default search action
Namhi Kang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2017
- [j15]Jiye Park, Hyeokjin Kwon, Namhi Kang:
IoT-Cloud collaboration to establish a secure connection for lightweight devices. Wirel. Networks 23(3): 681-692 (2017) - 2016
- [j14]Hyo Jin Ban, Jaeduck Choi, Namhi Kang:
Fine-Grained Support of Security Services for Resource Constrained Internet of Things. Int. J. Distributed Sens. Networks 12(5): 7824686:1-7824686:8 (2016) - [j13]Namje Park, Namhi Kang:
Mutual Authentication Scheme in Secure Internet of Things Technology for Comfortable Lifestyle. Sensors 16(1): 20 (2016) - [c13]Christoph Ruland, Namhi Kang, Jochen Sassmannshausen:
Rejuvenation of the IEC 61850 protocol stack for MMS. SmartGridComm 2016: 625-630 - 2015
- [j12]Seil Jeon, Namhi Kang, Daniel Corujo, Rui L. Aguiar:
Comprehensive performance evaluation of distributed and dynamic mobility routing strategy. Comput. Networks 79: 53-67 (2015) - [j11]Namhi Kang, Jiye Park, Hyeokjin Kwon, Souhwan Jung:
ESSE: Efficient Secure Session Establishment for Internet-Integrated Wireless Sensor Networks. Int. J. Distributed Sens. Networks 11: 393754:1-393754:11 (2015) - [c12]Hyeokjin Kwon, Jiye Park, Namhi Kang:
Challenges in Deploying CoAP Over DTLS in Resource Constrained Environments. WISA 2015: 269-280 - 2014
- [c11]Jiye Park, Namhi Kang:
Lightweight secure communication for CoAP-enabled Internet of Things using delegated DTLS handshake. ICTC 2014: 28-33 - 2013
- [j10]Seil Jeon, Rui L. Aguiar, Namhi Kang:
Load-Balancing Proxy Mobile IPv6 Networks with Mobility Session Redirection. IEEE Commun. Lett. 17(4): 808-811 (2013) - 2012
- [c10]Namkyun Baik, Sungsoo Ahn, Namhi Kang:
Effective DDoS attack defense scheme using web service performance measurement. ICUFN 2012: 428-433 - 2010
- [j9]Nils Gruschka, Luigi Lo Iacono, Namhi Kang:
Packaged HTTP: Reconsidering Web Efficiency. Int. J. Adv. Comp. Techn. 2(1): 93-99 (2010) - [j8]Yonghyuck Kim, Younghan Kim, Namhi Kang:
Multimedia push-to-talk service in home networks. IEEE Trans. Consumer Electron. 56(3): 1480-1486 (2010) - [c9]Yonghyuck Kim, Younghan Kim, Namhi Kang:
Multimedia Push-to-Talk Service over Wireless Mesh Networks. SUTC/UMC 2010: 408-412
2000 – 2009
- 2009
- [j7]Seil Jeon, Namhi Kang, Younghan Kim:
Enhanced Predictive Handover for Fast Proxy Mobile IPv6. IEICE Trans. Commun. 92-B(11): 3504-3507 (2009) - [j6]Seil Jeon, Namhi Kang, Younghan Kim:
Mobility management based on proxy mobile IPv6 for multicasting services in home networks. IEEE Trans. Consumer Electron. 55(3): 1227-1232 (2009) - 2008
- [j5]Namhi Kang, Jejun Oh, Younghan Kim:
A Novel Approach to Overlay Multicasting Schemes for Multi-Hop Ad-Hoc Networks. IEICE Trans. Commun. 91-B(6): 1862-1873 (2008) - [j4]Seil Jeon, Namhi Kang, Younghan Kim, Wonsik Yoon:
Enhanced PMIPv6 Route Optimization Handover. IEICE Trans. Commun. 91-B(11): 3715-3718 (2008) - 2007
- [j3]Kihun Hong, Souhwan Jung, Namhi Kang, Younghan Kim:
Integrated Authentication Model for Network Access in Next Generation Networks. IEICE Trans. Commun. 90-B(11): 3246-3249 (2007) - [j2]Sihun Park, Namhi Kang, Younghan Kim:
Localized Proxy-MIPv6 with Route Optimization in IP-Based Networks. IEICE Trans. Commun. 90-B(12): 3682-3686 (2007) - [c8]Namhi Kang, Younghan Kim, Jungnam Kwak:
H2O: Hierarchically Optimized Hybrid Routing Strategies for Multihop Wireless Networks. ICOIN 2007: 771-780 - 2006
- [c7]Namhi Kang, Ilkyun Park, Younghan Kim:
Ubiquitous Zone Networking Technologies for Multi-hop Based Wireless Communications. IWSOS/EuroNGI 2006: 233-235 - [c6]Namhi Kang, Younghan Kim:
A Short-Lived Key Selection Approach to Authenticate Data Origin of Multimedia Stream. ICCSA (3) 2006: 497-506 - [c5]Yun Won Chung, Namhi Kang, Younghan Kim:
Ubiquitous Zone (U-Zone) based Community Networking Technologies. SECON 2006: 678-683 - [c4]Namhi Kang, Seongil Yoo, Younghan Kim, Souhwan Jung, Kihun Hong:
Heterogeneous Routing Protocol Coordinator for Mobile Ad Hoc Networks. UCS 2006: 384-397 - 2005
- [b1]Namhi Kang:
Differentiated authentication services for real-time multimedia streaming over the Internet. University of Siegen, 2005, ISBN 3-8322-3826-3, pp. 1-193 - [j1]Namhi Kang, Christoph Ruland:
Security Analysis of DoS Vulnerability in Stream Authentication Schemes Using Hash Chaining. IEICE Trans. Commun. 88-B(3): 1264-1265 (2005) - [c3]Namhi Kang, Christoph Ruland:
MDS: Multiplexed Digital Signature for Real-Time Streaming over Multi-sessions. ICOIN 2005: 824-834 - [c2]Namhi Kang, Ilkyun Park, Younghan Kim:
Secure and Scalable Routing Protocol for Mobile Ad-Hoc Networks. MATA 2005: 334-343 - 2004
- [c1]Namhi Kang, Christoph Ruland:
DiffSig: Differentiated Digital Signature for Real-Time Multicast Packet Flows. TrustBus 2004: 251-260
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:06 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint