Conference
|
2024 |
A Unified Security Framework for RAN-CN Convergence towards 6G Mobile Networks
Kim Myung Eun International Conference on Information and Communication Technology Convergence (ICTC) 2024, pp.1078-1079 |
0 |
원문
|
Journal
|
2022 |
On the Security of a Lightweight and Secure Access Authentication Scheme for Both UE and mMTC Devices in 5G Networks
Park Kisung Applied Sciences, v.12, no.9, pp.1-18 |
2 |
원문
|
Journal
|
2021 |
A Security Analysis of Blockchain-Based Did Services
김봉곤 IEEE Access, v.9, pp.22894-22913 |
25 |
원문
|
Journal
|
2020 |
LAKS-NVT: Provably Secure and Lightweight Authentication and Key Agreement Scheme Without Verification Table in Medical Internet of Things
Park Kisung IEEE Access, v.8, pp.119387-119404 |
61 |
원문
|
Conference
|
2018 |
AppWrapper: Patching Security Functions with Dynamic Policy on Your Insecure Android Apps
Lee Sung-Hoon International Symposium on Software Reliability Engineering Workshops (ISSREW) 2018, pp.36-41 |
2 |
원문
|
Conference
|
2017 |
Mobile Crowd Sensing based on CICN
You Tae Wan International Conference on Information and Communication Technology Convergence (ICTC) 2017, pp.1273-1276 |
7 |
원문
|
Journal
|
2015 |
Analyzing User Awareness of Privacy Data Leak in Mobile Applications
Young Ho Kim Mobile Information Systems, v.2015, pp.1-12 |
23 |
원문
|
Journal
|
2014 |
Low-Priced and Energy-Efficient Detection of Replicas for Wireless Sensor Networks
Kwantae Cho IEEE Transactions on Dependable and Secure Computing, v.11, no.5, pp.454-466 |
8 |
원문
|
Journal
|
2013 |
Energy‐efficient replica detection for resource‐limited mobile devices in the internet of things
Kwantae Cho IET Communications, v.7, no.18, pp.2141-2150 |
9 |
원문
|
Conference
|
2013 |
Creation Mechanism for Access Group Based on User Privacy Policy-Based Protection
강태경 International Conference on Mobile, Ubiquitous, and Intelligent Computing (MUSIC) 2013 (LNEE 274), pp.125-130 |
2 |
원문
|
Journal
|
2012 |
Joint Relay Selection and Resource Allocation for Cooperative OFDMA Network
기주희 KSII Transactions on Internet and Information Systems, v.6, no.10, pp.2692-2707 |
1 |
원문
|
Journal
|
2011 |
Fingerprint Template Protection Using One-Time Fuzzy Vault
Woo Yong Choi KSII Transactions on Internet and Information Systems, v.5, no.11, pp.2221-2234 |
2 |
원문
|
Conference
|
2011 |
Fast Polynomial Reconstruction Attack against Fuzzy Fingerprint Vault
Woo Yong Choi International Conference on New Trends in Information Science and Service Science (NISS) 2011, pp.299-302 |
|
|
Journal
|
2010 |
Improved Delegation-Based Authentication Protocol for Secure Roaming Service with Unlinkability
Youn Taek Young IEEE Communications Letters, v.14, no.9, pp.791-793 |
18 |
원문
|
Journal
|
2010 |
Mutual Authentication and Key Establishment Protocol to Implement Secure M2M Communication Environments
은선기 정보보호학회논문지, v.20, no.1, pp.73-83 |
|
|
Conference
|
2008 |
Policy and Role based Mobile RFID User Privacy Data Management System
Park Nam Je Network Operations and Management Symposium (NOMS) 2008, pp.1003-1006 |
3 |
원문
|
Conference
|
2007 |
Privacy Aware Adaptable Web Services Using Petri Nets
송유진 International Conference on Convergence Information Technology (ICCIT) 2007, pp.1933-1938 |
4 |
원문
|
Conference
|
2007 |
A Unified User Consent Acquisition and Delivery Mechanism for Multi-Source User Data Integrated Service
Cho Young Seob International Symposium on Consumer Electronics (ISCE) 2007, pp.1-7 |
0 |
원문
|
Conference
|
2006 |
Privacy Protection for Secure Mobile RFID Service
Choi Doo Ho International Symposium on Wireless Pervasive Computing (ISWPC) 2006, pp.1-4 |
3 |
|