Conference
|
2024 |
Design of Data Transmission in High-Frequency Wireless Backhaul Networks
Kim Jun Sik International Conference on Information and Communication Technology Convergence (ICTC) 2024, pp.697-698 |
0 |
원문
|
Journal
|
2024 |
Blockchain-Enabled Key Aggregate Searchable Encryption Scheme for Personal Health Record Sharing With Multidelegation
Lee Joonyoung IEEE Internet of Things Journal, v.11, no.10, pp.17482-17494 |
12 |
원문
|
Conference
|
2023 |
Design and Implementation of Blockchain Data Analysis Platform
Jang Mi Young International Conference on Big Data (Big Data) 2023, pp.6169-6171 |
0 |
원문
|
Conference
|
2023 |
Understanding Integrity of Time Series IoT Datasets through Local Outlier Detection with Steep Peak and Valley
Yoonjungeun International Conference on Information Technology (ICIT) 2023, pp.126-133 |
0 |
원문
|
Conference
|
2023 |
Marmot: a Light-weight Secure SRv6 Header Authentication System
Park Sae Hyong International Conference on Information and Communication Technology Convergence (ICTC) 2023, pp.1377-1380 |
0 |
원문
|
Journal
|
2023 |
Convolutional Autoencoder-Based Anomaly Detection for Photovoltaic Power Forecasting of Virtual Power Plants
박태섭 Energies, v.16, no.14, pp.1-20 |
8 |
원문
|
Journal
|
2023 |
LAKA-UAV: Lightweight authentication and key agreement scheme for cloud-assisted Unmanned Aerial Vehicle using blockchain in flying ad-hoc networks
Yusungjin Computer Networks, v.224, pp.1-15 |
36 |
원문
|
Conference
|
2019 |
Canary
Shin Yong Yoon Conference on Information-Centric Networking (ICN) 2019, pp.167-168 |
1 |
원문
|
Conference
|
2017 |
Mobile Crowd Sensing based on CICN
You Tae Wan International Conference on Information and Communication Technology Convergence (ICTC) 2017, pp.1273-1276 |
7 |
원문
|
Conference
|
2015 |
A Cyber Blackbox for Collecting Network Evidence
Jooyoung Lee SRI Security Congress 2015, pp.141-147 |
|
|
Conference
|
2013 |
An Efficient Data Integrity Scheme for Preventing Falsification of Car Black Box
Kim Moo Seop International Conference on Information and Communication Technology Convergence (ICTC) 2013, pp.1020-1021 |
7 |
원문
|
Conference
|
2012 |
Improvement of the Hash Based RFID Mutual Authentication Protocol using a Secret Value
Ju Seok Shin International Symposium on Advances in Cryptography, Security and. Applications for Future Computing (ACSA) 2012, pp.1-5 |
|
|
Journal
|
2010 |
Recovery of Flash Memories for Reliable Mobile Storages
Moon Dae Sung Mobile Information Systems, v.6, no.2, pp.177-191 |
6 |
원문
|
Conference
|
2010 |
A Freshness Based Persistent Assurance Scheme for Secure Scalable Media Distribution
Moon Yong Hyuk International Conference on Cooperative Design, Visualization, and Engineering (CDVE) 2010 (LNCS 6240), v.6240, pp.97-100 |
0 |
원문
|
Conference
|
2006 |
Design of Lightweight Security Protocol for Electronic Seal Data Protection
Yousung Kang International Workshop on Information Security Applications (WISA) 2006 (LNCS 4298), v.4298, pp.517-531 |
|
|
Conference
|
2006 |
The Design and Implementation of MAC Security in EPON
Kyeong-Soo Han International Conference on Advanced Communication Technology (ICACT) 2006, pp.1673-1676 |
13 |
|
Conference
|
2005 |
The Implementation of the Link Security Module in an EPON Access Network
Kim Kwang Ok Asia-Pacific Conference on Communications (APCC) 2005, pp.1-5 |
7 |
원문
|
Conference
|
2005 |
Kernel Migration of Transport Layer Security
Kim Geonwoo International Conference on Advanced Communication Technology (ICACT) 2005, pp.69-71 |
|
원문
|