[1]

Kijoon Chae, Arne A. Nilsson, "Performance Evaluation of FDDI Network and Interconnected Heterogeneous Networks," Proceedings of IEEE 15th Conf. on Local Computer Networks, pp. 75-83, Oct. 1990.

[2]

Kijoon Chae, Arne A. Nilsson, "Performance Analysis of Prioritized Token Ring," Proceedings of IEEE 34th Midwest Symposium on Circuits and Systems, pp. 447-450, May. 1991.

[3]

C. S. Kang, E. K. Park, C. S. Kang, Kijoon Chae, James H. Herzog, "Design of a Network Interface Adapter for Hybrid-LANs," Proceedings of IEEE 34th Midtwest Symposium on Circuits and Sysrems, pp. 455-458, May. 1991.

[4]

Kijoon Chae, E. K. Park, C. S. Kang, "End-to-End Delay of Interconnected Local Area Networks," Proceedings of 4th ISMM/IASTED Int. Conf. on Parallel & Distributed Computing & Systems, pp. 15-19, Oct. 1991.

[5]

E. K. Park, Kijoon Chae, C. S. Kang, "The Structured Prototyping Life Cycle Model for System Development Management," Proceedings of IEEE/ACM Int. Conf. on Developing and Managing Expert System Programs, pp. 267-272, Oct. 1991.

[6]

Eunkyoung Kwon, Yonggu Cho, Kijoon Chae, "Implementation of Integrated EDI service through a gateway between X.400 and E-mail," Proceedings of The 13th International Conference on Information Networking (ICOIN-13), pp. 10B-2.1-10B-2.7, Jan. 1999.

[7]

Jiyoung Lim, Mihui Kim, Kijoon Chae, "Predictive and Adaptive Bandwidth Reservation Strategies in Wireless Networks," Proceedings of The International Conference on Parallel and Distributed Processing Techniques and pplications(PDPTA'99), pp. 121-127, Jun. 1999.

[8]

Sunnie Chung, Kijoon Chae, "An Efficient Public-Key based Authentication with Mobile-IP in E-commerce," Proceedings of The International Conference on Parallel and Distributed Processing Techniques and Applications(PDPTA'2000), pp. 2825-2831, Jun. 2000.

[9]

Jiyoung Lim, Kijoon Chae, "Differentiated Link Based QoS Routing Algorithms for Multimedia Traffic in MPLS Networks," Proceedings of The 15th International Conference On Infrormation Networking, pp. 65-71, Feb. 2001.

[10]

Eunkyeong Kwon, Yonggu Cho, Kij oon Chae, "Integrated Transport Layer Security : End-to-End Security Model between WTLS and TLS," Proceedings of The 15th International Conference On Infrormation Networking, pp. 587-592, Feb. 2001.

[11]

Sooyeon Yoo, Kijoon Chae, "Efficient Transmission of Multimedia Data using IntServ and DiffServ," Proceedings of The International Conference on Parallel and Distributed Processing Techniques and Applications(PDPTA'2001), pp. 1352-1358, Jun. 2001.

[12]

Seunghee Oh, Kijoon Chae, "Performance Evaluation of VPN Protocols on Testbed," Proceedings of The International Conference on Parallel and Distributed Processing Techniques and Applications(PDPTA'2001), pp. 2049-2054, Jun. 2001.

[13]

Eunkyeong Kwon, Yonggu Cho, Kijoon Chae, "Design of Layered Electronic Purse Protocol on a payable WAP phone," The 3rd International Workshop on Information Security Applicaions, pp.333-345, Aug. 2002.

[14]

Mihui Kim, Kijoon Chae, "Dynamic VLAN Registration Mechanism for Multi-Layer VLAN using the extension of GVRP," ITC-CSCC2003, 2003-07-07.

[15]

Mihui Kim, Kijoon Chae, "Dynamic VLAN Registration Mechanism on EoMPLS," APCC2003, 2003-9-21.

[16]

Mihui Kim, Kijoon Chae, "Ubiquitous Authentication and Key Distribution Mechanism without Trusted Third Party in Mobile Network," ITC-CSCC2004, 2004-07-08.

[17]

Mihui Kim, Kijoon Chae, "Providing Scalable Security Support for a NEMO Environment," ICWES13, 2005-08-27.

[18]

Inshil Doh, Hayoung Oh, Kijoon Chae, "Cluster-based Security Mechanism for Sensor Network Communication," International Symposium on Computer and Information Sciences(ISCIS'05), pp.175-189,Oct. 2005.

[19]

Yuseung Sohn, Misung Cho, Giwon On, Kijoon Chae, "A Secure User Authentication Method in Networked Intelligent Manufacturing Systems," 4th International Conference on Cyberworlds (CW 2005), pp.123-129. Nov. 2005.

[20]

Inshil Doh, Mihui Kim, Kijoon Chae, "Pairwise Key Establishment Mechanism based on Clustering for Secure Sensor Network," IEEE International Conference on Advanced Communication Technology (IEEE ICACT'06), Feb. 2006.

[21]

Mihui Kim, Inshil Doh, Kijoon Chae, "Denial-of-Service(DoS) Detection through Practical Entropy Estimation on Hierarchical Sensor Networks," IEEE International Conference on Advanced Communication Technology (IEEE ICACT'06), Feb. 2006.

[22]

Hayoung Oh, Kijoon Chae, HyoChan Bang, JungChan Na, "Comparisons analysis of Security Vulnerabilities for Security Enforcement in IPv4/IPv6," IEEE International Conference on Advanced Communication Technology (IEEE ICACT'06), Feb. 2006.

[23]

Jung-Min Park, Eunkyung Kim, Yukyung Jung, Kijoon Chae and Jungchan Na, "Personal Information leakage Detection in an Ubiquitous Network Environment," IEEE Proceeding of International Conference on Ubiquitous Information Technology & Applications (ICUT'07), Feb. 2007.

[24]

Inshil Doh, Mihui Kim, Kijoon Chae, "A key setup mechanism utilizing dual key strings for secure sensor communication," IEEE International Conference on Advanced Communication Technology (IEEE ICACT'07), Feb. 2007.

[25]

Mihui Kim, Inshil Doh and Kijoon Chae, "Defense Mechanism using Overlay against DDoS Attacks on Converged Networks," IEEE International Conference on Advanced Communication Technology (IEEE ICACT'07), Feb. 2007.

[26]

Hayoung Oh and Kijoon Chae, "An Efficient Security Management in IPv6 Network via MCGA," IEEE International Conference on Advanced Communication Technology (IEEE ICACT'07), Feb. 2007.

[27]

Hayoung Oh, Kijoon Chae, "An Energy-Efficient Sensor Routing with low latency, scalability in Wireless Sensor Networks," IEEE International Conference on Multimedia and Ubiquitous Engineering(IEEE MUE' 07), April. 2007.

[28]

Mihui Kim,Kijoon Chae,Siyoung Heo, Seongchoon Lee, "Design of AP-Initiated Flow Redirection for AP Load Balancing in IEEE802.11 WLAN Networks," IEEE Proceeding of International Conference on Ubiquitous Information Technology & Applications (ICUT'07), Dec. 2007.

[29]

Jaewon Seo, Mihui Kim, Kijoon Chae, "Priority Based Secure Aggregation for Increasing Efficiency on Medical Sensor Networks," IEEE 7th International Conference on Applications and Principles of Information Science (APIS 2008), Jan. 2008.

[30]

Inshil Doh, Kijoon Chae, "A Key Setup and a Secure Data Transmission Mechanism Based on Three-Dimensional Coordinates for Sensor Network Communication," ICISS 2008 (IEEE Computer Society), Jan. 2008.

[31]

Mihui Kim, Kijoon Chae, "Adaptive Authentication Mechanism using Node Reputation on Mobile Medical Sensor Networks," IEEE International Conference on Advanced Communication Technology (IEEE ICACT'08) Feb. 2008.

[32]

Hayoung Oh, Kijoon Chae, "A Secure and Delay-Efficient scheme for NetLMM," Proceedings of the International Conference on Mobile Technology, Applications, and Systems, Sep. 2008.

[33]

Hayoung Oh, Kijoon Chae, "A Key Management and Vulnerable Area Detection scheme for Secure Pervasive Environments," Proceedings of the 2008 Third International Conference on Convergence and Hybrid Information Technology - Volume 02 , Nov. 2008.

[34]

Hayoung Oh, Kijoon Chae, "Real-time Intrusion Detection System based on Self-Organized Maps and Feature Correlations," Proceedings of the 2008 Third International Conference on Convergence and Hybrid Information Technology - Volume 02 , Nov. 2008.

[35]

Jisun Kim, Jiyoung Lim, Kijoon Chae, "Energy-efficient Code Dissemination using Minimal Virtual Backbone in Sensor Networks," Proceedings of the 2010 International Conference on Broadband, Wireless Computing, Communication and Applications, Nov. 2010.

[36]

Jisun Kim, Jiyoung Lim, Kijoon Chae, "Secure Code Dissemination using Energy-efficient Minimal Virtual Backbone in Sensor Networks," 2011 Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, Jun. 2011.

[37]

Kyung Choi, Mihui Kim, Minjung Yun, Kijoon Chae, "An Enhanced Key Management Using ZigBee Pro for Wireless Sensor Networks," The International Conference on Information Networking 2012, Feb. 2012.

[38]

Jun Suk Kim, Bum-Gon Choi,Inshil Doh, Min Young Chung, "Downlink Scheduling Scheme Based on Estimation of Channel Quality at the Crossed Timeslot for Effective Resource Allocation in LTE System," The 6th International Conference on Ubiquitous Information Management and Communication (ICUIMC), Feb. 2012.

[39]

Inshil Doh, JungMin Park, Kijoon Chae, "Security Approach for Ubiquitous Healthcare Services through Wireless Communication," FTRA International Symposium on Advances in Cryptography, Security and Applications for Future Computing (ACSA - Summer 2012), Jul. 2012

[40]

Inshil Doh, Jiyoung Lim, Min Young Chung, "Group Key Management for Secure Mobile IPTV Service," 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing(IMIS 2012) 2012 6th IMIS pp. 352-357, Jul. 2012.

[41]

Inshil Doh, Kijoon Chae, Jiyoung Lim, "An Improved Security Approach Based on Kerberos for M2M Open IPTV System,The 15th International Conference on Network-Based Information Systems (NBiS-2012), Sep. 2012

[42]

Yunjeong Choi, Inshil Doh, Seung-Soo Park, Ki-Joon Chae, "Security based Semantic Context Awareness System for M2M Ubiquitous Healthcare Service," The 7th International Conference on Ubiquitous Information Technologies and Applications(CUTE 2012) , Nov. 2012.

[43]

Yunjeong Choi, Inshil Doh, "Hierarchical Data Fusion of Uncertain Data for WSN based on Reinforcement Learning," IWUCA 2012, Dec. 2012  

[44]

Shi Li, Kyung Choi, Kijoon Chae, "An Enhanced Measurement Transmission Scheme for Privacy Protection in Smart Grid,The International Conference on Information Networking 2013 (ICOIN 2013) , Jan. 2013.

[45]

Kijoon Chae, Yunjung Choi, Inshil Doh, Seung-Soo Park, "Hierarchical Clustering for efficient data transmission based on Entropy Analysis in M2M Sensor Network,International Conference on Computer Applications and 

Information Processing Technology (CAIPT 2013), Jun. 2013.

[46]

Inshil Doh, Jiyoung Lim, Shi Li, Kijoon Chae, "Key Establishment and Management for Secure Cellular Machine-to-Machine Communication," The Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2013), Jul. 2013.

[47]

Inshil Doh, Jiyoung Lim, Kijoon Chae, "Secure Aggregation and Attack Detection for Smart Grid System," The 16th International Conference on Network-Based Information Systems(NBiS 2013), Sep. 2013.

[48]

Xinyi Chen, Inshil Doh, Kijoon Chae, "User Authentication Mechanism based on Secure Positioning Systemin RFID Communication," The 8th International Conference on Ubiquitous Information Technologies and Applications(CUTE 2013), Sep. 2013.

[49]

Kyung Choi, Kijoon Chae, "Data Aggregation using Temporal and Spatial Correlations in Advanced Metering Infrastructure," The International Conference on Information Networking 2014 (ICOIN 2014), Feb. 2014.

[50]

Inshil Doh, Kijoon Chae,Jiyoung Lim, "Service Security for Smart Grid System," International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing(IMIS), Jul. 2014.

[51]

Nishat Mowla, Inshil Doh, Kijoon Chae, "Multi-Defense Mechanism against DDoS in SDN based CDNi," The 8th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing,  (IMIS-2014), Jul. 2014.

[52]

Shi Li, Inshil Doh, KiJoon Chae, "Key Management Mechanism in ALTO/SDN based CDNi Architecture," The International Conference on Information Networking (ICOIN 2015), Jan. 2015

[53]

Nishat I Mowla, Inshil Doh, KiJoon Chae, "An Efficient Defense Mechanism for spoofed IP attack in SDN based CDNi," The International Conference on Information Networking (ICOIN 2015), Jan. 2015

[54]

Inshil Doh, Kijoon Chae, Jiyoung Lim, "Secure Authentication for Secure Smart Grid System," IMIS 2015, July. 2015

[55]

Shi Li, Inshil Doh, Kijoon Chae, "An Anonymous IP-based Privacy Protection Routing Mechanism for CDNi", International Conference on Information Networking (ICOIN 2016), Jan. 2016.

[56]

Nishat I Mowla, Inshil Doh, Kijoon Chae, "Securing information flow in content delivery networks with visual and quantum cryptography", International Conference on Information Networking (ICOIN 2016), Jan. 2016.

[57]

Shi Li, Inshil Doh, KiJoon Chae, "A Cross-Domain Trust Model for Reputation Management in Hybrid CDNi-P2P Network," 2016 The 8th International Conference on Future Computer and Communication, April. 2016 (Excellent Oral Presentation)

[58]

Dana Yang, Inshil Doh, KiJoon Chae, "Mutual Authentication based on Visual Cryptography and OCR for Secure IoT Service," 2016 The 8th International Conference on Future Computer and Communication, April, 2016

[59]

Shi Li, Inshil Doh, Kijoon Chae, "A Group Authentication Scheme based on Lagrange Interpolation Polynomial," 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, July. 2016.

[60]

Jiyoung Lim, Inshil Doh, Kijoon Chae, "Authentication for Mobile Open IPTV Service Security," 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, July. 2016.

[61]

Dana Yang, Inshil Doh, Kijoon Chae, "Enhanced Password Processing Scheme Based on Visual Cryptography and OCR", The 31st International Conference on Information Networking (ICOIN 2017), Jan. 2017.

[62]

Shi Li, Inshil Doh, Kijoon Chae, "Non-Redundant Indirect Trust Search Algorithm Based on a Cross-Domain Trust Model in Content Delivery Network," 19th International Conference on Advanced Communications Technology (ICACT 2017), Feb. 2017. ( * Best Paper *)

[63]

Nishat Mowla, Inshil Doh, Kijoon Chae, "Evolving Neural Network Intrusion Detection System for MCPS," 19th International Conference on Advanced Communications Technology (ICACT 2017), Feb. 2017. ( * Best Paper *)

[64]

Jiyoung Lim, Inshil Doh, Kijoon Chae, "Lightweight Authentication for Distributed Mobile P2P Communications," The 11th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2017), July. 2017.

[65]

Nishat Mowla, Inshil Doh, Kijoon Chae, "Clustering based Evolving Neural Network Intrusion Detection for MCPS Traffic Security," 11th International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2017), September. 2017. 

[66]

YeJi Kang, Doyeon Jung, Inshil Doh, "Automated Parking Lot Management System using Embedded Robot Type Smart Car based on Wireless Sensors," 2017 27th International Telecommunication Networks and Applications Conference (ITNAC), Nov. 2017. 

[67]

Seohee You, Dana Yang, Inshil Doh and Kijoon Chae, "Authorization Based on Mobile Whitelist in Devices for Device-to-Device Communications", 32th International Conference on Information Networking (ICOIN 2018), Jan. 2018. 

[68]

Sol Jeon, Inshil Doh and Kijoon Chae, "RMBC: Randomized Mesh Blockchain Using DBFT Consensus Algorithm", 32th International Conference on Information Networking (ICOIN 2018), Jan. 2018. 

[69]

Nishat I Mowla, Inshil Doh, Kijoon Chae, "Selective Fuzzy Ensemble Learner for Cognitive Detection of Bio-identifiable Modality Spoofing in MCPS", 20th International Conference on Advanced Communications Technology (ICACT 2018), Feb. 2018.

[70]

Dana Yang, Inshil Doh, Kijoon Chae, "Secure Medical Image-Sharing Mechanism based on Visual Cryptography in EHR system", 20th International Conference on Advanced Communications Technology (ICACT 2018), Feb. 2018. ( * Best Paper *)

[71]

Jiyoung Lim, Inshil Doh, Kijoon Chae, "Dynamic group key management for efficient fog computing", 12th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS 2018), July 2018

[72]

Nishat I Mowla, Inshil Doh, Kijoon Chae, "Binarized Multi-factor Cognitive Detection of Bio-modality Spoofing in Fog based Medical Cyber Physical System", 33rd International Conference on Information Networking (ICOIN 2019), Jan. 2019.

[73]

Gabin Heo,Dana Yang, Inshil Doh, Kijoon Chae, "Design of Blockchain System for Protection of Personal Information in Digital Content Trading Environment," The 34th International Conference on Information Networking (ICOIN 2020), Jan. 2020.

[74]

Dana Yang, Sol Jeon, Inshil Doh, Kijoon Chae, "Randomly Elected Blockchain System based on Grouping Verifiers for Efficiency and Security,"  The 22nd IEEE International Conference on Advanced Communications Technology (ICACT2020), Feb. 2020.

[75]

Donghee kim, Inshil Doh, Kijoon Chae, "Improved Raft Algorithm exploiting Federated Learning for Private Blockchain performance enhancement,"  The 35th International Conference on Information Networking (ICOIN 2021), Jan. 2021.

국외학술회의논문

  • >
  • Publication >
  • 국외학술회의논문