Journal
|
2024 |
PUF-Based Robust and Anonymous Authentication and Key Establishment Scheme for V2G Networks
Yusungjin IEEE Internet of Things Journal, v.11, no.9, pp.15450-15464 |
29 |
원문
|
Conference
|
2023 |
Cryptanalysis and Countermeasures of the Recent Authentication and Key Agreement Scheme for Internet of Drones
Yusungjin International Conference on Information and Communication Technology Convergence (ICTC) 2023, pp.1419-1422 |
2 |
원문
|
Journal
|
2023 |
Robust and Efficient Authentication and Group–Proof Scheme Using Physical Unclonable Functions for Wearable Computing
Yusungjin Sensors, v.23, no.12, pp.1-26 |
5 |
원문
|
Journal
|
2023 |
LAKA-UAV: Lightweight authentication and key agreement scheme for cloud-assisted Unmanned Aerial Vehicle using blockchain in flying ad-hoc networks
Yusungjin Computer Networks, v.224, pp.1-15 |
36 |
원문
|
Journal
|
2022 |
A Robust Authentication Protocol for Wireless Medical Sensor Networks Using Blockchain and Physically Unclonable Functions
Yusungjin IEEE Internet of Things Journal, v.9, no.20, pp.20214-20228 |
94 |
원문
|
Journal
|
2021 |
Lightweight Three-Factor-Based Privacy- Preserving Authentication Scheme for IoT-Enabled Smart Homes
Yusungjin IEEE Access, v.9, pp.126186-126197 |
55 |
원문
|
Journal
|
2021 |
Comments on “ALAM: Anonymous Lightweight Authentication Mechanism for SDN Enabled Smart Homes”
Yusungjin IEEE Access, v.9, pp.49154-49159 |
21 |
원문
|
Journal
|
2019 |
Symmetric Keyring Encryption Scheme for Biometric Cryptosystem
Yen-Lung Lai Information Sciences, v.502, pp.492-509 |
20 |
원문
|
Journal
|
2016 |
Hybrid App Security Protocol for High Speed Mobile Communication
Lee Seoung Hyeon Journal of Supercomputing, v.72, no.5, pp.1715-1739 |
5 |
원문
|
Conference
|
2016 |
Load Adaptive and Fault Tolerant Distributed Stream Processing System for Explosive Stream Data
Myungcheol Lee International Conference on Advanced Communication Technology (ICACT) 2016, pp.745-751 |
7 |
원문
|
Conference
|
2015 |
Load Adaptive Distributed Stream Processing System for Explosive Stream Data
Myungcheol Lee International Conference on Advanced Communication Technology (ICACT) 2015, pp.753-757 |
3 |
원문
|
Conference
|
2015 |
A Framework for Security Services Based on Software-Defined Networking
정재훈 International Conference on Advanced Information Networking and Applications Workshops (WAINA) 2015, pp.150-153 |
18 |
원문
|
Journal
|
2014 |
Technical Trends of the Cyber Attack Traceback
Jung Tae Kim 전자통신동향분석, v.29, no.1, pp.93-103 |
|
원문
|
Journal
|
2010 |
A Scheme for Adaptively Countering Application Layer Security Attacks in Wireless Sensor Networks
Hae Young Lee IEICE Transactions on Communications, v.E93.B, no.7, pp.1881-1889 |
12 |
원문
|
Conference
|
2008 |
Design of Network Management Platform and Security Framework for WSN
Lee Byung-Gil International Conference on Signal Image Technology and Internet Based Systems (SITIS) 2008, pp.640-645 |
8 |
원문
|
Conference
|
2008 |
The Secure Routing Mechanism for DHT-based Overlay Network
Kwon Hyeok Chan International Conference on Advanced Communication Technology (ICACT) 2008, pp.1300-1303 |
2 |
원문
|
Conference
|
2004 |
On the design and performance of an Internet application traffic monitoring system
Taesang Choi Workshop on IP Operations and Management (IPOM) 2004, pp.41-47 |
|
원문
|