Search results for: Mihui Kim
Lecture Notes in Computer Science > Intelligent Information and Database Systems > Intelligent Cloud Computing and Security (ICCS 2011) > 382-391
Lecture Notes in Computer Science > Computational Science and Its Applications - ICCSA 2011 > Workshop on Mobile Communications (MC 2011) > 193-204
Lecture Notes in Computer Science > Information Security Applications > DRM/Information Hiding/Ubiquitous Computing Security/P2P Security > 267-281
Lecture Notes in Computer Science > Computational Science and Its Applications – ICCSA 2004 > Authentication Authorization Accounting (AAA) Workshop > 673-682
Lecture Notes in Computer Science > Software Technologies for Embedded and Ubiquitous Systems > Middleware Architectures and Virtualization > 466-476
Lecture Notes in Computer Science > Computational Science and Its Applications – ICCSA 2005 > Authentication Authorization Accounting (AAA) Workshop > 591-600
Lecture Notes in Computer Science > Information Networking. Networking Technologies for Broadband and Mobile Networks > Security > 943-950
Lecture Notes in Computer Science > Information Networking. Convergence in Broadband and Mobile Networking > Security III > 843-852
Lecture Notes in Computer Science > Computational Science – ICCS 2006 > Wireless and Mobile Systems > 1024-1032
Lecture Notes in Computer Science > Computational Science and Its Applications - ICCSA 2011 > Workshop on Mobile Sensor and Its Applications (MSA 2011) > 173-184
Ad Hoc Networks > 2016 > 39 > C > 45-55
Communications in Computer and Information Science > Ubiquitous Computing and Multimedia Applications > 165-174
2013 International Conference on ICT Convergence (ICTC) > 1121 - 1124
International Journal of Network Management > 23 > 3 > 155 - 171
Ad Hoc Networks > 2012 > 10 > 3 > 299-316
Computer Communications > 2011 > 34 > 4 > 567-576