|
Conference
|
2025 |
Security Analysis and Solution Proposal for Authentication Systems Using PUF in IoD Environment
Lee Joonyoung International Conference on Ubiquitous and Future Networks (ICUFN) 2025, pp.759-764 |
0 |
원문
|
|
Conference
|
2025 |
Security Analysis and Solution Proposal for Authentication Systems Using PUF in IoD Environment
Park Homin International Conference on Ubiquitous and Future Networks (ICUFN) 2025, pp.759-764 |
0 |
원문
|
|
Conference
|
2025 |
BrokenSleep: Remote Power Timing Attack Exploiting Processor Idle States
Kang Kidong International Symposium on High Performance Computer Architecture (HPCA) 2025, pp.409-422 |
1 |
원문
|
|
Conference
|
2025 |
BrokenSleep: Remote Power Timing Attack Exploiting Processor Idle States
김효상 International Symposium on High Performance Computer Architecture (HPCA) 2025, pp.409-422 |
1 |
원문
|
|
Conference
|
2024 |
Defending Against EMI Attacks on Just-In-Time Checkpoint for Resilient Intermittent Systems
Jaeseok Choi International Symposium on Microarchitecture (MICRO) 2024, pp.1-15 |
4 |
원문
|
|
Conference
|
2023 |
5G Architecture based on Software-Defined Perimeter (SDP) for Direct Trust Access to Private Networks
Kim Woocheol International Conference on Wireless Networks (ICWN) 2023, pp.2719-2721 |
1 |
원문
|
|
Journal
|
2021 |
Security Technology Trends to Prevent Medical Device Hacking and Ransomware
Kwon Hyeok Chan 전자통신동향분석, v.36, no.5, pp.21-31 |
|
원문
|
|
Conference
|
2021 |
Multiple PUF-based Lightweight Authentication Method in the IoT
Yoon Seung Yong International Conference on Information and Communication Technology Convergence (ICTC) 2021, pp.1198-1200 |
8 |
원문
|
|
Journal
|
2021 |
Analysis of Current 5G Open-Source Projects
Minjae Kim 전자통신동향분석, v.36, no.2, pp.83-92 |
|
원문
|
|
Journal
|
2021 |
Secrecy Outage Minimization for Wireless-Powered Relay Networks With Destination-Assisted Cooperative Jamming
이기송 IEEE Internet of Things Journal, v.8, no.3, pp.1467-1476 |
20 |
원문
|
|
Conference
|
2020 |
Drone Security Module for UAV Data Encryption
Keonwoo Kim International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.1672-1674 |
33 |
원문
|
|
Conference
|
2020 |
Secure IoT Device Authentication Scheme using Key Hiding Technology
Byoung Koo Kim International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.1808-1810 |
3 |
원문
|
|
Journal
|
2020 |
A Comprehensive Security Assessment Framework for Software-defined Networks
이승수 Computers & Security, v.91, pp.1-15 |
36 |
원문
|
|
Journal
|
2019 |
Mobile Network Security Issues regarding 5G Security
Park Jong Geun 전자통신동향분석, v.34, no.1, pp.36-48 |
|
원문
|
|
Journal
|
2018 |
Smart Contract-Based Review System for an IoT Data Marketplace
박지선 Sensors, v.18, no.10, pp.1-16 |
90 |
원문
|
|
Conference
|
2018 |
RIPPLE: Adaptive Fine-grained Access Control in Multi-hop LLNs
Young Ho Kim International Conference on Information Networking (ICOIN) 2018, pp.863-868 |
3 |
원문
|
|
Conference
|
2017 |
Remote Security Management Server for IoT Devices
Yoon Seung Yong International Conference on Information and Communication Technology Convergence (ICTC) 2017, pp.1163-1165 |
21 |
원문
|
|
Conference
|
2017 |
Development and Construction of Security-Enhanced LTE Traffic Signal System in Korea
Myunghee Son International Conference on Computer and Communication Systems (ICCCS) 2017, pp.91-95 |
4 |
원문
|
|
Journal
|
2016 |
Hybrid App Security Protocol for High Speed Mobile Communication
Lee Seoung Hyeon Journal of Supercomputing, v.72, no.5, pp.1715-1739 |
5 |
원문
|
|
Conference
|
2016 |
Abnormal Traffic Filtering Mechanism for Protecting ICS Networks
Byoung Koo Kim International Conference on Advanced Communication Technology (ICACT) 2016, pp.436-440 |
8 |
원문
|
|
Journal
|
2015 |
A Secure Storage System for Sensitive Data Protection Based on Mobile Virtualization
Su Wan Park International Journal of Distributed Sensor Networks, v.2015, pp.1-9 |
11 |
원문
|
|
Conference
|
2014 |
Secure Filesystem for Trusted Virtual Domain in Mobile Device
Su Wan Park International Conference on Computer Science and its Applications (CSA) 2014 (LNEE 330), pp.411-417 |
0 |
원문
|
|
Conference
|
2014 |
The Cost Effective and Secure Service Platform to Enable Smart Grid Service with Mobile Backhaul Network
Woo-Sug Jung Conference on Energy Conversion (CENCON) 2014, pp.49-54 |
0 |
원문
|
|
Conference
|
2014 |
Security Threats Analysis for Android based Mobile Device
Yoon Seung Yong International Conference on Information and Communication Technology Convergence (ICTC) 2014, pp.775-776 |
6 |
원문
|
|
Conference
|
2014 |
Implementation of TouchSign Certificate Management System
Sangrae Cho 대한전자공학회 종합 학술 대회 (하계) 2014, pp.598-601 |
|
|
|
Conference
|
2014 |
Design of Industrial Firewall System based on Multiple Access Control Filter
Byoung Koo Kim International Symposium on Frontier and Innovation in Future Computing and Communications (FCC) 2014 (LNEE 301), pp.535-544 |
1 |
원문
|
|
Journal
|
2013 |
Improving Mobile Device Classification Using Security Events for Preventing Wireless Intrusion
Kwon Hyeok Chan International Journal of Security and Its Applications, v.7, no.6, pp.181-190 |
1 |
원문
|
|
Conference
|
2013 |
DroidVulMon -- Android Based Mobile Device Vulnerability Analysis and Monitoring System
함유정 International Conference on Next Generation Mobile Apps, Services and Technologies (NGMAST) 2013, pp.26-31 |
8 |
원문
|
|
Conference
|
2012 |
Security Architecture for Smart Devices
Ju Hong Il International Conference on Information and Communication Technology Convergence (ICTC) 2012, pp.94-95 |
1 |
원문
|
|
Journal
|
2011 |
A Note on an Identity-Based Ring Signature Scheme with Signer Verifiability
Jung Yeon Hwang Theoretical Computer Science, v.412, no.8-10, pp.796-804 |
6 |
원문
|
|
Journal
|
2010 |
Authentication and ID-Based Key Management Protocol in Pervasive Environment
문종식 Wireless Personal Communications, v.55, no.1, pp.91-103 |
6 |
원문
|
|
Conference
|
2010 |
Design of a Forecasting Service System for Monitoring of Vulnerabilities of Sensor Networks
송재구 International Conference on Security-Enriched Urban Computing and Smart Grid (SUComS) 2010 (CCIS 78), v.78, pp.34-38 |
0 |
원문
|
|
Journal
|
2009 |
Security Vulnerability in a Non-Interactive ID-Based Proxy Re-encryption Scheme
구우권 Information Processing Letters, v.109, no.23-24, pp.1260-1262 |
11 |
원문
|
|
Journal
|
2009 |
Security Vulnerability of ID-Based Key Sharing Schemes
Jung Yeon Hwang IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, v.E92-A, no.10, pp.2641-2643 |
0 |
원문
|
|
Journal
|
2009 |
PKG-VUL: Security Vulnerability Evaluation and Patch Framework for Package-Based Systems
이종혁 ETRI Journal, v.31, no.5, pp.554-564 |
10 |
원문
|
|
Conference
|
2009 |
Designing Pastry-based Secure IPTV Video Delivery Network
Kwon Hyeok Chan Joint Workshop on Information Security (JWIS) 2009, pp.1-9 |
|
|
|
Conference
|
2009 |
A Study on Reliable Communication in ATN Environment
Do-Woo Kim International Conference on Information & Knowledge Engineering (IKE) 2009, pp.370-373 |
|
|
|
Conference
|
2009 |
Secure Overlay Multicast Infrastructure for P2P-based IPTV Service
Kwon Hyeok Chan International Conference on Advanced Communication Technology (ICACT) 2009, pp.2041-2043 |
|
|
|
Conference
|
2008 |
Protection Profile for Security Enhancement of Embedded Operating System for Mobile Terminals
Jeong Youn Seo International Conference on Advanced Communication Technology (ICACT) 2008, pp.1908-1911 |
2 |
원문
|
|
Conference
|
2007 |
Analysis of SEND Protocol through Implementation and Simulation
An Gaeil International Conference on Convergence Information Technology (ICCIT) 2007, pp.670-676 |
16 |
원문
|
|
Conference
|
2007 |
SNMP-based Integrated Wire/wireless Device Management System
정수진 International Conference on Advanced Communication Technology (ICACT) 2007, pp.995-998 |
3 |
원문
|
|
Conference
|
2006 |
Product Authentication Service of Consumer's mobile RFID Device
Kim Ju Han International Symposium on Consumer Electronics (ISCE) 2006, pp.660-665 |
0 |
|
|
Conference
|
2006 |
Comparisons analysis of Security Vulnerabilities for Security Enforcement in IPv4/IPv6
오하영 International Conference on Advanced Communication Technology (ICACT) 2006, pp.1583-1585 |
3 |
|
|
Conference
|
2006 |
Security Vulnerability and Considerations in Mobile RFID Environment
Kim Ju Han International Conference on Advanced Communication Technology (ICACT) 2006, pp.801-804 |
10 |
|
|
Conference
|
2006 |
On the Study of Service Security Model for Privacy using Global User Management Framework
Choi Byeong Cheol International Conference on Advanced Communication Technology (ICACT) 2006, pp.113-116 |
2 |
|
|
Conference
|
2006 |
A Wireless Service for Product Authentication in Mobile RFID Environment
Kim Ju Han International Symposium on Wireless Pervasive Computing (ISWPC) 2006, pp.1-5 |
|
|
|
Conference
|
2005 |
The Study on Secure Auto-Configuration Technology in IPv6
Kim Myung Eun International Conference on Advanced Communication Technology (ICACT) 2005, pp.85-88 |
|
|
|
Conference
|
2004 |
A Fine-Grained Taxonomy of Security Vulnerability in Active Network Environments
양진석 International Conference on Computational Science and Its Applications (ICCSA) 2004 (LNCS 3043), v.3043, pp.693-700 |
0 |
원문
|