Namhi KANG


Enhanced Predictive Handover for Fast Proxy Mobile IPv6
Seil JEON Namhi KANG Younghan KIM 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2009/11/01
Vol. E92-B  No. 11  pp. 3504-3507
Type of Manuscript:  LETTER
Category: Internet
Keyword: 
Proxy Mobile IPv6 (PMIPv6)seamless handoverMedia-Independent Handover (MIH)
 Summary | Full Text:PDF

Enhanced PMIPv6 Route Optimization Handover
Seil JEON Namhi KANG Younghan KIM Wonsik YOON 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2008/11/01
Vol. E91-B  No. 11  pp. 3715-3718
Type of Manuscript:  LETTER
Category: Internet
Keyword: 
Proxy Mobile IPv6PMIPv6 RO handoverenhanced PMIPv6 route optimization handovercontext transfer
 Summary | Full Text:PDF

A Novel Approach to Overlay Multicasting Schemes for Multi-Hop Ad-Hoc Networks
Namhi KANG Jejun OH Younghan KIM 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2008/06/01
Vol. E91-B  No. 6  pp. 1862-1873
Type of Manuscript:  PAPER
Category: Network
Keyword: 
ad-hoc networksoverlay multicastingroutingredundancyperformance evaluation
 Summary | Full Text:PDF | (Errata[Uploaded on August 1,2008])

Localized Proxy-MIPv6 with Route Optimization in IP-Based Networks
Sihun PARK Namhi KANG Younghan KIM 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2007/12/01
Vol. E90-B  No. 12  pp. 3682-3686
Type of Manuscript:  LETTER
Category: Internet
Keyword: 
Mobile IPv6Proxy Mobile IPv6Hierarchical Mobile IPv6fluid-flow model
 Summary | Full Text:PDF

Integrated Authentication Model for Network Access in Next Generation Networks
Kihun HONG Souhwan JUNG Namhi KANG Younghan KIM 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2007/11/01
Vol. E90-B  No. 11  pp. 3246-3249
Type of Manuscript:  LETTER
Category: Fundamental Theories for Communications
Keyword: 
NGNauthenticationEAPhandover
 Summary | Full Text:PDF

Security Analysis of DoS Vulnerability in Stream Authentication Schemes Using Hash Chaining
Namhi KANG Christoph RULAND 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2005/03/01
Vol. E88-B  No. 3  pp. 1264-1265
Type of Manuscript:  LETTER
Category: Internet
Keyword: 
stream authentication schemeshash chainingdenial of service(DoS) attack
 Summary | Full Text:PDF