|
Journal
|
2013 |
Comments on an Improved RFID Security Protocol for ISO/IEC WD 29167-6
Yousung Kang ETRI Journal, v.35, no.1, pp.170-172 |
8 |
원문
|
|
Conference
|
2012 |
Safe Bit Mixing Method on Pattern Analysis in RFID Environment
Kim Young Back International Symposium on Embedded Technology (ISET) 2012, pp.1-3 |
|
|
|
Journal
|
2011 |
Security Improvement of an RFID Security Protocol of ISO/IEC WD 29167-6
송보연 IEEE Communications Letters, v.15, no.12, pp.1375-1377 |
14 |
원문
|
|
Conference
|
2009 |
The Design of an RFID Security Protocol For Saving in DB Transaction Costs
Paek Kwangjin International Conference on Advanced Communication Technology (ICACT) 2009, pp.1937-1939 |
|
|
|
Conference
|
2008 |
Multilateral Approaches to the Mobile RFID Security Problem Using Web Service
Park Nam Je Asia Pacific Conference on Web Technology (APWeb) 2008 (LNCS 4976), v.4976, pp.331-341 |
23 |
원문
|
|
Conference
|
2006 |
A Security and Privacy Enhanced Protection Scheme for Secure 900MHz UHF RFID Reader on Mobile Phone
Park Nam Je International Symposium on Consumer Electronics (ISCE) 2006, pp.692-696 |
2 |
|
|
Conference
|
2006 |
Security Service in Reader on Mobile Phone for Secure Mobile RFID Network
Park Nam Je Applied Cryptography and Network Security, pp.1-11 |
|
|
|
Conference
|
2006 |
A Layered Approach to Design of Light-Weight Middleware Systems for Mobile RFID Security (SMRM: Secure Mobile RFID Middleware System)
Park Nam Je Network Operations and Management Symposium (NOMS) 2006, pp.1-4 |
1 |
|
|
Conference
|
2006 |
WIPI Mobile Platform with Secure Service for Mobile RFID Network Environment
Park Nam Je Asia-Pacific Web Conference (APWeb) 2006 (LNCS 3842), v.3842, pp.741-748 |
136 |
원문
|
|
Conference
|
2005 |
Design and Implementation of Crypto Co-processor and Its Application to Security Systems
Kim Ho Won International Conference on Computational and Information Science (CIS) 2005 (LNCS 3802), v.3802, pp.1104-1109 |
1 |
원문
|
|
Conference
|
2005 |
Security Considerations for RFID Technology Adoption
Park Joo Sang International Conference on Advanced Communication Technology (ICACT) 2005, pp.797-803 |
|
원문
|