Sung Je HONG


Security Condition for Exact Localization in Wireless Ad Hoc Networks
Jin Seok KIM Dae Hyun YUM Sung Je HONG Jong KIM Pil Joong LEE 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2012/07/01
Vol. E95-B  No. 7  pp. 2459-2462
Type of Manuscript:  LETTER
Category: Network
Keyword: 
secure localizationwireless ad hoc networks
 Summary | Full Text:PDF

Lightweight Distance Bounding Protocol against Relay Attacks
Jin Seok KIM Kookrae CHO Dae Hyun YUM Sung Je HONG Pil Joong LEE 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2012/04/01
Vol. E95-D  No. 4  pp. 1155-1158
Type of Manuscript:  LETTER
Category: Information Network
Keyword: 
securityauthenticationrelay attackmafia fraud attackdistance bounding protocol
 Summary | Full Text:PDF

Fast Verification of Hash Chains with Reduced Storage
Dae Hyun YUM Jin Seok KIM Pil Joong LEE Sung Je HONG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/01/01
Vol. E94-A  No. 1  pp. 383-391
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
hash chainprogressive verificationcheck-bit scheme
 Summary | Full Text:PDF

Dynamic Two-Tier Cell Structure for Bandwidth Reservation of Handoffs in Cellular Networks
Jae Keun PARK Wan Yeon LEE Sung Je HONG Jong KIM 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/10/01
Vol. E91-A  No. 10  pp. 3003-3005
Type of Manuscript:  Special Section LETTER (Special Section on Smart Multimedia & Communication Systems)
Category: Mobile Information Network
Keyword: 
two-tier celldynamic reservationhandoff probabilityadaptive bandwidth reservation
 Summary | Full Text:PDF

An Adaptive FEC Scheme for Firm Real-Time Multimedia Communications in Wireless Networks
Kyong Hoon KIM Jong KIM Sung Je HONG 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2005/07/01
Vol. E88-B  No. 7  pp. 2794-2801
Type of Manuscript:  Special Section PAPER (Special Section on Mobile Multimedia Communications)
Category: 
Keyword: 
wireless technologiesreal-time multimedia communicationswindow-constrained task model(m, k)-firm task modelerror correcting codes
 Summary | Full Text:PDF

Probabilistic Checkpointing
Hyochang NAM Jong KIM Sung Je HONG Sunggu LEE 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2002/07/01
Vol. E85-D  No. 7  pp. 1093-1104
Type of Manuscript:  PAPER
Category: Fault Tolerance
Keyword: 
checkpointingencodingrollback recoveryfault tolerancealiasing
 Summary | Full Text:PDF

Evaluation of Two Load-Balancing Primary-Backup Process Allocation Schemes
Heejo LEE Jong KIM Sung Je HONG 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 1999/12/25
Vol. E82-D  No. 12  pp. 1535-1544
Type of Manuscript:  PAPER
Category: Fault Tolerant Computing
Keyword: 
primary-backup replicationmultiple faultsfault-tolerant multi-computerload balancing process allocationreliability analysis
 Summary | Full Text:PDF

A Boolean Factorization Using an Extended Boolean Matrix
Oh-Hyeong KWON Sung Je HONG Jong KIM 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 1998/12/25
Vol. E81-D  No. 12  pp. 1466-1472
Type of Manuscript:  PAPER
Category: Computer Hardware and Design
Keyword: 
factored formkernelcokernelBoolean matrixrectangle covering
 Summary | Full Text:PDF