|
Journal
|
2025 |
Optimized implementation of HQC on Cortex-M4
김동천 ICT Express, v.11, no.5, pp.939-944 |
0 |
원문
|
|
Conference
|
2022 |
Enhancing IoT security with PUF-based authentication scheme
Yoon Seung Yong International Conference on Information and Communication Technology Convergence (ICTC) 2022, pp.2319-2321 |
4 |
원문
|
|
Conference
|
2022 |
Reinforcement of IoT Open Platform Security using PUF -based Device Authentication
Byoung Koo Kim International Conference on Information and Communication Technology Convergence (ICTC) 2022, pp.1969-1971 |
5 |
원문
|
|
Conference
|
2019 |
Security Considerations for In-Vehicle Secure Communication
Ju Hong Il International Conference on Information and Communication Technology Convergence (ICTC) 2019, pp.1404-1406 |
15 |
원문
|
|
Journal
|
2018 |
A UAV-Aided Cluster Head Election Framework and Applying Such to Security-Driven Cluster Head Election Schemes: A Survey
Wang/Kicheoul Security and Communication Networks, v.2018, pp.1-18 |
10 |
원문
|
|
Conference
|
2017 |
Side Channel Attack on Digital Door Lock with Vibration Signal Analysis: Longer Password does not Guarantee Higher Security Level
Youngmok Ha International Conference on Multisensor Fusion and Integration for Intelligent Systems (MFI) 2017, pp.103-110 |
5 |
원문
|
|
Conference
|
2017 |
Secure Number Theoretic Transform and Speed Record for Ring-LWE Encryption on Embedded Processors
서화정 International Conference on Information Security and Cryptology (ICISC) 2017, pp.37-50 |
5 |
원문
|
|
Conference
|
2017 |
Multi-Channel Transmission Method for Guaranteeing TCP Reliability and Improving Transmission Rate in UNIWAY
Kim Yong Kyun World Congress on Information Technology Applications and Services (World IT Congress) 2017, pp.1-6 |
|
|
|
Conference
|
2014 |
Implementation of a Video Streaming Security System for Smart Device
Jeon Yong-Sung International Conference on Consumer Electronics (ICCE) 2014, pp.97-100 |
5 |
원문
|
|
Journal
|
2013 |
Quality of Protection for Multimedia Services via Wireless Mesh Networks
임선희 Information : An International Interdisciplinary Journal, v.16, no.7(B), pp.5145-5158 |
0 |
|
|
Conference
|
2012 |
SCARF: profile-based Side Channel Analysis Resistant Framework
Kim Ju Han International Conference on Security and Management (SAM) 2012, pp.1-6 |
|
|
|
Journal
|
2011 |
Fingerprint Template Protection Using One-Time Fuzzy Vault
Woo Yong Choi KSII Transactions on Internet and Information Systems, v.5, no.11, pp.2221-2234 |
2 |
원문
|
|
Conference
|
2009 |
Context-Aware Dynamic Security Configuration for Mobile Communication Device
An Gaeil International Conference on New Technologies, Mobility and Security (NTMS) 2009, pp.1-5 |
3 |
원문
|
|
Conference
|
2006 |
A VLSI Implementation of Minutiae Extraction for Secure Fingerprint Authentication
반성범 International Conference on Computational Intelligence and Security (CIS) 2006, pp.1217-1220 |
5 |
원문
|
|
Conference
|
2006 |
Impact of Embedding Scenarios on the Smart Card-Based Fingerprint Verification
박병관 International Workshop on Information Security Applications (WISA) 2006 (LNCS 4298), v.4298, pp.110-120 |
4 |
원문
|
|
Conference
|
2006 |
A Security Model for Home Networks with Authority Delegation
Hwang Jin Bum International Conference on Computational Science and Its Applications (ICCSA) 2006 (LNCS 3983), v.3983, pp.360-369 |
6 |
원문
|