Journal
|
2024 |
DTR-SHIELD: Mutual Synchronization for Protecting against DoS Attacks on the SHIELD Protocol with AES-CTR Mode
Lee Sang Su Sensors, v.24, no.13, pp.1-18 |
1 |
원문
|
Journal
|
2023 |
Case Analysis on R&D Collaboration and Implications in Semiconductor industry
Sujin Min 전자통신동향분석, v.38, no.4, pp.25-35 |
|
원문
|
Journal
|
2023 |
Trends and Implications of Cybersecurity Policies in Major Countries
Lee Jaeseong 전자통신동향분석, v.38, no.4, pp.58-69 |
|
원문
|
Journal
|
2023 |
Visual Quality Assessment of Point Clouds compared to Natural Reference Images
백아람 Journal of Web Engineering, v.22, no.3, pp.405-432 |
2 |
원문
|
Journal
|
2023 |
Estimation of Number of Pigs Taking in Feed Using Posture Filtration
김태호 Sensors, v.23, no.1, pp.1-14 |
8 |
원문
|
Journal
|
2021 |
Trends of Hardware-based Trojan Detection Technologies
Choi Yangseo 전자통신동향분석, v.36, no.6, pp.78-87 |
|
원문
|
Conference
|
2021 |
Extreme Event Forecasting for Postal Logistics Service
Kim Eun Hye International Conference on Management of e-Commerce and e-Government (ICMECG) 2021, pp.1-10 |
1 |
원문
|
Journal
|
2020 |
Trends in Supply-Chain Security Technologies
Kim Dae Won 전자통신동향분석, v.35, no.4, pp.149-157 |
|
원문
|
Conference
|
2018 |
AEO(Authorized Economic Operator) Automated Platform for Supply Chain Security
Jeyoun Dong International Conference on Information and Communication Technology Convergence (ICTC) 2018, pp.1077-1079 |
0 |
원문
|
Journal
|
2018 |
Offshoring and Outsourcing in a Global Supply Chain: Impact of the Arm’s Length Regulation on Transfer Pricing
김보성 European Journal of Operational Research, v.266, no.1, pp.88-98 |
56 |
원문
|
Journal
|
2017 |
Efficient and privacy-enhanced object traceability based on unified and linked EPCIS events
변재욱 Computers in Industry, v.89, pp.35-49 |
9 |
원문
|
Conference
|
2017 |
Secure-EPCIS : Addressing Security Issues in EPCIS for IoT applications
Sungpil Woo World Congress on Services (SERVICES) 2017, pp.40-43 |
2 |
원문
|
Journal
|
2017 |
Are Factors Affecting RFID Adoption Different between Public and Private Organisations?
이상재 International Journal of Mobile Communications, v.15, no.4, pp.437-465 |
4 |
원문
|
Journal
|
2014 |
Modeling and Optimization of Energy Efficient Routing in Wireless Sensor Networks
Lee Jeonghun Applied Mathematical Modelling, v.38, no.7-8, pp.2280-2289 |
40 |
원문
|
Conference
|
2013 |
Detecting Counterfeit Products Using Supply Chain Event Mining
Lee Ho Sung International Conference on Advanced Communication Technology (ICACT) 2013, pp.744-748 |
6 |
|
Conference
|
2010 |
New approach for Convergence of IT + pharmaceutical industry
Marie Kim International Conference on Information and Communication Technology Convergence (ICTC) 2010, pp.569-570 |
0 |
원문
|
Journal
|
2010 |
Multi-Level Supply Chain Network Design with Routing
Lee Jeonghun International Journal of Production Research, v.48, no.13, pp.3957-3976 |
61 |
원문
|
Journal
|
2009 |
A BUSINESS MODEL ANALYSIS FOR THE SUPPLY CHAIN CONVERGENT OF SERVICES
Rim Myung Hwan International Journal of Innovation and Technology Management, v.6, no.1, pp.97-116 |
7 |
원문
|
Conference
|
2008 |
The Joint Replenishment and Freight Consolidation of a Warehouse in a Supply Chain
문일경 International Symposium on Inventories (ISIR) 2008, pp.119-119 |
|
|
Conference
|
2007 |
A Business Model Analysis for the Convergence Services of Supply Chain
Rim Myung Hwan Portland International Center for Management of Engineering and Technology (PICMET) 2007, pp.2325-2335 |
5 |
원문
|
Conference
|
2006 |
Product Authentication Service of Consumer's mobile RFID Device
Kim Ju Han International Symposium on Consumer Electronics (ISCE) 2006, pp.660-665 |
0 |
|
Journal
|
2006 |
Analysis of Interorganizational Systems Effect to Supply Chain Partnership and Performance
한현수 Journal of Information Technology Applications & Management, v.13, no.2, pp.41-54 |
|
|
Conference
|
2006 |
A Wireless Service for Product Authentication in Mobile RFID Environment
Kim Ju Han International Symposium on Wireless Pervasive Computing (ISWPC) 2006, pp.1-5 |
|
|
Conference
|
2005 |
Analysis about EPC Class 1 and C1G2 Security
Keonwoo Kim 한국정보과학회 학술 발표 (추계) 2005, pp.70-72 |
|
|
Conference
|
2005 |
Proposal on EPC C1G2 Mutual Authentication Protocol
Keonwoo Kim 대한전자공학회 종합 학술 대회 (추계) 2005, pp.1113-1116 |
|
|
Conference
|
2005 |
Design and Prototype Implementation of Asset Management System at Museum Using Mobile RFID Network Model
Kim Young Il Internet and Multimedia Systems and Applications (IMSA) 2005, pp.406-411 |
|
|
Conference
|
2005 |
A Study on the Establishment of RFID Network Testbed for Supply Chain
Ham Young Hwan International Technical Conference on Circuits Systems, Computers and Communications (ITC-CSCC) 2005, pp.1077-1078 |
|
|
Conference
|
2005 |
Security Considerations for RFID Technology Adoption
Park Joo Sang International Conference on Advanced Communication Technology (ICACT) 2005, pp.797-803 |
|
원문
|
Conference
|
2005 |
Study of RFID Middleware Framework for Ubiquitous Computing Environment
김영일 International Conference on Advanced Communication Technology (ICACT) 2005, pp.825-830 |
|
원문
|
Conference
|
2004 |
소포 접수 및 배달 서비스에서 처리 요원의 업무 분산과 고객 요구 개선을 위한 모니터링 및 제어 시스템
Park Jeong-Hyun International Conference on Internet and Multimedia Systems and Applications (IMSA) 2004, pp.373-378 |
|
|
Conference
|
2003 |
Real-time Logistics Tracking System based on Radio Frequency Identification Tag
Oh Se Won 한국정보과학회 학술 발표 (가을) 2003, pp.541-543 |
|
|
Conference
|
2003 |
Intelligent Track and Trace System for Improving Electronic Logistics
Oh Se Won 한국정보과학회 학술 발표 (봄) 2003, pp.620-622 |
|
|