Conference
|
2024 |
Caphammer: Exploiting Capacitor Vulnerability of Energy Harvesting Systems
Joe Hyunwoo International Conference on Embedded Software (EMSOFT) 2024 / IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, pp.1-12 |
3 |
원문
|
Conference
|
2024 |
Caphammer: Exploiting Capacitor Vulnerability of Energy Harvesting Systems
최종욱 International Conference on Embedded Software (EMSOFT) 2024 / IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, pp.1-12 |
3 |
원문
|
Conference
|
2023 |
Security enhancement scheme for mobile device using H/W cryptographic module
Yoon Seung Yong International Conference on Information and Communication Technology Convergence (ICTC) 2023, pp.1450-1452 |
2 |
원문
|
Conference
|
2020 |
Drone Security Module for UAV Data Encryption
Keonwoo Kim International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.1672-1674 |
31 |
원문
|
Journal
|
2018 |
Secure Mobile Device Structure for Trust IoT
Lee Yun-Kyung Journal of Supercomputing, v.74, no.12, pp.6646-6664 |
7 |
원문
|
Conference
|
2018 |
Design of an LPWAN Communication Module Based on Secure Element for Smart Parking Application
Jeon Yong-Sung International Conference on Consumer Electronics (ICCE) 2018, pp.1-2 |
14 |
원문
|
Conference
|
2016 |
Implementation of Secured PhotoVoltaic Monitoring System on the Smart Utility Network
Chang-Sic Choi International Conference on Information and Communication Technology Convergence (ICTC) 2016, pp.1049-1051 |
3 |
원문
|
Journal
|
2016 |
SecureDom: Secure Mobile-sensitive Information Protection with Domain Separation
Su Wan Park Journal of Supercomputing, v.72, no.7, pp.2682-2702 |
7 |
원문
|
Conference
|
2013 |
An Integrity-Based Mechanism for Accessing Keys in A Mobile Trusted Module
Kim Dae Won International Conference on Information and Communication Technology Convergence (ICTC) 2013, pp.780-782 |
1 |
원문
|
Conference
|
2012 |
System Requirements of Mobile device for Security Service
Jeon Yong-Sung International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC) 2012, pp.1-3 |
|
|
Journal
|
2009 |
Chaotic Order Preserving Encryption for Efficient and Secure Queries on Databases
Seung Min Lee IEICE Transactions on Information and Systems, v.E92-D, no.11, pp.2207-2217 |
38 |
원문
|
Conference
|
2007 |
A New Anti-Forensic Tool Based on a Simple Data Encryption Scheme
Lee Sang Su International Conference on Future Generation Communication and Networking (FGCN) 2007, pp.1-5 |
4 |
원문
|
Conference
|
2006 |
Topology-Aware Key Management Scheme for Secure Overlay Multicast
Noh Jong-Hyouk International Conference on Information Networking (ICOIN) 2006 (LNCS 3961), v.3961, pp.733-742 |
0 |
원문
|
Conference
|
2005 |
Design of an Authentication Protocol for Secure Electronic Seals
박성수 International Conference on Information Systems (ICIS) 2005, pp.1-5 |
|
|
Conference
|
2005 |
Key Management for Secure Overlay Multicast
Noh Jong-Hyouk Conference on Information Security and Cryptology (CISC) 2005 (LNCS 3822), v.3822, pp.336-345 |
0 |
원문
|