Journal
|
2024 |
gShock: A GNN-Based Fingerprinting System for Permissioned Blockchain Networks Over Encrypted Channels
김재한 IEEE Access, v.12, pp.146328-146342 |
0 |
원문
|
Journal
|
2024 |
gShock: A GNN-Based Fingerprinting System for Permissioned Blockchain Networks Over Encrypted Channels
Seo Minjae IEEE Access, v.12, pp.146328-146342 |
0 |
원문
|
Journal
|
2024 |
DTR-SHIELD: Mutual Synchronization for Protecting against DoS Attacks on the SHIELD Protocol with AES-CTR Mode
Lee Sang Su Sensors, v.24, no.13, pp.1-18 |
1 |
원문
|
Journal
|
2022 |
A Robust Authentication Protocol for Wireless Medical Sensor Networks Using Blockchain and Physically Unclonable Functions
Yusungjin IEEE Internet of Things Journal, v.9, no.20, pp.20214-20228 |
94 |
원문
|
Journal
|
2022 |
SALS-TMIS: Secure, Anonymous, and Lightweight Privacy-Preserving Scheme for IoMT-Enabled TMIS Environments
Yusungjin IEEE Access, v.10, pp.60534-60549 |
16 |
원문
|
Journal
|
2021 |
Lightweight Three-Factor-Based Privacy- Preserving Authentication Scheme for IoT-Enabled Smart Homes
Yusungjin IEEE Access, v.9, pp.126186-126197 |
55 |
원문
|
Journal
|
2021 |
Comments on “ALAM: Anonymous Lightweight Authentication Mechanism for SDN Enabled Smart Homes”
Yusungjin IEEE Access, v.9, pp.49154-49159 |
21 |
원문
|
Journal
|
2020 |
Secure Key Agreement and Authentication Protocol for Message Confirmation in Vehicular Cloud Computing
이준영 Applied Sciences, v.10, no.18, pp.1-20 |
15 |
원문
|
Journal
|
2020 |
A Secure and Efficient Three-Factor Authentication Protocol in Global Mobility Networks
유성진 Applied Sciences, v.10, no.10, pp.1-23 |
23 |
원문
|
Journal
|
2020 |
Privacy-Preserving Lightweight Authentication Protocol for Demand Response Management in Smart Grid Environment
유성진 Applied Sciences, v.10, no.5, pp.1-26 |
38 |
원문
|
Conference
|
2019 |
Implementation of UAS Identification and Authentication on OneM2M IoT Platform
Keonwoo Kim International Conference on Information and Communication Technology Convergence (ICTC) 2019, pp.948-950 |
4 |
원문
|
Journal
|
2019 |
Fuzzy Vector Signature and Its Application to Privacy-Preserving Authentication
서민혜 IEEE Access, v.7, pp.69892-69906 |
5 |
원문
|
Journal
|
2018 |
Construction of a New Biometric-Based Key Derivation Function and Its Application
서민혜 Security and Communication Networks, v.2018, pp.1-15 |
6 |
원문
|
Journal
|
2015 |
Tag-Reader Mutual Authentication Protocol for Safe RFID/USN Environments
Bang Hyochan Information : An International Interdisciplinary Journal, v.18, no.12, pp.5103-5116 |
0 |
|
Conference
|
2015 |
Security Analysis on RFID Mutual Authentication Protocol
Yousung Kang International Workshop on Information Security Applications (WISA) 2015 (LNCS 9503), v.9503, pp.65-74 |
4 |
원문
|
Conference
|
2015 |
A Design of Authentication Method Based on Magnetic Field Area Network
Juyoung Park International Conference on Convergence and its Application (ICCA) 2015, v.10, no.13, pp.33574-33576 |
0 |
|
Journal
|
2014 |
Performance Improvement Based Authentication Protocol for Intervessel Traffic Service Data Exchange Format Protocol Based on U-Navigation System in WoT Environment
Lee Byung-Gil Journal of Applied Mathematics, v.2014, pp.1-7 |
7 |
원문
|
Journal
|
2014 |
Architecture for Dynamic Security Services in Overlay Network Environments
Dae-Hee Seo Information : An International Interdisciplinary Journal, v.17, no.5, pp.1877-1884 |
0 |
|
Journal
|
2013 |
Improved An Hash-based RFID Authentication Protocol Using a Random Number
Ju Seok Shin 보안공학연구논문지, v.10, no.3, pp.279-290 |
|
|
Conference
|
2012 |
Improvement of the Hash Based RFID Mutual Authentication Protocol using a Secret Value
Ju Seok Shin International Symposium on Advances in Cryptography, Security and. Applications for Future Computing (ACSA) 2012, pp.1-5 |
|
|
Journal
|
2012 |
Improved An RFID Mutual Authentication Protocol based on Hash Function
Ju Seok Shin 한국통신학회논문지 C : 융합기술, v.37C, no.3, pp.241-250 |
|
|
Conference
|
2012 |
Improvement of the Mutual Authentication Protocol for RFID
Ju Seok Shin International Conference on Affective Computing and Intelligent Interaction (ICACII) 2012, pp.76-83 |
|
|
Journal
|
2011 |
Reducing Communication Overhead for Nested NEMO Networks: Roaming Authentication and Access Control Structure
임형진 IEEE Transactions on Vehicular Technology, v.60, no.7, pp.3408-3423 |
6 |
원문
|
Conference
|
2011 |
Security Enhanced Authentication Protocol for UHF Passive RFID System
Choi Su Na International Conference on Wireless and Mobile Communications (ICWMC) 2011, pp.307-311 |
|
|
Journal
|
2010 |
Improved Delegation-Based Authentication Protocol for Secure Roaming Service with Unlinkability
Youn Taek Young IEEE Communications Letters, v.14, no.9, pp.791-793 |
18 |
원문
|
Conference
|
2008 |
How to Integrate Diverse Client Authentication Protocol with Various Authentication Means
Lee Hyung Kyu International Conference on Security and Management (SAM) 2008, pp.1-5 |
|
|
Conference
|
2007 |
JavaCard-based Two-Level User Key Management for IP Conditional Access Systems
Moon Jin Young International Conference on Networks (ICON) 2007, pp.72-76 |
11 |
원문
|
Conference
|
2006 |
A Secure Authentication Protocol for Home Network using an ID/PW
Ju Hong Il International Ubiquitous Convergence Conference (IUC) 2006, pp.1-5 |
|
|
Conference
|
2006 |
A Study on RFID Authentication Protocol for Location Privacy Protection
박장수 International Conference on Hybrid Information Technology (ICHIT) 2006 (LNCS 4413), v.4413, pp.1-9 |
|
|
Conference
|
2006 |
Capacity Planning for Scalable Fingerprint Authentication
박병관 International Conference on Knowledge-Based and Intelligent Information and Engineering Systems (KES) 2006 (LNCS 4251), v.4251, pp.906-915 |
0 |
원문
|
Conference
|
2006 |
Efficient and User Friendly Inter-domain Device Authentication/Access Control for Home Networks
Hwang Jin Bum International Conference on Embedded and Ubiquitous Computing (EUC) 2006 (LNCS 4096), v.4096, pp.131-140 |
13 |
원문
|
Conference
|
2006 |
EAP Using the Split Password-Based Authenticated Key Agreement
Ryu Jong Ho International Workshop on Information Security Applications (WISA) 2006 (LNCS 4298), v.4298, pp.364-380 |
0 |
원문
|
Conference
|
2006 |
Two Layered PKI Model for Device Authentication in Multi-Domain Home Networks
Hwang Jin Bum International Symposium on Consumer Electronics (ISCE) 2006, pp.634-639 |
3 |
|
Conference
|
2006 |
Performance of an Efficient Performing Authentication to Obtain Access to Public Wireless LAN with a Cache Table
Hyun-Woo Lee International Conference on Communications (ICC) 2006, pp.2376-2381 |
1 |
원문
|
Conference
|
2005 |
Design of an Authentication Protocol for Secure Electronic Seals
박성수 International Conference on Information Systems (ICIS) 2005, pp.1-5 |
|
|
Conference
|
2004 |
The Implementation of IPsec-Based Internet Security System in IPv4/IPv6 Network
Park So Hee International Conference on AI, Simulation, and Planning in High Autonomy Systems (AIS) 2004 (LNCS 3397), v.3397, pp.109-116 |
0 |
원문
|
Conference
|
2004 |
Design and performance analysis of authentication scheme for interworking between high-speed portable Internet (HPi) system and wireless local area networks (WLANs)
Lim Sun-Hwa Vehicular Technology Conference (VTC) 2004 (Fall), pp.3569-3570 |
|
원문
|
Conference
|
2003 |
Concatenated Wireless Roaming Security Association and Authentication Protocol using ID-Based Cryptography
Lee Byung-Gil Vehicular Technology Conference (VTC) 2003, pp.1507-1511 |
6 |
|
Conference
|
2003 |
Mobile IP and WLAN with AAA Authentication Protocol using Identity-based Cryptography
Lee Byung-Gil International Conference on Telecommunications (ICT) 2003, pp.597-603 |
16 |
원문
|
Conference
|
2002 |
New EAP-TLS based on Password Authentication
Lee Sokjoon 한국정보처리학회 학술 발표 대회 (추계) 2002, pp.1067-1070 |
|
|
Conference
|
2001 |
Armoring password based protocol using zero-knowledge with secret coin tossing
Nyang Daehun International Symposium on Information Theory (ISIT) 2001, pp.139-139 |
0 |
원문
|