default search action
Moon-Seog Jun
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [j6]JaeSeung Lee, Jungho Kang, Moon-Seog Jun, Jaekyung Han:
Design of a Symmetry Protocol for the Efficient Operation of IP Cameras in the IoT Environment. Symmetry 11(3): 361 (2019) - 2017
- [j5]Mansik Kim, Kyung-Soo Lim, Jungsuk Song, Moon-Seog Jun:
An Efficient Secure Scheme Based on Hierarchical Topology in the Smart Home Environment. Symmetry 9(8): 143 (2017) - 2016
- [c27]Sang-Hyeon Park, Jeong-Ho Kim, Moon-Seog Jun:
A Design of Secure Authentication Method with Bio-Information in the Car Sharing Environment. CSA/CUTE 2016: 205-210 - [c26]Geunil Park, Bumryong Kim, Moon-Seog Jun:
A Design of Secure Authentication Method Using Zero Knowledge Proof in Smart-Home Environment. CSA/CUTE 2016: 215-220 - [c25]Hague-Chung, Keun-Chang Choi, Moon-Seog Jun:
A Design of Key Agreement Scheme Between Lightweight Devices in IoT Environment. CSA/CUTE 2016: 224-229 - 2015
- [j4]Byung Wook Jin, Keun-Wang Lee, Moon-Seog Jun:
Design of Data Communication Scheme for Privacy Protection in Smart IoT Environment. Smart Comput. Rev. 5(4): 318-328 (2015) - [c24]Mansik Kim, Wonkyu Choi, Ayoung Lee, Moon-Seog Jun:
PUF-Based Privacy Protection Method in VANET Environment. CSA/CUTE 2015: 263-268 - [c23]Minjin Kim, Keun-Chang Choi, Hanna You, Moon-Seog Jun:
Design of Authentication Protocol Based on Distance-Bounding and Zero-Knowledge for Anonymity in VANET. CSA/CUTE 2015: 269-274 - [c22]Bumryong Kim, Jun-ho Song, Jae-Pyo Park, Moon-Seog Jun:
Design of Exploitable Automatic Verification System for Secure Open Source Software. CSA/CUTE 2015: 275-281 - [c21]Seokhwa Song, JaeSeung Lee, Jaesik Lee, Moon-Seog Jun:
User Authentication Method Design Based on Biometrics in a Multi-cloud Environment. CSA/CUTE 2015: 283-288 - 2011
- [j3]Seung-Jae Jang, Young-Gu Lee, Kwang-Hyung Lee, Tai-Hoon Kim, Moon-Seog Jun:
A Study on Group Key Agreement in Sensor Network Environments Using Two-Dimensional Arrays. Sensors 11(9): 8227-8240 (2011) - [j2]Jeong-Hyo Park, Yong-Hoon Jung, Kwang-Hyung Lee, Moon-Seog Jun:
A New Privacy Scheme for Providing Anonymity Techniques on Sensor Network. Smart Comput. Rev. 1(1): 47-57 (2011) - [j1]Yong-Hoon Jung, Seung-Jae Jang, So Yeon Min, Moon-Seog Jun:
A Fast Authentication System for Home Network Devices Using Two Dimension Array. Smart Comput. Rev. 1(2): 139-149 (2011) - [c20]Jeong-Hyo Park, Yong-Hoon Jung, Kwang-Hyung Lee, Keun-Wang Lee, Moon-Seog Jun:
An Enhanced Data Privacy Mechanism Suitable for Ubiquitous Sensor Networks. FGIT-GDC 2011: 138-147 - [c19]Seung-Jae Jang, Young-Hoon Jung, So Yeon Min, Keun-Wang Lee, Moon-Seog Jun:
RFID Mutual Authentication Protocols Using Key Exchange Based on Hash Functions. FGIT-GDC 2011: 246-255 - [c18]Dae-Gi Min, Jae-Woo Kim, Moon-Seog Jun:
The Entrance Authentication and Tracking Systems Using Object Extraction and the RFID Tag. UCMA (1) 2011: 313-326 - [c17]Jeong-Hyo Park, Yong-Hoon Jung, Hoon Ko, Jeong-Jai Kim, Moon-Seog Jun:
A Privacy Technique for Providing Anonymity to Sensor Nodes in a Sensor Network. UCMA (1) 2011: 327-335 - [c16]Seung-Jae Jang, Young-Gu Lee, Hoon Ko, Moon-Seog Jun:
Study on Group Key Agreement Using Two-Dimensional Array in Sensor Network Environment. UCMA (1) 2011: 336-349 - [c15]Joo-Kwan Lee, Jeong-Jai Kim, Moon-Seog Jun:
Design and Materialization of Location Based Motion Detection System in USN Environments. UCMA (1) 2011: 350-360 - [c14]Jae-Yong Kim, Young-Gu Lee, Kwang-Hyung Lee, Moon-Seog Jun:
Realization of Integrated Service for Zoos Using RFID/USN Based Location Tracking Technology. UCMA (1) 2011: 361-368 - [c13]Jae-Hwe You, Young-Gu Lee, Moon-Seog Jun:
Real-Time Monitoring System Using Location Based Service. UCMA (1) 2011: 369-379 - 2010
- [c12]Jae-Hwe You, Moon-Seog Jun:
A Mechanism to Prevent RP Phishing in OpenID System. ACIS-ICIS 2010: 876-880 - [c11]Joo-Kwan Lee, Moon-Seog Jun:
Security Protocol Design for Electronic-Cash Transactions in a Mobile-PKI Environment. ACIS-ICIS 2010: 887-891 - [c10]Jung-Oh Park, Moon-Seog Jun, Sanggeun Kim:
A Study on Home Network User Authentication Using Token-Based OTP. SUComS 2010: 59-64
2000 – 2009
- 2009
- [c9]Hyun-Chul Kim, Young-Gu Lee, Kying-Seok Lee, Moon-Seog Jun:
Design and Implementation of Multi Authentication Mechanism for Secure Electronic Commerce. SNPD 2009: 215-219 - [c8]Hyun-Chul Kim, Young-Gu Lee, Kying-Seok Lee, Moon-Seog Jun:
Design and Implementation of Security Protocol for Home-Network. SNPD 2009: 220-224 - 2008
- [c7]Hyun-Chul Kim, Hong-Woo Lee, Kyung-Seok Lee, Moon-Seog Jun:
A Design of One-Time Password Mechanism Using Public Key Infrastructure. NCM (1) 2008: 18-24 - 2006
- [c6]Kun-Won Jang, Junho Choun, Myung-Hee Kim, Moon-Seog Jun:
Design and Verification of Security API Structure Based on PKCS #11. CIT 2006: 165 - [c5]Kun-Won Jang, Chan-Kil Park, Jung-Jae Kim, Moon-Seog Jun:
A Study on DRM System for On/Off Line Key Authentication. Security and Management 2006: 106-111 - [c4]Kyung-Sang Sung, Jung-Jae Kim, Moon-Seog Jun, Hae-Seok Oh:
Digital Video WaterMarking System Using Audio Information of Image Discrete Frequency on Improved Security Through Pre-Preocessing. DMIN 2006: 303-308 - 2004
- [c3]Jong-Hee Lee, Kwang-Hyoung Lee, Moon-Seog Jun, Keun-Wang Lee:
A Multimedia Database System Using Mobile Indexing Agent in Wireless Network. KES 2004: 81-87 - 2003
- [c2]Kyoung-Hwa Do, Kun-Won Jang, Sang-Hun Lee, Moon-Seog Jun:
The Design of WEB Stegodata Detection Systems Using Intrusion Detection Systems. Security and Management 2003: 177-182 - [c1]Sang-Hun Lee, Kyoung-Hwa Do, Kun-Won Jang, Moon-Seog Jun:
VDTS: The Design of Real-Time Virus Detection and Tracing Systems. Security and Management 2003: 508-513
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:57 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint