Journal
|
2024 |
Is pay-or-consent for privacy justifiable? Evidence from different users' privacy attitudes toward behavioral data collection in South Korea
Nam Sangjun Telecommunications Policy, v.48, no.7, pp.1-15 |
1 |
원문
|
Journal
|
2024 |
Adaptive DFL‐based straggler mitigation mechanism for synchronous ring topology in digital twin networks
Qazi Waqas Khan IET Collaborative Intelligent Manufacturing, v.6, no.3, pp.1-23 |
3 |
원문
|
Conference
|
2022 |
Industrial Humanless Monitoring System over 5G Networks in the Shipyard Environment
Jung Woosung International Conference on Information and Communication Technology Convergence (ICTC) 2022, pp.19-24 |
2 |
원문
|
Conference
|
2021 |
Trajectory privacy protection of selective partial area using the GAN model
송예지 International Conference on Ubiquitous Information Technologies and Applications (CUTE) 2021, pp.1-7 |
|
|
Conference
|
2021 |
Metadata Modeling and Operation Flow of Problem Solving Ecosystem for ECG Data Engineering and Arrhythmia Diagnosis
Sungpil Woo International Conference on Information and Communication Technology Convergence (ICTC) 2021, pp.1835-1837 |
3 |
원문
|
Journal
|
2020 |
Trends in Data Privacy Protection Technologies with Enhanced Utilization
Kim Juyoung 전자통신동향분석, v.35, no.6, pp.88-96 |
|
원문
|
Conference
|
2020 |
Design of an efficient image protection method based on QR code
Kim Young Sae International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.1448-1450 |
0 |
원문
|
Journal
|
2020 |
Competitive Data Trading Model With Privacy Valuation for Multiple Stakeholders in IoT Data Markets
오현택 IEEE Internet of Things Journal, v.7, no.4, pp.3623-3639 |
61 |
원문
|
Journal
|
2018 |
How Do Multilevel Privacy Controls Affect Utility-privacy Trade-offs When Used in Mobile Applications?
Kim Seung-Hyun ETRI Journal, v.40, no.6, pp.813-823 |
3 |
원문
|
Journal
|
2016 |
A Distributed Cloud based Video Storage System with Privacy Protection
Choi Kang Il ICACT Transactions on Advanced Communications Technology, v.5, no.3, pp.830-835 |
|
|
Journal
|
2015 |
Tag-Reader Mutual Authentication Protocol for Safe RFID/USN Environments
Bang Hyochan Information : An International Interdisciplinary Journal, v.18, no.12, pp.5103-5116 |
0 |
|
Conference
|
2015 |
Cloud based Video Storage System with Privacy Protection
Choi Kang Il International Conference on Advanced Communication Technology (ICACT) 2015, pp.460-463 |
2 |
원문
|
Conference
|
2012 |
Security Model for Video Surveillance System
Kim Geonwoo International Conference on Information and Communication Technology Convergence (ICTC) 2012, pp.100-104 |
7 |
원문
|
Journal
|
2011 |
Privacy-Preserving H.264 Video Encryption Scheme
Choi Sugil ETRI Journal, v.33, no.6, pp.935-944 |
11 |
원문
|
Conference
|
2011 |
Human Body Parts Candidate Segmentation using Laws Texture Energy Measures with Skin Color
Choi Byeong Cheol International Conference on Advanced Communication Technology (ICACT) 2011, pp.556-560 |
|
|
Conference
|
2011 |
A Privacy Enhanced Contents Sharing in Mobile Networks
김은아 International Conference on Consumer Electronics (ICCE) 2011, pp.729-730 |
0 |
원문
|
Conference
|
2010 |
Anonymous Access Control Framework Based on Group Signature
Lee Yun-Kyung International Conference on Information Technology Convergence and Services (ITCS) 2010, pp.1-5 |
0 |
원문
|
Conference
|
2008 |
U-health and Regulatory Implications in Korea
Kiryong Ha Portland International Conference on Management of Engineering and Technology (PICMET) 2008, pp.351-355 |
4 |
원문
|
Conference
|
2008 |
Policy and Role based Mobile RFID User Privacy Data Management System
Park Nam Je Network Operations and Management Symposium (NOMS) 2008, pp.1003-1006 |
3 |
원문
|
Conference
|
2007 |
E-Pedigree Discovery System and its Verification Service for Consumer's mobile RFID Device
Kim Ju Han International Symposium on Consumer Electronics (ISCE) 2007, pp.1-4 |
2 |
원문
|
Conference
|
2007 |
Usability Enhanced Privacy Protection System Based on Users' Responses
Han-Gyu Ko International Symposium on Consumer Electronics (ISCE) 2007, pp.1-6 |
4 |
원문
|
Conference
|
2006 |
A Study on RFID Authentication Protocol for Location Privacy Protection
박장수 International Conference on Hybrid Information Technology (ICHIT) 2006 (LNCS 4413), v.4413, pp.1-9 |
|
|
Conference
|
2006 |
Security Techniques Based on EPC Gen2 Tag for Secure Mobile RFID Network Services
Park Nam Je International Conference on Knowledge-Based and Intelligent Information and Engineering Systems (KES) 2006 (LNCS 4251), v.4251, pp.924-934 |
0 |
|
Conference
|
2006 |
Practical Privacy Protection Mechanism for Networked RFID Environment
Jooyoung Lee International Workshop on Security (IWSEC) 2006 (LNCS 4266), v.4266, pp.1-12 |
|
|
Conference
|
2006 |
Privacy-Friendly Mobile RFID Reader Protocol Design based on trusted Agent and PKI
Kim In Seop International Symposium on Consumer Electronics (ISCE) 2006, pp.672-677 |
3 |
|
Conference
|
2006 |
Privacy Protection for Secure Mobile RFID Service
Choi Doo Ho International Symposium on Wireless Pervasive Computing (ISWPC) 2006, pp.1-4 |
3 |
|
Conference
|
2003 |
A Location Privacy Protection Mechanism for Smart Space
Cho Young Seob International Workshop on Information Security Applications (WISA) 2003 (LNCS 2908), v.2908, pp.162-173 |
5 |
원문
|