Sungik Jun
According to our database1,
Sungik Jun
authored at least 27 papers
between 1995 and 2020.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on csuohio.edu
On csauthors.net:
Bibliography
2020
Proceedings of the International Conference on Information and Communication Technology Convergence, 2020
2017
J. Parallel Distributed Comput., 2017
2016
Proceedings of the 2016 International Conference on Information Networking, 2016
2015
Gaussian process for predicting CPU utilization and its application to energy efficiency.
Appl. Intell., 2015
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2015
2008
Proceedings of the Information Security Applications, 9th International Workshop, 2008
Proceedings of the Trust, 2008
Proceedings of the 21st Annual IEEE International SoC Conference, SoCC 2008, 2008
The Need of MTM Interface Specification for the Trusted Mobile Platform.
Proceedings of the 2008 International Conference on Embedded Systems & Applications, 2008
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008
2007
Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), 2007
Context-aware security service in RFID/USN environments using MAUT and extended GRBAC.
Proceedings of the Second IEEE International Conference on Digital Information Management (ICDIM), 2007
Proceedings of the Computational Science and Its Applications, 2007
Proceedings of the Computational Science and Its Applications, 2007
Efficient Implementation of the Keyed-Hash Message Authentication Code Based on SHA-1 Algorithm for Mobile Trusted Computing.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007
2006
Proceedings of the Advances in Information and Computer Security, 2006
Proceedings of the Autonomic and Trusted Computing, Third International Conference, 2006
2005
Efficient 3G/WLAN Interworking Techniques for Seamless Roaming Services with Location-Aware Authentication.
Proceedings of the NETWORKING 2005: Networking Technologies, 2005
Proceedings of the Network Control and Engineering for QoS, 2005
2004
Proceedings of the IEEE International Conference on Virtual Environments, 2004
Proceedings of the Information Security and Cryptology, 2004
2003
Proceedings of the 2003 International Symposium on Circuits and Systems, 2003
Proceedings of the Computational Science and Its Applications, 2003
Implementation of an Elliptic Curve Cryptography Hardware Accelerator for Smart Cards.
Proceedings of the International Conference on Security and Management, 2003
2002
Proceedings of the 22nd International Conference on Distributed Computing Systems, 2002
1998
Stand-by loading scheme: an effective software retrofit method for a switching system.
Proceedings of the Third IEEE Symposium on Computers and Communications (ISCC 1998), June 30, 1998
1995
Proceedings of the 2nd International Workshop on Real-Time Computing Systems and Applications, October 25, 1995