Journal
|
2024 |
Overview of RIS-enabled secure transmission in 6G wireless networks
Jungsook Bae Digital Communications and Networks, v.10, no.6, pp.1553-1565 |
14 |
원문
|
Journal
|
2024 |
Overview of RIS-enabled secure transmission in 6G wireless networks
Waqas Khalid Digital Communications and Networks, v.10, no.6, pp.1553-1565 |
14 |
원문
|
Conference
|
2021 |
Price Control-based Decentralized Electric Vehicle Charging Coordination by Arbitration Type Aggregators for Smart Buildings
윤승욱 IEEE International Smart Cities Conference (ISC2) 2021, pp.1-4 |
2 |
원문
|
Journal
|
2019 |
Analysis of Blockchain-based Access Control Technology
Kim Seung-Hyun 전자통신동향분석, v.34, no.4, pp.117-128 |
|
원문
|
Journal
|
2018 |
How Do Multilevel Privacy Controls Affect Utility-privacy Trade-offs When Used in Mobile Applications?
Kim Seung-Hyun ETRI Journal, v.40, no.6, pp.813-823 |
3 |
원문
|
Journal
|
2017 |
Quality of Private Information (QoPI) Model for Effective Representation and Prediction of Privacy Controls in Mobile Computing
Kim Seung-Hyun Computers & Security, v.66, pp.1-19 |
5 |
원문
|
Conference
|
2015 |
Detecting Malware with Similarity to Android Applications
Park Won-Joo International Conference on Information and Communication Technology Convergence (ICTC) 2015, pp.1252-1254 |
|
|
Conference
|
2015 |
Effects of Contextual Properties on Users' Privacy Preferences in Mobile Computing Environments
Kim Seung-Hyun International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) 2015, pp.507-514 |
8 |
원문
|
Conference
|
2014 |
Attacks about Channel Bonding on WLAN
Chung Do Young International Conference on IT Convergence and Security (ICITCS) 2014, pp.1-3 |
0 |
원문
|
Journal
|
2013 |
Energy‐efficient replica detection for resource‐limited mobile devices in the internet of things
Kwantae Cho IET Communications, v.7, no.18, pp.2141-2150 |
9 |
원문
|
Conference
|
2013 |
DroidVulMon -- Android Based Mobile Device Vulnerability Analysis and Monitoring System
함유정 International Conference on Next Generation Mobile Apps, Services and Technologies (NGMAST) 2013, pp.26-31 |
8 |
원문
|
Journal
|
2013 |
Personal Lifelog Upstreaming System for Secure and Reliable Lifelog Transmission
Kwon Yongjin International Journal of Information Processing and Management, v.4, no.2, pp.36-44 |
2 |
원문
|
Conference
|
2012 |
A Platform as a Service for Smart Home
Eom Bo Yun International Conference on Information and Multimedia Technology (ICIMT) 2012, pp.1-4 |
|
|
Conference
|
2012 |
PLUS: Personal Lifelog Upstreaming System
Kwon Yongjin International Conference on Computing and Convergence Technology (ICCCT) 2012, pp.278-283 |
|
|
Journal
|
2010 |
Prevent Illegal Access Control for Secure Healthcare System
Dae-Hee Seo 전기학회논문지, v.59, no.3, pp.657-663 |
|
|
Conference
|
2007 |
Usability Enhanced Privacy Protection System Based on Users' Responses
Han-Gyu Ko International Symposium on Consumer Electronics (ISCE) 2007, pp.1-6 |
4 |
원문
|
Conference
|
2007 |
SNMP-based Integrated Wire/wireless Device Management System
정수진 International Conference on Advanced Communication Technology (ICACT) 2007, pp.995-998 |
3 |
원문
|
Conference
|
2006 |
On the Study of Service Security Model for Privacy using Global User Management Framework
Choi Byeong Cheol International Conference on Advanced Communication Technology (ICACT) 2006, pp.113-116 |
2 |
|
Conference
|
2005 |
The Method of P2P Traffic Detecting for P2P Harmful Contents Prevention
Lee Ho Gyun International Conference on Advanced Communication Technology (ICACT) 2005, pp.777-780 |
|
원문
|