Conference
|
2024 |
Masked Background and Object Image based Data Augmentation Method
Whui Kim International Conference on Information and Communication Technology Convergence (ICTC) 2024, pp.1329-1331 |
1 |
원문
|
Conference
|
2021 |
Security Use-cases for Countering Threats of CLA and UAV in 6G
Kijung Bong International Conference on Intelligent Computing and its Emerging Applications (ICEA) 2021, pp.10-15 |
0 |
원문
|
Conference
|
2018 |
Security and Privacy Issues for Healthcare Service in the IoE Environment
Yu Jae Hak International Conference on Digital Contents (DigiCon) 2018, pp.75-77 |
|
|
Conference
|
2018 |
Learning based Biometric Key Generation Method using CNN and RNN
Noh Jong-Hyouk International Conference on Information Technology and Electrical Engineering (ICITEE) 2018, pp.136-139 |
12 |
원문
|
Journal
|
2018 |
Ranking-Based Locality Sensitive Hashing-Enabled Cancelable Biometrics: Index-of-Max Hashing
Zhe Jin IEEE Transactions on Information Forensics and Security, v.13, no.2, pp.393-407 |
193 |
원문
|
Conference
|
2015 |
The Factors of Technology, Organization and Environment Influencing the Adoption and Usage of Big Data in Korean Firms
Jong-Hyun Park European Regional Conference of the International Telecommunications Society 2015, pp.1-14 |
|
|
Journal
|
2012 |
Efficient Scheme of Verifying Integrity of Application Binaries in Embedded Operating Systems
김순석 Journal of Supercomputing, v.59, no.2, pp.676-692 |
2 |
원문
|
Conference
|
2011 |
New mapping system in networks with locator/identifier separation
Jung-Im Kim International Conference on Information and Communication Technology Convergence (ICTC) 2011, pp.733-734 |
0 |
원문
|
Journal
|
2010 |
Secure Face Authentication Framework in Open Networks
Lee Yongjin ETRI Journal, v.32, no.6, pp.950-960 |
1 |
원문
|
Conference
|
2008 |
Design of Network Management Platform and Security Framework for WSN
Lee Byung-Gil International Conference on Signal Image Technology and Internet Based Systems (SITIS) 2008, pp.640-645 |
8 |
원문
|
Conference
|
2008 |
Context-Aware Service System Architecture based on Identity Interchange Layer
Soo Hyung Kim International Conference on Advanced Communication Technology (ICACT) 2008, pp.1482-1486 |
1 |
원문
|
Conference
|
2007 |
Privacy Management for Medical Service Application Using Mobile Phone Collaborated with RFID Reader
Lee Byung-Gil International Conference on Signal Image Technologies and Internet Based System (SITIS) 2007, pp.1053-1057 |
7 |
원문
|
Conference
|
2007 |
A Design of Context Aware Smart Home Safety Management using by Networked RFID and Sensor
Lee Byung-Gil IFIP WG 6.2 Horne Networking Conference (lHN) 2007 (IFIPAICT 256), v.256, pp.215-224 |
4 |
원문
|
Conference
|
2006 |
An RFID System Based MCLT System with Improved Privacy
곽진 International Conference on Embedded and Ubiquitous Computing (EUC) 2006 (LNCS 4097), v.4097, pp.579-590 |
1 |
원문
|
Conference
|
2006 |
Design of an Extended Architecture for Secure Low-Cost 900MHz UHF Mobile RFID Systems
Park Nam Je International Symposium on Consumer Electronics (ISCE) 2006, pp.666-671 |
8 |
|
Conference
|
2006 |
A Security and Privacy Enhanced Protection Scheme for Secure 900MHz UHF RFID Reader on Mobile Phone
Park Nam Je International Symposium on Consumer Electronics (ISCE) 2006, pp.692-696 |
2 |
|
Conference
|
2005 |
A Design of Privacy Conscious RFID System Using Customizing Privacy Policy Based Access Control
Lee Byung-Gil International Conference on Embedded and Ubiquitous Computing (EUC) 2005 (LNCS 3823), v.3823, pp.673-682 |
5 |
원문
|
Conference
|
2005 |
Enhanced Security and Privacy Mechanism of RFID Service for Pervasive Mobile Device
Lee Byung-Gil International Conference on Computational and Information Science (CIS) 2005 (LNCS 3802), v.3802, pp.469-475 |
1 |
원문
|
Conference
|
2005 |
Security and Privacy Management for Effective RFID Lifecycle
Lee Byung-Gil 한국경영정보학회 (KMIS) 학술 대회 2005, pp.1-5 |
|
|