Subject

Subjects : information security

  • Articles (35)
  • Patents (1)
  • R&D Reports (0)
논문 검색결과
Type Year Title Cited Download
Journal 2024 Overview of RIS-enabled secure transmission in 6G wireless networks   Jungsook Bae  Digital Communications and Networks, v.10, no.6, pp.1553-1565 14 원문
Journal 2024 Overview of RIS-enabled secure transmission in 6G wireless networks   Waqas Khalid  Digital Communications and Networks, v.10, no.6, pp.1553-1565 14 원문
Journal 2023 Design of Block Codes for Distributed Learning in VR/AR Transmission   황서희  Journal of Information and Communication Convergence Engineering, v.21, no.4, pp.300-305 0 원문
Journal 2023 Reconfigurable dual-mode optical encryption enabled by block copolymer photonic crystal with micro-imprinted holographic metasurface   문승수  Materials Today, v.70, pp.44-56 8 원문
Journal 2023 Reconfigurable dual-mode optical encryption enabled by block copolymer photonic crystal with micro-imprinted holographic metasurface   박태현  Materials Today, v.70, pp.44-56 8 원문
Journal 2022 Technological Trends in Intelligent Cyber Range   Yu Jae Hak  전자통신동향분석, v.37, no.4, pp.36-45 원문
Journal 2020 Information leakage in bi‐directional IFD communication system with simultaneously transmitted jamming sequence   Ju Hyung Sik  ETRI Journal, v.42, no.1, pp.138-149 0 원문
Conference 2019 Character Detection and Recognition for Personal Information Security in Real-World Document Image   Kye Kyung Kim  International Workshop on Frontiers of Computer Vision (IW-FCV) 2019, pp.1-2
Conference 2017 Design of Unidirectional Security Gateway System for Secure Monitoring of OPC-UA Data   Byoung Koo Kim  International Conference on Information and Communication Technology Convergence (ICTC) 2017, pp.1288-1290 6 원문
Conference 2017 Hierarchy Architecture Security Design for Energy Cloud   Hong Yoon Kee  International Conference on Information and Communication Technology Convergence (ICTC) 2017, pp.1188-1190 1 원문
Journal 2017 DTB-IDS: An Intrusion Detection System Based on Decision Tree using Behavior Analysis for Preventing APT Attacks   Moon Dae Sung  Journal of Supercomputing, v.73, no.7, pp.2881-2895 119 원문
Conference 2015 Robust Authenticated Key Exchange Using Passwords and Identity-Based Signatures   Jung Yeon Hwang  International Conference on Security Standardisation Research (SSR) 2015, v.9497, pp.43-69 4 원문
Journal 2015 Information Security and Organizational Performance: Empirical Study of Korean Securities Industry   공희경  ETRI Journal, v.37, no.2, pp.428-437 11 원문
Journal 2012 The NADIA: A Network Acceleration System with Defense against Network Invasion and Attack   Kim Sun Wook  IETE Journal of Research, v.58, no.5, pp.398-410 0 원문
Journal 2011 전자파 보안 국제 표준화 동향 연구   Jang Dong Won  주간기술동향, v.1526, pp.13-24
Conference 2010 Network Intrusion Prevention System based on TOE   Kim Sun Wook  International Workshop on Information Security Applications (WISA) 2010, pp.1-6
Journal 2010 Fuzzy difference-of-Gaussian–based iris recognition method for noisy iris images   Byung Jun Kang  Optical Engineering, v.49, no.6, pp.1-10 9 원문
Journal 2010 An Analysis on Effects of Information Security Investments: A BSC Perspective   Kong Hee Kyung  Journal of Intelligent Manufacturing, v.23, no.4, pp.941-953 32 원문
Journal 2009 PKG-VUL: Security Vulnerability Evaluation and Patch Framework for Package-Based Systems   이종혁  ETRI Journal, v.31, no.5, pp.554-564 10 원문
Journal 2009 Probabilistic Modeling for Evaluation of Information Security Investment Portfolios   Yang Won Seok  한국경영과학회지, v.34, no.3, pp.155-163
Journal 2008 A Novel Difference Expansion Transform for Reversible Data Embedding   김형중  IEEE Transactions on Information Forensics and Security, v.3, no.3, pp.456-465 346 원문
Other 2008 Handbook of Research on Information Security and Assurance   An Gaeil  Handbook of Research on Information Security and Assurance [Book], pp.29-41 0 원문
Conference 2008 Malware and Antivirus Deployment for Enterprise Security   Lee Deok Gyu  한국정보기술학회 학술 발표회 (하계) 2008, pp.1-4
Journal 2008 A Dynamic Manpower Forecasting Model for the Information Security Industry   박상현  Industrial Management & Data Systems, v.103, no.3, pp.368-384 25 원문
Conference 2006 Efficient Exponentiation in GF(p m ) Using the Frobenius Map   이문규  International Conference on Computational Science and Its Applications (ICCSA) 2006 (LNCS 3983), v.3983, pp.584-593 0 원문
Conference 2006 Building a Dynamic Manpower Planning Model: Focused on the Information Security Manpower Policy of Korea   박상현  International Conference of the System Dynamics Society 2006, pp.1-21
Conference 2006 Design of an Extended Architecture for Secure Low-Cost 900MHz UHF Mobile RFID Systems   Park Nam Je  International Symposium on Consumer Electronics (ISCE) 2006, pp.666-671 8
Conference 2005 Security Frameworks for Open LBS Based on Web Services Security Mechanism   Moon Ki Young  International Symposium on Parallel and Distributed Processing and Applications (ISPA) 2005 (LNCS 3759), v.3759, pp.609-618 2 원문
Conference 2005 Security and Privacy Management for Effective RFID Lifecycle   Lee Byung-Gil  한국경영정보학회 (KMIS) 학술 대회 2005, pp.1-5
Conference 2005 An Enhanced LBS Security Protocol in Wireless Networks   Park Nam Je  International Geoscience and Remote Sensing Symposium (IGARSS) 2005, pp.1594-1597
Conference 2005 Open Location-Based Service Using Secure Middleware Infrastructure in Web Services   Park Nam Je  International Conference on Computational Science and Its Applications (ICCSA) 2005 (LNCS 3481), v.3481, pp.1146-1155 24 원문
Conference 2005 An Analysis of ISPs’ role as Managed Security Service Providers (MSSPs)   Choi Yangseo  International Conference on Advanced Communication Technology (ICACT) 2005, pp.624-626
Conference 2004 The Implementation of IPsec-Based Internet Security System in IPv4/IPv6 Network   Park So Hee  International Conference on AI, Simulation, and Planning in High Autonomy Systems (AIS) 2004 (LNCS 3397), v.3397, pp.109-116 0 원문
Conference 2002 Security Policy Deployment in IPsec   Kim Geonwoo  International Conference on Information Networking (ICOIN) 2002 (LNCS 2344), v.2344, pp.453-464 0 원문
Conference 2001 Design of key recovery system using multiple agent technology for electronic commerce   Lim Shin Young  International Symposium on Industrial Electronics (ISIE) 2001, pp.1351-1356 원문
특허 검색결과
Status Year Patent Name Country Family Pat. KIPRIS
Registered 2013 APPARATUS AND METHOD FOR MANAGING USIM DATA USING MOBILE TRUSTED MODULE UNITED STATES
연구보고서 검색결과
Type Year Research Project Primary Investigator Download
No search results.