default search action
Gicheol Wang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [c14]Gicheol Wang, Jaein Kim, Sungchang Kim:
Impacts of Cluster Architecture on Security and Performance of UAV-assisted Wireless Sensor Networks. ICTC 2021: 1519-1524 - 2020
- [j12]Gicheol Wang, Byoung-Sun Lee, Jae Young Ahn, Gihwan Cho:
A UAV-assisted CH election framework for secure data collection in wireless sensor networks. Future Gener. Comput. Syst. 102: 152-162 (2020)
2010 – 2019
- 2018
- [j11]Gicheol Wang, Byoung-Sun Lee, Jae Young Ahn, Gihwan Cho:
A UAV-Aided Cluster Head Election Framework and Applying Such to Security-Driven Cluster Head Election Schemes: A Survey. Secur. Commun. Networks 2018: 6475927:1-6475927:17 (2018) - [c13]Gicheol Wang, Byoung-Sun Lee, Jae Young Ahn:
UAV-Assisted Cluster Head Election for a UAV-Based Wireless Sensor Network. FiCloud 2018: 267-274 - 2017
- [c12]Gicheol Wang, Kwangjae Lim, Byoung-Sun Lee, Jae Young Ahn:
Handover Key Management in an LTE-based Unmanned Aerial Vehicle Control Network. FiCloud Workshops 2017: 200-205 - 2016
- [c11]Gicheol Wang, Byoung-Sun Lee, Jae Young Ahn:
Authentication and Key Management in an LTE-Based Unmanned Aerial System Control and Non-payload Communication Network. FiCloud Workshops 2016: 355-360 - 2014
- [j10]Dongkyun Kim, Joobum Kim, Gicheol Wang, Jin-Hyung Park, Seung-Hae Kim:
K-GENI testbed deployment and federated meta operations experiment over GENI and KREONET. Comput. Networks 61: 39-50 (2014) - [j9]Gicheol Wang, Gihwan Cho:
Securing Cluster Formation and Cluster Head Elections in Wireless Sensor Networks. Int. J. Commun. Networks Inf. Secur. 6(1) (2014) - 2013
- [j8]Gicheol Wang, Gihwan Cho:
Reputation-based cluster head elections in wireless sensor networks. Simul. 89(7): 829-845 (2013) - [c10]Dongkyun Kim, Joon-Min Gil, Gicheol Wang, Seung-Hae Kim:
Integrated SDN and Non-SDN Network Management Approaches for Future Internet Environment. MUE 2013: 529-536 - 2012
- [j7]Gicheol Wang, Dongkyun Kim, Gihwan Cho:
A Secure Cluster Formation Scheme in Wireless Sensor Networks. Int. J. Distributed Sens. Networks 8 (2012) - [c9]Gicheol Wang, Seunghae Kim, Byungyun Park, Gihwan Cho:
Secure cluster formation using two-hop conformity check and broadcast communication. APCC 2012: 716-721 - [c8]Dosik An, Jongseon Park, Gicheol Wang, Gihwan Cho:
An adaptive UDT congestion control method with reflecting of the network status. ICOIN 2012: 492-496 - 2010
- [j6]Gicheol Wang, Kang-Suk Song, Gihwan Cho:
DIRECT: Dynamic Key Renewal Using Secure Cluster Head Election in Wireless Sensor Networks. IEICE Trans. Inf. Syst. 93-D(6): 1560-1571 (2010) - [j5]Gicheol Wang, Gihwan Cho:
Secure Cluster Head Election Using Mark Based Exclusion in Wireless Sensor Networks. IEICE Trans. Commun. 93-B(11): 2925-2935 (2010) - [j4]Gicheol Wang, Seunghae Kim, Daewook Kang, Deokjai Choi, Gihwan Cho:
Lightweight Key Renewals for Clustered Sensor Networks. J. Networks 5(3): 300-312 (2010)
2000 – 2009
- 2009
- [j3]Gicheol Wang, Gihwan Cho:
Clustering-Based Key Renewals for Wireless Sensor Networks. IEICE Trans. Commun. 92-B(2): 612-615 (2009) - [j2]Gicheol Wang, Gihwan Cho:
Secure Cluster Head Sensor Elections Using Signal Strength Estimation and Ordered Transmissions. Sensors 9(6): 4709-4727 (2009) - [c7]Gicheol Wang, Deokjai Choi, Daewook Kang:
A lightweight key renewal scheme for clustered sensor networks. ICUIMC 2009: 557-565 - 2008
- [c6]Gicheol Wang, Deokjai Choi, Daewook Kang:
Securing Wireless Sensor Networks Using Cluster Reformations. EUC (2) 2008: 306-311 - 2006
- [c5]Taeyeon Kim, Gicheol Wang, Gihwan Cho:
A Secure Key Agreement Scheme in Low-Energy Wireless Sensor Networks. EUC 2006: 79-88 - [c4]Taeyeon Kim, Gicheol Wang:
A Strong Key Pre-distribution Scheme for Wireless Sensor Networks. UIC 2006: 854-863 - [c3]Gicheol Wang, Dongsun Park:
Utilizing Secure Three Hop Links to Agree Pairwise Keys in Wireless Sensor Networks. UIC 2006: 946-955 - 2005
- [j1]Gicheol Wang, Gihwan Cho:
An On-Demand Cluster Formation Scheme for Efficient Flooding in Ad-Hoc Networks. IEICE Trans. Commun. 88-B(9): 3563-3569 (2005) - [c2]Gicheol Wang, Gihwan Cho, Sangwon Bang:
A pair-wise key establishment scheme without predistributing keys for ad-hoc networks. ICC 2005: 3520-3524 - 2004
- [c1]Woosuk Cha, Gicheol Wang, Gihwan Cho:
A Pair-Wise Key Agreement Scheme in Ad Hoc Networks. International Conference on Computational Science 2004: 648-651
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-12 20:12 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint