Journal
|
2023 |
Improvement of the Efficiency of Neural Cryptography-Based Secret Key Exchange Algorithm
Kim Juyoung IEEE Access, v.11, pp.45323-45333 |
2 |
원문
|
Journal
|
2019 |
Study on Peak Misdetection Recovery of Key Exchange Protocol using Heartbeat
Kim Juyoung Journal of Supercomputing, v.75, no.6, pp.3288-3301 |
6 |
원문
|
Conference
|
2017 |
Recovery of Peak Misdetection for IPI-based Key Exchange
Kim Juyoung International Conference on Computer Science and its Applications (CSA) 2017, pp.1-5 |
|
|
Conference
|
2015 |
Denial of Service Attack against IEEE 802.11 WLAN Fast Initial Link Setup Technology
Lee Sokjoon International Conference on Computer Engineering and Information Technology (ICCEIT) 2015, pp.335-337 |
|
|
Conference
|
2015 |
Robust Authenticated Key Exchange Using Passwords and Identity-Based Signatures
Jung Yeon Hwang International Conference on Security Standardisation Research (SSR) 2015, v.9497, pp.43-69 |
4 |
원문
|
Conference
|
2015 |
Constructing Efficient PAKE Protocols from Identity-Based KEM/DEM
최규영 International Workshop on Information Security Applications (WISA) 2015 (LNCS 9503), v.9503, pp.411-422 |
8 |
원문
|
Journal
|
2014 |
Practical RSA-PAKE for Low-Power Device in Imbalanced Wireless Networks
Taek-Young Youn International Journal of Distributed Sensor Networks, v.2014, pp.1-6 |
3 |
원문
|
Journal
|
2012 |
Platform-Independent Security Framework for Application Security on Smartphone Environment
Choi Dae Seon 정보과학회논문지 : 정보통신, v.39, no.1, pp.102-107 |
|
|
Conference
|
2010 |
A Privacy-Enhanced Contents Sharing Mechanism with Secure Removable Media(SRM)
문혜란 International Conference on Multimedia and Ubiquitous Engineering (MUE) 2010, pp.1-5 |
0 |
원문
|
Conference
|
2008 |
How to Integrate Diverse Client Authentication Protocol with Various Authentication Means
Lee Hyung Kyu International Conference on Security and Management (SAM) 2008, pp.1-5 |
|
|
Journal
|
2007 |
Key Agreement for Key Hypergraph
Jeong Ik Rae Computers & Security, v.26, no.7-8, pp.452-458 |
|
|
Journal
|
2007 |
3라운드 스마트카드 기반의 키 교환
권정옥 IEICE Transactions on Communications, v.E90-B, no.11, pp.3255-3258 |
|
원문
|
Conference
|
2007 |
Anonymous PKI Framework for Privacy-guaranteed e-Services
Choi Byeong Cheol International Conference on Convergence Information Technology (ICCIT) 2007, pp.687-690 |
1 |
원문
|
Journal
|
2007 |
Efficient Verifier-based Password-authenticated Key Exchange in the Three-party Setting
권정옥 Computer Standards & Interfaces, v.29, no.5, pp.513-520 |
33 |
원문
|
Journal
|
2007 |
Strong Diffie-Hellman-DSA Key Exchange
Jeong Ik Rae IEEE Communications Letters, v.11, no.5, pp.432-433 |
20 |
원문
|
Conference
|
2006 |
A Diffie-Hellman Key Exchange Protocol Without Random Oracles
Jeong Ik Rae International Conference on Cryptology and Network Security (CANS) 2006 (LNCS 4301), v.4301, pp.37-54 |
18 |
원문
|
Conference
|
2006 |
PAK-based Binding Update Method for Mobile IPv6 route optimization
Yoon Ho Sun International Conference on Hybrid Information Technology (ICHIT) 2006, pp.1-8 |
4 |
원문
|
Conference
|
2006 |
Provably-Secure Two-Round Password-Authenticated Group Key Exchange in the Standard Model
권정옥 International Workshop on Security (IWSEC) 2006 (LNCS 4266), v.4266, pp.322-336 |
9 |
원문
|
Conference
|
2006 |
EAP Using the Split Password-Based Authenticated Key Agreement
Ryu Jong Ho International Workshop on Information Security Applications (WISA) 2006 (LNCS 4298), v.4298, pp.364-380 |
0 |
원문
|
Conference
|
2006 |
Constant-Round Password-Based Group Key Generation for Multi-layer Ad-Hoc Networks
변진욱 International Conference on Security in Pervasive Computing (SPC) 2006 (LNCS 3934), v.3934, pp.3-17 |
15 |
원문
|
Conference
|
2006 |
Implementation of 10 Giga VPN Accelerator Board
Kim Ki Hyun International Conference on Advanced Communication Technology (ICACT) 2006, pp.1552-1556 |
0 |
|
Conference
|
2004 |
The Implementation of IPsec-Based Internet Security System in IPv4/IPv6 Network
Park So Hee International Conference on AI, Simulation, and Planning in High Autonomy Systems (AIS) 2004 (LNCS 3397), v.3397, pp.109-116 |
0 |
원문
|
Conference
|
2004 |
Analysis and Countermeasure on Vulnerability of WPA Key Exchange Mechanism
Yousung Kang International Conference on Information Networking (ICOIN) 2004 (LNCS 3090), v.3090, pp.915-924 |
1 |
원문
|
Conference
|
2003 |
Return Routability Procedure for MAP in HMIPv6
Lee Jun Seob 한국정보과학회 학술 발표 (봄) 2003, pp.409-411 |
|
|
Conference
|
2001 |
Ticket based authentication and payment protocol for mobile telecommunications systems
Byung-Rae Lee Pacific Rim International Symposium on Dependable Computing (PRDC) 2001, pp.218-221 |
11 |
원문
|