Subjects : security verification
| Type | Year | Title | Cited | Download |
|---|---|---|---|---|
| Journal | 2023 | LAKA-UAV: Lightweight authentication and key agreement scheme for cloud-assisted Unmanned Aerial Vehicle using blockchain in flying ad-hoc networks Yusungjin Computer Networks, v.224, pp.1-15 | 41 | 원문 |
| Journal | 2020 | LAKS-NVT: Provably Secure and Lightweight Authentication and Key Agreement Scheme Without Verification Table in Medical Internet of Things Park Kisung IEEE Access, v.8, pp.119387-119404 | 64 | 원문 |
| Journal | 2012 | Secure Hardware Implementation of ARIA Based on Adaptive Random Masking Technique 강준기 ETRI Journal, v.34, no.1, pp.76-86 | 4 | 원문 |
| Conference | 2005 | Method of securely transferring programmable packet using digital signatures having access-controlled high-security verification key Kim Youngsoo International Conference on Advanced Communication Technology (ICACT) 2005, pp.1208-1211 | 원문 |
| Status | Year | Patent Name | Country | Family Pat. | KIPRIS |
|---|---|---|---|---|---|
| Registered | 2018 | METHOD AND APPARATUS FOR DEVICE SECURITY VERIFICATION UTILIZING A VIRTUAL TRUSTED COMPUTING BASE | UNITED STATES | ||
| Registered | 2017 | 가상 트러스트 컴퓨팅 베이스를 이용한 기기 보안성 검증 방법 및 장치 | KOREA | KIPRIS |
| Type | Year | Research Project | Primary Investigator | Download |
|---|---|---|---|---|
| No search results. | ||||