A secure smart-work service model based OpenStack for Cloud computing JM Kim, HY Jeong, I Cho, SM Kang, JH Park Cluster computing 17, 691-702, 2014 | 26 | 2014 |
An efficient clustering scheme through estimate in centralized hierarchical routing protocol JM Kim, HK Joo, SS Hong, WH Ahn, HB Ryou 2006 International Conference on Hybrid Information Technology 2, 145-152, 2006 | 24 | 2006 |
Study on predictive modeling of incidence of traffic accidents caused by weather conditions YS Chung, RK Park, JM Kim Journal of the Korea Convergence Society 5 (1), 9-15, 2014 | 23 | 2014 |
Data access control method for multimedia content data sharing and security based on XMDR-DAI in mobile cloud storage KD Jung, SJ Moon, JM Kim Multimedia Tools and Applications 76, 19983-19999, 2017 | 19 | 2017 |
Secure authentication system for hybrid cloud service in mobile communication environments JM Kim, JK Moon International Journal of Distributed Sensor Networks 10 (2), 828092, 2014 | 16 | 2014 |
A Novel Approach to Search a Node in MANET JM Kim, IS Han, JB Kwon, HB Ryou 2008 International Conference on Information Science and Security (ICISS …, 2008 | 13 | 2008 |
A study on the clustering scheme for node mobility in mobile ad-hoc network HJ Cha, JM Kim, HB Ryou Advances in Computer Science and its Applications: CSA 2013, 531-535, 2014 | 12 | 2014 |
A study of privacy problem solving using device and user authentication for M2M environments JM Kim, HY Jeong, BH Hong Security and Communication Networks 7 (10), 1528-1535, 2014 | 11 | 2014 |
A study of improved ways of the predicted probability to criminal types YS Chung, JM Kim, KR Park Journal of The Korea Society of Computer and Information 17 (4), 163-172, 2012 | 10 | 2012 |
Fast Fourier transform benchmark on X86 Xeon system for multimedia data processing YS Park, KR Park, JM Kim, HY Jeong Multimedia Tools and Applications 76, 6015-6030, 2017 | 9 | 2017 |
A Secure Authentication Protocol for Cloud Services JK Moon, JM Kim, HR Kim Journal Of Advanced Information Technology And Convergence 1 (2), 33-36, 2011 | 7 | 2011 |
Modify of extended API for Smart-TV security JK Moon, JM Kim Journal of the Korea Convergence Society 5 (2), 1-6, 2014 | 6 | 2014 |
Approach of secure authentication system for hybrid cloud service JM Kim, JK Moon Advances in Computer Science and its Applications: CSA 2013, 1377-1384, 2014 | 5 | 2014 |
Service discovery and delivery system based on Trust in Mobile Ad-Hoc Network IS Han, JM Kim, HB Ryou, WH Ahn 2008 International Conference on Information Science and Security (ICISS …, 2008 | 5 | 2008 |
Multimedia image data processing on smartphone for authentication SJ Kim, JM Kim, IJ Jo Multimedia Tools and Applications 78, 5287-5303, 2019 | 4 | 2019 |
A study on data processing for application of vehicular CPS in fog computing environment HJ Cha, HK Yang, JM Kim, YJ Song Advanced Science Letters 23 (10), 10379-10383, 2017 | 4 | 2017 |
Secure data sharing based on proxy re-encryption in fog computing environment YJ Song, JM Kim Proc. Asia–Pacific Appl. Sci. Eng. Better Hum. Life, 52-56, 2016 | 4 | 2016 |
An Effective Resource Management for Cloud Services using Clustering Schemes JM Kim, JK Moon, BH Hong | 4 | 2013 |
Research of virtualization services valuation for cloud computing environments JM Kim, JK Moon, BH Hong Embedded and Multimedia Computing Technology and Service: EMC 2012, 613-620, 2012 | 4 | 2012 |
A user authentication method for M2M environments JM Kim, HY Jeong, BH Hong Computer Science and Convergence: CSA 2011 & WCC 2011 Proceedings, 589-595, 2012 | 4 | 2012 |