default search action
Ki-Hyung Kim
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c88]Heeyeon Kim, Ki-Hyung Kim:
Deep Learning-Based SBOM Defect Detection for Medical Devices. ICAIIC 2024: 47-51 - [c87]Hansu Oh, Ki-Hyung Kim:
Cyber Attack Defense: DID-based Email Security System. ICOIN 2024: 807-811 - 2023
- [j25]Rana Muhammad Abdul Haseeb-ur-rehman, Azana Hafizah Mohd Aman, Mohammad Kamrul Hasan, Khairul Akram Zainol Ariffin, Abdallah Namoun, Ali Tufail, Ki-Hyung Kim:
High-Speed Network DDoS Attack Detection: A Survey. Sensors 23(15): 6850 (2023) - [j24]Muhammad Hammad, Rashad Maqbool Jillani, Sami Ullah, Abdallah Namoun, Ali Tufail, Ki-Hyung Kim, Habib Shah:
Security Framework for Network-Based Manufacturing Systems with Personalized Customization: An Industry 4.0 Approach. Sensors 23(17): 7555 (2023) - [j23]Muhammad Muzamil Aslam, Ali Tufail, Ki-Hyung Kim, Rosyzie Anna Awg Haji Mohd Apong, Muhammad Taqi Raza:
A Comprehensive Study on Cyber Attacks in Communication Networks in Water Purification and Distribution Plants: Challenges, Vulnerabilities, and Future Prospects. Sensors 23(18): 7999 (2023) - [c86]Jiho Lim, Hansu Oh, Kichun Sim, Sunyoung Kim, Ki-Hyung Kim:
A V2X Access Authorization Mechanism based on Decentralized ID (DID) and Verifiable Credentials (VC). ICOIN 2023: 801-805 - [c85]Jae-Ho Choi, Jun-Hyuk Im, Hae-Jun Song, Ki-Hyung Kim:
Home IoT Authority Control Method Based on DID Auth. ICUFN 2023: 94-99 - 2022
- [c84]Mukhammaddiyor Khaydaraliev, Min-Hyung Rhie, Ki-Hyung Kim:
Blockchain-enabled Access Control with Fog Nodes for Independent IoTs. ICOIN 2022: 78-83 - [c83]Alnazif Mohammed Alnour, Ki-Hyung Kim:
Decentralized Identifiers (DIDs)-Based Authentication Scheme for Smart Health Care System. ICUFN 2022: 443-438 - 2021
- [j22]Youngjun Kim, Ki-Hyung Kim, We-Duke Cho:
Image Compression Using Chain Coding for Electronic Shelf Labels (ESL) Systems. IEEE Access 9: 8497-8511 (2021) - [j21]Ali Tufail, Abdallah Namoun, Adnan Ahmed Abi Sen, Ki-Hyung Kim, Ahmed Alrehaili, Arshad Ali:
Moisture Computing-Based Internet of Vehicles (IoV) Architecture for Smart Cities. Sensors 21(11): 3785 (2021) - [c82]Seongsu Park, Ki-Hyung Kim:
Principal Component Analysis Implementation for Signal Processing of Electrochemical Impedance Spectroscopy in the Detection of Fake Fingerprints. ICAIIC 2021: 411-415 - [c81]Seungjoo Lim, Min-Hyung Rhie, DongYeop Hwang, Ki-Hyung Kim:
A Subject-Centric Credential Management Method based on the Verifiable Credentials. ICOIN 2021: 508-510 - [c80]Min-Hyung Rhie, Kyung-Hoon Kim, DongYeop Hwang, Ki-Hyung Kim:
Vulnerability Analysis of DID Document's Updating Process in the Decentralized Identifier Systems. ICOIN 2021: 517-520 - [c79]Kyung-Hoon Kim, Seungjoo Lim, DongYeop Hwang, Ki-Hyung Kim:
Analysis on the Privacy of DID Service Properties in the DID Document. ICOIN 2021: 745-748 - [c78]Beomseok Kim, Woonseob Shin, DongYeop Hwang, Ki-Hyung Kim:
Attribute-Based Access Control(ABAC) with Decentralized Identifier in the Blockchain-Based Energy Transaction Platform. ICOIN 2021: 845-848 - 2020
- [c77]Jungyong Choi, Woonseob Shin, Jonghyun Kim, Ki-Hyung Kim:
Random Seed Generation For IoT Key Generation and Key Management System Using Blockchain. ICOIN 2020: 663-665 - [c76]Sung-bin Lee, DongYeop Hwang, Jonghyun Kim, Ki-Hyung Kim:
Proof-of-Lottery: Design for Block Producing Algorithm Based on PoS for Scalability. ICOIN 2020: 666-669 - [c75]Hye-Eun Lee, Woonseob Shin, Ki-Hyung Kim:
An Assistant Service for Customers in QR-payment with the Merchant Presented Mode. ICOIN 2020: 682-686 - [c74]Yonghyun Kim, Ki-Hyung Kim, Jai-Hoon Kim:
Power Trading Blockchain using Hyperledger Fabric. ICOIN 2020: 821-824 - [c73]Hyowon Im, Ki-Hyung Kim, Jai-Hoon Kim:
Privacy and Ledger Size Analysis for Healthcare Blockchain. ICOIN 2020: 825-829
2010 – 2019
- 2019
- [c72]Yena Jeong, DongYeop Hwang, Ki-Hyung Kim:
Blockchain-Based Management of Video Surveillance Systems. ICOIN 2019: 465-468 - [c71]JaeSik Cho, DongYeop Hwang, Ki-Hyung Kim:
Improving TDoA Based Positioning Accuracy Using Machine Learning in a LoRaWan Environment. ICOIN 2019: 469-472 - 2018
- [j20]Leandros A. Maglaras, Ki-Hyung Kim, Helge Janicke, Mohamed Amine Ferrag, Stylianos Rallis, Pavlina Fragkou, Athanasios Maglaras, Tiago J. Cruz:
Cyber security of critical infrastructures. ICT Express 4(1): 42-45 (2018) - [j19]Sukho Oh, DongYeop Hwang, Kangseok Kim, Ki-Hyung Kim:
A hybrid mode to enhance the downward route performance in routing protocol for low power and lossy networks. Int. J. Distributed Sens. Networks 14(4) (2018) - [j18]Beenish A. Akram, Ali Hammad Akbar, Ki-Hyung Kim:
CEnsLoc: Infrastructure-Less Indoor Localization Methodology Using GMM Clustering-Based Classification Ensembles. Mob. Inf. Syst. 2018: 3287810:1-3287810:11 (2018) - [j17]Sukho Oh, DongYeop Hwang, Ki-Hyung Kim, Kangseok Kim:
Escalator: An Autonomous Scheduling Scheme for Convergecast in TSCH. Sensors 18(4): 1209 (2018) - [c70]Chan Hyeok Lee, Ki-Hyung Kim:
Implementation of IoT system using block chain with authentication and data protection. ICOIN 2018: 936-940 - [c69]Jin Hyeong Jeon, Ki-Hyung Kim, Jai-Hoon Kim:
Block chain based data security enhanced IoT server platform. ICOIN 2018: 941-944 - [c68]DongYeop Hwang, Jungyong Choi, Ki-Hyung Kim:
Dynamic Access Control Scheme for IoT Devices using Blockchain. ICTC 2018: 713-715 - [c67]Woo-Suk Park, DongYeop Hwang, Ki-Hyung Kim:
A TOTP-Based Two Factor Authentication Scheme for Hyperledger Fabric Blockchain. ICUFN 2018: 817-819 - 2017
- [j16]Jihong Park, Ki-Hyung Kim, Kangseok Kim:
An Algorithm for Timely Transmission of Solicitation Messages in RPL for Energy-Efficient Node Mobility. Sensors 17(4): 899 (2017) - [c66]HaeSung Kim, DongYeop Hwang, Ki-Hyung Kim, Jai-Jin Jung:
Reducing positioning errors in the important access point selection method for fingerprint localization by spatial partitioning. ICOIN 2017: 445-447 - [c65]JungWoon Lee, DongYeop Hwang, Jihong Park, Ki-Hyung Kim:
Risk analysis and countermeasure for bit-flipping attack in LoRaWAN. ICOIN 2017: 549-551 - [c64]SeungJae Na, DongYeop Hwang, Woonseob Shin, Ki-Hyung Kim:
Scenario and countermeasure for replay attack using join request messages in LoRaWAN. ICOIN 2017: 718-720 - [c63]Gebere Akele Tizazu, Ki-Hyung Kim, Abraham Belay Berhe:
Dynamic routing influence on secure enterprise network based on DMVPN. ICUFN 2017: 756-759 - [c62]Eyob Alemu Buba, Ki-Hyung Kim, Abraham Belay Berhe:
MDA approach towards a unified application development framework. ICUFN 2017: 780-784 - [c61]Abraham Belay Berhe, Ki-Hyung Kim, Gebere Akele Tizazu:
Industrial control system security framework for ethiopia. ICUFN 2017: 814-817 - [c60]Mukundwa Chantal, Seok Won Lee, Ki-Hyung Kim:
A Security Analysis and Reinforcement Design Adopting Fingerprints over Drawbacks of Passwords Based Authentication in Remote Home Automation Control System. IEEA 2017: 71-75 - 2016
- [j15]Majid Hussain, Ki-Hyung Kim, Ali Hammad Akbar, Shehzad Khalid, Seung-Jin Bang, Mohsin Javed, Madiha Amjad:
A Gateway Deployment Heuristic for Enhancing the Availability of Sensor Grids. Int. J. Distributed Sens. Networks 12(9): 7595038 (2016) - [j14]HyunSoo Cha, Seung-Wha Yoo, Taekkyeun Lee, Jihong Park, Ki-Hyung Kim:
An entropy-based clustering algorithm for load balancing in WSN. Int. J. Sens. Networks 22(3): 188-196 (2016) - [j13]Hassen Redwan Hussen, Chekka Ramnath Teja, Ting Miao, Kangseok Kim, Ki-Hyung Kim:
Traffic-aware Cooperative Binary Exponential Backoff Algorithm for Low Power and Lossy Networks. Wirel. Pers. Commun. 86(4): 1913-1929 (2016) - 2015
- [c59]Yoona Kim, Ki-Hyung Kim, Taeshik Shon, Jai-Hoon Kim:
A hybrid service discovery approach to mitigate overhead concentration on resource directory. ICOIN 2015: 407-409 - [c58]Shamini Emerson, Young-Kyu Choi, DongYeop Hwang, Kang-Seok Kim, Ki-Hyung Kim:
An OAuth based authentication mechanism for IoT networks. ICTC 2015: 1072-1074 - [c57]Ho-Chul Park, Jihong Park, Ki-Hyung Kim, Kangseok Kim, Gi-Nam Wang:
An efficient generation mechanism of HMI information for heterogeneous PLCs. ICUFN 2015: 46-48 - [c56]Haftu Reda Nigus, Ki-Hyung Kim, Dongyeop Hwang, Hassen Redwan Hussen:
Multi-antenna channel capacity enhancement in wireless communication. ICUFN 2015: 77-82 - [c55]Jinhee Seo, Jihong Park, Young Jun Kim, DongYeop Hwang, Kangseok Kim, Ki-Hyung Kim, Ki-Beon Lee:
An ECDH-based light-weight mutual authentication scheme on local SIP. ICUFN 2015: 871-873 - 2014
- [j12]Faraz Idris Khan, Taeshik Shon, Taekkyeun Lee, Ki-Hyung Kim:
Merkle tree-based wormhole attack avoidance mechanism in low power and lossy network based networks. Secur. Commun. Networks 7(8): 1292-1309 (2014) - [c54]Gebere Akele Tizazu, Hassen Redwan, Ki-Hyung Kim:
Virtual group leader election algorithm in distributed WSN. ICUFN 2014: 143-148 - [c53]Ting Miao, Chekka Ramnath Teja, Ki-Hyung Kim:
GIDPS: A game theory-based IDPS for RPL-networked low power lossy networks with energy limitation. ICUFN 2014: 278-283 - [c52]Hassen Redwan, Gebere Akele Tizazu, Ki-Hyung Kim:
Cluster-based failure detection and recovery scheme in wireless sensor network. ICUFN 2014: 407-412 - [c51]Chekka Ramnath Teja, Ting Miao, Ki-Hyung Kim:
Implementation of adaptive binary exponential backoff (ABEB) algorithm with dynamical sizing buffer for load-balanced RPL. ICUFN 2014: 562-564 - 2013
- [j11]Ali Tufail, Arslan Qamar, Adil Mehmood Khan, Waleed Akram Baig, Ki-Hyung Kim:
WEAMR - A Weighted Energy Aware Multipath Reliable Routing Mechanism for Hotline-Based WSNs. Sensors 13(5): 6295-6318 (2013) - [c50]Sangheum Lee, Taekkyeun Lee, Ki-Hyung Kim, Manpyo Hong:
A fast and efficient wireless AP connection approach based on NFC Tag. ICTC 2013: 1076-1077 - [c49]Faraz Idris Khan, Ki-Hyung Kim:
Q-learning based adaptive subgraph generation algorithm for graph routing in ISA 100.11a. ICTC 2013: 1099-1101 - [c48]Gebere Akele Tizazu, Hassen Redwan Hussen, Ki-Hyung Kim:
Secure session key exchange scheme for Smart Grid Home Area Networks. ICTC 2013: 1116-1120 - 2012
- [j10]Syed Muhammad Asad Zaidi, Jieun Jung, Minsoo Kang, Byunghun Song, Ki-Hyung Kim:
Remote Industrial Sensor Network Monitoring Using M2M Based Ethical Sniffers. Int. J. Distributed Sens. Networks 8 (2012) - [j9]Muhammad Rizwan Butt, Ali Hammad Akbar, Ki-Hyung Kim, Muhammad Mohsin Javed, Chae-Seong Lim, Quratulain Taj:
LABILE: link quAlity-based lexIcaL routing mEtric for reactive routing protocols in IEEE 802.15.4 networks. J. Supercomput. 62(1): 84-104 (2012) - [j8]Ritwik Majumder, Gargi Bag, Ki-Hyung Kim:
Power Sharing and Control in Distributed Generation With Wireless Sensor Networks. IEEE Trans. Smart Grid 3(2): 618-634 (2012) - [c47]Dong Yeop Hwang, Jihong Park, Seung-Wha Yoo, Ki-Hyung Kim:
A window-based overload control considering the number of confirmation Massages for SIP server. ICUFN 2012: 180-185 - [c46]Usman Mehmood, Usman Mansoor, Dong Yeop Hwang, Ki-Hyung Kim, Taekkyeun Lee, Seung-Wha Yoo:
Wireless Sensor Networks for integrated search and rescue efforts for disaster hit areas. ICUFN 2012: 306-309 - [c45]Hayeon Jung, Dong Yeop Hwang, Waleed Akram Baig, Ki-Hyung Kim, Seung-Wha Yoo:
Optimizing time schedule of key updates in ISA100.11a. ICUFN 2012: 434-439 - [c44]Usman Mansoor, Taekkyeun Lee, Usman Mehmood, Ki-Hyung Kim:
Cluster-based AAA architecture for wireless sensor and WiMax networks. ICUIMC 2012: 117:1-117:10 - 2011
- [c43]HyunSoo Cha, Ki-Hyung Kim, Seung-Wha Yoo:
LBP: a secure and efficient network bootstrapping protocol for 6LoWPAN. ICUIMC 2011: 54 - [c42]Yonghoon Chung, Ki-Hyung Kim, Seung-Wha Yoo:
Instant graph routing: lightweight graph generation scheme. ICUIMC 2011: 73 - [c41]Sameer Farooq, Ali Hammad Akbar, Asif Raza, Abdul Waheed, Ki-Hyung Kim:
Application-oriented Re-Clustering and Cluster Head Re-Election scheme for Wireless Sensor Networks. IWCMC 2011: 1087-1092 - 2010
- [j7]Ali Tufail, Syed Ali Khayam, Muhammad Taqi Raza, Amna Ali, Ki-Hyung Kim:
An Enhanced Backbone-Assisted Reliable Framework for Wireless Sensor Networks. Sensors 10(3): 1619-1651 (2010) - [c40]Yonghoon Chung, Ki-Hyung Kim, Seung-Wha Yoo:
Time slot schedule based minimum delay graph in TDMA supported wireless industrial system. CISIM 2010: 265-268 - [c39]Muhammad Taqi Raza, Fatima Muhammad Anwar, Seung-Wha Yoo, Ki-Hyung Kim:
FESP: Fast and Energy Efficient Service Provisioning in 6LoWPAN. PIMRC 2010: 2575-2580 - [c38]Fatima Muhammad Anwar, Muhammad Taqi Raza, Seung-Wha Yoo, Ki-Hyung Kim:
ENUM Based Service Discovery Architecture for 6LoWPAN. WCNC 2010: 1-6 - [p1]Minkoo Kim, We-Duke Cho, Jaeho Lee, Rae Woong Park, Hamid Mukhtar, Ki-Hyung Kim:
Ubiquitous Korea Project. Handbook of Ambient Intelligence and Smart Environments 2010: 1257-1283
2000 – 2009
- 2009
- [j6]Muhammad Taqi Raza, Seung-Wha Yoo, Ki-Hyung Kim, Seong-Soon Joo, Wun-Cheol Jeong:
Design and Implementation of an Architectural Framework for Web Portals in a Ubiquitous Pervasive Environment. Sensors 9(7): 5201-5223 (2009) - [j5]Gargi Bag, Muhammad Taqi Raza, Ki-Hyung Kim, Seung-Wha Yoo:
LoWMob: Intra-PAN Mobility Support Schemes for 6LoWPAN. Sensors 9(7): 5844-5877 (2009) - [j4]Muhammad Taqi Raza, Gargi Bag, Seung-Wha Yoo, Ki-Hyung Kim:
Dead reckoning based target tracking in wireless sensor networks. SIGBED Rev. 6(3): 1 (2009) - [c37]Kang-Myo Kim, Hamid Mukhtar, Ki-Hyung Kim:
Remote Configuration Mechanism for IP Based Ubiquitous Sensor Networks. APNOMS 2009: 423-426 - [c36]Gargi Bag, S. M. Saif Shams, Ali Hammad Akbar, Muhammad Taqi Raza, Ki-Hyung Kim, Seung-Wha Yoo:
Network Assisted Mobility Support for 6LoWPAN. CCNC 2009: 1-5 - [c35]Muhammad Taqi Raza, Ryu Jeatek, Seung-Wha Yoo, Ki-Hyung Kim, Seong-Soon Joo, Wun-Cheol Jeong:
An Architectural Framework for Web Portal in Ubiquitous Pervasive Environment. CNSR 2009: 102-109 - [c34]Rabia Riaz, Ki-Hyung Kim, H. Farooq Ahmed:
Security analysis survey and framework design for IP connected LoWPANs. ISADS 2009: 29-34 - [c33]Muhammad Ikram, Aminul Haque Chowdhury, Bilal Zafar, Hyon-Soo Cha, Ki-Hyung Kim, Seung-Wha Yoo, Dong-Kyoo Kim:
A simple lightweight authentic bootstrapping protocol for IPv6-based low rate wireless personal area networks (6LoWPANs). IWCMC 2009: 937-941 - [c32]Aminul Haque Chowdhury, Muhammad Ikram, Hyon-Soo Cha, Hassen Redwan, S. M. Saif Shams, Ki-Hyung Kim, Seung-Wha Yoo:
Route-over vs mesh-under routing in 6LoWPAN. IWCMC 2009: 1208-1212 - [c31]Ayesha Naureen, Attiya Akram, Rabia Riaz, Ki-Hyung Kim, H. Farooq Ahmed:
A Comparative Analysis of PKC and Semi-PKC Based Key Management Schemes for Hierarchical Sensor Networks. ISA 2009: 692-701 - 2008
- [j3]Rabia Riaz, Ayesha Naureen, Attiya Akram, Ali Hammad Akbar, Ki-Hyung Kim, H. Farooq Ahmed:
A unified security framework with three key management schemes for wireless sensor networks. Comput. Commun. 31(18): 4269-4280 (2008) - [j2]Muhammad Taqi Raza, Zeeshan Hameed Mir, Ali Hammad Akbar, Seung-Wha Yoo, Ki-Hyung Kim:
Adaptive Yaw Rate Aware Sensor Wakeup Schemes Protocol (A-YAP) for Target Prediction and Tracking in Sensor Networks. IEICE Trans. Commun. 91-B(11): 3524-3533 (2008) - [c30]Wang-Boo Jeong, Young-Ho Sohn, Hyun-Gon Suh, Ki-Hyung Kim:
Effective Superpeer Control Messages for P2P Virtual Network in MANET. ALPIT 2008: 466-470 - [c29]Aminul Haque Chowdhury, Muhammad Ikram, Ki-Hyung Kim:
Secure and Survivable Group Communication over MANET Using CRTDH Based on a Virtual Subnet Model. APSCC 2008: 638-643 - [c28]Ali Tufail, Mike Fraser, Ali Hammad Akbar, Ki-Hyung Kim, Seung-Wha Yoo:
An empirical study to analyze the feasibility of WIFI for VANETs. CSCWD 2008: 553-558 - [c27]Hassen Redwan, Ki-Hyung Kim:
Survey of Security Requirements, Attacks and Network Integration in Wireless Mesh Networks. FCST 2008: 3-9 - [c26]Mustafa Hasan, Ali Hammad Akbar, Hamid Mukhtar, Ki-Hyung Kim, Dong-Wha Kim:
A scheme to support mobility for IP based sensor networks. Infoscale 2008: 5 - [c25]Muhammad Ikram, Aminul Haque Chowdhury, Hassen Redwan, Jong-bin Koh, Ki-Hyung Kim, Dong-Kyoo Kim:
A Lightweight Mutual Authentication Scheme for Mobile Radio Frequency IDentification (mRFID) Systems. IPCCC 2008: 289-296 - [c24]Aminul Haque Chowdhury, Ki-Hyung Kim:
A survey of flash memory design and implementation of database in flash memory. ISKE 2008: 1256-1259 - [c23]Hamid Mukhtar, Kang-Myo Kim, Shafique Ahmad Chaudhry, Ali Hammad Akbar, Ki-Hyung Kim, Seung-Wha Yoo:
LNMP- Management architecture for IPv6 based low-power wireless Personal Area Networks (6LoWPAN). NOMS 2008: 417-424 - [c22]Hassen Redwan, Ki-Hyung Kim:
Survey of Security Requirements, Attacks and Network Integration in Wireless Mesh Networks. NTMS 2008: 1-5 - [c21]Ayesha Naureen, Attiya Akram, Tariq Maqsood, Rabia Riaz, Ki-Hyung Kim, H. Farooq Ahmed:
Performance and Security Assessment of a PKC Based Key Management Scheme for Hierarchical Sensor Networks. VTC Spring 2008: 163-167 - 2007
- [j1]Shafique Ahmad Chaudhry, Ali Hammad Akbar, Ki-Hyung Kim:
On the Interplay of Service Proximity and Ubiquity. IEICE Trans. Commun. 90-B(12): 3470-3479 (2007) - 2006
- [c20]Shafique Ahmad Chaudhry, Faysal Adeem Siddiqui, Ali Hammad Akbar, Ki-Hyung Kim:
NETSAQ: Network State Adaptive QoS Provisioning for MANETs. APNOMS 2006: 170-179 - [c19]Dongkyun Kim, Joungsik Kim, Ki-Hyung Kim:
An energy-efficient data gathering technique using multiple paths in wireless sensor networks. CCNC 2006: 346-350 - [c18]Shafique Ahmad Chaudhry, Ali Hammad Akbar, Ki-Hyung Kim, Suk-Kyo Hong, Won-Sik Yoon:
HYWINMARC: An Autonomic Management Architecture for Hybrid Wireless Networks. EUC Workshops 2006: 193-202 - [c17]Shafique Ahmad Chaudhry, Won-Do Jung, Chaudhary Sajjad Hussain, Ali Hammad Akbar, Ki-Hyung Kim:
A Proxy-Enabled Service Discovery Architecture to Find Proximity-Based Services in 6LoWPAN. EUC 2006: 956-965 - [c16]Shafique Ahmad Chaudhry, Ali Hammad Akbar, Faisal Siddiqui, Ki-Hyung Kim:
Autonomic Network Management for Wireless Mesh and MANETs. IWSOS/EuroNGI 2006: 259 - [c15]Ali Hammad Akbar, Ahmad Ali Iqbal, Ki-Hyung Kim:
Binding Multiple Applications on Wireless Sensor Networks. GPC 2006: 250-258 - [c14]Ali Hammad Akbar, Ki-Hyung Kim, Seung-Jin Bang, Waleed Mansoor, Won-Sik Yoon:
Availability Considerations for Wireless Sensor Grids. GPC 2006: 269-278 - [c13]Won-Do Jung, Shafique Ahmad Chaudhry, Young-Ho Sohn, Ki-Hyung Kim:
Route Error Reporting Schemes for On-Demand Routing in 6LoWPAN. GPC 2006: 517-526 - [c12]Ki-Hyung Kim, Ali Hammad Akbar:
Are Low PANs a PAN or an Internet of PANs? GPC 2006: 527-536 - [c11]Shafique Ahmad Chaudhry, Won-Do Jung, Ali Hammad Akbar, Ki-Hyung Kim:
Proxy-Based Service Discovery and Network Selection in 6LoWPAN. HPCC 2006: 525-534 - [c10]Ali Hammad Akbar, Ki-Hyung Kim, Shaokai Yu, Won-Sik Yoon:
On the Effect of Heterogeneous Traffic Sources on the Network Availability for Wireless Sensor Grids. International Conference on Computational Science (2) 2006: 1073-1080 - [c9]Ali Hammad Akbar, Ki-Hyung Kim, Won-Do Jung, Ali Kashif Bashir, Seung-Wha Yoo:
GARPAN: Gateway-Assisted Inter-PAN Routing for 6LoWPANs. ICCSA (2) 2006: 186-194 - [c8]Shoaib Mukhtar, Ali Hammad Akbar, Shafique Ahmad Chaudhry, Won-Sik Yoon, Ki-Hyung Kim, Suk-Kyo Hong:
Mitigating Broadcast Storms in Stateless Address Auto-configuring MANETs. ICCSA (2) 2006: 847-855 - 2005
- [c7]Hyun-Gon Seo, Ki-Hyung Kim, Won-Do Jung, Jun-Sung Park, Seung-Hwan Jo, Chang-Min Shin, Seung-Min Park, Heung-Nam Kim:
Performance of Service Location Protocols in MANET Based on Reactive Routing Protocols. ICN (2) 2005: 234-241 - [c6]Hyun-Gon Seo, Ki-Hyung Kim:
Design of a Service Discovery Architecture for Mobility-Supported Wired and Wireless Networks. ICN (2) 2005: 1106-1113 - [c5]Ki-Hyung Kim, Won-Do Jung, Jun-Sung Park, Hyun-Gon Seo, Seung-Hwan Jo, Chang-Min Shin, Seung-Min Park, Heung-Nam Kim:
A Resilient Multipath Routing Protocol for Wireless Sensor Networks. ICN (2) 2005: 1122-1129 - 2004
- [c4]Ki-Hyung Kim, Sang-Ryoul Han:
Mapping Cooperating GRID Applications by Affinity for Resource Characteristics. AIS 2004: 313-322 - [c3]Ki-Hyung Kim, Won-Seok Kang:
A Web Services-Based Distributed Simulation Architecture for Hierarchical DEVS Models. AIS 2004: 370-379 - [c2]Ki-Hyung Kim, Won-Seok Kang:
CORBA-Based, Multi-threaded Distributed Simulation of Hierarchical DEVS Models: Transforming Model Structure into a Non-hierarchical One. ICCSA (4) 2004: 167-176 - [c1]Hyun-Gon Seo, Ki-Hyung Kim:
Mobility Agent Advertisement Mechanism for Supporting Mobile IP in Ad Hoc Networks. SAPIR 2004: 187-196
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:03 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint