Namhi Kang
According to our database1,
Namhi Kang
authored at least 29 papers
between 2004 and 2017.
Collaborative distances:
Collaborative distances:
Timeline
2004
2006
2008
2010
2012
2014
2016
0
1
2
3
4
5
1
2
2
1
2
2
2
2
1
1
1
1
1
1
1
4
2
1
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2017
Wirel. Networks, 2017
2016
Mutual Authentication Scheme in Secure Internet of Things Technology for Comfortable Lifestyle.
Sensors, 2016
Fine-Grained Support of Security Services for Resource Constrained Internet of Things.
Int. J. Distributed Sens. Networks, 2016
Proceedings of the 2016 IEEE International Conference on Smart Grid Communications, 2016
2015
ESSE: Efficient Secure Session Establishment for Internet-Integrated Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2015
Comprehensive performance evaluation of distributed and dynamic mobility routing strategy.
Comput. Networks, 2015
Proceedings of the Information Security Applications - 16th International Workshop, 2015
2014
Lightweight secure communication for CoAP-enabled Internet of Things using delegated DTLS handshake.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2014
2013
IEEE Commun. Lett., 2013
2012
Proceedings of the Fourth International Conference on Ubiquitous and Future Networks, 2012
2010
IEEE Trans. Consumer Electron., 2010
Proceedings of the IEEE International Conference on Sensor Networks, 2010
2009
Mobility management based on proxy mobile IPv6 for multicasting services in home networks.
IEEE Trans. Consumer Electron., 2009
2008
IEICE Trans. Commun., 2008
2007
IEICE Trans. Commun., 2007
IEICE Trans. Commun., 2007
H2O: Hierarchically Optimized Hybrid Routing Strategies for Multihop Wireless Networks.
Proceedings of the Information Networking. Towards Ubiquitous Networking and Services, 2007
2006
Proceedings of the Ubiquitous Computing Systems, Third International Symposium, 2006
Proceedings of the Third Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks, 2006
A Short-Lived Key Selection Approach to Authenticate Data Origin of Multimedia Stream.
Proceedings of the Computational Science and Its Applications, 2006
Proceedings of the Self-Organizing Systems, First International Workshop, 2006
2005
Differentiated authentication services for real-time multimedia streaming over the Internet.
PhD thesis, 2005
Security Analysis of DoS Vulnerability in Stream Authentication Schemes Using Hash Chaining.
IEICE Trans. Commun., 2005
Proceedings of the Mobility Aware Technologies and Applications, 2005
Proceedings of the Information Networking, 2005
2004
Proceedings of the Trust and Privacy in Digital Business, First International Conference, 2004