default search action
Young-Ju Han
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2010
- [c26]Young-Ju Han, Min-Woo Park, Tai-Myoung Chung:
SecDEACH: Secure and Resilient Dynamic Clustering Protocol Preserving Data Privacy in WSNs. ICCSA (3) 2010: 142-157 - [c25]Young-Ju Han, Min-Woo Park, Jong-Myoung Kim, Tai-Myoung Chung:
A Light-Weighted Misused Key Detection in Wireless Sensor Networks. ICCSA (3) 2010: 352-367
2000 – 2009
- 2009
- [c24]Seon-Ho Park, Young-Ju Han, Jung-Ho Eom, Tai-Myoung Chung:
Architecture of Context-Aware Workflow Authorization Management Systems for Workflow-Based Systems. APNOMS 2009: 375-384 - [c23]Young-Ju Han, Min-Woo Park, Jong-Myoung Kim, Yoonjoo Kwon, Tai-Myoung Chung:
Eperfi: Design and Implementation of End-to-End Network Performance Measurement and Diagnosis System for High-Speed Networks. FGIT-FGCN 2009: 201-215 - [c22]Min-Woo Park, Jin-Young Choi, Young-Ju Han, Tai-Myoung Chung:
An Energy Efficient Concentric Clustering Scheme in Wireless Sensor Networks. NCM 2009: 58-61 - 2008
- [c21]Jin-Young Choi, Sung-Min Jung, Young-Ju Han, Tai-Myoung Chung:
Extended Concentric-Clustering Routing Scheme Adapted to Various Environments of Sensor Networks. APNOMS 2008: 187-196 - [c20]Jong-Myoung Kim, Young-Ju Han, Giljae Lee, Woojin Seok, Tai-Myoung Chung:
DTPD: Data Transfer Tool Performance Diagnosis System in High Speed Networks. APNOMS 2008: 266-275 - [c19]Min-Woo Park, Jong-Myoung Kim, Young-Ju Han, Tai-Myoung Chung:
A Misused Key Detection Mechanism for Hierarchical Routings in Wireless Sensor Network. NCM (1) 2008: 47-52 - 2007
- [c18]Seon-Ho Park, Joon-Sic Cho, Sung-Min Jung, Young-Ju Han, Tai-Myoung Chung:
Architecture of Context-Aware Integrated Security Management Systems for Smart Home Environment. APNOMS 2007: 102-111 - [c17]Young-Ju Han, Jung-Ho Eom, Seon-Ho Park, Tai-Myoung Chung:
Energy-Efficient Distance Based Clustering Routing Scheme for Long-Term Lifetime of Multi-hop Wireless Sensor Networks. APNOMS 2007: 543-546 - [c16]Seon-Ho Park, Young-Ju Han, Tai-Myoung Chung:
Context-Aware Security Management System for Pervasive Computing Environment. CONTEXT 2007: 384-396 - [c15]Jung-Ho Eom, Seon-Ho Park, Young-Ju Han, Tai-Myoung Chung:
Risk Assessment Method Based on Business Process-Oriented Asset Evaluation for Information System Security. International Conference on Computational Science (3) 2007: 1024-1031 - [c14]Young-Ju Han, Seon-Ho Park, Jung-Ho Eom, Tai-Myoung Chung:
Energy-Efficient Distance Based Clustering Routing Scheme for Wireless Sensor Networks. ICCSA (2) 2007: 195-206 - [c13]Jong-Myoung Kim, Young-Ju Han, Seon-Ho Park, Tai-Myoung Chung:
N-Dimensional Grid-Based Key Predistribution in Wireless Sensor Networks. ICCSA (2) 2007: 1107-1120 - [c12]Hun-Jung Lim, Soo-Jin Jung, Jong-Hyouk Lee, Young-Ju Han, Tai-Myoung Chung:
MANET ID : Improvement on Group Communications and ZRP. ICSNC 2007: 9 - [c11]Seon-Ho Park, Joon-Sic Cho, Young-Ju Han, Tai-Myoung Chung:
Design and Implementation of Context-Aware Security Management System for Ubiquitous Computing Environment. ISPA Workshops 2007: 235-244 - [c10]Jong-Hyouk Lee, Young-Ju Han, Jong-Hyun Kim, Jung-Chan Na, Tai-Myoung Chung:
PKG-MIB: Private-Mib for Package-Based Linux Systems in a Large Scale Management Domain. KES-AMSTA 2007: 833-840 - [c9]Jong-Hyouk Lee, Young-Ju Han, Tai-Myoung Chung:
Local Authentication Scheme Based on AAA in Mobile IPv6 Networks. MMM (2) 2007: 552-559 - [c8]Sung-Min Jung, Young-Ju Han, Tai-Myoung Chung:
The Concentric-Cluster Routing Scheme Adapted to Large-scale Sensor Networks. MoMM 2007: 187-198 - 2006
- [c7]Seon-Ho Park, Young-Ju Han, Tai-Myoung Chung:
Context-Role Based Access Control for Context-Aware Application. HPCC 2006: 572-580 - [c6]Jung-Ho Eom, Young-Ju Han, Tai-Myoung Chung:
Modeling Active Cyber Attack for Network Vulnerability Assessment. ISPA Workshops 2006: 971-980 - 2005
- [c5]Jong-Hyouk Lee, Young-Ju Han, Hyung-Jin Lim, Tai-Myung Chung:
New Binding Update Method using GDMHA in Hierarchical Mobile IPv6. ICCSA (1) 2005: 146-155 - 2004
- [c4]Young-Ju Han, Jin S. Yang, Beom-Hwan Chang, Jung C. Na, Tai-Myung Chung:
The Vulnerability Assessment for Active Networks; Model, Policy, Procedures, and Performance Evaluations. ICCSA (1) 2004: 191-198 - [c3]Jin S. Yang, Young-Ju Han, Dong-Soo Kim, Beom-Hwan Chang, Tai-Myung Chung, Jung C. Na:
A Fine-Grained Taxonomy of Security Vulnerability in Active Network Environments. ICCSA (4) 2004: 681-688 - [c2]Jin S. Yang, Young-Ju Han, Dong-Soo Kim, Beom-Hwan Chang, Tai-Myoung Chung, Jung-Chan Na:
A Fine-Grained Taxonomy of Security Vulnerability in Active Network Environments. ICCSA (1) 2004: 693-700 - [c1]Young-Ju Han, Jin S. Yang, Beom-Hwan Chang, Tai-Myung Chung:
SVAM: The Scalable Vulnerability Analysis Model Based on Active Networks. ICOIN 2004: 857-866
Coauthor Index
aka: Tai-Myoung Chung
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:02 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint