Networks, 2005

2004
A Combined Data Mining Approach for DDoS Attack Detection.
Proceedings of the Information Networking, 2004

Detection and Identification Mechanism against Spoofed Traffic Using Distributed Agents.
Proceedings of the Computational Science and Its Applications, 2004

2003
Design of Security Enforcement Engine for Active Nodes in Active Networks.
Proceedings of the Information Networking, 2003

A Ticket-Based AAA Security Mechanism in Mobile IP Network.
Proceedings of the Computational Science and Its Applications, 2003

Secure Firewall Traversal in Mobile IP Network.
Proceedings of the Computational Science - ICCS 2003, 2003

Refundable Electronic Cash for Mobile Commerce.
Proceedings of the Web Communication Technologies and Internet-Related Social Issues, 2003

2002
The Chamois Reconfigurable Data-Mining Architecture.
J. Object Technol., 2002

The Chamois Component-Based Knowledge Engineering Framework.
Computer, 2002

Flow Admission Control for MPLS Support of DiffServ.
Proceedings of the Information Networking, 2002

2001
Differentiated Link Based QoS Routing Algorithms for Multimedia Traffic in MPLS Networks.
Proceedings of the 15th International Conference on Information Networking, 2001

Integrated Transport Layer Security: End-to-End Security Model between WTLS and TLS.
Proceedings of the 15th International Conference on Information Networking, 2001

Security Enhancement on Mobile Commerce.
Proceedings of the Human Society and the Internet, 2001

2000
An Efficient Public-key Based Authentication with Mobile-IP in E-commerce.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2000

1999
Predictive and Adaptive Bandwidth Reservation Strategies in Wireless Networks.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1999

1990
Performance evaluation of FDDI network and interconnected heterogeneous networks.
Proceedings of the 15th Conference on Local Computer Networks, 1990


  Loading...