default search action
Jiyoung Lim
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c29]Jiyoung Lim, Soo Kyung Park, Hong Hwan Ahn, Bong Gyou Lee:
Analyzing Diverse Issues on AI Education in South Korea: Focusing on news editorials text mining. ICEMT 2023: 82-87 - [c28]Jiyoung Lim:
An Analysis of Child-Related Metaverse Perceptions through Text Mining: Focusing on comparison with news article and parent communities. ICIIT 2023: 112-116 - 2020
- [c27]Jiyoung Lim, Kyu Yon Lim:
Supporting Groups to Monitor Themselves: Does It Distribute the Interaction? ICLS 2020 - [c26]Jiyoon Kim, Soobin Ahn, Jiyoung Lim:
Protocol Design for Boarding Confirmation Through Arduino Sensing. IMIS 2020: 73-80
2010 – 2019
- 2018
- [c25]Jiyoung Lim, Ji Hyun Lee, Kyu Yon Lim:
Visual Feedback for Asynchronous Online Interaction: Exploratory Study on the Pattern of Other-regulation. ICLS 2018 - [c24]Jiyoung Lim, Inshil Doh, Kijoon Chae:
Dynamic Group Key Management for Efficient Fog Computing. IMIS 2018: 685-694 - [c23]Jiyoung Lim, Sanghyun Lim:
Location Based One-Time Conference Protocol Without Personal Information. PDCAT 2018: 50-55 - 2017
- [j10]Jiyoung Lim, Inshil Doh, Kijoon Chae:
Secure and structured IoT smart grid system management. Int. J. Web Grid Serv. 13(2): 170-185 (2017) - [c22]Jiyoung Lim, Inshil Doh, Kijoon Chae:
Lightweight Authentication for Distributed Mobile P2P Communications. IMIS 2017: 580-589 - 2016
- [j9]Jiyoung Lim, Inshil Doh, Kijoon Chae:
Security system architecture for data integrity based on a virtual smart meter overlay in a smart grid system. Soft Comput. 20(5): 1829-1840 (2016) - [c21]Justin JongSu Song, Jiyoung Lim, Wookey Lee, Jafar Afshar:
Search result diversification using data envelopment analysis. EDB 2016: 156-158 - [c20]Jiyoung Lim, Inshil Doh, Kijoon Chae:
Authentication for Mobile Open IPTV Service Security. IMIS 2016: 381-385 - 2015
- [j8]Inshil Doh, Kijoon Chae, Jiyoung Lim, Min Young Chung:
Authentication and Key Management Based on Kerberos for M2M Mobile Open IPTV Security. Intell. Autom. Soft Comput. 21(4): 543-558 (2015) - [j7]Hae-Duck Joshua Jeong, Woojin Lee, Jiyoung Lim, WooSeok Hyun:
Utilizing a Bluetooth remote lock system for a smartphone. Pervasive Mob. Comput. 24: 150-165 (2015) - [c19]Yongwoo Kwon, Inhyeok Jeon, WooSeok Hyun, Jiyoung Lim, Ilsun You, Hae-Duck Joshua Jeong:
An Enhanced Java-Based Mobile Device Theft Response System. IMIS 2015: 41-46 - [c18]Inshil Doh, Jiyoung Lim, Kijoon Chae:
Secure Authentication for Structured Smart Grid System. IMIS 2015: 200-204 - 2014
- [j6]Hae-Duck Joshua Jeong, Sang-Kug Ye, Jiyoung Lim, Ilsun You, WooSeok Hyun:
A computer remote control system based on speech recognition technologies of mobile devices and wireless communication technologies. Comput. Sci. Inf. Syst. 11(3): 1001-1016 (2014) - [j5]Inshil Doh, Jiyoung Lim, Shi Li, Kijoon Chae:
Pairwise and group key setup mechanism for secure machine-to-machine communication. Comput. Sci. Inf. Syst. 11(3): 1071-1090 (2014) - [c17]Inshil Doh, Jiyoung Lim, Kijoon Chae:
Service Security for Smart Grid System. IMIS 2014: 427-432 - [c16]Hae-Duck Joshua Jeong, Jiyoung Lim, WooSeok Hyun, Woojin Lee:
A Remote Lock System Using Bluetooth Communication. IMIS 2014: 441-446 - 2013
- [j4]Hae-Duck Joshua Jeong, Jiyoung Lim, WooSeok Hyun, Arisu An:
A real-time location-based SNS smartphone application for the disabled population. Comput. Sci. Inf. Syst. 10(2): 747-765 (2013) - [j3]Inshil Doh, Jiyoung Lim, Kijoon Chae:
Key management approach for secure mobile open IPTV service. Comput. Sci. Inf. Syst. 10(2): 843-864 (2013) - [j2]Inshil Doh, Jiyoung Lim, Kijoon Chae:
Code updates based on minimal backbone and group key management for secure sensor networks. Math. Comput. Model. 57(11-12): 2801-2813 (2013) - [c15]Inshil Doh, Jiyoung Lim, Shi Li, Kijoon Chae:
Key Establishment and Management for Secure Cellular Machine-to-Machine Communication. IMIS 2013: 579-584 - [c14]Hae-Duck Joshua Jeong, Sang-Kug Ye, Jiyoung Lim, Ilsun You, WooSeok Hyun, Hee-Kyoung Song:
A Remote Computer Control System Using Speech Recognition Technologies of Mobile Devices. IMIS 2013: 595-600 - [c13]Inshil Doh, Jiyoung Lim, Kijoon Chae:
Secure Aggregation and Attack Detection for Smart Grid System. NBiS 2013: 270-275 - 2012
- [c12]Inshil Doh, Jiyoung Lim, Min Young Chung:
Group Key Management for Secure Mobile IPTV Service. IMIS 2012: 352-357 - [c11]Arisu An, Hae-Duck Joshua Jeong, Jiyoung Lim, WooSeok Hyun:
Design and Implementation of Location-Based SNS Smartphone Application for the Disabled Population. IMIS 2012: 365-370 - [c10]Inshil Doh, Kijoon Chae, Jiyoung Lim, Min Young Chung:
An Improved Security Approach Based on Kerberos for M2M Open IPTV System. NBiS 2012: 754-759 - [c9]Hae-Duck Joshua Jeong, WooSeok Hyun, Jiyoung Lim, Ilsun You:
Anomaly Teletraffic Intrusion Detection Systems on Hadoop-Based Platforms: A Survey of Some Problems and Solutions. NBiS 2012: 766-770 - 2011
- [j1]Inshil Doh, Jiyoung Lim, Kijoon Chae:
Distributed authentication mechanism for secure channel establishment in ubiquitous medical sensor networks. Mob. Inf. Syst. 7(3): 189-200 (2011) - [c8]Jisun Kim, Jiyoung Lim, Kijoon Chae:
Secure Code Dissemination Using Energy-Efficient Minimal Virtual Backbone in Sensor Networks. IMIS 2011: 341-346 - 2010
- [c7]Jisun Kim, Jiyoung Lim, Kijoon Chae:
Energy-Efficient Code Dissemination Using Minimal Virtual Backbone in Sensor Networks. BWCCA 2010: 149-154
2000 – 2009
- 2007
- [c6]Ilsun You, Jiyoung Lim:
Advanced Agent-Delegated Route Optimization Protocol for Efficient Multimedia Services at Low-Battery Devices. MMM (2) 2007: 479-486 - 2006
- [c5]Hayoung Oh, Jiyoung Lim, Kijoon Chae, Jung-Chan Na:
Home Gateway with Automated Real-Time Intrusion Detection for Secure Home Networks. ICCSA (4) 2006: 440-447 - 2003
- [c4]Jiyoung Lim, Ok-kyeung Kim, Yeo-Jin Kim, Ga-Jin Na, Hyunjung Na, Kijoon Chae, Young-Soo Kim, Jung-Chan Na:
Design of Security Enforcement Engine for Active Nodes in Active Networks. ICOIN 2003: 346-356 - 2002
- [c3]Jiyoung Lim, Ki-Joon Chae:
Flow Admission Control for MPLS Support of DiffServ. ICOIN (1) 2002: 480-493 - 2001
- [c2]Jiyoung Lim, Ki-Joon Chae:
Differentiated Link Based QoS Routing Algorithms for Multimedia Traffic in MPLS Networks. ICOIN 2001: 587-592
1990 – 1999
- 1999
- [c1]Jiyoung Lim, Mi-Hee Kim, Ki-Joon Chae:
Predictive and Adaptive Bandwidth Reservation Strategies in Wireless Networks. PDPTA 1999: 121-127
Coauthor Index
aka: Ki-Joon Chae
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:54 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint