default search action
Jong Wook Han
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2018
- [c28]Kyung-Soo Lim, Seoung-Hyeon Lee, Jong Wook Han, Geon Woo Kim:
Design Considerations for an Intelligent Video Surveillance System Using Cloud Computing. PDCAT 2018: 84-89 - 2016
- [j9]Geon Woo Kim, Jong Wook Han, Deok-Gyu Lee, Sang Wook Kim:
Single authentication through in convergence space using collaborative smart cameras. Secur. Commun. Networks 9(6): 561-570 (2016) - 2014
- [j8]Deok-Gyu Lee, Jong Wook Han:
Flight Protection Data via Dynamic Sensor Networks. Int. J. Distributed Sens. Networks 10 (2014) - [j7]Seoung-Hyeon Lee, Yong-Kyun Kim, Jong Wook Han, Deok-Gyu Lee:
Protection Method for Data Communication between ADS-B Sensor and Next-Generation Air Traffic Control Systems. Inf. 5(4): 622-633 (2014) - [j6]Su-Wan Park, Deok-Gyu Lee, Jong Wook Han, Jeong-Nyeo Kim:
Automated and coupled services of advanced smart surveillance systems toward green IT: tracking, retrieval and digital evidence. J. Supercomput. 69(3): 1215-1234 (2014) - 2013
- [c27]Deok-Gyu Lee, Jong Wook Han:
A Based on Single Image Authentication System in Aviation Security. MUE 2013: 293-302 - [c26]Yong-Kyun Kim, Deok-Gyu Lee, Jong Wook Han:
Trajectory Calculation Based on Position and Speed for Effective Air Traffic Flow Management. MUE 2013: 377-384 - 2012
- [c25]Mooseop Kim, Jong Wook Han:
Compact hardware architecture for first one detector using priority-based uniform partition. ICTC 2012: 179-180 - 2011
- [j5]Chol Soon Jang, Deok-Gyu Lee, Jong Wook Han, Jong Hyuk Park:
Hybrid security protocol for wireless body area networks. Wirel. Commun. Mob. Comput. 11(2): 277-288 (2011) - [c24]Kyung-Soo Lim, Deok-Gyu Lee, Jong Wook Han:
A new proposal for a digital evidence container for security convergence. ICCSCE 2011: 171-175 - [c23]Deok-Gyu Lee, Jong Wook Han:
For Aviation Security Using Surveillance System. STA Workshops 2011: 103-115
2000 – 2009
- 2009
- [j4]Yun-kyung Lee, Deok-Gyu Lee, Jong Wook Han, Tai-Hoon Kim:
Home Network Device Authentication: Device Authentication Framework and Device Certificate Profile. Comput. J. 52(8): 871-877 (2009) - [j3]Geon Woo Kim, Deok-Gyu Lee, Jong Wook Han, Sang Wook Kim:
Security policy specification for home network. Int. J. Ad Hoc Ubiquitous Comput. 4(6): 372-378 (2009) - [j2]Geon Woo Kim, Deok-Gyu Lee, Jong Wook Han, Seung Hyun Lee, Sang Wook Kim:
Security technologies based on a home gateway for making smart homes secure. Internet Res. 19(2): 209-226 (2009) - [c22]Deok-Gyu Lee, Jong Wook Han, Doo-Soon Park, Im-Yeong Lee:
Intelligent Pervasive Network Authentication: S/Key Based Device Authentication. CCNC 2009: 1-5 - [c21]Yong-Sung Jeon, Jong Wook Han:
Compact Design of a Combined MixColumn/InvMixColumn Transformation Module for AES. CDES 2009: 38-41 - [c20]Seung-Hee Oh, Deok-Gyu Lee, Jong Wook Han, Jong Hyuk Park:
The Detection and Response Mechanism against Abnormal Traffic Attack in ATN Network. Security and Management 2009: 535-540 - [c19]Do-woo Kim, Jong Wook Han:
A Study on Reliable Communication in ATN Environment. IKE 2009: 370-373 - 2008
- [c18]Seung-Hee Oh, Deok-Gyu Lee, Jong Wook Han:
The Mechanism and Requirements for Detecting the Cross-Service Attack. APSCC 2008: 656-661 - [c17]Seoung-Hyeon Lee, Cheol-Joo Chae, Deok-Gyu Lee, Jong Wook Han, Jae-Kwang Lee:
The Traceback Method about DoS Attack in Open Grid Computing Environment. FGCN (1) 2008: 391-394 - [c16]Yun-kyung Lee, Deok-Gyu Lee, Jong Wook Han, Jeong-Nyeo Kim:
The home device authentication system construction for pervasive home network. MobiQuitous 2008 - [c15]Geon Woo Kim, Deok-Gyu Lee, Jong Wook Han, Sang Wook Kim:
Intelligent Security for Inter-space Surveillance Applications. MUE 2008: 419-422 - [c14]Abedelaziz Mohaisen, YoungJae Maeng, Jeonil Kang, DaeHun Nyang, KyungHee Lee, Dowon Hong, Jong Wook Han:
Protection Techniques of Secret Information in Non-tamper Proof Devices of Smart Home Network. UIC 2008: 548-562 - [c13]Deok-Gyu Lee, Jong Wook Han, Jong Hyuk Park, Sang-Soo Yeo, Young-Sik Jeong:
Time Stamp Protocol for Smart Environment Services. UIC 2008: 591-601 - 2007
- [c12]Yun-kyung Lee, Deok-Gyu Lee, Jong Wook Han, Kyo-Il Chung:
Home Network Device Authentication: Device Authentication Framework and Device Certificate Profile. APWeb/WAIM Workshops 2007: 573-582 - [c11]Geon Woo Kim, Deok-Gyu Lee, Jong Wook Han, Sang Wook Kim:
Security Technologies Based on Home Gateway for Making Smart Home Secure. EUC Workshops 2007: 124-135 - [c10]Yun-kyung Lee, Deok-Gyu Lee, Jong Wook Han:
Home Device Authentication Method Based on PKI. FGCN (2) 2007: 7-11 - [c9]Deok-Gyu Lee, Ilsun You, Sang-Choon Kim, Yun-kyung Lee, Jong Wook Han, Kyo-Il Chung:
Intelligent Home Network Authentication: S/Key-Based Home Device Authentication. ISPA Workshops 2007: 214-223 - [c8]Deok-Gyu Lee, Jong Wook Han, Jong Hyuk Park:
User Authentication for Multi Domain in Home Network Environments. MUE 2007: 89-96 - [c7]Deok-Gyu Lee, Yun-kyung Lee, Jong Wook Han, Jong Hyuk Park, Im-Yeong Lee:
Intelligent Home Network Authentication: Home Device Authentication Using Device Certification. OTM Conferences (2) 2007: 1688-1700 - [c6]Geon Woo Kim, Deok-Gyu Lee, Jong Wook Han, Sang-Choon Kim, Sang Wook Kim:
Security Framework for Home Network: Authentication, Authorization, and Security Policy. PAKDD Workshops 2007: 621-628 - 2006
- [c5]Jin-Bum Hwang, Hyungkyu Lee, Jong Wook Han:
Efficient and User Friendly Inter-domain Device Authentication/Access Control for Home Networks. EUC 2006: 131-140 - [c4]Jin-Bum Hwang, Jong Wook Han:
A Security Model for Home Networks with Authority Delegation. ICCSA (4) 2006: 360-369 - 2005
- [c3]Jin-Bum Hwang, Jong Wook Han:
Privacy enhanced access control mechanism for home networks. ICECS 2005: 1-4 - 2003
- [j1]Jung-Tae Kim, Jong Wook Han:
Analyses of Crypto Module for Gbps VPN System. J. Inform. and Commun. Convergence Engineering 1(4): 213-216 (2003) - [c2]Sang-Su Lee, Jong Wook Han, Hyo-wook Bae:
The encryption method to share a secret binary image and its decryption system. ISICT 2003: 94-99 - [c1]Ki Hyun Kim, Jong Wook Han, Yong Man Ro:
Enhancement of Image Quality in Screen Mark Attack of Watermark. SIP 2003: 66-70
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint