Journal
|
2024 |
Blockchain-Enabled Key Aggregate Searchable Encryption Scheme for Personal Health Record Sharing With Multidelegation
Lee Joonyoung IEEE Internet of Things Journal, v.11, no.10, pp.17482-17494 |
12 |
원문
|
Conference
|
2023 |
Cryptanalysis and Countermeasures of the Recent Authentication and Key Agreement Scheme for Internet of Drones
Yusungjin International Conference on Information and Communication Technology Convergence (ICTC) 2023, pp.1419-1422 |
2 |
원문
|
Conference
|
2022 |
Security Requirements and Countermeasures in a Cloud-native Environment
Kim Youngsoo International Symposium on Mobile Internet Security (MobiSec) 2022, pp.1-10 |
|
|
Journal
|
2022 |
A Robust Authentication Protocol for Wireless Medical Sensor Networks Using Blockchain and Physically Unclonable Functions
Yusungjin IEEE Internet of Things Journal, v.9, no.20, pp.20214-20228 |
94 |
원문
|
Journal
|
2022 |
SALS-TMIS: Secure, Anonymous, and Lightweight Privacy-Preserving Scheme for IoMT-Enabled TMIS Environments
Yusungjin IEEE Access, v.10, pp.60534-60549 |
16 |
원문
|
Conference
|
2021 |
Wi-SUN Device Authentication using Physical Layer Fingerprint
Oh Mi Kyung International Conference on Information and Communication Technology Convergence (ICTC) 2021, pp.160-162 |
4 |
원문
|
Journal
|
2020 |
Security Threats and Potential Security Requirements in 5G Non-Public Networks for Industrial Applications
박태근 한국컴퓨터정보학회논문지, v.25, no.11, pp.105-114 |
|
원문
|
Journal
|
2020 |
A Secure and Efficient Three-Factor Authentication Protocol in Global Mobility Networks
유성진 Applied Sciences, v.10, no.10, pp.1-23 |
23 |
원문
|
Journal
|
2020 |
Wireless Transceiver Aided Run-Time Secret Key Extraction for IoT Device Security
Oh Mi Kyung IEEE Transactions on Consumer Electronics, v.66, no.1, pp.11-21 |
19 |
원문
|
Conference
|
2018 |
A Study on the PKI System for Autonomous Vessels
Chung Do Young International Conference on Maritime Autonomous Surface Ship (ICMASS) 2018, pp.1-3 |
|
|
Conference
|
2018 |
Secure Key Extraction for IoT Devices Integrating IEEE 802.15.4g/k Transceiver
Oh Mi Kyung International Conference on Information and Communication Technology Convergence (ICTC) 2018, pp.833-835 |
3 |
원문
|
Journal
|
2018 |
Efficient Client-Side Deduplication of Encrypted Data With Public Auditing in Cloud Storage
Taek-Young Youn IEEE Access, v.6, pp.26578-26587 |
41 |
원문
|
Journal
|
2018 |
Secure Cyber Deception Architecture and Decoy Injection to Mitigate the Insider Threat
Kyungmin Park Symmetry, v.10, no.1, pp.1-16 |
18 |
원문
|
Journal
|
2017 |
네트워크 주소 이동 기술 동향
Kyungmin Park 전자통신동향분석, v.32, no.6, pp.73-82 |
|
원문
|
Conference
|
2017 |
The Security Requirements for Autonomous Vessel
Chung Do Young International Symposium on Marine Engineering and Technology (ISMT) 2017, pp.1-2 |
|
|
Conference
|
2017 |
Security Considerations Based on Classification of IoT Device Capabilities
Yoon Seung Yong International Conferences on Advanced Service Computing (SERVICE COMPUTATION) 2017, pp.13-15 |
|
|
Conference
|
2016 |
Common Security Requirements for Device Identification System in Internet of Things
Kim Dae Won International Conference on Security Technology (SecTech) 2016, pp.306-309 |
|
원문
|
Conference
|
2016 |
Authentication and Key Management in an LTE-Based Unmanned Aerial System Control and Non-payload Communication Network
Wang/Kicheoul International Conference on Future Internet of Things and Cloud Workshops (FiCloudW) 2016, pp.355-360 |
8 |
원문
|
Journal
|
2015 |
S3 (Secure Ship-to-Ship) Information Sharing Scheme Using Ship Authentication in the e-Navigation
Oh Seung-Hee International Journal of Security and Its Applications, v.9, no.2, pp.97-110 |
9 |
원문
|
Conference
|
2014 |
An Architecture for Virtualization-Based Trusted Execution Environment on Mobile Devices
Jung Young-Woo International Conference on Ubiquitous Intelligence and Computing (UIC) / International Conference on Autonomic and Trusted Computing (ATC) / International Conference on Scalable Computing and Communications and Its Associated Workshops (ScalCom) 2014, pp.540-547 |
0 |
원문
|
Conference
|
2014 |
The Issue of Data Transfer for the Embedded SE on Mobile Devices
Ju Hong Il International Conference on Computer Science and its Applications (CSA) 2014 (LNEE 330), v.330, pp.317-322 |
0 |
원문
|
Journal
|
2013 |
Group Signatures with Controllable Linkability for Dynamic Membership
Jung Yeon Hwang Information Sciences, v.222, pp.761-778 |
50 |
원문
|
Conference
|
2012 |
Security Architecture of Inter VTS Exchange Format Protocol for Secure u-Navigation
Lee Byung-Gil International Conference on Embedded and Multimedia Computing (EMC) 2012 (LNEE 181), v.181, pp.229-236 |
7 |
원문
|
Conference
|
2012 |
System Requirements of Mobile device for Security Service
Jeon Yong-Sung International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC) 2012, pp.1-3 |
|
|
Conference
|
2011 |
International Standardization Trend of Mashup Web Service Security
Nah Jae Hoon 한국정보보호학회 학술 대회 (동계) 2011, pp.1-5 |
|
|
Journal
|
2011 |
Hybrid Security Protocol for Wireless Body Area Networks
장철순 Wireless Communications and Mobile Computing, v.11, no.2, pp.277-288 |
42 |
원문
|
Journal
|
2010 |
Design Implementation of Lightweight and High Speed Security Protocol Suitable for UHF Passive RFID Systems
Yousung Kang 정보보호학회논문지, v.20, no.4, pp.117-134 |
|
|
Journal
|
2010 |
Authentication Mechanism for Fast Handoff in CDMA2000-WiBro Interworking
Hong Do Won Science China: Information Sciences, v.53, no.1, pp.137-146 |
2 |
원문
|
Journal
|
2010 |
Security Requirement Representation Method for Confidence of Systems and Networks
김형종 International Journal of Software Engineering and Knowledge Engineering, v.20, no.1, pp.49-71 |
1 |
원문
|
Journal
|
2010 |
Mutual Authentication and Key Establishment Protocol to Implement Secure M2M Communication Environments
은선기 정보보호학회논문지, v.20, no.1, pp.73-83 |
|
|
Conference
|
2009 |
Security Requirements for Scalable IPTV Services
Seung Min Lee International Conference on Security and Management (SAM) 2009, pp.1-4 |
|
|
Conference
|
2009 |
A Study on Reliable Communication in ATN Environment
Do-Woo Kim International Conference on Information & Knowledge Engineering (IKE) 2009, pp.370-373 |
|
|
Conference
|
2008 |
The Mechanism and Requirements for Detecting the Cross-Service Attack
Oh Seung-Hee Asia-Pacific Services Computing Conference (APSCC) 2008, pp.656-661 |
1 |
원문
|
Journal
|
2008 |
Energy-Efficient Key-Management (EEKM) Protocol for Large-Scale Distributed Sensor Networks
Paek Kwangjin Journal of Information Science and Engineering, v.24, no.6, pp.1837-1858 |
|
|
Conference
|
2008 |
Security Requirement for Cyber Attack Traceback
Ryu Jong Ho International Conference on Networked Computing and Advanced Information Management (NCM) 2008, pp.653-658 |
3 |
원문
|
Conference
|
2007 |
Implementation of LSM-Based RBAC Module for Embedded System
Lim Jae Deok International Workshop on Information Security Applications (WISA) 2007 (LNCS 4867), v.4867, pp.91-101 |
2 |
원문
|
Conference
|
2006 |
Difference Set Attacks on Conjunctive Keyword Search Schemes
이현숙 Workshop on Secure Data Management (SDM) 2006 (LNCS 4165), v.4165, pp.64-74 |
7 |
원문
|
Conference
|
2006 |
XML-Signcryption Based LBS Security Protocol Acceleration Methods in Mobile Distributed Computing
Park Nam Je International Conference on Computational Science and Its Applications (ICCSA) 2006 (LNCS 3984), v.3984, pp.251-259 |
4 |
원문
|
Conference
|
2006 |
A Layered Approach to Design of Light-Weight Middleware Systems for Mobile RFID Security (SMRM: Secure Mobile RFID Middleware System)
Park Nam Je Network Operations and Management Symposium (NOMS) 2006, pp.1-4 |
1 |
|
Conference
|
2006 |
Security Vulnerability and Considerations in Mobile RFID Environment
Kim Ju Han International Conference on Advanced Communication Technology (ICACT) 2006, pp.801-804 |
10 |
|
Conference
|
2005 |
The Study on Secure Auto-Configuration Technology in IPv6
Kim Myung Eun International Conference on Advanced Communication Technology (ICACT) 2005, pp.85-88 |
|
|
Conference
|
2003 |
Certificate Validation Service using XKMS for Computational Grid
Park Nam Je ACM Workshop on XML Security (XMLSEC) 2003, pp.112-120 |
7 |
원문
|
Conference
|
2003 |
A Location Privacy Protection Mechanism for Smart Space
Cho Young Seob International Workshop on Information Security Applications (WISA) 2003 (LNCS 2908), v.2908, pp.162-173 |
5 |
원문
|