Search results for: Kijoon Chae
Wireless Personal Communications > 2017 > 97 > 1 > 1-17
Lecture Notes in Computer Science > Computational Science and Its Applications - ICCSA 2006 > Workshop on Data Storage Devices and Systems (DSDS 2006) > 1072-1079
Lecture Notes in Computer Science > Information Security Applications > DRM/Information Hiding/Ubiquitous Computing Security/P2P Security > 267-281
Lecture Notes in Computer Science > Information Networking. Advances in Data Communications and Wireless Networks > Ad Hoc Sensor Networks > 317-326
Lecture Notes in Computer Science > Information Networking > Enhanced Protocols in Internet > 346-356
Lecture Notes in Computer Science > Computational Science and Its Applications – ICCSA 2004 > Authentication Authorization Accounting (AAA) Workshop > 673-682
Lecture Notes in Computer Science > Software Technologies for Embedded and Ubiquitous Systems > Middleware Architectures and Virtualization > 466-476
Lecture Notes in Computer Science > Computational Science and Its Applications - ICCSA 2006 > Workshop on Ubiquitous Application and Security Service (UASS 2006) > 440-447
Lecture Notes in Computer Science > Computational Science and Its Applications – ICCSA 2005 > Authentication Authorization Accounting (AAA) Workshop > 591-600
Lecture Notes in Computer Science > Information Networking. Networking Technologies for Broadband and Mobile Networks > Security > 943-950
Lecture Notes in Computer Science > Computational Science and Its Applications — ICCSA 2003 > Mobile Computing: Authentication Technology > 210-219
Lecture Notes in Computer Science > Information Networking. Convergence in Broadband and Mobile Networking > Security III > 843-852
Lecture Notes in Computer Science > Advanced Web and Network Technologies, and Applications > International Workshop on Sensor Networks (IWSN 2006) > 335-344
Lecture Notes in Computer Science > Computational Science – ICCS 2006 > Wireless and Mobile Systems > 1024-1032