Journal
|
2020 |
Secure Key Agreement and Authentication Protocol for Message Confirmation in Vehicular Cloud Computing
이준영 Applied Sciences, v.10, no.18, pp.1-20 |
15 |
원문
|
Journal
|
2020 |
LAKS-NVT: Provably Secure and Lightweight Authentication and Key Agreement Scheme Without Verification Table in Medical Internet of Things
Park Kisung IEEE Access, v.8, pp.119387-119404 |
61 |
원문
|
Journal
|
2020 |
A Secure and Efficient Three-Factor Authentication Protocol in Global Mobility Networks
유성진 Applied Sciences, v.10, no.10, pp.1-23 |
23 |
원문
|
Journal
|
2019 |
A Secure Charging System for Electric Vehicles Based on Blockchain
김명현 Sensors, v.19, no.13, pp.1-22 |
65 |
원문
|
Conference
|
2017 |
Trust Domain Based Trustworthy Networking
Byeongok Kwak International Conference on Information and Communication Technology Convergence (ICTC) 2017, pp.1248-1250 |
5 |
원문
|
Journal
|
2016 |
Hybrid App Security Protocol for High Speed Mobile Communication
Lee Seoung Hyeon Journal of Supercomputing, v.72, no.5, pp.1715-1739 |
5 |
원문
|
Conference
|
2014 |
Active Phishing Attack Against the I-PIN Service
Kim Seung-Hyun 대한전자공학회 종합 학술 대회 (하계) 2014, pp.587-590 |
|
|
Journal
|
2014 |
Practical RSA-PAKE for Low-Power Device in Imbalanced Wireless Networks
Taek-Young Youn International Journal of Distributed Sensor Networks, v.2014, pp.1-6 |
3 |
원문
|
Journal
|
2013 |
Comments on an Improved RFID Security Protocol for ISO/IEC WD 29167-6
Yousung Kang ETRI Journal, v.35, no.1, pp.170-172 |
8 |
원문
|
Conference
|
2012 |
Security Architecture of Inter VTS Exchange Format Protocol for Secure u-Navigation
Lee Byung-Gil International Conference on Embedded and Multimedia Computing (EMC) 2012 (LNEE 181), v.181, pp.229-236 |
7 |
원문
|
Journal
|
2011 |
Security Improvement of an RFID Security Protocol of ISO/IEC WD 29167-6
송보연 IEEE Communications Letters, v.15, no.12, pp.1375-1377 |
14 |
원문
|
Journal
|
2011 |
Hybrid Security Protocol for Wireless Body Area Networks
장철순 Wireless Communications and Mobile Computing, v.11, no.2, pp.277-288 |
42 |
원문
|
Journal
|
2010 |
Design Implementation of Lightweight and High Speed Security Protocol Suitable for UHF Passive RFID Systems
Yousung Kang 정보보호학회논문지, v.20, no.4, pp.117-134 |
|
|
Journal
|
2010 |
Key Establishment and Pairing Management Protocol for Downloadable Conditional Access System Host Devices
Han Seung Koo ETRI Journal, v.32, no.2, pp.204-213 |
7 |
원문
|
Conference
|
2009 |
The Design of an RFID Security Protocol For Saving in DB Transaction Costs
Paek Kwangjin International Conference on Advanced Communication Technology (ICACT) 2009, pp.1937-1939 |
|
|
Conference
|
2007 |
A Design and Implementation of Wireless Sensor Network Security on Nano-Qplus Platform
Kim Jin Won International Conference on Advanced Communication Technology (ICACT) 2007, pp.684-688 |
0 |
원문
|
Conference
|
2006 |
Design of Lightweight Security Protocol for Electronic Seal Data Protection
Yousung Kang International Workshop on Information Security Applications (WISA) 2006 (LNCS 4298), v.4298, pp.517-531 |
|
|
Conference
|
2006 |
A Security Model for Home Networks with Authority Delegation
Hwang Jin Bum International Conference on Computational Science and Its Applications (ICCSA) 2006 (LNCS 3983), v.3983, pp.360-369 |
6 |
원문
|
Conference
|
2006 |
XML-Signcryption Based LBS Security Protocol Acceleration Methods in Mobile Distributed Computing
Park Nam Je International Conference on Computational Science and Its Applications (ICCSA) 2006 (LNCS 3984), v.3984, pp.251-259 |
4 |
원문
|
Conference
|
2005 |
Design and Implementation of Crypto Co-processor and Its Application to Security Systems
Kim Ho Won International Conference on Computational and Information Science (CIS) 2005 (LNCS 3802), v.3802, pp.1104-1109 |
1 |
원문
|
Conference
|
2005 |
An Efficient Software-based Security Acceleration Methods for Open LBS Services
박남제 International Geoscience and Remote Sensing Symposium (IGARSS) 2005, pp.600-603 |
3 |
원문
|
Conference
|
2005 |
An Enhanced LBS Security Protocol in Wireless Networks
Park Nam Je International Geoscience and Remote Sensing Symposium (IGARSS) 2005, pp.1594-1597 |
|
|
Conference
|
2004 |
Security Flow Control by Dynamic Stack Allocation
Kim Geonwoo International Conference on Advanced Communication Technology (ICACT) 2004, pp.309-311 |
|
원문
|