default search action
Kijoon Chae
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j27]Gabin Heo, Kijoon Chae, Inshil Doh:
Hierarchical Blockchain-Based Group and Group Key Management Scheme Exploiting Unmanned Aerial Vehicles for Urban Computing. IEEE Access 10: 27990-28003 (2022) - [j26]Dana Yang, Inshil Doh, Kijoon Chae:
Cell Based Raft Algorithm for Optimized Consensus Process on Blockchain in Smart Data Market. IEEE Access 10: 85199-85212 (2022) - 2021
- [j25]Gabin Heo, Dana Yang, Inshil Doh, Kijoon Chae:
Efficient and Secure Blockchain System for Digital Content Trading. IEEE Access 9: 77438-77450 (2021) - [j24]Dana Yang, Seohee Yoo, Inshil Doh, Kijoon Chae:
Selective blockchain system for secure and efficient D2D communication. J. Netw. Comput. Appl. 173: 102817 (2021) - [c59]Donghee Kim, Inshil Doh, Kijoon Chae:
Improved Raft Algorithm exploiting Federated Learning for Private Blockchain performance enhancement. ICOIN 2021: 828-832 - 2020
- [j23]Nishat I. Mowla, Nguyen Hoang Tran, Inshil Doh, Kijoon Chae:
Federated Learning-Based Cognitive Detection of Jamming Attack in Flying Ad-Hoc Network. IEEE Access 8: 4338-4350 (2020) - [j22]Nishat I. Mowla, Nguyen Hoang Tran, Inshil Doh, Kijoon Chae:
AFRL: Adaptive federated reinforcement learning for intelligent jamming defense in FANET. J. Commun. Networks 22(3): 244-258 (2020) - [c58]Dana Yang, Sol Jeon, Inshil Doh, Kijoon Chae:
Randomly Elected Blockchain System based on Grouping Verifiers for Efficiency and Security. ICACT 2020: 159-165 - [c57]Gabin Heo, Dana Yang, Inshil Doh, Kijoon Chae:
Design of Blockchain System for Protection of Personal Information in Digital Content Trading Environment. ICOIN 2020: 152-157
2010 – 2019
- 2019
- [j21]Nishat I. Mowla, Inshil Doh, Kijoon Chae:
On-Device AI-Based Cognitive Detection of Bio-Modality Spoofing in Medical Cyber Physical System. IEEE Access 7: 2126-2137 (2019) - [c56]Nishat I. Mowla, Inshil Doh, Kijoon Chae:
SEFL: Selective Ensemble Fuzzy Learner for Cognitive Detection of Bio-Modality Spoofing in MCPS. ICACT 2019: 1153-1158 - [c55]Nishat I. Mowla, Inshil Doh, Kijoon Chae:
Binarized Multi-Factor Cognitive Detection of Bio-Modality Spoofing in Fog Based Medical Cyber-Physical System. ICOIN 2019: 43-48 - 2018
- [j20]Nishat I. Mowla, Inshil Doh, Kijoon Chae:
CSDSM: Cognitive switch-based DDoS sensing and mitigation in SDN-driven CDNi word. Comput. Sci. Inf. Syst. 15(1): 163-185 (2018) - [c54]Nishat I. Mowla, Inshil Doh, Kijoon Chae:
Selective fuzzy ensemble learner for cognitive detection of bio-identifiable modality spoofing in MCPS. ICACT 2018: 63-67 - [c53]Dana Yang, Inshil Doh, Kijoon Chae:
Secure medical image-sharing mechanism based on visual cryptography in EHR system. ICACT 2018: 463-467 - [c52]Shi Li, Inshil Doh, Kijoon Chae:
NRIT: Non-redundant indirect trust search algorithm for a cross-domain based CDNi-P2P architecture. ICACT 2018: 992-998 - [c51]Nishat I. Mowla, Inshil Doh, Kijoon Chae:
Evolving neural network intrusion detection system for MCPS. ICACT 2018: 1040-1045 - [c50]Seohee You, Dana Yang, Inshil Doh, Kijoon Chae:
Authorization based on mobile whitelist in devices for device-to-device communications. ICOIN 2018: 706-711 - [c49]Sol Jeon, Inshil Doh, Kijoon Chae:
RMBC: Randomized mesh blockchain using DBFT consensus algorithm. ICOIN 2018: 712-717 - [c48]Jiyoung Lim, Inshil Doh, Kijoon Chae:
Dynamic Group Key Management for Efficient Fog Computing. IMIS 2018: 685-694 - 2017
- [j19]Jiyoung Lim, Inshil Doh, Kijoon Chae:
Secure and structured IoT smart grid system management. Int. J. Web Grid Serv. 13(2): 170-185 (2017) - [j18]Xinyi Chen, Kyung Choi, Kijoon Chae:
A Secure and Efficient Key Authentication using Bilinear Pairing for NFC Mobile Payment Service. Wirel. Pers. Commun. 97(1): 1-17 (2017) - [c47]Dana Yang, Inshil Doh, Kijoon Chae:
Enhanced password processing scheme based on visual cryptography and OCR. ICOIN 2017: 254-258 - [c46]Jiyoung Lim, Inshil Doh, Kijoon Chae:
Lightweight Authentication for Distributed Mobile P2P Communications. IMIS 2017: 580-589 - 2016
- [j17]Jiyoung Lim, Inshil Doh, Kijoon Chae:
Security system architecture for data integrity based on a virtual smart meter overlay in a smart grid system. Soft Comput. 20(5): 1829-1840 (2016) - [c45]Shi Li, Inshil Doh, Kijoon Chae:
An anonymous IP-based privacy protection routing mechanism for CDNi. ICOIN 2016: 75-80 - [c44]Nishat I. Mowla, Inshil Doh, Kijoon Chae:
Securing information flow in content delivery networks with visual and quantum cryptography. ICOIN 2016: 463-468 - [c43]Jiyoung Lim, Inshil Doh, Kijoon Chae:
Authentication for Mobile Open IPTV Service Security. IMIS 2016: 381-385 - [c42]Shi Li, Inshil Doh, Kijoon Chae:
A Group Authentication Scheme Based on Lagrange Interpolation Polynomial. IMIS 2016: 386-391 - 2015
- [j16]Inshil Doh, Kijoon Chae, Jiyoung Lim, Min Young Chung:
Authentication and Key Management Based on Kerberos for M2M Mobile Open IPTV Security. Intell. Autom. Soft Comput. 21(4): 543-558 (2015) - [c41]Nishat I. Mowla, Inshil Doh, Kijoon Chae:
An efficient defense mechanism for spoofed IP attack in SDN based CDNi. ICOIN 2015: 92-97 - [c40]Shi Li, Inshil Doh, Kijoon Chae:
Key management mechanism in ALTO/SDN based CDNi architecture. ICOIN 2015: 110-115 - [c39]Inshil Doh, Jiyoung Lim, Kijoon Chae:
Secure Authentication for Structured Smart Grid System. IMIS 2015: 200-204 - 2014
- [j15]Shi Li, Kyung Choi, Kijoon Chae:
OCPM: Ortho code privacy mechanism in smart grid using ring communication architecture. Ad Hoc Networks 22: 93-108 (2014) - [j14]Inshil Doh, Jiyoung Lim, Shi Li, Kijoon Chae:
Pairwise and group key setup mechanism for secure machine-to-machine communication. Comput. Sci. Inf. Syst. 11(3): 1071-1090 (2014) - [c38]Kyung Choi, Kijoon Chae:
Data aggregation using temporal and spatial correlations in Advanced Metering Infrastructure. ICOIN 2014: 541-544 - [c37]Inshil Doh, Jiyoung Lim, Kijoon Chae:
Service Security for Smart Grid System. IMIS 2014: 427-432 - [c36]Nishat I. Mowla, Inshil Doh, Kijoon Chae:
Multi-defense Mechanism against DDoS in SDN Based CDNi. IMIS 2014: 447-451 - 2013
- [j13]Inshil Doh, Jiyoung Lim, Kijoon Chae:
Key management approach for secure mobile open IPTV service. Comput. Sci. Inf. Syst. 10(2): 843-864 (2013) - [j12]Kyung Choi, Mihui Kim, Kijoon Chae:
Secure and Lightweight Key Distribution with ZigBee Pro for Ubiquitous Sensor Networks. Int. J. Distributed Sens. Networks 9 (2013) - [j11]Inshil Doh, Jiyoung Lim, Kijoon Chae:
Code updates based on minimal backbone and group key management for secure sensor networks. Math. Comput. Model. 57(11-12): 2801-2813 (2013) - [c35]Shi Li, Kyung Choi, Kijoon Chae:
An enhanced measurement transmission scheme for privacy protection in smart grid. ICOIN 2013: 18-23 - [c34]Inshil Doh, Jiyoung Lim, Shi Li, Kijoon Chae:
Key Establishment and Management for Secure Cellular Machine-to-Machine Communication. IMIS 2013: 579-584 - [c33]Inshil Doh, Jiyoung Lim, Kijoon Chae:
Secure Aggregation and Attack Detection for Smart Grid System. NBiS 2013: 270-275 - 2012
- [c32]Kyung Choi, Minjung Yun, Kijoon Chae, Mihui Kim:
An enhanced key management using ZigBee Pro for wireless sensor networks. ICOIN 2012: 399-403 - [c31]Inshil Doh, Kijoon Chae, Jiyoung Lim, Min Young Chung:
An Improved Security Approach Based on Kerberos for M2M Open IPTV System. NBiS 2012: 754-759 - 2011
- [j10]Inshil Doh, Jiyoung Lim, Kijoon Chae:
Distributed authentication mechanism for secure channel establishment in ubiquitous medical sensor networks. Mob. Inf. Syst. 7(3): 189-200 (2011) - [c30]Phuong Luu Vo, Nguyen Hoang Tran, Choong Seon Hong, Kijoon Chae:
A joint congestion control, routing, and scheduling algorithm in multihop wireless networks with heterogeneous flows. ICOIN 2011: 347-351 - [c29]Jisun Kim, Jiyoung Lim, Kijoon Chae:
Secure Code Dissemination Using Energy-Efficient Minimal Virtual Backbone in Sensor Networks. IMIS 2011: 341-346 - 2010
- [j9]Mihui Kim, Yukyong Jung, Kijoon Chae:
Adaptive Data Mining Approach for Flow Redirection in Multihomed Mobile Router. Int. J. Inf. Technol. Decis. Mak. 9(5): 737-758 (2010) - [j8]Mihui Kim, Kijoon Chae:
DMP: Detouring Using Multiple Paths against Jamming Attack for Ubiquitous Networking System. Sensors 10(4): 3626-3640 (2010) - [c28]Jisun Kim, Jiyoung Lim, Kijoon Chae:
Energy-Efficient Code Dissemination Using Minimal Virtual Backbone in Sensor Networks. BWCCA 2010: 149-154
2000 – 2009
- 2009
- [j7]Hayoung Oh, Inshil Doh, Kijoon Chae:
Attack Classification Based on Data Mining Technique and Its Application for Reliable Medical Sensor Communication. Int. J. Comput. Sci. Appl. 6(3): 20-32 (2009) - [j6]Hayoung Oh, Inshil Doh, Kijoon Chae:
A Fault Management and Monitoring Mechanism for Secure Medical Sensor Network. Int. J. Comput. Sci. Appl. 6(3): 43-56 (2009) - [j5]Kyung Choi, Mihui Kim, Kijoon Chae, Jong-Jun Park, Seong-Soon Joo:
An efficient data fusion and assurance mechanism using temporal and spatial correlations for home automation networks. IEEE Trans. Consumer Electron. 55(3): 1330-1336 (2009) - 2008
- [c27]Hayoung Oh, Kijoon Chae:
A secure and delay-efficient scheme for NetLMM. Mobility Conference 2008: 62 - [c26]Hayoung Oh, Kijoon Chae:
An Abnormal Area Scanning for Scalable and Energy-Efficient and Secure SensorNet Management. MUE 2008: 592-596 - 2007
- [c25]Hayoung Oh, Kijoon Chae:
An Energy-Efficient Sensor Routing with low latency, scalability in Wireless Sensor Networks. MUE 2007: 147-152 - [c24]Mihui Kim, Jaewon Seo, Kijoon Chae:
Integrated Notification Architecture Based on Overlay Against DDoS Attacks on Convergence Network. SEUS 2007: 466-476 - 2006
- [j4]Mihui Kim, Kijoon Chae:
Proactive Defense Mechanism against IP Spoofing Traffic on a NEMO Environment. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 89-A(7): 1959-1967 (2006) - [c23]Inshil Doh, Kijoon Chae:
Key Establishment and Authentication Mechanism for Secure Sensor Networks. APWeb Workshops 2006: 335-344 - [c22]Inshil Doh, Jung Min Park, Kijoon Chae:
Pairwise Key Setup and Authentication Utilizing Deployment Information for Secure Sensor Network. HPCC 2006: 280-289 - [c21]Mihui Kim, Kijoon Chae:
Overlapped Detection Via Approximate Entropy Estimation Against Flooding Attack in Mobile Sensor Networks. International Conference on Computational Science (2) 2006: 1024-1032 - [c20]Hayoung Oh, Jiyoung Lim, Kijoon Chae, Jung-Chan Na:
Home Gateway with Automated Real-Time Intrusion Detection for Secure Home Networks. ICCSA (4) 2006: 440-447 - [c19]Myungjin Lee, Hyokyung Bahn, Kijoon Chae:
A New Key Management Scheme for Distributed Encrypted Storage Systems. ICCSA (1) 2006: 1072-1079 - [c18]Inshil Doh, Kijoon Chae, Howon Kim, Kyoil Chung:
Security Enhancement Mechanism for Ad-Hoc OLSR Protocol. ICOIN 2006: 317-326 - [c17]Mihui Kim, Inshil Doh, Kijoon Chae:
A Key Management Based on Multiple Regression in Hierarchical Sensor Network. WISA 2006: 267-281 - 2005
- [j3]Hayoung Oh, Hyokyung Bahn, Ki-Joon Chae:
An energy-efficient sensor routing scheme for home automation networks. IEEE Trans. Consumer Electron. 51(3): 836-839 (2005) - [c16]Yuseung Sohn, Misung Cho, Giwon On, Kijoon Chae:
A Secure User Authentication Method in Networked Intelligent Manufacturing Systems. CW 2005: 123-129 - [c15]Mihui Kim, Eunah Kim, Kijoon Chae:
A Scalable Mutual Authentication and Key Distribution Mechanism in a NEMO Environment. ICCSA (1) 2005: 591-600 - [c14]Mihui Kim, Kijoon Chae:
A Fast Defense Mechanism Against IP Spoofing Traffic in a NEMO Environment. ICOIN 2005: 843-852 - [p1]Inshil Doh, Hayoung Oh, Kijoon Chae:
Cluster-based Security Mechanism for Sensor Network Communication. New Trends in Computer Networks 2005 - 2004
- [c13]Mihui Kim, Kijoon Chae:
Detection and Identification Mechanism against Spoofed Traffic Using Distributed Agents. ICCSA (1) 2004: 673-682 - [c12]Mihui Kim, Hyunjung Na, Kijoon Chae, Hyochan Bang, Jung-Chan Na:
A Combined Data Mining Approach for DDoS Attack Detection. ICOIN 2004: 943-950 - [e1]Kijoon Chae, Moti Yung:
Information Security Applications, 4th International Workshop, WISA 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers. Lecture Notes in Computer Science 2908, Springer 2004, ISBN 3-540-20827-5 [contents] - 2003
- [c11]Eun-Kyeong Kwon, Yong-Gu Cho, Kijoon Chae:
Refundable Electronic Cash for Mobile Commerce. Human.Society@Internet 2003 2003: 644-649 - [c10]Jung Min Park, Min-Jung Jin, Kijoon Chae:
Secure Firewall Traversal in Mobile IP Network. International Conference on Computational Science 2003: 535-544 - [c9]Jung Min Park, Eun-Hui Bae, Hye-Jin Pyeon, Kijoon Chae:
A Ticket-Based AAA Security Mechanism in Mobile IP Network. ICCSA (2) 2003: 210-219 - [c8]Jiyoung Lim, Ok-kyeung Kim, Yeo-Jin Kim, Ga-Jin Na, Hyunjung Na, Kijoon Chae, Young-Soo Kim, Jung-Chan Na:
Design of Security Enforcement Engine for Active Nodes in Active Networks. ICOIN 2003: 346-356 - 2002
- [j2]Won Kim, Ki-Joon Chae, Dong-Sub Cho, Byoungju Choi, Anmo Jeong, Myung Kim, Kiho Lee, Meejeong Lee, Sang-Ho Lee, Seung-Soo Park, Hwan-Seung Yong:
The Chamois Component-Based Knowledge Engineering Framework. Computer 35(5): 46-54 (2002) - [j1]Won Kim, Ki-Joon Chae, Dong-Sub Cho, Byoungju Choi, Anmo Jeong, Myung Kim, Kiho Lee, Meejeong Lee, Minsoo Lee, Sang-Ho Lee, Seung-Soo Park, Hwan-Seung Yong, Ho-Sook Kim, Jung-Won Lee, Wol-Young Lee:
The Chamois Reconfigurable Data-Mining Architecture. J. Object Technol. 1(2): 21-33 (2002) - [c7]Jiyoung Lim, Ki-Joon Chae:
Flow Admission Control for MPLS Support of DiffServ. ICOIN (1) 2002: 480-493 - 2001
- [c6]Eun-Kyeong Kwon, Yong-Gu Cho, Ki-Joon Chae:
Security Enhancement on Mobile Commerce. Human.Society@Internet 2001: 164-176 - [c5]Eun-Kyeong Kwon, Yong-Gu Cho, Ki-Joon Chae:
Integrated Transport Layer Security: End-to-End Security Model between WTLS and TLS. ICOIN 2001: 65-71 - [c4]Jiyoung Lim, Ki-Joon Chae:
Differentiated Link Based QoS Routing Algorithms for Multimedia Traffic in MPLS Networks. ICOIN 2001: 587-592 - 2000
- [c3]Sunnie Chung, Kijoon Chae:
An Efficient Public-key Based Authentication with Mobile-IP in E-commerce. PDPTA 2000
1990 – 1999
- 1999
- [c2]Jiyoung Lim, Mi-Hee Kim, Ki-Joon Chae:
Predictive and Adaptive Bandwidth Reservation Strategies in Wireless Networks. PDPTA 1999: 121-127 - 1990
- [c1]Kijoon Chae, Arne A. Nilsson:
Performance evaluation of FDDI network and interconnected heterogeneous networks. LCN 1990: 75-83
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:38 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint