Subject

Subjects : Security requirements

  • Articles (43)
  • Patents (0)
  • R&D Reports (0)
논문 검색결과
Type Year Title Cited Download
Journal 2024 Blockchain-Enabled Key Aggregate Searchable Encryption Scheme for Personal Health Record Sharing With Multidelegation   Lee Joonyoung  IEEE Internet of Things Journal, v.11, no.10, pp.17482-17494 12 원문
Conference 2023 Cryptanalysis and Countermeasures of the Recent Authentication and Key Agreement Scheme for Internet of Drones   Yusungjin  International Conference on Information and Communication Technology Convergence (ICTC) 2023, pp.1419-1422 2 원문
Conference 2022 Security Requirements and Countermeasures in a Cloud-native Environment   Kim Youngsoo  International Symposium on Mobile Internet Security (MobiSec) 2022, pp.1-10
Journal 2022 A Robust Authentication Protocol for Wireless Medical Sensor Networks Using Blockchain and Physically Unclonable Functions   Yusungjin  IEEE Internet of Things Journal, v.9, no.20, pp.20214-20228 94 원문
Journal 2022 SALS-TMIS: Secure, Anonymous, and Lightweight Privacy-Preserving Scheme for IoMT-Enabled TMIS Environments   Yusungjin  IEEE Access, v.10, pp.60534-60549 16 원문
Conference 2021 Wi-SUN Device Authentication using Physical Layer Fingerprint   Oh Mi Kyung  International Conference on Information and Communication Technology Convergence (ICTC) 2021, pp.160-162 4 원문
Journal 2020 Security Threats and Potential Security Requirements in 5G Non-Public Networks for Industrial Applications   박태근  한국컴퓨터정보학회논문지, v.25, no.11, pp.105-114 원문
Journal 2020 A Secure and Efficient Three-Factor Authentication Protocol in Global Mobility Networks   유성진  Applied Sciences, v.10, no.10, pp.1-23 23 원문
Journal 2020 Wireless Transceiver Aided Run-Time Secret Key Extraction for IoT Device Security   Oh Mi Kyung  IEEE Transactions on Consumer Electronics, v.66, no.1, pp.11-21 19 원문
Conference 2018 A Study on the PKI System for Autonomous Vessels   Chung Do Young  International Conference on Maritime Autonomous Surface Ship (ICMASS) 2018, pp.1-3
Conference 2018 Secure Key Extraction for IoT Devices Integrating IEEE 802.15.4g/k Transceiver   Oh Mi Kyung  International Conference on Information and Communication Technology Convergence (ICTC) 2018, pp.833-835 3 원문
Journal 2018 Efficient Client-Side Deduplication of Encrypted Data With Public Auditing in Cloud Storage   Taek-Young Youn  IEEE Access, v.6, pp.26578-26587 41 원문
Journal 2018 Secure Cyber Deception Architecture and Decoy Injection to Mitigate the Insider Threat   Kyungmin Park  Symmetry, v.10, no.1, pp.1-16 18 원문
Journal 2017 네트워크 주소 이동 기술 동향   Kyungmin Park  전자통신동향분석, v.32, no.6, pp.73-82 원문
Conference 2017 The Security Requirements for Autonomous Vessel   Chung Do Young  International Symposium on Marine Engineering and Technology (ISMT) 2017, pp.1-2
Conference 2017 Security Considerations Based on Classification of IoT Device Capabilities   Yoon Seung Yong  International Conferences on Advanced Service Computing (SERVICE COMPUTATION) 2017, pp.13-15
Conference 2016 Common Security Requirements for Device Identification System in Internet of Things   Kim Dae Won  International Conference on Security Technology (SecTech) 2016, pp.306-309 원문
Conference 2016 Authentication and Key Management in an LTE-Based Unmanned Aerial System Control and Non-payload Communication Network   Wang/Kicheoul  International Conference on Future Internet of Things and Cloud Workshops (FiCloudW) 2016, pp.355-360 8 원문
Journal 2015 S3 (Secure Ship-to-Ship) Information Sharing Scheme Using Ship Authentication in the e-Navigation   Oh Seung-Hee  International Journal of Security and Its Applications, v.9, no.2, pp.97-110 9 원문
Conference 2014 An Architecture for Virtualization-Based Trusted Execution Environment on Mobile Devices   Jung Young-Woo  International Conference on Ubiquitous Intelligence and Computing (UIC) / International Conference on Autonomic and Trusted Computing (ATC) / International Conference on Scalable Computing and Communications and Its Associated Workshops (ScalCom) 2014, pp.540-547 0 원문
Conference 2014 The Issue of Data Transfer for the Embedded SE on Mobile Devices   Ju Hong Il  International Conference on Computer Science and its Applications (CSA) 2014 (LNEE 330), v.330, pp.317-322 0 원문
Journal 2013 Group Signatures with Controllable Linkability for Dynamic Membership   Jung Yeon Hwang  Information Sciences, v.222, pp.761-778 50 원문
Conference 2012 Security Architecture of Inter VTS Exchange Format Protocol for Secure u-Navigation   Lee Byung-Gil  International Conference on Embedded and Multimedia Computing (EMC) 2012 (LNEE 181), v.181, pp.229-236 7 원문
Conference 2012 System Requirements of Mobile device for Security Service   Jeon Yong-Sung  International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC) 2012, pp.1-3
Conference 2011 International Standardization Trend of Mashup Web Service Security   Nah Jae Hoon  한국정보보호학회 학술 대회 (동계) 2011, pp.1-5
Journal 2011 Hybrid Security Protocol for Wireless Body Area Networks   장철순  Wireless Communications and Mobile Computing, v.11, no.2, pp.277-288 42 원문
Journal 2010 Design Implementation of Lightweight and High Speed Security Protocol Suitable for UHF Passive RFID Systems   Yousung Kang  정보보호학회논문지, v.20, no.4, pp.117-134
Journal 2010 Authentication Mechanism for Fast Handoff in CDMA2000-WiBro Interworking   Hong Do Won  Science China: Information Sciences, v.53, no.1, pp.137-146 2 원문
Journal 2010 Security Requirement Representation Method for Confidence of Systems and Networks   김형종  International Journal of Software Engineering and Knowledge Engineering, v.20, no.1, pp.49-71 1 원문
Journal 2010 Mutual Authentication and Key Establishment Protocol to Implement Secure M2M Communication Environments   은선기  정보보호학회논문지, v.20, no.1, pp.73-83
Conference 2009 Security Requirements for Scalable IPTV Services   Seung Min Lee  International Conference on Security and Management (SAM) 2009, pp.1-4
Conference 2009 A Study on Reliable Communication in ATN Environment   Do-Woo Kim  International Conference on Information & Knowledge Engineering (IKE) 2009, pp.370-373
Conference 2008 The Mechanism and Requirements for Detecting the Cross-Service Attack   Oh Seung-Hee  Asia-Pacific Services Computing Conference (APSCC) 2008, pp.656-661 1 원문
Journal 2008 Energy-Efficient Key-Management (EEKM) Protocol for Large-Scale Distributed Sensor Networks   Paek Kwangjin  Journal of Information Science and Engineering, v.24, no.6, pp.1837-1858
Conference 2008 Security Requirement for Cyber Attack Traceback   Ryu Jong Ho  International Conference on Networked Computing and Advanced Information Management (NCM) 2008, pp.653-658 3 원문
Conference 2007 Implementation of LSM-Based RBAC Module for Embedded System   Lim Jae Deok  International Workshop on Information Security Applications (WISA) 2007 (LNCS 4867), v.4867, pp.91-101 2 원문
Conference 2006 Difference Set Attacks on Conjunctive Keyword Search Schemes   이현숙  Workshop on Secure Data Management (SDM) 2006 (LNCS 4165), v.4165, pp.64-74 7 원문
Conference 2006 XML-Signcryption Based LBS Security Protocol Acceleration Methods in Mobile Distributed Computing   Park Nam Je  International Conference on Computational Science and Its Applications (ICCSA) 2006 (LNCS 3984), v.3984, pp.251-259 4 원문
Conference 2006 A Layered Approach to Design of Light-Weight Middleware Systems for Mobile RFID Security (SMRM: Secure Mobile RFID Middleware System)   Park Nam Je  Network Operations and Management Symposium (NOMS) 2006, pp.1-4 1
Conference 2006 Security Vulnerability and Considerations in Mobile RFID Environment   Kim Ju Han  International Conference on Advanced Communication Technology (ICACT) 2006, pp.801-804 10
Conference 2005 The Study on Secure Auto-Configuration Technology in IPv6   Kim Myung Eun  International Conference on Advanced Communication Technology (ICACT) 2005, pp.85-88
Conference 2003 Certificate Validation Service using XKMS for Computational Grid   Park Nam Je  ACM Workshop on XML Security (XMLSEC) 2003, pp.112-120 7 원문
Conference 2003 A Location Privacy Protection Mechanism for Smart Space   Cho Young Seob  International Workshop on Information Security Applications (WISA) 2003 (LNCS 2908), v.2908, pp.162-173 5 원문
특허 검색결과
Status Year Patent Name Country Family Pat. KIPRIS
No search results.
연구보고서 검색결과
Type Year Research Project Primary Investigator Download
No search results.