Subject

Subjects : Security vulnerabilities

  • Articles (48)
  • Patents (3)
  • R&D Reports (0)
논문 검색결과
Type Year Title Cited Download
Conference 2025 Security Analysis and Solution Proposal for Authentication Systems Using PUF in IoD Environment   Lee Joonyoung  International Conference on Ubiquitous and Future Networks (ICUFN) 2025, pp.759-764 0 원문
Conference 2025 Security Analysis and Solution Proposal for Authentication Systems Using PUF in IoD Environment   Park Homin  International Conference on Ubiquitous and Future Networks (ICUFN) 2025, pp.759-764 0 원문
Conference 2025 BrokenSleep: Remote Power Timing Attack Exploiting Processor Idle States   Kang Kidong  International Symposium on High Performance Computer Architecture (HPCA) 2025, pp.409-422 1 원문
Conference 2025 BrokenSleep: Remote Power Timing Attack Exploiting Processor Idle States   김효상  International Symposium on High Performance Computer Architecture (HPCA) 2025, pp.409-422 1 원문
Conference 2024 Defending Against EMI Attacks on Just-In-Time Checkpoint for Resilient Intermittent Systems   Jaeseok Choi  International Symposium on Microarchitecture (MICRO) 2024, pp.1-15 4 원문
Conference 2023 5G Architecture based on Software-Defined Perimeter (SDP) for Direct Trust Access to Private Networks   Kim Woocheol  International Conference on Wireless Networks (ICWN) 2023, pp.2719-2721 1 원문
Journal 2021 Security Technology Trends to Prevent Medical Device Hacking and Ransomware   Kwon Hyeok Chan  전자통신동향분석, v.36, no.5, pp.21-31 원문
Conference 2021 Multiple PUF-based Lightweight Authentication Method in the IoT   Yoon Seung Yong  International Conference on Information and Communication Technology Convergence (ICTC) 2021, pp.1198-1200 8 원문
Journal 2021 Analysis of Current 5G Open-Source Projects   Minjae Kim  전자통신동향분석, v.36, no.2, pp.83-92 원문
Journal 2021 Secrecy Outage Minimization for Wireless-Powered Relay Networks With Destination-Assisted Cooperative Jamming   이기송  IEEE Internet of Things Journal, v.8, no.3, pp.1467-1476 20 원문
Conference 2020 Drone Security Module for UAV Data Encryption   Keonwoo Kim  International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.1672-1674 33 원문
Conference 2020 Secure IoT Device Authentication Scheme using Key Hiding Technology   Byoung Koo Kim  International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.1808-1810 3 원문
Journal 2020 A Comprehensive Security Assessment Framework for Software-defined Networks   이승수  Computers & Security, v.91, pp.1-15 36 원문
Journal 2019 Mobile Network Security Issues regarding 5G Security   Park Jong Geun  전자통신동향분석, v.34, no.1, pp.36-48 원문
Journal 2018 Smart Contract-Based Review System for an IoT Data Marketplace   박지선  Sensors, v.18, no.10, pp.1-16 90 원문
Conference 2018 RIPPLE: Adaptive Fine-grained Access Control in Multi-hop LLNs   Young Ho Kim  International Conference on Information Networking (ICOIN) 2018, pp.863-868 3 원문
Conference 2017 Remote Security Management Server for IoT Devices   Yoon Seung Yong  International Conference on Information and Communication Technology Convergence (ICTC) 2017, pp.1163-1165 21 원문
Conference 2017 Development and Construction of Security-Enhanced LTE Traffic Signal System in Korea   Myunghee Son  International Conference on Computer and Communication Systems (ICCCS) 2017, pp.91-95 4 원문
Journal 2016 Hybrid App Security Protocol for High Speed Mobile Communication   Lee Seoung Hyeon  Journal of Supercomputing, v.72, no.5, pp.1715-1739 5 원문
Conference 2016 Abnormal Traffic Filtering Mechanism for Protecting ICS Networks   Byoung Koo Kim  International Conference on Advanced Communication Technology (ICACT) 2016, pp.436-440 8 원문
Journal 2015 A Secure Storage System for Sensitive Data Protection Based on Mobile Virtualization   Su Wan Park  International Journal of Distributed Sensor Networks, v.2015, pp.1-9 11 원문
Conference 2014 Secure Filesystem for Trusted Virtual Domain in Mobile Device   Su Wan Park  International Conference on Computer Science and its Applications (CSA) 2014 (LNEE 330), pp.411-417 0 원문
Conference 2014 The Cost Effective and Secure Service Platform to Enable Smart Grid Service with Mobile Backhaul Network   Woo-Sug Jung  Conference on Energy Conversion (CENCON) 2014, pp.49-54 0 원문
Conference 2014 Security Threats Analysis for Android based Mobile Device   Yoon Seung Yong  International Conference on Information and Communication Technology Convergence (ICTC) 2014, pp.775-776 6 원문
Conference 2014 Implementation of TouchSign Certificate Management System   Sangrae Cho  대한전자공학회 종합 학술 대회 (하계) 2014, pp.598-601
Conference 2014 Design of Industrial Firewall System based on Multiple Access Control Filter   Byoung Koo Kim  International Symposium on Frontier and Innovation in Future Computing and Communications (FCC) 2014 (LNEE 301), pp.535-544 1 원문
Journal 2013 Improving Mobile Device Classification Using Security Events for Preventing Wireless Intrusion   Kwon Hyeok Chan  International Journal of Security and Its Applications, v.7, no.6, pp.181-190 1 원문
Conference 2013 DroidVulMon -- Android Based Mobile Device Vulnerability Analysis and Monitoring System   함유정  International Conference on Next Generation Mobile Apps, Services and Technologies (NGMAST) 2013, pp.26-31 8 원문
Conference 2012 Security Architecture for Smart Devices   Ju Hong Il  International Conference on Information and Communication Technology Convergence (ICTC) 2012, pp.94-95 1 원문
Journal 2011 A Note on an Identity-Based Ring Signature Scheme with Signer Verifiability   Jung Yeon Hwang  Theoretical Computer Science, v.412, no.8-10, pp.796-804 6 원문
Journal 2010 Authentication and ID-Based Key Management Protocol in Pervasive Environment   문종식  Wireless Personal Communications, v.55, no.1, pp.91-103 6 원문
Conference 2010 Design of a Forecasting Service System for Monitoring of Vulnerabilities of Sensor Networks   송재구  International Conference on Security-Enriched Urban Computing and Smart Grid (SUComS) 2010 (CCIS 78), v.78, pp.34-38 0 원문
Journal 2009 Security Vulnerability in a Non-Interactive ID-Based Proxy Re-encryption Scheme   구우권  Information Processing Letters, v.109, no.23-24, pp.1260-1262 11 원문
Journal 2009 Security Vulnerability of ID-Based Key Sharing Schemes   Jung Yeon Hwang  IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, v.E92-A, no.10, pp.2641-2643 0 원문
Journal 2009 PKG-VUL: Security Vulnerability Evaluation and Patch Framework for Package-Based Systems   이종혁  ETRI Journal, v.31, no.5, pp.554-564 10 원문
Conference 2009 Designing Pastry-based Secure IPTV Video Delivery Network   Kwon Hyeok Chan  Joint Workshop on Information Security (JWIS) 2009, pp.1-9
Conference 2009 A Study on Reliable Communication in ATN Environment   Do-Woo Kim  International Conference on Information & Knowledge Engineering (IKE) 2009, pp.370-373
Conference 2009 Secure Overlay Multicast Infrastructure for P2P-based IPTV Service   Kwon Hyeok Chan  International Conference on Advanced Communication Technology (ICACT) 2009, pp.2041-2043
Conference 2008 Protection Profile for Security Enhancement of Embedded Operating System for Mobile Terminals   Jeong Youn Seo  International Conference on Advanced Communication Technology (ICACT) 2008, pp.1908-1911 2 원문
Conference 2007 Analysis of SEND Protocol through Implementation and Simulation   An Gaeil  International Conference on Convergence Information Technology (ICCIT) 2007, pp.670-676 16 원문
Conference 2007 SNMP-based Integrated Wire/wireless Device Management System   정수진  International Conference on Advanced Communication Technology (ICACT) 2007, pp.995-998 3 원문
Conference 2006 Product Authentication Service of Consumer's mobile RFID Device   Kim Ju Han  International Symposium on Consumer Electronics (ISCE) 2006, pp.660-665 0
Conference 2006 Comparisons analysis of Security Vulnerabilities for Security Enforcement in IPv4/IPv6   오하영  International Conference on Advanced Communication Technology (ICACT) 2006, pp.1583-1585 3
Conference 2006 Security Vulnerability and Considerations in Mobile RFID Environment   Kim Ju Han  International Conference on Advanced Communication Technology (ICACT) 2006, pp.801-804 10
Conference 2006 On the Study of Service Security Model for Privacy using Global User Management Framework   Choi Byeong Cheol  International Conference on Advanced Communication Technology (ICACT) 2006, pp.113-116 2
Conference 2006 A Wireless Service for Product Authentication in Mobile RFID Environment   Kim Ju Han  International Symposium on Wireless Pervasive Computing (ISWPC) 2006, pp.1-5
Conference 2005 The Study on Secure Auto-Configuration Technology in IPv6   Kim Myung Eun  International Conference on Advanced Communication Technology (ICACT) 2005, pp.85-88
Conference 2004 A Fine-Grained Taxonomy of Security Vulnerability in Active Network Environments   양진석  International Conference on Computational Science and Its Applications (ICCSA) 2004 (LNCS 3043), v.3043, pp.693-700 0 원문
특허 검색결과
Status Year Patent Name Country Family Pat. KIPRIS
Registered 2018 사이버 보안 취약점 및 규제지침 점검 장치 및 방법 KOREA KIPRIS
Registered 2017 직렬 포트 기반 사이버 보안 취약점 점검 장치 및 그 방법 KOREA KIPRIS
Registered 2017 콘솔 접속을 통한 보안 취약점 점검 장치 및 그 방법 KOREA
연구보고서 검색결과
Type Year Research Project Primary Investigator Download
No search results.