Journal
|
2024 |
gShock: A GNN-Based Fingerprinting System for Permissioned Blockchain Networks Over Encrypted Channels
김재한 IEEE Access, v.12, pp.146328-146342 |
0 |
원문
|
Journal
|
2024 |
gShock: A GNN-Based Fingerprinting System for Permissioned Blockchain Networks Over Encrypted Channels
Seo Minjae IEEE Access, v.12, pp.146328-146342 |
0 |
원문
|
Conference
|
2023 |
Privacy-preserving Approximate Query Processing with Differentially Private Generative Models
옥지원 International Conference on Big Data (Big Data) 2023, pp.6242-6244 |
2 |
원문
|
Journal
|
2023 |
Collaborative Worker Safety Prediction Mechanism Using Federated Learning Assisted Edge Intelligence in Outdoor Construction Environment
Sa Jim Soe Moe IEEE Access, v.11, pp.109010-109026 |
8 |
원문
|
Journal
|
2023 |
LAKA-UAV: Lightweight authentication and key agreement scheme for cloud-assisted Unmanned Aerial Vehicle using blockchain in flying ad-hoc networks
Yusungjin Computer Networks, v.224, pp.1-15 |
36 |
원문
|
Journal
|
2022 |
Technological Trends in Intelligent Cyber Range
Yu Jae Hak 전자통신동향분석, v.37, no.4, pp.36-45 |
|
원문
|
Conference
|
2020 |
Design of SW Framework for Trustworthy AI-Data Commons
Sunhwan Lim International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.1883-1885 |
7 |
원문
|
Conference
|
2019 |
클라우드상에서 보안 실행 환경에 기반한 민감 데이터 처리
Soocheol Oh International Conference on Big data, IoT, and Cloud Computing (BIC) 2019, pp.1-6 |
|
|
Conference
|
2017 |
Mobile Security Solution for Sensitive Data Leakage Prevention
Kim Geon Lyang International Conference on Communications and Broadband Networking (ICCBN) 2017, pp.59-64 |
2 |
원문
|
Journal
|
2016 |
Secure User Authentication based on the Trusted Platform for Mobile Devices
Kim Geon Lyang EURASIP Journal on Wireless Communications and Networking, v.2016, no.1, pp.1-15 |
7 |
원문
|
Journal
|
2016 |
Secure Principal Component Analysis in Multiple Distributed Nodes
Hee Sun Won Security and Communication Networks, v.9, no.14, pp.2348-2358 |
10 |
원문
|
Journal
|
2016 |
SecureDom: Secure Mobile-sensitive Information Protection with Domain Separation
Su Wan Park Journal of Supercomputing, v.72, no.7, pp.2682-2702 |
7 |
원문
|
Conference
|
2015 |
Detecting an Abnormal Traffic on Healthcare Network
이원혁 International Conference on IT Convergence and Security (ICITCS) 2015, pp.1-4 |
1 |
원문
|
Conference
|
2015 |
Privacy Preserving Client-side Deduplication scheme in Cloud Storage
박철희 Asia Pacific International Conference on Information Science and Technology (APIC-IST) 2015, pp.141-147 |
|
|
Journal
|
2015 |
A Secure Storage System for Sensitive Data Protection Based on Mobile Virtualization
Su Wan Park International Journal of Distributed Sensor Networks, v.2015, pp.1-9 |
11 |
원문
|
Conference
|
2015 |
A Protection Method of Mobile Sensitive Data and Applications over Escrow Service
Su Wan Park Global Conference on Information Technology, Computing, and Applications (Global IT) 2015, pp.1-10 |
|
|
Conference
|
2014 |
Data Preprocessor for Order Preserving Encryption
Su Hyung Jo International Conference on Advanced Engineering and Technology (ICAET) 2014, v.AMM 752-753, pp.1356-1359 |
|
원문
|
Conference
|
2014 |
An Architecture for Virtualization-Based Trusted Execution Environment on Mobile Devices
Jung Young-Woo International Conference on Ubiquitous Intelligence and Computing (UIC) / International Conference on Autonomic and Trusted Computing (ATC) / International Conference on Scalable Computing and Communications and Its Associated Workshops (ScalCom) 2014, pp.540-547 |
0 |
원문
|
Conference
|
2014 |
The Issue of Data Transfer for the Embedded SE on Mobile Devices
Ju Hong Il International Conference on Computer Science and its Applications (CSA) 2014 (LNEE 330), v.330, pp.317-322 |
0 |
원문
|
Conference
|
2014 |
A Secure Message Service Using the Secure Domain of a Mobile Security Solution
Kim Geon Lyang International Conference on Information and Communication Technology Convergence (ICTC) 2014, pp.619-620 |
1 |
원문
|
Conference
|
2009 |
On the Challenges of Applying Selective Encryption on Region-of-Interest in H.264 Video Coding
Choi Sugil International Conference on Computer Science and its Applications (CSA) 2009, pp.1-5 |
5 |
원문
|
Journal
|
2009 |
Chaotic Order Preserving Encryption for Efficient and Secure Queries on Databases
Seung Min Lee IEICE Transactions on Information and Systems, v.E92-D, no.11, pp.2207-2217 |
38 |
원문
|
Conference
|
2008 |
A Bucket ID Transformation Scheme for Efficient Database Encryption
Lee Donghyuk International Conference on Information Networking (ICOIN) 2008, pp.1-5 |
1 |
원문
|