default search action
Seung Jo Han
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2015
- [j5]BeomHun Kim, Seung Jo Han, Goo-Rak Kwon, Jae-Young Pyun:
Signal Processing for Tracking of Moving Object in Multi-Impulse Radar Network System. Int. J. Distributed Sens. Networks 11: 536841:1-536841:12 (2015) - 2014
- [j4]Ramesh Kumar Lama, Seung Jo Han, Goo-Rak Kwon:
SVD based improved secret fragment visible mosaic image generation for information hiding. Multim. Tools Appl. 73(2): 873-886 (2014) - 2013
- [c28]Sika Shrestha, Seung Jo Han, Sun-Kuk Noh, Sunwoong Kim, Hyun-Bai Kim, Dong-You Choi:
Design of modified Sierpinski fractal based miniaturized patch antenna. ICOIN 2013: 274-279 - 2010
- [j3]Anish Prasad Shrestha, Dong-You Choi, Goo-Rak Kwon, Seung Jo Han:
Kerberos based authentication for inter-domain roaming in wireless heterogeneous network. Comput. Math. Appl. 60(2): 245-255 (2010) - [j2]Young-Bai Kim, Seung Jo Han:
Securing Mobile IP Registration Messages in Residential Networks. J. Inform. and Commun. Convergence Engineering 8(1): 77-82 (2010) - [c27]Roja Kiran Basukala, Kyu Jin Park, Dong-You Choi, Seung Jo Han:
Secure Mobile IP Communication in Residential Networks. AINA Workshops 2010: 357-362 - [c26]Rakesh Shrestha, Kyong-Heon Han, Dong-You Choi, Seung Jo Han:
A Novel Cross Layer Intrusion Detection System in MANET. AINA 2010: 647-654
2000 – 2009
- 2009
- [j1]Binod Vaidya, Sang-Soo Yeo, Dong-You Choi, Seung Jo Han:
Robust and secure routing scheme for wireless multihop network. Pers. Ubiquitous Comput. 13(7): 457-469 (2009) - [c25]Rakesh Shrestha, Jong-Yeop Sung, SangDuck Lee, Pyung Sik-Yun, Dong-You Choi, Seung Jo Han:
A Secure Intrusion Detection System with Authentication in Mobile Ad hoc Network. PACCS 2009: 759-762 - [c24]Roja Kiran Basukala, Kyong-Heon Han, Dong-You Choi, Young-Bai Kim, Seung Jo Han:
QoS Assurance of Multimedia Traffic in Residential Network with Hybrid Co-ordination Function and Queuing Disciplines. PACCS 2009: 767-770 - [c23]Anish Prasad Shrestha, Kyu Jin Park, Jae Sung Park, Dong-You Choi, Seung Jo Han:
Kerberos Based Authentication Protocol with Improved Identity Protection in 3G Network. PACCS 2009: 771-774 - 2008
- [c22]Binod Vaidya, Byung-Lok Cho, Jong-An Park, Seung Jo Han:
Investigating Secure Framework for Hybrid Multipath Ad Hoc Network. AINA Workshops 2008: 1540-1545 - [c21]Anish Prasad Shrestha, Dong-You Choi, Joon Lee, Seung Jo Han, Soon-Suck Jarng:
Investigating Authentication Architecture Based on Mobility in Heterogeneous Network. FGCN (2) 2008: 120-123 - [c20]Jong-An Park, Seung Jo Han, Youngeun An:
Heuristic Features for Color Correlogram for Image Retrieval. ICCSA Workshops 2008: 9-13 - [c19]Binod Vaidya, Dong-You Choi, Jong-An Park, Seung Jo Han:
Multipath Routing Scheme for Wireless Multihop Network. ICCSA (2) 2008: 433-445 - [c18]Binod Vaidya, Nak Yong Ko, Soon-Suck Jarng, Seung Jo Han:
Investigating voice communication over multipath wireless mobile ad hoc network. ICUIMC 2008: 528-532 - [c17]Binod Vaidya, Dong-You Choi, Jong-An Park, Seung Jo Han:
Investigation of Secure Framework for Multipath MANET. MUE 2008: 182-185 - 2007
- [c16]Binod Vaidya, Jae-Young Pyun, Jong-An Park, Seung Jo Han:
Secure Multipath Routing Scheme for Mobile Ad Hoc Network. DASC 2007: 163-171 - [c15]Binod Vaidya, SangDuck Lee, Eung-Kon Kim, Jong-An Park, Seung Jo Han:
Investigating Media Streaming in Multipath Multihop Wireless Network. International Conference on Computational Science (4) 2007: 717-720 - [c14]Jong-An Park, Seung Jo Han, Pankoo Kim:
Using Intrinsic Object Attributes for Incremental Content Based Image Retrieval with Histograms. International Conference on Computational Science (3) 2007: 829-835 - [c13]Binod Vaidya, SangDuck Lee, Jongwoo Kim, Seung Jo Han:
Investigation of Secure Media Streaming over Wireless Access Network. ICOIN 2007: 791-800 - [c12]Binod Vaidya, SangDuck Lee, Eung-Kon Kim, Seung Jo Han:
Streaming Media Securely over Multipath Multihop Wireless Network. PAKDD Workshops 2007: 636-643 - 2006
- [c11]Binod Vaidya, SangDuck Lee, Jae-Kyun Han, Seung Jo Han:
Authentication Mechanism Using One-Time Password for 802.11 Wireless LAN. CSR 2006: 619-628 - [c10]Seong-Pyo Hong, Jong-An Park, Seung Jo Han, Jae-Young Pyun, Joon Lee:
Design of WLAN Secure System Against Weaknesses of the IEEE 802.1x. ICHIT 2006: 617-627 - [c9]Binod Vaidya, SangDuck Lee, Eung-Kon Kim, Seung Jo Han:
Using One-Time Password Based Authentication for Wireless IP Network. ISI 2006: 739-740 - [c8]Binod Vaidya, YoungJin Kim, Eung-Kon Kim, Seung Jo Han:
Investigating Authentication Mechanisms for Wireless Mobile Network. UIC 2006: 902-911 - 2005
- [c7]Binod Vaidya, Jongwoo Kim, Jae-Young Pyun, Jong-An Park, Seung Jo Han:
Performance Analysis of Audio Streaming in Secure Wireless Access Network. ACIS-ICIS 2005: 556-561 - [c6]Binod Vaidya, Jongwoo Kim, Jae-Young Pyun, Jong-An Park, Seung Jo Han:
Framework for Secure Audio Streaming to Wireless Access Network. Systems Communications 2005: 122-127 - [c5]ByungRae Cha, Binod Vaidya, Seung Jo Han:
Anomaly Intrusion Detection for System Call Using the Soundex Algorithm and Neural Networks. ISCC 2005: 427-433 - [c4]Binod Vaidya, Jongwoo Kim, Jae-Young Pyun, Jong-An Park, Seung Jo Han:
Evaluation of Audio Streaming in Secure Wireless Access Network. Panhellenic Conference on Informatics 2005: 828-838 - [c3]Jae-Young Pyun, Jong Ae Park, Seung Jo Han, Yoon Kim, Sang-Hyun Park:
TCP-Friendly Congestion Control over Heterogeneous Wired/Wireless IP Network. PCM (2) 2005: 489-500 - 2004
- [c2]Seung-Jin Park, Muhammad Bilal Ahmad, Seung-Hak Rhee, Seung Jo Han, Jong-An Park:
Image Corner Detection Using Radon Transform. ICCSA (4) 2004: 948-955 - [c1]Seung-Hak Rhee, Seung Jo Han, Pan-Koo Kim, Muhammad Bilal Ahmad, Jong-An Park:
Vehicle Tracking Using Image Processing Techniques. Rough Sets and Current Trends in Computing 2004: 671-678
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:44 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint