Conference
|
2018 |
Abnormal Traffic Detection Mechanism for Protecting IIoT Environments
Byoung Koo Kim International Conference on Information and Communication Technology Convergence (ICTC) 2018, pp.943-945 |
8 |
원문
|
Journal
|
2017 |
Design of a Security Scheme for High-Rate Close Proximity Point-to-Point Communication
Lee Jae Seung Information : An International Interdisciplinary Journal, v.20, no.8, pp.5703-5708 |
0 |
|
Conference
|
2014 |
Detecting Abnormal Behavior in SCADA Networks Using Normal Traffic Pattern Learning
Byoung Koo Kim International Conference on Computer Science and its Applications (CSA) 2014 (LNEE 330), v.330, pp.121-126 |
9 |
원문
|
Conference
|
2014 |
A Safer Way to Share a Car based on SNS to Increase Use Efficiency of Released Vehicles
Myunghee Son International Carnahan Conference on Security Technology (ICCST) 2014, pp.1-6 |
0 |
원문
|
Journal
|
2011 |
Secure and Scalable Content Sharing Framework for Next-Generation IPTV Service
Seung Min Lee IEICE Transactions on Communications, v.E94.B, no.10, pp.2723-2731 |
0 |
원문
|
Journal
|
2010 |
Design of Security Framework for Next Generation IPTV Service
Seung Min Lee 정보보호학회논문지, v.20, no.6, pp.33-42 |
|
|
Conference
|
2009 |
A Scalable Security Service Model for Reliable End-to-End Media Distribution and Reuse
Moon Yong Hyuk Joint Workshop on Information Security (JWIS) 2009, pp.1-11 |
|
|
Conference
|
2009 |
Protecting IPTV Service Network against Malicious Rendezvous Point
Kwon Hyeok Chan Information Security Applications (WISA) 2009 (LNCS 5932), v.5932, pp.1-9 |
1 |
원문
|
Journal
|
2009 |
Security technologies based on a home gateway for making smart homes secure
Kim Geonwoo Internet Research, v.19, no.2, pp.209-226 |
2 |
원문
|
Journal
|
2008 |
Energy-Efficient Key-Management (EEKM) Protocol for Large-Scale Distributed Sensor Networks
Paek Kwangjin Journal of Information Science and Engineering, v.24, no.6, pp.1837-1858 |
|
|
Journal
|
2007 |
Decentralized Trust in Distributed Networks : a Delegate-based Security Hardening Approach
Gu Jabeom International Journal of Computer Science and Network Security, v.7, no.10, pp.265-272 |
|
|
Conference
|
2007 |
A Design and Implementation of Wireless Sensor Network Security on Nano-Qplus Platform
Kim Jin Won International Conference on Advanced Communication Technology (ICACT) 2007, pp.684-688 |
0 |
원문
|
Conference
|
2006 |
Security Service in Reader on Mobile Phone for Secure Mobile RFID Network
Park Nam Je Applied Cryptography and Network Security, pp.1-11 |
|
|
Conference
|
2006 |
Design of an Extended Architecture for Secure Low-Cost 900MHz UHF Mobile RFID Systems
Park Nam Je International Symposium on Consumer Electronics (ISCE) 2006, pp.666-671 |
8 |
|
Conference
|
2006 |
A Security and Privacy Enhanced Protection Scheme for Secure 900MHz UHF RFID Reader on Mobile Phone
Park Nam Je International Symposium on Consumer Electronics (ISCE) 2006, pp.692-696 |
2 |
|
Conference
|
2006 |
A Security Model for Home Networks with Authority Delegation
Hwang Jin Bum International Conference on Computational Science and Its Applications (ICCSA) 2006 (LNCS 3983), v.3983, pp.360-369 |
6 |
원문
|
Conference
|
2006 |
A Layered Approach to Design of Light-Weight Middleware Systems for Mobile RFID Security (SMRM: Secure Mobile RFID Middleware System)
Park Nam Je Network Operations and Management Symposium (NOMS) 2006, pp.1-4 |
1 |
|
Conference
|
2006 |
WIPI Mobile Platform with Secure Service for Mobile RFID Network Environment
Park Nam Je Asia-Pacific Web Conference (APWeb) 2006 (LNCS 3842), v.3842, pp.741-748 |
136 |
원문
|
Conference
|
2005 |
Design and Implementation of Crypto Co-processor and Its Application to Security Systems
Kim Ho Won International Conference on Computational and Information Science (CIS) 2005 (LNCS 3802), v.3802, pp.1104-1109 |
1 |
원문
|
Conference
|
2005 |
Consideration of UMTS-WLAN Seamless Handover
Hyeyeon Kwon IEEE International Symposium on Multimedia (ISM) 2005, pp.649-654 |
7 |
원문
|
Conference
|
2005 |
A Design of Privacy Conscious RFID System Using Customizing Privacy Policy Based Access Control
Lee Byung-Gil International Conference on Embedded and Ubiquitous Computing (EUC) 2005 (LNCS 3823), v.3823, pp.673-682 |
5 |
원문
|
Journal
|
2005 |
Trusted Certificate Validation Scheme for Open LBS Application Based on XML Web Services
Moon Ki Young International journal of information processing systems, v.1, no.1, pp.86-95 |
|
|
Conference
|
2005 |
Security Frameworks for Open LBS Based on Web Services Security Mechanism
Moon Ki Young International Symposium on Parallel and Distributed Processing and Applications (ISPA) 2005 (LNCS 3759), v.3759, pp.609-618 |
2 |
원문
|
Conference
|
2005 |
A Survivability Model for Cluster System
Khin Mi Mi Aung International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP) 2005 (LNCS 3719), v.3719, pp.73-82 |
4 |
원문
|
Conference
|
2005 |
An Enhanced LBS Security Protocol in Wireless Networks
Park Nam Je International Geoscience and Remote Sensing Symposium (IGARSS) 2005, pp.1594-1597 |
|
|
Conference
|
2005 |
Security Issues in Peer-to-Peer Systems
Jung Tae Kim International Conference on Advanced Communication Technology (ICACT) 2005, pp.1059-1063 |
|
원문
|
Conference
|
2004 |
A Combined Data Mining Approach for DDoS Attack Detection
김미희 International Conference on Information Networking (ICOIN) 2004 (LNCS 3090), v.3090, pp.943-950 |
24 |
원문
|
Conference
|
2004 |
모바일 웹서비스 환경의 안전한 그리드 어플리케이션을 위한 미들웨어 프레임워크
Park Nam Je Grid and Cooperative Computing (GCC) 2004 (LNCS 3252), pp.406-413 |
1 |
원문
|
Conference
|
2004 |
The Implementation of IPsec-Based Internet Security System in IPv4/IPv6 Network
Park So Hee International Conference on AI, Simulation, and Planning in High Autonomy Systems (AIS) 2004 (LNCS 3397), v.3397, pp.109-116 |
0 |
원문
|
Conference
|
2004 |
A XKMS-Based Security Framework for Mobile Grid into the XML Web Services
Park Nam Je International Conference on Computational Science (ICCS) 2004 (LNCS 3038), pp.124-132 |
1 |
원문
|
Conference
|
2004 |
모바일 그리드 응용을 위한 통산 XML 보안 메카니즘
Moon Ki Young International Conference on Computational Science and Its Applications (ICCSA) 2004 (LNCS 3043), pp.776-783 |
0 |
원문
|
Conference
|
2003 |
Mobile IPv6 security while traversing a NAT
Kim Geonwoo International Conference on Networks (ICON) 2003, pp.331-335 |
0 |
원문
|
Conference
|
2002 |
ESES/signature and its applications for secure data exchange
Lee Jae Seung International Workshop on System-on-Chip for Real-Time Applications (IWSOC) 2002, pp.45-50 |
2 |
원문
|