Conference
|
2023 |
Security enhancement scheme for mobile device using H/W cryptographic module
Yoon Seung Yong International Conference on Information and Communication Technology Convergence (ICTC) 2023, pp.1450-1452 |
2 |
원문
|
Conference
|
2020 |
Secure IoT Device Authentication Scheme using Key Hiding Technology
Byoung Koo Kim International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.1808-1810 |
3 |
원문
|
Journal
|
2020 |
Practical Sender Authentication Scheme for In-Vehicle CAN With Efficient Key Management
Taek-Young Youn IEEE Access, v.8, pp.86836-86849 |
17 |
원문
|
Journal
|
2019 |
Communication and Security Technology Trends in Drone-assisted Wireless Sensor Network
Wang/Kicheoul 전자통신동향분석, v.34, no.3, pp.55-64 |
|
원문
|
Conference
|
2018 |
A Study on the PKI System for Autonomous Vessels
Chung Do Young International Conference on Maritime Autonomous Surface Ship (ICMASS) 2018, pp.1-3 |
|
|
Conference
|
2018 |
A Secret Key Updating Method between Devices for Secure Smart Services
Han Jin Hee International Conference on Information and Communication Technology Convergence (ICTC) 2018, pp.946-948 |
2 |
원문
|
Conference
|
2017 |
Handover Key Management in An LTE-based Unmanned Aerial Vehicle Control Network
Wang/Kicheoul International Conference on Future Internet of Things and Cloud (FiCloud) 2017: Workshops, pp.200-205 |
7 |
원문
|
Conference
|
2017 |
Security Enhanced Search and Rescue System by Using LTE and COSPAS SARSAT
Lee Sang Uk Baska GNSS Conference 2017, pp.109-119 |
|
|
Journal
|
2017 |
An Efficient Key Management Scheme for User Access Control in Outsourced Databases
Seungtae Hong World Wide Web: Internet and Web Information Systems, v.20, no.3, pp.467-490 |
6 |
원문
|
Conference
|
2016 |
Implementation of Secured PhotoVoltaic Monitoring System on the Smart Utility Network
Chang-Sic Choi International Conference on Information and Communication Technology Convergence (ICTC) 2016, pp.1049-1051 |
3 |
원문
|
Conference
|
2016 |
Authentication and Key Management in an LTE-Based Unmanned Aerial System Control and Non-payload Communication Network
Wang/Kicheoul International Conference on Future Internet of Things and Cloud Workshops (FiCloudW) 2016, pp.355-360 |
8 |
원문
|
Journal
|
2016 |
SecureDom: Secure Mobile-sensitive Information Protection with Domain Separation
Su Wan Park Journal of Supercomputing, v.72, no.7, pp.2682-2702 |
7 |
원문
|
Conference
|
2015 |
Architecture Design of Ground Telecommand Encryption Function for Spacecraft
Kim In Jun International Conference on Information and Communication Technology Convergence (ICTC) 2015, pp.929-932 |
|
|
Journal
|
2015 |
A Secure Storage System for Sensitive Data Protection Based on Mobile Virtualization
Su Wan Park International Journal of Distributed Sensor Networks, v.2015, pp.1-9 |
11 |
원문
|
Conference
|
2015 |
Improving MTM-Based Session & Key Management
Yoon Seung Yong International Conference on Green and Human Information Technology (ICGHIT) 2015, pp.333-334 |
|
|
Conference
|
2014 |
Application Authentication and Secure Key Management Scheme using MTM
Han Jin Hee International Conference on Computer Science and its Applications (CSA) 2014 (LNEE 330), pp.941-946 |
0 |
원문
|
Journal
|
2014 |
Secured Search and Rescue Signal using COSPAS-SARSAT
백유진 제어로봇시스템학회논문지, v.20, no.2, pp.157-162 |
0 |
원문
|
Conference
|
2013 |
User-Centric Key Management Scheme for Personal Cloud Storage
유성민 International Conference on Information Science and Applications (ICISA) 2013, pp.1-4 |
6 |
원문
|
Conference
|
2011 |
Design and Implementation of Headend Servers for Downloadable CAS
Jeong Young Ho International Conference on Consumer Electronics (ICCE) 2011, pp.727-728 |
1 |
원문
|
Journal
|
2010 |
Authentication and ID-Based Key Management Protocol in Pervasive Environment
문종식 Wireless Personal Communications, v.55, no.1, pp.91-103 |
6 |
원문
|
Journal
|
2010 |
Hierarchical CRGK Supporting a Secure Multicast Communication for a Large Number of Users
Park Jee Hyun IEICE Transactions on Communications, v.E93.B, no.4, pp.862-870 |
0 |
원문
|
Conference
|
2009 |
Implementation of a SW-based Secure Storage for License Protection
Lee Sang-Woo IASTED International Conference on Internet and Multimedia Systems and Applications (IMSA) 2009, pp.119-123 |
|
|
Conference
|
2009 |
Secure Gateway Systems for a Wireless Sensor Network
Kim Ju Han International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC) 2009, pp.1165-1168 |
|
|
Conference
|
2009 |
Hierarchical CRGK for a Large-scale User Group
Park Jee Hyun International Conference on Consumer Electronics (ICCE) 2009, pp.1-2 |
0 |
원문
|
Journal
|
2008 |
Key Management for Overlay-based IPTV Content Delivery
Gu Jabeom International Journal of Computer Science and Network Security, v.8, no.12, pp.161-167 |
|
|
Journal
|
2008 |
Efficient and Secure Self-Organized Public Key Management for Mobile Ad Hoc Networks
Choi Dae Seon IEICE Transactions on Communications, v.E91-B, no.11, pp.3574-3583 |
1 |
원문
|
Journal
|
2008 |
Energy-Efficient Key-Management (EEKM) Protocol for Large-Scale Distributed Sensor Networks
Paek Kwangjin Journal of Information Science and Engineering, v.24, no.6, pp.1837-1858 |
|
|
Conference
|
2008 |
Data Randomization for Lightweight Secure Data Aggregation in Sensor Network
Abedelaziz Mohaisen International Conference on Ubiquitous Intelligence and Computing (UIC) 2008 (LNCS 5061), v.5061, pp.338-351 |
0 |
원문
|
Conference
|
2008 |
MYTV 2.0: Semantic reasoning and Web 2.0 for mobile TV
Kim Ju Han International Symposium on Consumer Electronics (ISCE) 2008, pp.1-4 |
7 |
원문
|
Conference
|
2007 |
JavaCard-based Two-Level User Key Management for IP Conditional Access Systems
Moon Jin Young International Conference on Networks (ICON) 2007, pp.72-76 |
11 |
원문
|
Conference
|
2007 |
A Level-based Key Management for both In-Network Processing and Mobility in WSNs
Kim Kyeong Tae International Conference on Mobile Ad-hoc and Sensor Systems (MASS) 2007, pp.1-8 |
10 |
원문
|
Journal
|
2007 |
Key Management Protocol for Roaming in Wireless Interworking System
조태남 International Journal of Computer Science and Network Security, v.7, no.8, pp.59-68 |
|
|
Conference
|
2007 |
Public Key Management Framework for Two-tier Super Peer Architecture
Kwon Hyeok Chan International Conference on Distributed Computing Systems Workshops (ICDCSW) 2007, pp.1-6 |
4 |
원문
|
Conference
|
2007 |
A Design and Implementation of Wireless Sensor Network Security on Nano-Qplus Platform
Kim Jin Won International Conference on Advanced Communication Technology (ICACT) 2007, pp.684-688 |
0 |
원문
|
Conference
|
2006 |
A Trustworthy End-to-End Key Management Scheme for Digital Rights Management
Kim Jun Il International Conference on Multimedia (MM) 2006, pp.635-638 |
2 |
원문
|
Conference
|
2006 |
An Active Entitlement Key Management for Conditional Access System on Digital TV Broadcasting Network
Han Seung Koo Network Operations and Management Symposium (NOMS) 2006, pp.1-4 |
1 |
|
Conference
|
2006 |
Authorization Refreshment Management Using ARL in DTV Broadcasting
Han Seung Koo International Conference on Advanced Communication Technology (ICACT) 2006, pp.1591-1594 |
0 |
|
Conference
|
2006 |
Key Management Scheme for Providing the Confidentiality in Mobile Multicast
Noh Jong-Hyouk International Conference on Advanced Communication Technology (ICACT) 2006, pp.1205-1209 |
7 |
|
Conference
|
2006 |
An Active Entitlement Key Management for CA System on Digital TV Broadcasting System
Han Seung Koo International Conference on Consumer Electronics (ICCE) 2006, pp.109-110 |
0 |
원문
|
Conference
|
2006 |
Topology-Aware Key Management Scheme for Secure Overlay Multicast
Noh Jong-Hyouk International Conference on Information Networking (ICOIN) 2006 (LNCS 3961), v.3961, pp.733-742 |
0 |
원문
|
Journal
|
2005 |
Trusted Certificate Validation Scheme for Open LBS Application Based on XML Web Services
Moon Ki Young International journal of information processing systems, v.1, no.1, pp.86-95 |
|
|
Conference
|
2005 |
Key Management for Secure Overlay Multicast
Noh Jong-Hyouk Conference on Information Security and Cryptology (CISC) 2005 (LNCS 3822), v.3822, pp.336-345 |
0 |
원문
|
Journal
|
2005 |
Protection of MPEG-2 Multicast Streaming in IP Set-Top Box Environment
Seong Oun Hwang ETRI Journal, v.27, no.5, pp.595-607 |
3 |
원문
|
Conference
|
2005 |
Implementation of Streamlining PKI System for Web Services
Park Nam Je International Conference on Computational Science and Its Applications (ICCSA) 2005 (LNCS 3480), v.3480, pp.609-618 |
2 |
원문
|
Journal
|
2005 |
저작권 관리를 위한 신뢰성지원 키 관리 구조
Jeong Yeon Jeong ETRI Journal, v.27, no.1, pp.114-117 |
32 |
원문
|
Conference
|
2005 |
A Distributed Certificate Key Management Method in IEEE 802.15.3 WPAN Environment
Song Ji Eun International Conference on Advanced Communication Technology (ICACT) 2005, pp.1019-1022 |
|
원문
|
Conference
|
2005 |
Method of securely transferring programmable packet using digital signatures having access-controlled high-security verification key
Kim Youngsoo International Conference on Advanced Communication Technology (ICACT) 2005, pp.1208-1211 |
|
원문
|
Conference
|
2005 |
Design of Unified Key Management Model using XKMS
Kim Ju Han International Conference on Advanced Communication Technology (ICACT) 2005, pp.77-80 |
|
원문
|
Conference
|
2004 |
A XKMS-Based Security Framework for Mobile Grid into the XML Web Services
Park Nam Je International Conference on Computational Science (ICCS) 2004 (LNCS 3038), pp.124-132 |
1 |
원문
|
Conference
|
2004 |
Development of XKMS-Based Service Component for Using PKI in XML Web Services Environment
Park Nam Je International Conference on Computational Science and Its Applications (ICCSA) 2004 (LNCS 3043), pp.784-791 |
3 |
원문
|
Conference
|
2004 |
Analysis and Countermeasure on Vulnerability of WPA Key Exchange Mechanism
Yousung Kang International Conference on Information Networking (ICOIN) 2004 (LNCS 3090), v.3090, pp.915-924 |
1 |
원문
|
Conference
|
2004 |
A Study on the XKMS-based Key Management System for Secure Global XML Web Services
Park Nam Je International Conference on Advanced Communication Technology (ICACT) 2004, pp.492-495 |
|
원문
|
Conference
|
2003 |
Certificate Validation Service using XKMS for Computational Grid
Park Nam Je ACM Workshop on XML Security (XMLSEC) 2003, pp.112-120 |
7 |
원문
|
Conference
|
2002 |
A SAML-based SSO and B2B
Jin Seung Hun 한국정보처리학회 학술 발표 대회 (추계) 2002, pp.961-964 |
|
|
Conference
|
2002 |
A Study of Security Association Management Oriented to IP Security
Park Won-Joo International Conference on Information Networking (ICOIN) 2002 (LNCS 2344), v.2344, pp.381-388 |
0 |
원문
|