default search action
Yongtae Shin
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c48]Dupyo Hong, DongWan Kim, Oh Jung Min, Yongtae Shin:
Resource Allocation Reinforcement Learning for Quality of Service Maintenance in Cloud-Based Services. ICOIN 2023: 517-521 - 2022
- [j7]Jung Ji Young, Minwoo Park, Shin Hee Kyoung, Yongtae Shin:
SNI Field Blocking and Internet Censorship. Int. J. Softw. Innov. 10(2): 1-12 (2022) - [j6]Jung Ji Young, Yongtae Shin:
Cloud Computing Transformation Considering Operational Efficiency. Int. J. Softw. Innov. 10(2): 1-18 (2022) - 2021
- [j5]Jee-Ho Park, Yongtae Shin, Jaehyuk Choi, Seong-Jin Kim:
A 5.02nW 32-kHz Self-Reference Power Gating XO With Fast Startup Time Assisted by Negative Resistance and Initial Noise Boosters. IEEE Trans. Circuits Syst. II Express Briefs 68(11): 3386-3390 (2021) - [c47]Jung Ji Young, Shin Hee Kyoung, Minwoo Park, Yongtae Shin:
Cloud Computing Transformation * : Considering Adoption of Mixed Security. SNPD Winter 2021: 90-95
2010 – 2019
- 2019
- [c46]Yongseon Ji, Suhwan Bae, Yongtae Shin:
A Personal Information Management Using BlockChain. ICOIN 2019: 489-493 - [c45]Sumin Choi, Jaehee Back, Yongtae Shin:
A Study on the Selection of Candidate Leaders for flexible Platooning in Urban Road. ICUFN 2019: 725-728 - [c44]Jaehee Back, Sumin Choi, Yongtae Shin:
A Study on the Election of Suitable Leader Vehicle in Vehicle Platooning Using the Raft Algorithm. ICUFN 2019: 756-761 - 2018
- [c43]Jongsoek Choi, Yongtae Shin, Sunok Cho:
Study on information security sharing system among the industrial IoT service and product provider. ICOIN 2018: 551-555 - [c42]Suhwan Bae, Yongtae Shin:
An Automated System Recovery Using BlockChain. ICUFN 2018: 897-901 - 2017
- [c41]Sangdo Lee, Yongtae Shin:
A Study of Service Quality in Multi Cloud Computing. CSA/CUTE 2017: 811-816 - [c40]Sangdo Lee, Yongtae Shin:
The Direction of Information Security Control Analysis Using Artificial Intelligence. CSA/CUTE 2017: 872-877 - [c39]Dohyun Kim, Yongtae Shin:
An enhanced security authentication mechanism in the environment partially distributed mobility management. ICOIN 2017: 457-462 - 2016
- [c38]Jinsook Bong, Yuhwa Suh, Yongtae Shin:
Fast user authentication method considering mobility in multi clouds. ICOIN 2016: 445-448 - 2015
- [j4]Yukyong Kim, Yongtae Shin, Kyung-Goo Doh:
Quantitative trust management with QoS-aware service selection. Int. J. Web Grid Serv. 11(3): 247-264 (2015) - [j3]Yukyong Kim, Jong-Seok Choi, Yongtae Shin:
Trustworthy Service Discovery for Dynamic Web Service Composition. KSII Trans. Internet Inf. Syst. 9(3): 1260-1281 (2015) - [j2]Yuhwa Suh, Kiyoung Kim, Aran Kim, Yongtae Shin:
A study on impact of wired access networks for green Internet. J. Netw. Comput. Appl. 57: 156-168 (2015) - [c37]Yukyong Kim, Eun-Wha Jhee, Jongwon Choe, Jong-Seok Choi, Yongtae Shin:
A measurement model for trustworthiness of information on social network services. ICOIN 2015: 437-438 - [c36]Jinsook Bong, Sangjin Park, Yongtae Shin:
Fast handover method by using L2 trigger supporting multi-interface in PMIPv6. ICUFN 2015: 378-381 - 2014
- [j1]Sungjin Jang, Jongbae Kim, JungWon Byun, Yongtae Shin:
Game Theory based Dynamic Spectrum Allocation for Secondary Users in the Cell Edge of Cognitive Radio Networks. KSII Trans. Internet Inf. Syst. 8(7): 2231-2245 (2014) - [c35]Sangji Lee, Jinsuk Bong, Sunhee Shin, Yongtae Shin:
A security mechanism of Smart Grid AMI network through smart device mutual authentication. ICOIN 2014: 592-595 - 2013
- [c34]Jungeun Jee, Joopal Jang, Inhee Jo, Yongtae Shin:
A Network Partition Scheme to protect secure zone for malicious code. ICOIN 2013: 476-480 - 2012
- [c33]Hyeopgeon Lee, Aran Kim, Yongtae Shin:
Retransmission Algorithm for Channel Allocation in IEEE 802.15.4 LR-WPAN. ICHIT (1) 2012: 657-664 - [c32]Hyoungyill Park, Sangdo Lee, Yongtae Shin:
Design of the Adaptive Encryption Using Parallel TCP in the Open IPTV. ICHIT (2) 2012: 775-782 - [c31]Sangdo Lee, Hyoungyill Park, Yongtae Shin:
Cloud Computing Availability: Multi-clouds for Big Data Service. ICHIT (2) 2012: 799-806 - [c30]Sangdo Lee, Aran Kim, Hyeopgeon Lee, Yongtae Shin:
A secure information flow architecture for public web service. ICOIN 2012: 394-398 - 2011
- [c29]Hyeopgeon Lee, Kyounghwa Lee, Seunghak Ryu, Sanghong Lee, Kwanho Song, Yongtae Shin:
An efficient slotted CSMA/CA algorithm for the IEEE 802.15.4 LR-WPAN. ICOIN 2011: 488-493 - [e1]Cheeha Kim, Yongtae Shin:
2011 International Conference on Information Networking, ICOIN 2011, Kuala Lumpur, Malaysia, January 26-28, 2011. IEEE Computer Society 2011, ISBN 978-1-61284-661-3 [contents] - 2010
- [c28]Hyeopgeon Lee, Kyounghwa Lee, Yongtae Shin:
An Enhanced Key Distribution Scheme for the Energy Consumption and the Security in the Wireless Sensor Networks. SAINT 2010: 157-160
2000 – 2009
- 2009
- [c27]Kyunghwa Lee, Joohyun Lee, Minsu Park, Jaeho Kim, Yongtae Shin:
EECHE: An Energy-Efficient Cluster Head Election Algorithm in Sensor Networks. APNOMS 2009: 486-489 - [c26]Jieun Cho, Jongwon Choe, Kwanho Song, Yongtae Shin:
A routing protocol using relative landmark based on virtual grid in wireless sensor network. ICOIN 2009: 1-3 - [c25]Jing Liu, Sungchol Cho, Sunyoung Han, Keecheon Kim, Young-Guk Ha, Jongwon Choe, Sinchai Kamolphiwong, Hyunseung Choo, Yongtae Shin, Chinchol Kim:
Establishment and traffic measurement of overlay multicast testbed in KOREN, THaiREN and TEIN2. Mobility Conference 2009 - [c24]Miyeon Yoon, Kwangkyum Lee, Mijoo Kim, Yongtae Shin:
Secure Mobile Multicast Handoff Mechanisms Using a Time-Limited Key. NetCoM 2009: 271-276 - [c23]Kyunghwa Lee, Joohyun Lee, Bongduk Zhang, Jaeho Kim, Yongtae Shin:
An Enhanced Trust Center Based Authentication in ZigBee Networks. ISA 2009: 471-484 - [i3]Boseung Kim, Joohyun Lee, Yongtae Shin:
(RCFT) ReClustering Formation Technique in Hierarchical Sensor Network. CoRR abs/0911.0121 (2009) - [i2]Boseung Kim, Huibin Lim, Yongtae Shin:
Routing Technique Based on Clustering for Data Duplication Prevention in Wireless Sensor Network. CoRR abs/0911.0480 (2009) - [i1]Hyubgun Lee, Kyounghwa Lee, Yongtae Shin:
AES Implementation and Performance Evaluation on 8-bit Microcontrollers. CoRR abs/0911.0482 (2009) - 2007
- [c22]Yuhwa Suh, Yongtae Shin:
Data Diffusion Considering Target Mobility in Large-Scale Wireless Sensor Network. ICOIN 2007: 11-20 - 2006
- [c21]Sulyun Sung, Yuhwa Seo, Yongtae Shin:
Hierarchical Clustering Algorithm Based on Mobility in Mobile Ad Hoc Networks. ICCSA (3) 2006: 954-963 - [c20]Kwangkyum Lee, Yongtae Shin, Ara Khil:
Energy-Efficient Routing Protocol Depending on Dynamic Message Communication over Wireless Sensor Network. ISPA Workshops 2006: 1025-1033 - 2005
- [c19]Sulyun Sung, Yuhwa Seo, Soonho Chu, Yongtae Shin:
MAMIP - Interoperation Mechanism of Ad Hoc Network and IP Network. ACIS-ICIS 2005: 133-138 - [c18]Sulyun Sung, Soonho Chu, Yongtae Shin:
An Effective Multicast Communication Based on Locality in Mobile IPv6 Networks. ACIS-ICIS 2005: 610-615 - [c17]Sulyun Sung, Yuhwa Seo, Sangjin Park, Yongtae Shin:
An Efficient Multicast Delivery Mechanism Based on Locality in Mobile IPv6 Networks. International Conference on Internet Computing 2005: 319-324 - [c16]Hoon Ko, Bangyong Sohn, Hayoung Park, Yongtae Shin:
Safe Authentication Method for Security Communication in Ubiquitous. ICCSA (2) 2005: 442-448 - [c15]Youngsoo Pi, Miyoun Yoon, Yongtae Shin:
A Mapping Algorithm for Quality Guaranteed Network Design Based on DiffServ over MPLS Model over UMTS Packet Network. ICOIN 2005: 370-379 - [c14]Sangchul Son, Miyoun Yoon, Kwangkyum Lee, Yongtae Shin:
A Study on Efficient Key Management in Real Time Wireless Sensor Network. MSN 2005: 745-752 - 2004
- [c13]Miyoun Yoon, Yongtae Shin:
On-Demand One-Time Overlay Multicast Tree for Multimedia Transmission over Large Internet Environment. IEEE SCC 2004: 541-546 - [c12]Seonho Kim, Miyoun Yoon, Yongtae Shin:
Placement Algorithm of Web Server Replicas. ICCSA (1) 2004: 328-336 - [c11]Kiyoung Kim, Myung-Kyu Yi, Yongtae Shin, Jaesoo Kim:
A State-Based Fast Handover Scheme for Hierarchical Mobile IPv6. ICOIN 2004: 174-183 - [c10]Sulyun Sung, Jungho Kang, Yongtae Shin:
VPN Traversal Scheme in Hierarchical Mobile Environment. International Conference on Wireless Networks 2004: 270-278 - [c9]Seonho Kim, Sulyun Sung, Jinhong Park, Yongtae Shin:
A Redirection Mechanism for a Dynamic Load Balancing on Heterogeneous Distributed Replica Servers. PDPTA 2004: 267-270 - [c8]Seonho Kim, Miyoun Yoon, Jinhong Park, Yongtae Shin:
Replica Placement Mechanism through Determining Upper Bound Access Cost. PDPTA 2004: 1331-1335 - 2003
- [c7]Miyoun Yoon, Kiyoung Kim, Yongtae Shin:
Robust Multimedia Authentication in Mobile Multicast Environment. Security and Management 2003: 551-557 - [c6]Miyoun Yoon, Kiyoung Kim, Yongtae Shin:
Robust Authentication of Multimedia Stream over Multicast Network. Human.Society@Internet 2003 2003: 632-637 - [c5]Kiyoung Kim, Miyoun Yoon, Yongtae Shin:
Error Recovery Algorithm for Multimedia Stream in the Tree-Based Multicast Environments. ICOIN 2003: 243-252 - [c4]Kiyoung Kim, Miyoun Yoon, Yongtae Shin:
Adaptive Mobile Multicast Guaranteed QoS over Heterogeneous Network. International Conference on Wireless Networks 2003: 520-526 - [c3]Youngsoo Pi, Kiyoung Kim, Miyoun Yoon, Yongtae Shin:
Reliable Multicasting with Low Control Signaling Via Regional Location Management for Mobile Hosts. PDPTA 2003: 921-927 - 2002
- [c2]Sulyun Sung, Yongtae Shin, Jongwon Choe, Kwangsue Chung:
Mobile Multicast Method Using the Habitude of Movement. ICOIN (2) 2002: 22-31 - [c1]Byunghun Song, Kwangsue Chung, Yongtae Shin:
SRTP: TCP-Friendly Congestion Control for Multimedia Streaming. ICOIN (2) 2002: 529-538
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:41 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint