Journal
|
2020 |
TwinPeaks: An approach for certificateless public key distribution for the internet and internet of things
조은상 Computer Networks, v.175, pp.1-15 |
7 |
원문
|
Journal
|
2015 |
Trends in Trustworthy Communication for the Next-Generation
Kim Tae Hwan 전자통신동향분석, v.30, no.4, pp.129-139 |
|
원문
|
Journal
|
2014 |
Protection Method for Data Communication between ADS-B Sensor and Next-Generation Air Traffic Control Systems
Lee Seoung Hyeon Information, v.5, no.4, pp.622-633 |
11 |
원문
|
Journal
|
2008 |
Designing Reliable P2P Transmission Mechanism Against MITM Attack
김상춘 정보보호학회논문지, v.18, no.4, pp.103-109 |
|
|
Conference
|
2007 |
Anonymous PKI Framework for Privacy-guaranteed e-Services
Choi Byeong Cheol International Conference on Convergence Information Technology (ICCIT) 2007, pp.687-690 |
1 |
원문
|
Conference
|
2007 |
Designing Reliable P2P File Sharing Application without PKI
김상춘 World Conference on Information Security Applications (WISA) 2007, pp.1-9 |
|
|
Conference
|
2007 |
Public Key Management Framework for Two-tier Super Peer Architecture
Kwon Hyeok Chan International Conference on Distributed Computing Systems Workshops (ICDCSW) 2007, pp.1-6 |
4 |
원문
|
Conference
|
2006 |
PAK-based Binding Update Method for Mobile IPv6 route optimization
Yoon Ho Sun International Conference on Hybrid Information Technology (ICHIT) 2006, pp.1-8 |
4 |
원문
|
Conference
|
2006 |
Grid ID Management based on Distributed Agents using SPML
Kim Seung-Hyun International Symposium on Consumer Electronics (ISCE) 2006, pp.604-609 |
0 |
|
Conference
|
2006 |
A Security Model for Home Networks with Authority Delegation
Hwang Jin Bum International Conference on Computational Science and Its Applications (ICCSA) 2006 (LNCS 3983), v.3983, pp.360-369 |
6 |
원문
|
Journal
|
2004 |
생체 인식-PKI 연구 동향
Jee Hyung-Keun 주간기술동향, v.1133, pp.16-26 |
|
|
Journal
|
2002 |
Authentication and Key Exchange Protocol for Wireless Internet using Passwords
Nyang Daehun 정보과학회논문지 : 정보통신, v.29, no.3, pp.324-332 |
|
|
Journal
|
2002 |
A Scalable Secure Multicast Key Management Structure
Lee Su Young 정보과학회논문지 : 정보통신, v.29, no.2, pp.109-116 |
|
|
Journal
|
2000 |
Attribute Certification Technology and PMI
Jin Seung Hun 정보보호학회지, v.10, no.4, pp.33-40 |
|
|