Sung Je Hong

According to our database1, Sung Je Hong authored at least 58 papers between 1981 and 2012.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2012
A Hybrid Sonar Algorithm for Submersible Cars to Verify the Location of Senders.
IEEE Trans. Veh. Technol., 2012

Security Condition for Exact Localization in Wireless Ad Hoc Networks.
IEICE Trans. Commun., 2012

Lightweight Distance Bounding Protocol against Relay Attacks.
IEICE Trans. Inf. Syst., 2012

Distance Bounding with Delayed Responses.
IEEE Commun. Lett., 2012

2011
Distance Bounding Protocol for Mutual Authentication.
IEEE Trans. Wirel. Commun., 2011

Fast Verification of Hash Chains with Reduced Storage.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011

Distance Bounding Protocol with Adjustable False Acceptance Rate.
IEEE Commun. Lett., 2011

Order-Preserving Encryption for Non-uniformly Distributed Plaintexts.
Proceedings of the Information Security Applications - 12th International Workshop, 2011

2010
On Fast Verification of Hash Chains.
Proceedings of the Topics in Cryptology, 2010

2009
Security weakness of Tseng's fault-tolerant conference-key agreement protocol.
J. Syst. Softw., 2009

Redistributing time-based rights between consumer devices for content sharing in DRM system.
Int. J. Inf. Sec., 2009

2008
Dynamic Two-Tier Cell Structure for Bandwidth Reservation of Handoffs in Cellular Networks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

Annulling SYN Flooding Attacks with Whitelist.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

2007
Minimum distance between two sphere-swept surfaces.
Comput. Aided Des., 2007

2006
PolyI-D: Polymorphic Worm Detection Based on Instruction Distribution.
Proceedings of the Information Security Applications, 7th International Workshop, 2006

Dual-Mode <i>r</i>-Reliable Task Model for Flexible Scheduling in Reliable Real-Time Systems.
Proceedings of the Embedded and Ubiquitous Computing, International Conference, 2006

Return Address Randomization Scheme for Annuling Data-Injection Buffer Overflow Attacks.
Proceedings of the Information Security and Cryptology, Second SKLOIS Conference, 2006

The Exclusion of Malicious Routing Peers in Structured P2P Systems.
Proceedings of the Agents and Peer-to-Peer Computing - 5th International Workshop, 2006

Mitigating the Impact of Liars by Reflecting Peer's Credibility on P2P File Reputation Systems.
Proceedings of the Agents and Peer-to-Peer Computing - 5th International Workshop, 2006

2005
An Adaptive FEC Scheme for Firm Real-Time Multimedia Communications in Wireless Networks.
IEICE Trans. Commun., 2005

A Reputation Management System in Structured Peer-to-Peer Networks.
Proceedings of the 14th IEEE International Workshops on Enabling Technologies (WETICE 2005), 2005

Adaptive Location Management Scheme for Mobile IP.
Proceedings of the 3rd IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2005 Workshops), 2005

Energy-saving design technique achieved by latched pass-transistor adiabatic logic.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2005), 2005

Parallely testable design for detection of neighborhood pattern sensitive faults in high density DRAMs.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2005), 2005

Mobile Multicast Routing Protocol Using Prediction of Dwelling Time of a Mobile Host.
Proceedings of the Networking, 2005

Ticket-Based Grid Services Architecture for Dynamic Virtual Organizations.
Proceedings of the Advances in Grid Computing, 2005

A Trust Management Scheme in Structured P2P Systems.
Proceedings of the Agents and Peer-to-Peer Computing, 4th International Workshop, 2005

2004
Workflow-Based Authorization Service in the Grid.
J. Grid Comput., 2004

Ticket-based fine-grained authorization service in the dynamic VO environment.
Proceedings of the 1st ACM Workshop On Secure Web Services, 2004

Best-Effort Scheduling (m, k)-Firm Real-Time Tasks Based on the (m, k)-Firm Constraint Meeting Probability.
Proceedings of the International Conference on Embedded Systems and Applications, 2004

2003
Processor Allocation and Task Scheduling of Matrix Chain Products on Parallel Systems.
IEEE Trans. Parallel Distributed Syst., 2003

Task scheduling using a block dependency DAG for block-oriented sparse Cholesky factorization.
Parallel Comput., 2003

Secure checkpointing.
J. Syst. Archit., 2003

Dynamic load balancing for switch-based networks.
J. Parallel Distributed Comput., 2003

On-line scheduling of scalable real-time tasks on multiprocessor systems.
J. Parallel Distributed Comput., 2003

Approximating 3D General Sweep Boundary Using Depth-Buffer.
Proceedings of the Computational Science and Its Applications, 2003

Workflow-based Authorization Service in Grid.
Proceedings of the 4th International Workshop on Grid Computing (GRID 2003), 2003

2001
The Intersection of Two Ringed Surfaces and Some Related Problems.
Graph. Model., 2001

A Secure Checkpointing System.
Proceedings of the 8th Pacific Rim International Symposium on Dependable Computing (PRDC 2001), 2001

2000
Polygonal boundary approximation for a 2D general sweep based on envelope and boolean operations.
Vis. Comput., 2000

On the Configuration of Switch-Based Networks with Wormhole Routing.
J. Interconnect. Networks, 2000

The Intersection of Two Ringed Surfaces.
Proceedings of the 8th Pacific Conference on Computer Graphics and Applications, 2000

1999
Design and Analysis of the Dual-Torus Network.
New Gener. Comput., 1999

Reliable Probabilistic Checkpointing.
Proceedings of the 1999 Pacific Rim International Symposium on Dependable Computing (PRDC 1999), 1999

1998
Direct manipulation of generalized cylinders based on B-spline motion.
Vis. Comput., 1998

Design of a built-in current sensor for I<sub>DDQ</sub> testing.
IEEE J. Solid State Circuits, 1998

A Real-Time Communication Method for Wormhole Switching Networks.
Proceedings of the 1998 International Conference on Parallel Processing (ICPP '98), 1998

1997
Dynamic Load Distribution on Meshes with Broadcasting.
Int. J. High Speed Comput., 1997

Real-Time Job Scheduling in Hypercube Systems.
Proceedings of the 1997 International Conference on Parallel Processing (ICPP '97), 1997

Dynamic Load Distribution on a Mesh with a Single Bus.
Proceedings of the 1997 International Conference on Parallel and Distributed Systems (ICPADS '97), 1997

Probabilistic Checkpointing.
Proceedings of the Digest of Papers: FTCS-27, 1997

1996
A New Approach to Through-the-Lens Camera Control.
CVGIP Graph. Model. Image Process., 1996

1995
DTN: A New Partitionable Torus Topology.
Proceedings of the 1995 International Conference on Parallel Processing, 1995

1991
Absolute Minimization of Completely Specified Switching Functions.
IEEE Trans. Computers, 1991

1990
The Design of a Testable Parallel Multiplier.
IEEE Trans. Computers, 1990

1988
An easily testable parallel multiplier.
Proceedings of the Eighteenth International Symposium on Fault-Tolerant Computing, 1988

1983
Design of Minimal Programmable Logic Arrays
PhD thesis, 1983

1981
Existence Algorithms for Synchronizing/Distinguishing Sequences.
IEEE Trans. Computers, 1981


  Loading...