|
Conference
|
2023 |
Security Technology for C-Band Modem Communication in Unmanned Vehicle Environment
Kim Ju Han International Conference on Information and Communication Technology Convergence (ICTC) 2023, pp.1095-1097 |
1 |
원문
|
|
Conference
|
2017 |
Security Consideration of Fuzzy Vault Based on Photoplethysmogram
Kim Juyoung International Conference on Computer Science and its Applications (CSA) 2017, pp.1-7 |
|
|
|
Journal
|
2015 |
Inter-Authentication and Session Key Sharing Procedure for Secure M2M/IoT Environment
박남제 Information : An International Interdisciplinary Journal, v.18, no.1, pp.261-266 |
17 |
|
|
Journal
|
2012 |
Constructing Strong Identity-Based Designated Verifier Signatures with Self-Unverifiability
기주희 ETRI Journal, v.34, no.2, pp.235-244 |
17 |
원문
|
|
Conference
|
2010 |
Unified Fast Authentication Procedure in Service and Access Networks for NGN
Kim Kwihoon International Conference on Computer Sciences and Convergence Information Technology (ICCIT) 2010, pp.570-573 |
0 |
원문
|
|
Journal
|
2009 |
Security Vulnerability of ID-Based Key Sharing Schemes
Jung Yeon Hwang IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, v.E92-A, no.10, pp.2641-2643 |
0 |
원문
|
|
Conference
|
2009 |
Hierarchical CRGK for a Large-scale User Group
Park Jee Hyun International Conference on Consumer Electronics (ICCE) 2009, pp.1-2 |
0 |
원문
|
|
Journal
|
2008 |
A Novel Protocol for Downloadable CAS
Jeong Young Ho IEEE Transactions on Consumer Electronics, v.54, no.3, pp.1236-1243 |
13 |
원문
|
|
Journal
|
2007 |
Chikazawa-Yamagishi 키교환의 강한 전반위 안전성에 관해서
Jeong Ik Rae IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, v.E90-A, no.11, pp.2626-2628 |
|
|