Journal
|
2025 |
Optimal AAV 3D Trajectory Design and Resource Allocation for Secure Mobile Edge Computing
정재민 IEEE Transactions on Vehicular Technology, v.74, no.3, pp.5281-5286 |
0 |
원문
|
Journal
|
2022 |
InAsP Quantum Dot-Embedded InP Nanowires toward Silicon Photonic Applications
Ting-Yuan Chang ACS Applied Materials & Interfaces, v.14, no.10, pp.12488-12494 |
12 |
원문
|
Journal
|
2020 |
A Lightweight True Random Number Generator using Beta Radiation for IoT Applications
Park Kyung Hwan ETRI Journal, v.42, no.6, pp.951-964 |
8 |
원문
|
Conference
|
2020 |
Simple Integration of Quantum and Beam Tracking Channels for Free-space Quantum Key Distribution
Kim Minchul International Conference on Quantum Cryptography (QCrypt) 2020, pp.1-2 |
|
|
Journal
|
2020 |
LAKS-NVT: Provably Secure and Lightweight Authentication and Key Agreement Scheme Without Verification Table in Medical Internet of Things
Park Kisung IEEE Access, v.8, pp.119387-119404 |
61 |
원문
|
Journal
|
2020 |
Recent R&D Trends in Wireless Network Technology based on UAV-assisted FSO Technique
Yeo Chan Il 전자통신동향분석, v.35, no.2, pp.38-49 |
|
원문
|
Conference
|
2019 |
Security Considerations for In-Vehicle Secure Communication
Ju Hong Il International Conference on Information and Communication Technology Convergence (ICTC) 2019, pp.1404-1406 |
15 |
원문
|
Journal
|
2018 |
Recent Technology Trends of Free-Space Quantum Key Distribution System and Components
Youn Chun Ju 전자통신동향분석, v.33, no.6, pp.94-106 |
|
원문
|
Conference
|
2018 |
Public Key-based Lightweight Mutual Authentication and Key Agreement Protocol for Drones
Keonwoo Kim Asian/Austrailian Rotorcraft Forum (ARF) 2018, pp.1-5 |
1 |
|
Journal
|
2018 |
Threshold Secret Sharing Transmission against Passive Eavesdropping in MIMO Wireless Networks
Jung Ho Myung Wireless Communications and Mobile Computing, v.2018, pp.1-7 |
0 |
원문
|
Conference
|
2018 |
Threshold Secret Sharing Transmission Against Passive Eavesdropping in MIMO Wireless Network
Jung Ho Myung International Conference on Ubiquitous and Future Networks (ICUFN) 2018, pp.634-636 |
2 |
원문
|
Conference
|
2017 |
Balance between Performance and Security in IPI-based Key Schemes using Heartbeats
Kwantae Cho International Conference on Signal Processing Systems (ICSPS) 2017, pp.1-5 |
1 |
원문
|
Journal
|
2016 |
Proposal of a Visible Light Communication Method for Personalized and Localized Building Energy Management
Jin Doo Jeong ETRI Journal, v.38, no.4, pp.735-745 |
12 |
원문
|
Journal
|
2015 |
Capacity Scaling and Diversity Order for Secure Cooperative Relaying With Untrustworthy Relays
Jung-Bin Kim IEEE Transactions on Wireless Communications, v.14, no.7, pp.3866-3876 |
49 |
원문
|
Conference
|
2014 |
An Architecture for Virtualization-Based Trusted Execution Environment on Mobile Devices
Jung Young-Woo International Conference on Ubiquitous Intelligence and Computing (UIC) / International Conference on Autonomic and Trusted Computing (ATC) / International Conference on Scalable Computing and Communications and Its Associated Workshops (ScalCom) 2014, pp.540-547 |
0 |
원문
|
Journal
|
2014 |
CMOS Security-Enhanced Passive (SEP) Tag Supporting to Mutual Authentication
Kim Hyunseok IEEE Transactions on Industrial Electronics, v.61, no.9, pp.4920-4930 |
8 |
원문
|
Journal
|
2014 |
Architecture for Dynamic Security Services in Overlay Network Environments
Dae-Hee Seo Information : An International Interdisciplinary Journal, v.17, no.5, pp.1877-1884 |
0 |
|
Journal
|
2012 |
Signcryption with Fast Online Signing and Short Signcryptext for Secure and Private Mobile Communication
Youn Taek Young Science China - Information Science, v.55, no.11, pp.2530-2541 |
8 |
원문
|
Journal
|
2011 |
Security Improvement of an RFID Security Protocol of ISO/IEC WD 29167-6
송보연 IEEE Communications Letters, v.15, no.12, pp.1375-1377 |
14 |
원문
|
Conference
|
2011 |
Scalable Wireless Network Security for Bluetooth in Global Collaborative Environment
Dae-Hee Seo International Conference on Ubi-media Computing (U-Media) 2011, pp.1-6 |
1 |
원문
|
Conference
|
2011 |
Location Based Hierarchical Secure Multicast Group Building in Wireless Sensor Networks
Kim Jin Myoung International Conference on Multimedia and Ubiquitous Engineering (MUE) 2011, pp.28-32 |
0 |
원문
|
Conference
|
2010 |
Gatekeeper
Kim Seung-Hyun Workshop on Digital Identity Management (DIM) 2010, pp.59-62 |
0 |
원문
|
Journal
|
2010 |
Authentication and ID-Based Key Management Protocol in Pervasive Environment
문종식 Wireless Personal Communications, v.55, no.1, pp.91-103 |
6 |
원문
|
Journal
|
2010 |
Prevent Illegal Access Control for Secure Healthcare System
Dae-Hee Seo 전기학회논문지, v.59, no.3, pp.657-663 |
|
|
Conference
|
2007 |
A Study on Key Distribution and ID Registration in the AAA System for Ubiquitous Multimedia Environments
강서일 International MultiMedia Modeling Conference (MMM) 2007 (LNCS 4352), v.4352, pp.487-493 |
0 |
원문
|
Conference
|
2006 |
Product Authentication Service of Consumer's mobile RFID Device
Kim Ju Han International Symposium on Consumer Electronics (ISCE) 2006, pp.660-665 |
0 |
|
Conference
|
2004 |
Network Processor Architecture for IPSec
Han Min-Ho International Conference on Advanced Communication Technology (ICACT) 2004, pp.485-487 |
|
원문
|
Conference
|
2002 |
Design and Analysis of Hierarchical VPN Based on SCG
박찬우 International Conference on Information Networking (ICOIN) 2002 (LNCS 2344), v.2344, pp.418-429 |
0 |
원문
|
Conference
|
2002 |
A Study of Security Association Management Oriented to IP Security
Park Won-Joo International Conference on Information Networking (ICOIN) 2002 (LNCS 2344), v.2344, pp.381-388 |
0 |
원문
|