Journal
|
2022 |
A Robust Authentication Protocol for Wireless Medical Sensor Networks Using Blockchain and Physically Unclonable Functions
Yusungjin IEEE Internet of Things Journal, v.9, no.20, pp.20214-20228 |
94 |
원문
|
Journal
|
2022 |
SALS-TMIS: Secure, Anonymous, and Lightweight Privacy-Preserving Scheme for IoMT-Enabled TMIS Environments
Yusungjin IEEE Access, v.10, pp.60534-60549 |
16 |
원문
|
Journal
|
2021 |
Comments on “ALAM: Anonymous Lightweight Authentication Mechanism for SDN Enabled Smart Homes”
Yusungjin IEEE Access, v.9, pp.49154-49159 |
21 |
원문
|
Conference
|
2020 |
Long-Term Evolution Vulnerability Focusing on System Information Block Messages
Minjae Kim International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.837-842 |
0 |
원문
|
Conference
|
2020 |
PUF-based Authentication Scheme for IoT Devices
Yoon Seung Yong International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.1792-1794 |
23 |
원문
|
Journal
|
2020 |
Secure Key Agreement and Authentication Protocol for Message Confirmation in Vehicular Cloud Computing
이준영 Applied Sciences, v.10, no.18, pp.1-20 |
15 |
원문
|
Journal
|
2020 |
A Secure and Efficient Three-Factor Authentication Protocol in Global Mobility Networks
유성진 Applied Sciences, v.10, no.10, pp.1-23 |
23 |
원문
|
Journal
|
2020 |
Privacy-Preserving Lightweight Authentication Protocol for Demand Response Management in Smart Grid Environment
유성진 Applied Sciences, v.10, no.5, pp.1-26 |
38 |
원문
|
Journal
|
2019 |
A Secure Charging System for Electric Vehicles Based on Blockchain
김명현 Sensors, v.19, no.13, pp.1-22 |
65 |
원문
|
Conference
|
2017 |
Security Analysis of Samsung Knox
Munkhzorig Dorjmyagmar International Conference on Advanced Communications Technology (ICACT) 2017, pp.550-553 |
|
|
Journal
|
2015 |
Inter-Authentication and Session Key Sharing Procedure for Secure M2M/IoT Environment
박남제 Information : An International Interdisciplinary Journal, v.18, no.1, pp.261-266 |
17 |
|
Conference
|
2013 |
Geo-Location based QR-Code Authentication Scheme to Defeat Active Real-time Phishing Attack
Kim Seung-Hyun Workshop on Digital Identity Management (DIM) 2013, pp.51-61 |
10 |
원문
|
Journal
|
2011 |
Security Improvement of an RFID Security Protocol of ISO/IEC WD 29167-6
송보연 IEEE Communications Letters, v.15, no.12, pp.1375-1377 |
14 |
원문
|
Conference
|
2011 |
A Lightweight and Stable Authentication Method for the Internet Access Control in Smartphones
유성민 International Conference on Informatics Engineering and Information Science (ICIEIS) 2011 (CCIS 251), v.251, pp.331-342 |
1 |
원문
|
Conference
|
2011 |
Human Verifiable Authentication Schemes Geared to Smart Wallet Applications
마건일 International Conference on Consumer Electronics (ICCE) 2011, pp.141-142 |
1 |
원문
|
Journal
|
2008 |
Technology Trends of IPTV Security Service
Park Jongyoul 전자통신동향분석, v.23, no.5, pp.40-48 |
|
원문
|
Journal
|
2008 |
IPTV 서비스를 위한 보안 기술
Park Jongyoul 정보와 통신 : 한국통신학회지, v.25, no.8, pp.32-38 |
|
|
Journal
|
2008 |
Designing Reliable P2P Transmission Mechanism Against MITM Attack
김상춘 정보보호학회논문지, v.18, no.4, pp.103-109 |
|
|
Journal
|
2008 |
A New Security Protocol Based on Elliptic Curve Cryptosystems for Securing Wireless Sensor Networks
서석충 Telecommunications Review, v.18, no.1, pp.112-126 |
|
|
Conference
|
2007 |
Anonymous PKI Framework for Privacy-guaranteed e-Services
Choi Byeong Cheol International Conference on Convergence Information Technology (ICCIT) 2007, pp.687-690 |
1 |
원문
|
Conference
|
2006 |
A Secure Authentication Protocol for Home Network using an ID/PW
Ju Hong Il International Ubiquitous Convergence Conference (IUC) 2006, pp.1-5 |
|
|
Journal
|
2004 |
Interworking of SIP Authentication with Diameter and Security Analysis
박성준 한국통신학회논문지 B : 네트워크 및 융합 서비스, v.29, no.3C, pp.426-435 |
|
|