Journal
|
2020 |
Practical Sender Authentication Scheme for In-Vehicle CAN With Efficient Key Management
Taek-Young Youn IEEE Access, v.8, pp.86836-86849 |
17 |
원문
|
Journal
|
2019 |
Communication and Security Technology Trends in Drone-assisted Wireless Sensor Network
Wang/Kicheoul 전자통신동향분석, v.34, no.3, pp.55-64 |
|
원문
|
Conference
|
2017 |
Handover Key Management in An LTE-based Unmanned Aerial Vehicle Control Network
Wang/Kicheoul International Conference on Future Internet of Things and Cloud (FiCloud) 2017: Workshops, pp.200-205 |
7 |
원문
|
Journal
|
2017 |
An Efficient Key Management Scheme for User Access Control in Outsourced Databases
Seungtae Hong World Wide Web: Internet and Web Information Systems, v.20, no.3, pp.467-490 |
6 |
원문
|
Conference
|
2014 |
Application Authentication and Secure Key Management Scheme using MTM
Han Jin Hee International Conference on Computer Science and its Applications (CSA) 2014 (LNEE 330), pp.941-946 |
0 |
원문
|
Conference
|
2013 |
User-Centric Key Management Scheme for Personal Cloud Storage
유성민 International Conference on Information Science and Applications (ICISA) 2013, pp.1-4 |
6 |
원문
|
Journal
|
2010 |
Hierarchical CRGK Supporting a Secure Multicast Communication for a Large Number of Users
Park Jee Hyun IEICE Transactions on Communications, v.E93.B, no.4, pp.862-870 |
0 |
원문
|
Conference
|
2009 |
Hierarchical CRGK for a Large-scale User Group
Park Jee Hyun International Conference on Consumer Electronics (ICCE) 2009, pp.1-2 |
0 |
원문
|
Journal
|
2008 |
Key Management for Overlay-based IPTV Content Delivery
Gu Jabeom International Journal of Computer Science and Network Security, v.8, no.12, pp.161-167 |
|
|
Journal
|
2008 |
Efficient and Secure Self-Organized Public Key Management for Mobile Ad Hoc Networks
Choi Dae Seon IEICE Transactions on Communications, v.E91-B, no.11, pp.3574-3583 |
1 |
원문
|
Conference
|
2008 |
Data Randomization for Lightweight Secure Data Aggregation in Sensor Network
Abedelaziz Mohaisen International Conference on Ubiquitous Intelligence and Computing (UIC) 2008 (LNCS 5061), v.5061, pp.338-351 |
0 |
원문
|
Conference
|
2007 |
JavaCard-based Two-Level User Key Management for IP Conditional Access Systems
Moon Jin Young International Conference on Networks (ICON) 2007, pp.72-76 |
11 |
원문
|
Conference
|
2006 |
A Trustworthy End-to-End Key Management Scheme for Digital Rights Management
Kim Jun Il International Conference on Multimedia (MM) 2006, pp.635-638 |
2 |
원문
|
Conference
|
2006 |
Key Management Scheme for Providing the Confidentiality in Mobile Multicast
Noh Jong-Hyouk International Conference on Advanced Communication Technology (ICACT) 2006, pp.1205-1209 |
7 |
|
Conference
|
2006 |
An Active Entitlement Key Management for CA System on Digital TV Broadcasting System
Han Seung Koo International Conference on Consumer Electronics (ICCE) 2006, pp.109-110 |
0 |
원문
|
Conference
|
2006 |
Topology-Aware Key Management Scheme for Secure Overlay Multicast
Noh Jong-Hyouk International Conference on Information Networking (ICOIN) 2006 (LNCS 3961), v.3961, pp.733-742 |
0 |
원문
|
Journal
|
2005 |
Protection of MPEG-2 Multicast Streaming in IP Set-Top Box Environment
Seong Oun Hwang ETRI Journal, v.27, no.5, pp.595-607 |
3 |
원문
|
Journal
|
2005 |
저작권 관리를 위한 신뢰성지원 키 관리 구조
Jeong Yeon Jeong ETRI Journal, v.27, no.1, pp.114-117 |
32 |
원문
|