Conference
|
2015 |
Supporting a Variety of Secure Services Based on MTM
Yoon Seung Yong International Conference on Systems and Networks Communications (ICSNC) 2015, pp.18-20 |
|
|
Journal
|
2015 |
Implementation of a Hardware Security Chip for Mobile Devices
Ju Hong Il IEEE Transactions on Consumer Electronics, v.61, no.4, pp.500-506 |
13 |
원문
|
Conference
|
2015 |
A Method Based on Platform Integrity Verification for Activating a Mobile Trusted Module
Kim Dae Won International Conference on Information and Communication Technology Convergence (ICTC) 2015, pp.1177-1179 |
|
|
Journal
|
2015 |
Implementation of a MTM-based secure OTP Generator for IoT Devices
Kim Young Sae 대한임베디드공학회논문지, v.10, no.4, pp.199-206 |
|
원문
|
Conference
|
2014 |
Application Authentication and Secure Key Management Scheme using MTM
Han Jin Hee International Conference on Computer Science and its Applications (CSA) 2014 (LNEE 330), pp.941-946 |
0 |
원문
|
Conference
|
2014 |
A Method for Safe and Efficient Integrity Verification of Smartphones
Han Jin Hee 한국정보처리학회 학술 발표 대회 (추계) 2014, pp.423-426 |
|
|
Conference
|
2014 |
A Secure Channel Establishment Method on a Hardware Security Module
Kim Dae Won International Conference on Information and Communication Technology Convergence (ICTC) 2014, pp.555-556 |
4 |
원문
|
Conference
|
2014 |
A Design of Mobile Trusted Module for Application Dedicated Cryptographic Keys
Kim Dae Won International Conference on Mobile Services, Resources, and Users (MOBILITY) 2014, pp.1-5 |
|
|
Conference
|
2013 |
An Integrity-Based Mechanism for Accessing Keys in A Mobile Trusted Module
Kim Dae Won International Conference on Information and Communication Technology Convergence (ICTC) 2013, pp.780-782 |
1 |
원문
|
Journal
|
2013 |
Compact and Unified Hardware Architecture for SHA-1 and SHA-256 of Trusted Mobile Computing
Kim Moo Seop Personal and Ubiquitous Computing, v.17, no.5, pp.921-932 |
11 |
원문
|
Conference
|
2013 |
A Study on the Embedded SE Interface for Mobile Devices
Ju Hong Il International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC) 2013, pp.881-882 |
|
|
Journal
|
2010 |
Design and Implementation of Mobile Trusted Module for Trusted Mobile Computing
Kim Moo Seop IEEE Transactions on Consumer Electronics, v.56, no.1, pp.134-140 |
24 |
원문
|
Conference
|
2010 |
Design and Implementation of Mobile Trusted Module for Trusted Mobile Computing
Kim Moo Seop International Conference on Consumer Electronics (ICCE) 2010, pp.1-2 |
2 |
원문
|
Conference
|
2009 |
Design and Implementation of the MTM Interface for Data Transmission
Ju Hong Il International Conference on Embedded Systems & Applications (ESA) 2009, pp.1-4 |
|
|
Journal
|
2009 |
A Study on Secure Key Backup/Recovery Scheme for Device based on Mobile Trusted Module
강동완 정보처리학회논문지 C, v.16C, no.3, pp.335-346 |
|
원문
|
Conference
|
2008 |
Compact Implementation of SHA-1 Hash Function for Mobile Trusted Module
Kim Moo Seop World Conference on Information Security Applications (WISA) 2008 (LNCS 5379), v.5379, pp.292-304 |
1 |
원문
|
Journal
|
2008 |
A Secure Maintenance Scheme of Secret Data on Trusted Mobile Platform Environment
강동완 정보보호학회논문지, v.18, no.4, pp.79-91 |
|
|
Conference
|
2008 |
The Need of MTM Interface Specification for the Trusted Mobile Platform
Ju Hong Il International Conference on Embedded Systems and Applications (ESA) 2008, pp.1-6 |
|
|
Conference
|
2007 |
Efficient Implementation of the Keyed-Hash Message Authentication Code Based on SHA-1 Algorithm for Mobile Trusted Computing
Kim Moo Seop International Conference on Autonomic and Trusted Computing (ATC) 2007 (LNCS 4610), v.4610, pp.410-419 |
4 |
원문
|