Namje Park
Orcid: 0000-0003-4434-8933
According to our database1,
Namje Park
authored at least 89 papers
between 2003 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
2005
2010
2015
2020
0
5
10
15
1
4
3
4
2
3
4
2
1
1
1
2
1
1
14
6
7
5
3
1
6
10
5
2
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2023
Proposal of a Token-Based Node Selection Mechanism for Node Distribution of Mobility IoT Blockchain Nodes.
Sensors, October, 2023
2022
Short-Term Energy Forecasting Using Machine-Learning-Based Ensemble Voting Regression.
Symmetry, 2022
De-Identification Mechanism of User Data in Video Systems According to Risk Level for Preventing Leakage of Personal Healthcare Information.
Sensors, 2022
Lightweight knowledge-based authentication model for intelligent closed circuit television in mobile personal computing.
Pers. Ubiquitous Comput., 2022
Role-based Access Control Video Surveillance Mechanism Modeling in Smart Contract Environment.
Trans. Emerg. Telecommun. Technol., 2022
2021
Web-Browsing Application Using Web Scraping Technology in Korean Network Separation Application.
Symmetry, 2021
Blockchain based privacy preserving multimedia intelligent video surveillance using secure Merkle tree.
Multim. Tools Appl., 2021
2020
A Face Image Virtualization Mechanism for Privacy Intrusion Prevention in Healthcare Video Surveillance Systems.
Symmetry, 2020
IoT-Blockchain Enabled Optimized Provenance System for Food Industry 4.0 Using Advanced Deep Learning.
Sensors, 2020
CCTV-RFID enabled multifactor authentication model for secure differential level video access control.
Multim. Tools Appl., 2020
Framework for assessing responsiveness to personal data breaches based on Capture-the-Flag.
J. Multim. Inf. Syst., 2020
2018
Electronic identity information hiding methods using a secret sharing scheme in multimedia-centric internet of things environment.
Pers. Ubiquitous Comput., 2018
De-identification of metering data for smart grid personal security in intelligent CCTV-based P2P cloud computing environment.
Peer-to-Peer Netw. Appl., 2018
2017
Erratum to: Geocasting-based synchronization of Almanac on the maritime cloud for distributed smart surveillance.
J. Supercomput., 2017
Geocasting-based synchronization of Almanac on the maritime cloud for distributed smart surveillance.
J. Supercomput., 2017
A Study on De-Identification of Metering Data for Smart Grid Personal Security in Cloud Environment.
J. Multim. Inf. Syst., 2017
2016
Mutual Authentication Scheme in Secure Internet of Things Technology for Comfortable Lifestyle.
Sensors, 2016
An Enhanced Lightweight Anonymous Authentication Scheme for a Scalable Localization Roaming Service in Wireless Sensor Networks.
Sensors, 2016
Mobile middleware platform for secure vessel traffic system in IoT service environment.
Secur. Commun. Networks, 2016
Security and Privacy Mechanisms for Sensor Middleware and Application in Internet of Things (IoT).
Int. J. Distributed Sens. Networks, 2016
Proceedings of the Information Security Applications - 17th International Workshop, 2016
Proceedings of the Information Security Applications - 17th International Workshop, 2016
2015
Inter-vessel traffic service data exchange format protocol security enhancement of user authentication scheme in mobile VTS middleware platform.
Proceedings of the 17th Asia-Pacific Network Operations and Management Symposium, 2015
2014
Performance Improvement Based Authentication Protocol for Intervessel Traffic Service Data Exchange Format Protocol Based on U-Navigation System in WoT Environment.
J. Appl. Math., 2014
Implementation of load management application system using smart grid privacy policy in energy management service environment.
Clust. Comput., 2014
The Improvement for Performance of Inter-VTS Data Exchange Format Protocol in VTS System.
Proceedings of the Frontier and Innovation in Future Computing and Communications, 2014
2013
Proceedings of the Mobile, Ubiquitous, and Intelligent Computing, 2013
Proceedings of the Mobile, Ubiquitous, and Intelligent Computing, 2013
Proceedings of the Mobile, Ubiquitous, and Intelligent Computing, 2013
Result of Implementing STEAM Program and Analysis of Effectiveness for Smart Grid's Education.
Proceedings of the Mobile, Ubiquitous, and Intelligent Computing, 2013
Proceedings of the Mobile, Ubiquitous, and Intelligent Computing, 2013
Use-Cases and Service Modeling Analysis of Open Ubiquitous Sensor Network Platform in Semantic Environment.
Proceedings of the Mobile, Ubiquitous, and Intelligent Computing, 2013
Proceedings of the Mobile, Ubiquitous, and Intelligent Computing, 2013
Proceedings of the Mobile, Ubiquitous, and Intelligent Computing, 2013
Access Control Technique of Illegal Harmful Contents for Elementary Schoolchild Online Protection.
Proceedings of the Grid and Pervasive Computing - 8th International Conference, 2013
Development of STEAM Program and Teaching Method for Using LEGO Line Tracer Robot in Elementary School.
Proceedings of the Grid and Pervasive Computing - 8th International Conference, 2013
Cryptanalysis of an Authenticated Group Key Transfer Protocol Based on Secret Sharing.
Proceedings of the Grid and Pervasive Computing - 8th International Conference, 2013
The Concept of Delegation of Authorization and Its Expansion for Multi Domain Smart Grid System.
Proceedings of the Grid and Pervasive Computing - 8th International Conference, 2013
Proceedings of the Grid and Pervasive Computing - 8th International Conference, 2013
Development of the STEAM-Based Media Education Materials for Prevention of Media Dysfunction in Elementary School.
Proceedings of the Grid and Pervasive Computing - 8th International Conference, 2013
2012
Int. J. Radio Freq. Identif. Technol. Appl., 2012
Computer Education's Teaching-Learning Methods Using Educational Programming Language Based on STEAM Education.
Proceedings of the Network and Parallel Computing, 9th IFIP International Conference, 2012
Detection and Mitigation of Web Application Vulnerabilities Based on Security Testing.
Proceedings of the Network and Parallel Computing, 9th IFIP International Conference, 2012
Mobile RFID/NFC Linkage Based on UHF/HF Dual Band's Integration in U-Sensor Network Era.
Proceedings of the Information Technology Convergence, Secure and Trust Computing, and Data Management, 2012
Weaknesses of a Dynamic ID-Based Remote User Authentication Scheme with Session Key Agreement for Multi-server Environment.
Proceedings of the Information Technology Convergence, Secure and Trust Computing, and Data Management, 2012
Proceedings of the Information Technology Convergence, Secure and Trust Computing, and Data Management, 2012
Customizing Data Analysis Using Forensic Approach in Personalized RFID for Access Control of Student's Harmful Contents.
Proceedings of the Information Technology Convergence, Secure and Trust Computing, and Data Management, 2012
2011
Int. J. Ad Hoc Ubiquitous Comput., 2011
Customized Healthcare Infrastructure Using Privacy Weight Level Based on Smart Device.
Proceedings of the Convergence and Hybrid Information Technology, 2011
Secure UHF/HF Dual-Band RFID : Strategic Framework Approaches and Application Solutions.
Proceedings of the Computational Collective Intelligence. Technologies and Applications, 2011
Proceedings of the Future Generation Information Technology, 2011
USN Middleware Access Control of Sensor Network and Selective Encryption of Information.
Proceedings of the Future Generation Information Technology, 2011
Proceedings of the Future Generation Information Technology, 2011
Proceedings of the Future Generation Information Technology, 2011
Experiment and Verification of Teaching Fractal Geometry Concepts Using a Logo-Based Framework for Elementary School Children.
Proceedings of the Future Generation Information Technology, 2011
2010
Proceedings of the Wireless Algorithms, 2010
Proceedings of the Seventh International Conference on Information Technology: New Generations, 2010
Security Scheme for Managing a Large Quantity of Individual Information in RFID Environment.
Proceedings of the Information Computing and Applications - International Conference, 2010
Proceedings of the Computational Collective Intelligence. Technologies and Applications, 2010
Harmful Adult Multimedia Contents Filtering Method in Mobile RFID Service Environment.
Proceedings of the Computational Collective Intelligence. Technologies and Applications, 2010
2008
Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, 2008
Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, 2008
Proceedings of the Progress in WWW Research and Development, 2008
2007
Proceedings of the Advances in Intelligent Web Mastering, Proceedings of the 5th Atlantic Web Intelligence Conference - AWIC 2007, Fontainebleau, France, June 25, 2007
2006
A Layered Approach to Design of Light-Weight Middleware Systems for Mobile RFID Security (SMRM : Secure Mobile RFID Middleware System).
Proceedings of the Management of Integrated End-to-End Communications and Services, 2006
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2006
Proceedings of the Personal Wireless Communications, 2006
XML-Signcryption Based LBS Security Protocol Acceleration Methods in Mobile Distributed Computing.
Proceedings of the Computational Science and Its Applications, 2006
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006
Proceedings of the Advanced Web and Network Technologies, and Applications, 2006
2005
Trusted Certificate Validation Scheme for Open LBS Application Based on XML Web Services.
J. Inf. Process. Syst., 2005
Proceedings of the Parallel and Distributed Processing and Applications, 2005
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2005
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2005
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2005
Proceedings of the Web Engineering, 5th International Conference, 2005
Proceedings of the Computational Science and Its Applications, 2005
Proceedings of the Computational Science and Its Applications, 2005
Proceedings of the Grid and Cooperative Computing - GCC 2005, 4th International Conference, Beijing, China, November 30, 2005
Proceedings of the E-Commerce and Web Technologies: 6th International Conference, 2005
Proceedings of the Advances in Web Intelligence Third International Atlantic Web IntelligenceConference, 2005
2004
Proceedings of the Managing Next Generation Convergence Networks and Services, 2004
Development of XKMS-Based Service Component for Using PKI in XML Web Services Environment.
Proceedings of the Computational Science and Its Applications, 2004
Proceedings of the Computational Science and Its Applications, 2004
Proceedings of the Computational Science, 2004
Proceedings of the Grid and Cooperative Computing, 2004
2003
Proceedings of the 2003 ACM Workshop on XML Security, Fairfax, VA, USA, October 31, 2003, 2003
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003