Journal
|
2024 |
Vectorized Implementation of Kyber and Dilithium on 32-bit Cortex-A Series
김영범 IEEE Access, v.12, pp.104414-104428 |
1 |
원문
|
Conference
|
2023 |
Security enhancement scheme for mobile device using H/W cryptographic module
Yoon Seung Yong International Conference on Information and Communication Technology Convergence (ICTC) 2023, pp.1450-1452 |
2 |
원문
|
Conference
|
2018 |
ATHENA: A Pagerank-based Scheme to Solve the Thundering Herd in Authentication
Chao Chen Vehicular Networking Conference (VNC) 2018, pp.1-4 |
0 |
원문
|
Conference
|
2018 |
Route Plan Exchange Scheme based on Block Chain
Chung Do Young International Conference on Ubiquitous and Future Networks (ICUFN) 2018, pp.697-699 |
1 |
원문
|
Conference
|
2017 |
CAESAR: A criticality-aware ECDSA signature verification scheme with Markov model
Chao Chen Vehicular Networking Conference (VNC) 2017, pp.1-4 |
4 |
원문
|
Conference
|
2016 |
Method for Providing Reliable Peer Activity Report for Managed P2P Communications
Wook Hyun International Conference on Advanced Communication Technology (ICACT) 2016, pp.470-473 |
0 |
원문
|
Journal
|
2015 |
New efficient batch verification for an identity‐based signature scheme
Jung Yeon Hwang Security and Communication Networks, v.8, no.15, pp.2524-2535 |
4 |
원문
|
Journal
|
2008 |
TinyECCK:Efficient Implementation of Elliptic Curve Cryptosystem over GF(2m) on 8-bit Micaz Mote
서석충 정보보호학회논문지, v.18, no.3, pp.9-21 |
|
|
Journal
|
2008 |
TinyECCK: Efficient Elliptic Curve Cryptography Implementation over GF(2m) on 8-Bit Micaz Mote
서석충 IEICE Transactions on Information and Systems, v.E91-D, no.5, pp.1338-1347 |
34 |
원문
|
Conference
|
2008 |
A New Forensic Image Format for High Capacity Disk Storage
Lee Sang Su International Conference on Information Security and Assurance (ISA) 2008, pp.399-402 |
7 |
원문
|
Conference
|
2008 |
A Study of Providing the Integrity on Cluster System
Lim Jae Deok International Conference on Advanced Communication Technology (ICACT) 2008, pp.1925-1928 |
2 |
원문
|
Journal
|
2008 |
A New Security Protocol Based on Elliptic Curve Cryptosystems for Securing Wireless Sensor Networks
서석충 Telecommunications Review, v.18, no.1, pp.112-126 |
|
|
Conference
|
2007 |
XML Digital signature System based on Mobile Environment
학일명 한국해양정보통신학회 종합 학술 대회 (추계) 2007, pp.701-704 |
|
|
Conference
|
2006 |
Secure Message Delivery Mechanism on Structured Overlay Network
Nah Jae Hoon Joint Workshop on Information Security (JWIS) 2006, pp.1-8 |
|
|
Conference
|
2006 |
VO Authentication Framework in Grid Environment Using Digital Signature
이성현 International Conference on Computational Science and Its Applications (ICCSA) 2006 (LNCS 3981), v.3981, pp.945-953 |
1 |
원문
|
Conference
|
2006 |
Identity Based KCDSA Signcryption
Ryu Jong Ho International Conference on Advanced Communication Technology (ICACT) 2006, pp.1369-1374 |
4 |
|
Conference
|
2005 |
XML-Based Digital Signature Accelerator in Open Mobile Grid Computing
Park Nam Je International Conference on Grid and Cooperative Computing (GCC) 2005 (LNCS 3795), v.3795, pp.323-333 |
0 |
원문
|
Conference
|
2005 |
Implementation of Streamlining PKI System for Web Services
Park Nam Je International Conference on Computational Science and Its Applications (ICCSA) 2005 (LNCS 3480), v.3480, pp.609-618 |
2 |
원문
|
Conference
|
2005 |
Method of securely transferring programmable packet using digital signatures having access-controlled high-security verification key
Kim Youngsoo International Conference on Advanced Communication Technology (ICACT) 2005, pp.1208-1211 |
|
원문
|
Conference
|
2004 |
Dynamic Adaptive Learning Mobile Agents for Multi-modal Input Collaboration in Home Environment
김두현 International Conference onCommunications Systems (ICCS) 2004, pp.345-350 |
1 |
원문
|
Journal
|
2002 |
Implementation of Key Recovery Model based on XML for B2B
Kim Ju Han 정보보호학회논문지, v.12, no.5, pp.53-61 |
|
|
Conference
|
2001 |
ESES/j-Crypto and its application
Jooyoung Lee International Symposium on Industrial Electronics (ISIE) 2001, pp.1373-1377 |
|
원문
|