Inshil Doh
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – today
- 2019
- [j14]Nishat I. Mowla
, Inshil Doh, Kijoon Chae:
On-Device AI-Based Cognitive Detection of Bio-Modality Spoofing in Medical Cyber Physical System. IEEE Access 7: 2126-2137 (2019) - [c25]Nishat I. Mowla, Inshil Doh, Kijoon Chae:
Binarized Multi-Factor Cognitive Detection of Bio-Modality Spoofing in Fog Based Medical Cyber-Physical System. ICOIN 2019: 43-48 - 2018
- [j13]Nishat I. Mowla, Inshil Doh, Kijoon Chae:
CSDSM: Cognitive switch-based DDoS sensing and mitigation in SDN-driven CDNi word. Comput. Sci. Inf. Syst. 15(1): 163-185 (2018) - [c24]Seohee You, Dana Yang, Inshil Doh, Kijoon Chae:
Authorization based on mobile whitelist in devices for device-to-device communications. ICOIN 2018: 706-711 - [c23]Sol Jeon, Inshil Doh, Kijoon Chae:
RMBC: Randomized mesh blockchain using DBFT consensus algorithm. ICOIN 2018: 712-717 - [c22]Jiyoung Lim, Inshil Doh, Kijoon Chae:
Dynamic Group Key Management for Efficient Fog Computing. IMIS 2018: 685-694 - 2017
- [j12]Jiyoung Lim, Inshil Doh, Kijoon Chae:
Secure and structured IoT smart grid system management. IJWGS 13(2): 170-185 (2017) - [c21]Dana Yang, Inshil Doh, Kijoon Chae:
Enhanced password processing scheme based on visual cryptography and OCR. ICOIN 2017: 254-258 - [c20]Jiyoung Lim, Inshil Doh, Kijoon Chae:
Lightweight Authentication for Distributed Mobile P2P Communications. IMIS 2017: 580-589 - [c19]YeJi Kang, Doyeon Jung, Inshil Doh:
Automated parking lot management system using embedded robot type smart car based on wireless sensors. ITNAC 2017: 1-6 - 2016
- [j11]Jiyoung Lim, Inshil Doh
, Kijoon Chae:
Security system architecture for data integrity based on a virtual smart meter overlay in a smart grid system. Soft Comput. 20(5): 1829-1840 (2016) - [c18]Shi Li, Inshil Doh, Kijoon Chae:
An anonymous IP-based privacy protection routing mechanism for CDNi. ICOIN 2016: 75-80 - [c17]Nishat I. Mowla, Inshil Doh, Kijoon Chae:
Securing information flow in content delivery networks with visual and quantum cryptography. ICOIN 2016: 463-468 - [c16]Jiyoung Lim, Inshil Doh, Kijoon Chae:
Authentication for Mobile Open IPTV Service Security. IMIS 2016: 381-385 - [c15]Shi Li, Inshil Doh, Kijoon Chae:
A Group Authentication Scheme Based on Lagrange Interpolation Polynomial. IMIS 2016: 386-391 - 2015
- [j10]Inshil Doh, Kijoon Chae, Jiyoung Lim, Min Young Chung:
Authentication and Key Management Based on Kerberos for M2M Mobile Open IPTV Security. Intelligent Automation & Soft Computing 21(4): 543-558 (2015) - [j9]Bum-Gon Choi, Inshil Doh, Min Young Chung:
Radio Resource Management Scheme for Relieving Interference to MUEs in Relay-Based Cellular Networks. IEEE Trans. Vehicular Technology 64(7): 3018-3029 (2015) - [c14]Nishat I. Mowla, Inshil Doh, Kijoon Chae:
An efficient defense mechanism for spoofed IP attack in SDN based CDNi. ICOIN 2015: 92-97 - [c13]Shi Li, Inshil Doh, Kijoon Chae:
Key management mechanism in ALTO/SDN based CDNi architecture. ICOIN 2015: 110-115 - [c12]Inshil Doh, Jiyoung Lim, Kijoon Chae:
Secure Authentication for Structured Smart Grid System. IMIS 2015: 200-204 - 2014
- [j8]Inshil Doh, Jiyoung Lim, Shi Li, Kijoon Chae:
Pairwise and group key setup mechanism for secure machine-to-machine communication. Comput. Sci. Inf. Syst. 11(3): 1071-1090 (2014) - [j7]Yunjeong Choi, Inshil Doh:
Hierarchical Aggregation of Uncertain Sensor Data for M2M Wireless Sensor Network Using Reinforcement Learning. IJDSN 10 (2014) - [c11]Inshil Doh, Jiyoung Lim, Kijoon Chae:
Service Security for Smart Grid System. IMIS 2014: 427-432 - [c10]Nishat I. Mowla, Inshil Doh, Kijoon Chae:
Multi-defense Mechanism against DDoS in SDN Based CDNi. IMIS 2014: 447-451 - 2013
- [j6]Inshil Doh, Jiyoung Lim, Kijoon Chae:
Key management approach for secure mobile open IPTV service. Comput. Sci. Inf. Syst. 10(2): 843-864 (2013) - [j5]Jun Suk Kim, Bum-Gon Choi, Sueng Jae Bae, Inshil Doh, Min Young Chung:
Adaptive time division duplexing configuration mode selection mechanism for accommodating asymmetric traffic in time division long term evolution-advanced systems. Trans. Emerging Telecommunications Technologies 24(3): 342-351 (2013) - [j4]Inshil Doh, Jiyoung Lim, Kijoon Chae:
Code updates based on minimal backbone and group key management for secure sensor networks. Mathematical and Computer Modelling 57(11-12): 2801-2813 (2013) - [c9]Inshil Doh, Jiyoung Lim, Shi Li, Kijoon Chae:
Key Establishment and Management for Secure Cellular Machine-to-Machine Communication. IMIS 2013: 579-584 - [c8]Inshil Doh, Jiyoung Lim, Kijoon Chae:
Secure Aggregation and Attack Detection for Smart Grid System. NBiS 2013: 270-275 - 2012
- [c7]Jun Suk Kim, Inshil Doh, Bum-Gon Choi, Min Young Chung:
Downlink scheduling scheme based on estimation of channel quality at the crossed timeslot for effective resource allocation in LTE-advanced system. ICUIMC 2012: 32:1-32:6 - [c6]Inshil Doh, Jiyoung Lim, Min Young Chung:
Group Key Management for Secure Mobile IPTV Service. IMIS 2012: 352-357 - [c5]Inshil Doh, Kijoon Chae, Jiyoung Lim, Min Young Chung:
An Improved Security Approach Based on Kerberos for M2M Open IPTV System. NBiS 2012: 754-759 - 2011
- [j3]Inshil Doh, Jiyoung Lim, Kijoon Chae:
Distributed authentication mechanism for secure channel establishment in ubiquitous medical sensor networks. Mobile Information Systems 7(3): 189-200 (2011)
2000 – 2009
- 2009
- [j2]Hayoung Oh, Inshil Doh, Kijoon Chae:
Attack Classification Based on Data Mining Technique and Its Application for Reliable Medical Sensor Communication. IJCSA 6(3): 20-32 (2009) - [j1]Hayoung Oh, Inshil Doh, Kijoon Chae:
A Fault Management and Monitoring Mechanism for Secure Medical Sensor Network. IJCSA 6(3): 43-56 (2009) - 2006
- [c4]Inshil Doh, Kijoon Chae:
Key Establishment and Authentication Mechanism for Secure Sensor Networks. APWeb Workshops 2006: 335-344 - [c3]Inshil Doh, Jung Min Park, Kijoon Chae:
Pairwise Key Setup and Authentication Utilizing Deployment Information for Secure Sensor Network. HPCC 2006: 280-289 - [c2]Inshil Doh, Kijoon Chae, Howon Kim, Kyoil Chung:
Security Enhancement Mechanism for Ad-Hoc OLSR Protocol. ICOIN 2006: 317-326 - [c1]Mihui Kim, Inshil Doh, Kijoon Chae:
A Key Management Based on Multiple Regression in Hierarchical Sensor Network. WISA 2006: 267-281
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org and opencitations.net to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy.
Citation data
Add a list of citing articles from to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter accout. At the same time, Twitter will persitently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2019-10-02 04:57 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint