default search action
Sungik Jun
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [c25]Baik Song An, Jinho On, Byunggyu Lee, Sumin Jang, Sungik Jun:
Dynamic Power Management for Heterogeneous Server Environments. ICTC 2020: 1599-1601
2010 – 2019
- 2017
- [j2]Dinh-Mao Bui, Yongik Yoon, Eui-Nam Huh, Sungik Jun, Sungyoung Lee:
Energy efficiency for cloud computing system based on predictive optimization. J. Parallel Distributed Comput. 102: 103-114 (2017) - 2016
- [c24]Dinh-Mao Bui, Thien Huynh-The, Sungyoung Lee, Yongik Yoon, Sungik Jun:
Energy savings in processor based on prediction technique. ICOIN 2016: 147-150 - 2015
- [j1]Dinh-Mao Bui, Huu-Quoc Nguyen, Yongik Yoon, Sungik Jun, Muhammad Bilal Amin, Sungyoung Lee:
Gaussian process for predicting CPU utilization and its application to energy efficiency. Appl. Intell. 43(4): 874-891 (2015) - [c23]Dinh-Mao Bui, Thien Huynh-The, Yongik Yoon, Sungik Jun, Sungyoung Lee:
EAP: Energy-Awareness Predictor in Multicore CPU. CSA/CUTE 2015: 361-366
2000 – 2009
- 2008
- [c22]Mooseop Kim, Jaecheol Ryou, Sungik Jun:
Efficient Hardware Architecture of SHA-256 Algorithm for Trusted Mobile Computing. Inscrypt 2008: 240-252 - [c21]HongIl Ju, JeongSook Park, Sungik Jun:
The Need of MTM Interface Specification for the Trusted Mobile Platform. ESA 2008: 167-172 - [c20]Ji-Man Park, Sung-Ik Jun:
A resistance deviation-to-time interval converter for resistive sensors. SoCC 2008: 101-104 - [c19]SuGil Choi, Jin-Hee Han, Jeong-Woo Lee, Jongpil Kim, Sungik Jun:
Implementation of a TCG-Based Trusted Computing in Mobile Device. TrustBus 2008: 18-27 - [c18]Mooseop Kim, Jaecheol Ryou, Sungik Jun:
Compact Implementation of SHA-1 Hash Function for Mobile Trusted Module. WISA 2008: 292-304 - 2007
- [c17]Mooseop Kim, Youngse Kim, Jaecheol Ryou, Sungik Jun:
Efficient Implementation of the Keyed-Hash Message Authentication Code Based on SHA-1 Algorithm for Mobile Trusted Computing. ATC 2007: 410-419 - [c16]Jongpil Kim, Sungik Jun:
Authentication and Key Agreement Method for Home Networks Using a Smart Card. ICCSA (1) 2007: 655-665 - [c15]SuGil Choi, Jin-Hee Han, Sung-Ik Jun:
Improvement on TCG Attestation and Its Implication for DRM. ICCSA (1) 2007: 912-925 - [c14]Kiyeal Lee, Seokhwan Yang, Sungik Jun, Mokdong Chung:
Context-aware security service in RFID/USN environments using MAUT and extended GRBAC. ICDIM 2007: 303-308 - [c13]Janghaeng Lee, Sung-Ho Hwang, Neungsoo Park, Seong-Won Lee, Sungik Jun, Young Soo Kim:
A high performance NIDS using FPGA-based regular expression matching. SAC 2007: 1187-1191 - 2006
- [c12]Minsoo Lee, Sehyun Park, Sungik Jun:
A Security Management Framework with Roaming Coordinator for Pervasive Services. ATC 2006: 302-311 - [c11]Mooseop Kim, Jaecheol Ryou, YongJe Choi, Sungik Jun:
Low Power AES Hardware Architecture for Radio Frequency Identification. IWSEC 2006: 353-363 - 2005
- [c10]Minsoo Lee, Gwanyeon Kim, Sehyun Park, Ohyoung Song, Sungik Jun:
Predictive Mobility Support with Secure Context Management for Vehicular Users. Net-Con 2005: 21-28 - [c9]Minsoo Lee, Gwanyeon Kim, Sehyun Park, Sungik Jun, Jaehoon Nah, Ohyoung Song:
Efficient 3G/WLAN Interworking Techniques for Seamless Roaming Services with Location-Aware Authentication. NETWORKING 2005: 370-381 - 2004
- [c8]Minsoo Lee, Jintaek Kim, Sehyun Park, Ohyoung Song, Sungik Jun:
A Location-Aware Secure Interworking Architecture Between 3GPP and WLAN Systems. ICISC 2004: 394-406 - [c7]Yoon-Sim Yang, Min-Sik Jin, Sung-Ik Jun, Min-Soo Jung:
A study on an efficient pre-resolution method for embedded Java system. VECIMS 2004: 20-24 - 2003
- [c6]Sangwoo Lee, Yun-kyung Lee, Youngsae Kim, Youngsoo Park, Sung-Ik Jun, Kyo-Il Chung:
Implementation of an Elliptic Curve Cryptography Hardware Accelerator for Smart Cards. Security and Management 2003: 607-610 - [c5]Jeung-Bo Cho, Min-Soo Jung, Sung-Ik Jun:
An Efficient Small Sized On-Card Verifier for Java Card. ICCSA (2) 2003: 552-561 - [c4]Junhyung Um, Sangwoo Lee, Youngsoo Park, Sungik Jun, Taewhan Kim:
An efficient inverse multiplier/divider architecture for cryptography systems. ISCAS (5) 2003: 149-152 - 2002
- [c3]Jin-Hee Han, Young-Jin Kim, Sung-Ik Jun, Kyo-Il Chung, Chang-Ho Seo:
Implementation of ECC/ECDSA Cryptography Algorithms Based on Java Card. ICDCS Workshops 2002: 272-278
1990 – 1999
- 1998
- [c2]Sungik Jun, Hyeoung Kyu Chang, W. Choi, Young Man Kim:
Stand-by loading scheme: an effective software retrofit method for a switching system. ISCC 1998: 343-347 - 1995
- [c1]Boo-Geum Jung, Young-Jun Cha, Hyung-Hwan Kim, Sung-Ik Jun, Ju-Hyun Cho:
Dynamic code binding for scalable operating system in distributed real-time systems. RTCSA 1995: 96-
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-27 21:28 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint