Journal
|
2023 |
Robust and Efficient Authentication and Group–Proof Scheme Using Physical Unclonable Functions for Wearable Computing
Yusungjin Sensors, v.23, no.12, pp.1-26 |
5 |
원문
|
Journal
|
2023 |
LAKA-UAV: Lightweight authentication and key agreement scheme for cloud-assisted Unmanned Aerial Vehicle using blockchain in flying ad-hoc networks
Yusungjin Computer Networks, v.224, pp.1-15 |
36 |
원문
|
Journal
|
2023 |
BPPS:Blockchain-Enabled Privacy-Preserving Scheme for Demand-Response Management in Smart Grid Environments
Park Kisung IEEE Transactions on Dependable and Secure Computing, v.20, no.2, pp.1719-1729 |
62 |
원문
|
Journal
|
2023 |
T‐depth reduction method for efficient SHA‐256 quantum circuit construction
Jong-Heon Lee IET Information Security, v.17, no.1, pp.46-65 |
6 |
원문
|
Conference
|
2021 |
T-depth Reduction Method for Efficient SHA-256 Quantum Circuit Construction
Jong-Heon Lee International Conference on Information Security and Cryptology (ICISC) 2021 (LNCS 13218), pp.368-391 |
0 |
원문
|
Journal
|
2021 |
A Security Analysis of Blockchain-Based Did Services
김봉곤 IEEE Access, v.9, pp.22894-22913 |
25 |
원문
|
Journal
|
2020 |
Dynamic Membership Management in Anonymous and Deniable Distance Bounding
Jho Nam-Su Sustainability, v.12, no.4, pp.1-16 |
1 |
원문
|
Journal
|
2020 |
Secure Key Agreement and Authentication Protocol for Message Confirmation in Vehicular Cloud Computing
이준영 Applied Sciences, v.10, no.18, pp.1-20 |
15 |
원문
|
Journal
|
2020 |
A Secure and Efficient Three-Factor Authentication Protocol in Global Mobility Networks
유성진 Applied Sciences, v.10, no.10, pp.1-23 |
23 |
원문
|
Journal
|
2020 |
Privacy-Preserving Lightweight Authentication Protocol for Demand Response Management in Smart Grid Environment
유성진 Applied Sciences, v.10, no.5, pp.1-26 |
38 |
원문
|
Conference
|
2017 |
Netflow Based HTTP Get Flooding Attack Analysis
Jung Tae Kim International Conference on Emerging Security Information, Systems and Technologies (SECURWARE) 2017 |
|
|
Conference
|
2017 |
Security Analysis of Samsung Knox
Munkhzorig Dorjmyagmar International Conference on Advanced Communications Technology (ICACT) 2017, pp.550-553 |
|
|
Journal
|
2016 |
Secure Firmware Validation and Update for Consumer Devices in Home Networking
Choi Byeong Cheol IEEE Transactions on Consumer Electronics, v.62, no.1, pp.39-44 |
54 |
원문
|
Conference
|
2015 |
Security Analysis on RFID Mutual Authentication Protocol
Yousung Kang International Workshop on Information Security Applications (WISA) 2015 (LNCS 9503), v.9503, pp.65-74 |
4 |
원문
|
Conference
|
2011 |
Enterprise Data Loss Prevention System Having a Function of Coping with Civil Suits
Kim Youngsoo International Conference on Computers, Networks, Systems, and Industrial Engineering (CNSI) 2011 (SCI 365), v.365, pp.201-208 |
13 |
원문
|
Journal
|
2008 |
Random Visitor: Defense against Identity Attacks in P2P Networks
Gu Jabeom IEICE Transactions on Information and Systems, v.E91-D, no.4, pp.1058-1073 |
1 |
원문
|
Conference
|
2008 |
Enforcing Security in Mobile RFID Networks Multilateral Approaches and Solutions
Park Nam Je Network Operations and Management Symposium (NOMS) 2008, pp.999-1002 |
4 |
원문
|
Conference
|
2006 |
Security Analysis and Implementation leveraging Globally Networked RFIDs
Park Nam Je International Conference on Personal Wireless Communications (PWC) 2006 (LNCS 4217), v.4217, pp.494-505 |
30 |
원문
|
Conference
|
2006 |
A Personal Information Leakage Prevention Method on the Internet
Choi Dae Seon International Symposium on Consumer Electronics (ISCE) 2006, pp.646-650 |
4 |
|
Conference
|
2006 |
Design and Implementation of FPGA Based High-Performance Intrusion Detection System
Byoung Koo Kim International Conference on Intelligence and Security Informatics (ISI) 2006 (LNCS 3975), v.3975, pp.724-725 |
4 |
원문
|
Conference
|
2004 |
Design and Implementation of Detection Engine Against IDS Evasion with Unicode
Dong Ho Kang International Conference on High Performance Computing and Applications (ICHPCA) 2004, pp.333-337 |
|
원문
|
Conference
|
2004 |
Implementation and Performance Evaluation of High-Performance Intrusion Detection and Response System
김형주 International Conference on Computational Science and Its Applications (ICCSA) 2004 (LNCS 3043), v.3043, pp.998-1006 |
0 |
원문
|
Conference
|
2004 |
Design and Implementation of High-Performance Intrusion Detection System
Kim Byoung Koo International Conference on Computational Science and Its Applications (ICCSA) 2004 (LNCS 3046), v.3046, pp.594-602 |
2 |
원문
|