Journal
|
2022 |
A Robust Authentication Protocol for Wireless Medical Sensor Networks Using Blockchain and Physically Unclonable Functions
Yusungjin IEEE Internet of Things Journal, v.9, no.20, pp.20214-20228 |
94 |
원문
|
Conference
|
2021 |
A Study on the Improvement of Fine-grained Ship Classification through Data Augmentation Using Generative Adversarial Networks
Moon Sung-Won International Conference on Information and Communication Technology Convergence (ICTC) 2021, pp.1230-1232 |
4 |
원문
|
Journal
|
2021 |
Lightweight Three-Factor-Based Privacy- Preserving Authentication Scheme for IoT-Enabled Smart Homes
Yusungjin IEEE Access, v.9, pp.126186-126197 |
55 |
원문
|
Journal
|
2020 |
A Comprehensive Security Assessment Framework for Software-defined Networks
이승수 Computers & Security, v.91, pp.1-15 |
33 |
원문
|
Conference
|
2014 |
Data Preprocessor for Order Preserving Encryption
Su Hyung Jo International Conference on Advanced Engineering and Technology (ICAET) 2014, v.AMM 752-753, pp.1356-1359 |
|
원문
|
Conference
|
2014 |
User-Defined Privilege Restriction Mechanism for Secure Execution Environments on Android
Chung Bo-Heung International Conference on Information and Communication Technology Convergence (ICTC) 2014, pp.815-816 |
1 |
원문
|
Conference
|
2013 |
A Design of the Server Storage Filter for the Separated Software Execution Service
Chung Moonyoung International Conference on Internet (ICONI) 2013, pp.1-4 |
|
|
Conference
|
2012 |
Anti-Forensic Approach for Password Protection Using Fuzzy Fingerprint Vault
Woo Yong Choi International Conference on Computing and Convergence Technology (ICCCT) 2012, pp.643-646 |
|
|
Journal
|
2012 |
The Study on the Cyber Security Requirements of Cyber-Physical Systems for Cyber Security Frameworks
박수열 대한임베디드공학회논문지, v.7, no.5, pp.255-265 |
|
원문
|
Journal
|
2012 |
System Architecture for Physical/IT Security Event Integration
Seon-Gyoung Sohn International Journal of Computer Science and Network Security, v.12, no.1, pp.66-70 |
|
|
Journal
|
2011 |
Fingerprint Template Protection Using One-Time Fuzzy Vault
Woo Yong Choi KSII Transactions on Internet and Information Systems, v.5, no.11, pp.2221-2234 |
2 |
원문
|
Conference
|
2011 |
Fast Polynomial Reconstruction Attack against Fuzzy Fingerprint Vault
Woo Yong Choi International Conference on New Trends in Information Science and Service Science (NISS) 2011, pp.299-302 |
|
|
Conference
|
2011 |
Building Secure Execution Environment for Mobile Platform
Young Ho Kim International Conference on Computers, Networks, Systems and Industrial Engineering (CNSI) 2011, pp.119-122 |
4 |
원문
|
Conference
|
2010 |
A Study on the Security for a Vehicle Using TPM
Jeong-Woo Lee ITS World Congress 2010, pp.1-6 |
|
|
Journal
|
2010 |
A Wireless Network Structure and AKA(Authentication and Key Agreement) Protocol of Advanced Metering Infrastructure on the Smart Grid based on Binary CDMA
전재우 정보보호학회논문지, v.20, no.5, pp.111-124 |
|
|
Journal
|
2010 |
Design Implementation of Lightweight and High Speed Security Protocol Suitable for UHF Passive RFID Systems
Yousung Kang 정보보호학회논문지, v.20, no.4, pp.117-134 |
|
|
Journal
|
2010 |
Mutual Authentication and Key Establishment Protocol to Implement Secure M2M Communication Environments
은선기 정보보호학회논문지, v.20, no.1, pp.73-83 |
|
|
Journal
|
2009 |
A study on restoration of iris images with motion‐and‐optical blur on mobile iris recognition devices
Byung Jun Kang International Journal of Imaging Systems and Technology, v.19, no.4, pp.323-331 |
8 |
원문
|
Journal
|
2009 |
Efficient Implementation of Pairing-Based Cryptography on a Sensor Node
Masaaki Shirase IEICE Transactions on Information and Systems, v.E92-D, no.5, pp.909-917 |
24 |
원문
|
Journal
|
2005 |
Cluster-Based Trust Evaluation Scheme in an Ad Hoc Network
Jin Seung Hun ETRI Journal, v.27, no.4, pp.465-468 |
38 |
원문
|
Conference
|
2005 |
Security Considerations for RFID Technology Adoption
Park Joo Sang International Conference on Advanced Communication Technology (ICACT) 2005, pp.797-803 |
|
원문
|
Conference
|
2005 |
Method of securely transferring programmable packet using digital signatures having access-controlled high-security verification key
Kim Youngsoo International Conference on Advanced Communication Technology (ICACT) 2005, pp.1208-1211 |
|
원문
|
Conference
|
2005 |
Design of network security policy information model for policy-based network management
Seon-Gyoung Sohn International Conference on Advanced Communication Technology (ICACT) 2005, pp.701-705 |
|
원문
|