Journal
|
2024 |
A Comprehensive Survey of TPM for Defense Systems
Ryu Cheol KSII Transactions on Internet and Information Systems, v.18, no.7, pp.1953-1967 |
0 |
원문
|
Journal
|
2016 |
Secure User Authentication based on the Trusted Platform for Mobile Devices
Kim Geon Lyang EURASIP Journal on Wireless Communications and Networking, v.2016, no.1, pp.1-15 |
7 |
원문
|
Conference
|
2014 |
Application Authentication and Secure Key Management Scheme using MTM
Han Jin Hee International Conference on Computer Science and its Applications (CSA) 2014 (LNEE 330), pp.941-946 |
0 |
원문
|
Journal
|
2013 |
Compact and Unified Hardware Architecture for SHA-1 and SHA-256 of Trusted Mobile Computing
Kim Moo Seop Personal and Ubiquitous Computing, v.17, no.5, pp.921-932 |
11 |
원문
|
Conference
|
2011 |
Short Group Signatures with Controllable Linkability
Jung Yeon Hwang Workshop on Lightweight Security & Privacy: Devices, Protocols and Applications (LightSec) 2011, pp.44-52 |
38 |
원문
|
Conference
|
2010 |
A Study on the Security for a Vehicle Using TPM
Jeong-Woo Lee ITS World Congress 2010, pp.1-6 |
|
|
Journal
|
2010 |
Design and Implementation of Mobile Trusted Module for Trusted Mobile Computing
Kim Moo Seop IEEE Transactions on Consumer Electronics, v.56, no.1, pp.134-140 |
24 |
원문
|
Conference
|
2010 |
Design and Implementation of Mobile Trusted Module for Trusted Mobile Computing
Kim Moo Seop International Conference on Consumer Electronics (ICCE) 2010, pp.1-2 |
2 |
원문
|
Conference
|
2009 |
Design and Implementation of the MTM Interface for Data Transmission
Ju Hong Il International Conference on Embedded Systems & Applications (ESA) 2009, pp.1-4 |
|
|
Conference
|
2008 |
The Need of MTM Interface Specification for the Trusted Mobile Platform
Ju Hong Il International Conference on Embedded Systems and Applications (ESA) 2008, pp.1-6 |
|
|
Conference
|
2008 |
Protection Techniques of Secret Information in Non-tamper Proof Devices of Smart Home Network
Abedelaziz Mohaisen International Conference on Ubiquitous Intelligence and Computing (UIC) 2008 (LNCS 5061), v.5061, pp.548-562 |
0 |
원문
|
Conference
|
2007 |
Efficient Implementation of the Keyed-Hash Message Authentication Code Based on SHA-1 Algorithm for Mobile Trusted Computing
Kim Moo Seop International Conference on Autonomic and Trusted Computing (ATC) 2007 (LNCS 4610), v.4610, pp.410-419 |
4 |
원문
|
Journal
|
2006 |
모바일 플랫폼용 공통보안핵심 모듈 기술
Kim Moo Seop 정보보호학회지, v.16, no.3, pp.7-17 |
|
|