Conference
|
2023 |
Delegation of TLS Authentication to CDNs using Revocable Delegated Credentials
Daegeun Yoon Annual Computer Security Applications Conference (ACSAC) 2023, pp.1-11 |
0 |
원문
|
Journal
|
2023 |
Improvement of the Efficiency of Neural Cryptography-Based Secret Key Exchange Algorithm
Kim Juyoung IEEE Access, v.11, pp.45323-45333 |
2 |
원문
|
Journal
|
2022 |
A Survey of Polynomial Multiplication With RSA-ECC Coprocessors and Implementations of NIST PQC Round3 KEM Algorithms in Exynos2100
박종연 IEEE Access, v.10, pp.2546-2563 |
9 |
원문
|
Journal
|
2021 |
Lightweight Three-Factor-Based Privacy- Preserving Authentication Scheme for IoT-Enabled Smart Homes
Yusungjin IEEE Access, v.9, pp.126186-126197 |
55 |
원문
|
Journal
|
2020 |
TwinPeaks: An approach for certificateless public key distribution for the internet and internet of things
조은상 Computer Networks, v.175, pp.1-15 |
7 |
원문
|
Conference
|
2019 |
Canary
Shin Yong Yoon Conference on Information-Centric Networking (ICN) 2019, pp.167-168 |
1 |
원문
|
Journal
|
2018 |
Recent Technology Trends of Free-Space Quantum Key Distribution System and Components
Youn Chun Ju 전자통신동향분석, v.33, no.6, pp.94-106 |
|
원문
|
Conference
|
2018 |
Public Key-based Lightweight Mutual Authentication and Key Agreement Protocol for Drones
Keonwoo Kim Asian/Austrailian Rotorcraft Forum (ARF) 2018, pp.1-5 |
1 |
|
Journal
|
2018 |
TLDA: An Efficient Two-Layered Data Authentication Mechanism for Content-Centric Networking
서석충 Security and Communication Networks, v.2018, pp.1-17 |
2 |
원문
|
Journal
|
2016 |
Symmetric Searchable Encryption with Efficient Range Query using Multi-layered Linked Chains
Jho Nam-Su Journal of Supercomputing, v.72, no.11, pp.4233-4246 |
12 |
원문
|
Journal
|
2015 |
Trends in Trustworthy Communication for the Next-Generation
Kim Tae Hwan 전자통신동향분석, v.30, no.4, pp.129-139 |
|
원문
|
Journal
|
2014 |
Protection Method for Data Communication between ADS-B Sensor and Next-Generation Air Traffic Control Systems
Lee Seoung Hyeon Information, v.5, no.4, pp.622-633 |
11 |
원문
|
Journal
|
2014 |
An Enhanced (t,n) Threshold Directed Signature Scheme
Jung Yeon Hwang Information Sciences, v.275, pp.284-292 |
11 |
원문
|
Journal
|
2013 |
Symmetric Searchable Encryption with Efficient Conjunctive Keyword Search
Jho Nam-Su KSII Transactions on Internet and Information Systems, v.7, no.5, pp.1328-1342 |
10 |
원문
|
Journal
|
2012 |
Efficient Certificateless Proxy Signature Scheme with Provable Security
서승현 Information Sciences, v.188, pp.322-337 |
38 |
원문
|
Journal
|
2011 |
Reducing Communication Overhead for Nested NEMO Networks: Roaming Authentication and Access Control Structure
임형진 IEEE Transactions on Vehicular Technology, v.60, no.7, pp.3408-3423 |
6 |
원문
|
Conference
|
2009 |
A New Fault Cryptanalysis on Montgomery Ladder Exponentiation Algorithm
박제훈 International Conference on Interaction Sciences: Information Technology, Culture and Human (ICIS) 2009, pp.896-899 |
1 |
원문
|
Conference
|
2009 |
Protecting IPTV Service Network against Malicious Rendezvous Point
Kwon Hyeok Chan Information Security Applications (WISA) 2009 (LNCS 5932), v.5932, pp.1-9 |
1 |
원문
|
Conference
|
2009 |
Information-Revealing with Distributed Escrow Authorities
Ryu Jong Ho International Joint Conference on INC, IMS and IDC NCM (NCM) 2009, pp.1141-1146 |
1 |
원문
|
Journal
|
2008 |
Efficient and Secure Self-Organized Public Key Management for Mobile Ad Hoc Networks
Choi Dae Seon IEICE Transactions on Communications, v.E91-B, no.11, pp.3574-3583 |
1 |
원문
|
Journal
|
2008 |
A More Compact Representation of XTR Cryptosystem
Masaaki Shirase IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, v.E91-A, no.10, pp.2843-2850 |
11 |
원문
|
Journal
|
2008 |
Designing Reliable P2P Transmission Mechanism Against MITM Attack
김상춘 정보보호학회논문지, v.18, no.4, pp.103-109 |
|
|
Conference
|
2008 |
A Peer Mutual Authentication Method on Super Peer Based Peer-to-Peer Network
Oh Byeong Thaek International Symposium on Consumer Electronics (ISCE) 2008, pp.1-4 |
5 |
원문
|
Conference
|
2007 |
Anonymous PKI Framework for Privacy-guaranteed e-Services
Choi Byeong Cheol International Conference on Convergence Information Technology (ICCIT) 2007, pp.687-690 |
1 |
원문
|
Conference
|
2007 |
Designing Reliable P2P File Sharing Application without PKI
김상춘 World Conference on Information Security Applications (WISA) 2007, pp.1-9 |
|
|
Conference
|
2007 |
Reliable Public Key Distribution Method for Dynamic Peer to Peer Network
Kwon Hyeok Chan Joint Workshop on Information Security (JWIS) 2007, pp.1-10 |
|
|
Conference
|
2007 |
Public Key Management Framework for Two-tier Super Peer Architecture
Kwon Hyeok Chan International Conference on Distributed Computing Systems Workshops (ICDCSW) 2007, pp.1-6 |
4 |
원문
|
Conference
|
2007 |
An Efficient Password-Based E-mail Protocol for Encrypted E-mail Transmissions on Mobile Equipment
권정옥 International Conference on Consumer Electronics (ICCE) 2007, pp.1-2 |
3 |
원문
|
Conference
|
2006 |
PAK-based Binding Update Method for Mobile IPv6 route optimization
Yoon Ho Sun International Conference on Hybrid Information Technology (ICHIT) 2006, pp.1-8 |
4 |
원문
|
Conference
|
2006 |
Efficient Exponentiation in GF(p m ) Using the Frobenius Map
이문규 International Conference on Computational Science and Its Applications (ICCSA) 2006 (LNCS 3983), v.3983, pp.584-593 |
0 |
원문
|
Conference
|
2006 |
Hash-based Secure Sensor Network Programming Method without Public Key Cryptography
Lee Sokjoon Workshop on World-Sensor-Web (WSW) 2006, pp.1-3 |
|
|
Conference
|
2006 |
Public Key Watermarking for Reversible Image Authentication
Lee Sang Kwang International Conference on Image Processing (ICIP) 2006, pp.1409-1412 |
3 |
원문
|
Conference
|
2006 |
Grid ID Management based on Distributed Agents using SPML
Kim Seung-Hyun International Symposium on Consumer Electronics (ISCE) 2006, pp.604-609 |
0 |
|
Conference
|
2006 |
A Security Model for Home Networks with Authority Delegation
Hwang Jin Bum International Conference on Computational Science and Its Applications (ICCSA) 2006 (LNCS 3983), v.3983, pp.360-369 |
6 |
원문
|
Conference
|
2006 |
Identity Based KCDSA Signcryption
Ryu Jong Ho International Conference on Advanced Communication Technology (ICACT) 2006, pp.1369-1374 |
4 |
|
Conference
|
2005 |
Method of securely transferring programmable packet using digital signatures having access-controlled high-security verification key
Kim Youngsoo International Conference on Advanced Communication Technology (ICACT) 2005, pp.1208-1211 |
|
원문
|
Conference
|
2005 |
Design of Unified Key Management Model using XKMS
Kim Ju Han International Conference on Advanced Communication Technology (ICACT) 2005, pp.77-80 |
|
원문
|
Journal
|
2004 |
생체 인식-PKI 연구 동향
Jee Hyung-Keun 주간기술동향, v.1133, pp.16-26 |
|
|
Journal
|
2004 |
Design and implementation of a private and public key crypto processor and its application to a security system
Kim Ho Won IEEE Transactions on Consumer Electronics, v.50, no.1, pp.214-224 |
48 |
원문
|
Conference
|
2003 |
Concatenated Wireless Roaming Security Association and Authentication Protocol using ID-Based Cryptography
Lee Byung-Gil Vehicular Technology Conference (VTC) 2003, pp.1507-1511 |
6 |
|
Conference
|
2003 |
Mobile IP and WLAN with AAA Authentication Protocol using Identity-based Cryptography
Lee Byung-Gil International Conference on Telecommunications (ICT) 2003, pp.597-603 |
16 |
원문
|
Conference
|
2002 |
FPGA Implementation of RSA Public-Key Cryptographic Coprocessor for Restricted System
Kim Moo Seop International Technical Conference on Circuits Systems, Computers and Communications (ITC-CSCC) 2002, pp.1554-1557 |
|
|
Journal
|
2002 |
Authentication and Key Exchange Protocol for Wireless Internet using Passwords
Nyang Daehun 정보과학회논문지 : 정보통신, v.29, no.3, pp.324-332 |
|
|
Journal
|
2002 |
A Scalable Secure Multicast Key Management Structure
Lee Su Young 정보과학회논문지 : 정보통신, v.29, no.2, pp.109-116 |
|
|
Conference
|
2001 |
Ticket based authentication and payment protocol for mobile telecommunications systems
Byung-Rae Lee Pacific Rim International Symposium on Dependable Computing (PRDC) 2001, pp.218-221 |
11 |
원문
|
Journal
|
2000 |
Attribute Certification Technology and PMI
Jin Seung Hun 정보보호학회지, v.10, no.4, pp.33-40 |
|
|