Subject

Subjects : Security problems

  • Articles (23)
  • Patents (1)
  • R&D Reports (0)
논문 검색결과
Type Year Title Cited Download
Journal 2022 A Robust Authentication Protocol for Wireless Medical Sensor Networks Using Blockchain and Physically Unclonable Functions   Yusungjin  IEEE Internet of Things Journal, v.9, no.20, pp.20214-20228 94 원문
Conference 2021 A Study on the Improvement of Fine-grained Ship Classification through Data Augmentation Using Generative Adversarial Networks   Moon Sung-Won  International Conference on Information and Communication Technology Convergence (ICTC) 2021, pp.1230-1232 4 원문
Journal 2021 Lightweight Three-Factor-Based Privacy- Preserving Authentication Scheme for IoT-Enabled Smart Homes   Yusungjin  IEEE Access, v.9, pp.126186-126197 55 원문
Journal 2020 A Comprehensive Security Assessment Framework for Software-defined Networks   이승수  Computers & Security, v.91, pp.1-15 33 원문
Conference 2014 Data Preprocessor for Order Preserving Encryption   Su Hyung Jo  International Conference on Advanced Engineering and Technology (ICAET) 2014, v.AMM 752-753, pp.1356-1359 원문
Conference 2014 User-Defined Privilege Restriction Mechanism for Secure Execution Environments on Android   Chung Bo-Heung  International Conference on Information and Communication Technology Convergence (ICTC) 2014, pp.815-816 1 원문
Conference 2013 A Design of the Server Storage Filter for the Separated Software Execution Service   Chung Moonyoung  International Conference on Internet (ICONI) 2013, pp.1-4
Conference 2012 Anti-Forensic Approach for Password Protection Using Fuzzy Fingerprint Vault   Woo Yong Choi  International Conference on Computing and Convergence Technology (ICCCT) 2012, pp.643-646
Journal 2012 The Study on the Cyber Security Requirements of Cyber-Physical Systems for Cyber Security Frameworks   박수열  대한임베디드공학회논문지, v.7, no.5, pp.255-265 원문
Journal 2012 System Architecture for Physical/IT Security Event Integration   Seon-Gyoung Sohn  International Journal of Computer Science and Network Security, v.12, no.1, pp.66-70
Journal 2011 Fingerprint Template Protection Using One-Time Fuzzy Vault   Woo Yong Choi  KSII Transactions on Internet and Information Systems, v.5, no.11, pp.2221-2234 2 원문
Conference 2011 Fast Polynomial Reconstruction Attack against Fuzzy Fingerprint Vault   Woo Yong Choi  International Conference on New Trends in Information Science and Service Science (NISS) 2011, pp.299-302
Conference 2011 Building Secure Execution Environment for Mobile Platform   Young Ho Kim  International Conference on Computers, Networks, Systems and Industrial Engineering (CNSI) 2011, pp.119-122 4 원문
Conference 2010 A Study on the Security for a Vehicle Using TPM   Jeong-Woo Lee  ITS World Congress 2010, pp.1-6
Journal 2010 A Wireless Network Structure and AKA(Authentication and Key Agreement) Protocol of Advanced Metering Infrastructure on the Smart Grid based on Binary CDMA   전재우  정보보호학회논문지, v.20, no.5, pp.111-124
Journal 2010 Design Implementation of Lightweight and High Speed Security Protocol Suitable for UHF Passive RFID Systems   Yousung Kang  정보보호학회논문지, v.20, no.4, pp.117-134
Journal 2010 Mutual Authentication and Key Establishment Protocol to Implement Secure M2M Communication Environments   은선기  정보보호학회논문지, v.20, no.1, pp.73-83
Journal 2009 A study on restoration of iris images with motion‐and‐optical blur on mobile iris recognition devices   Byung Jun Kang  International Journal of Imaging Systems and Technology, v.19, no.4, pp.323-331 8 원문
Journal 2009 Efficient Implementation of Pairing-Based Cryptography on a Sensor Node   Masaaki Shirase  IEICE Transactions on Information and Systems, v.E92-D, no.5, pp.909-917 24 원문
Journal 2005 Cluster-Based Trust Evaluation Scheme in an Ad Hoc Network   Jin Seung Hun  ETRI Journal, v.27, no.4, pp.465-468 38 원문
Conference 2005 Security Considerations for RFID Technology Adoption   Park Joo Sang  International Conference on Advanced Communication Technology (ICACT) 2005, pp.797-803 원문
Conference 2005 Method of securely transferring programmable packet using digital signatures having access-controlled high-security verification key   Kim Youngsoo  International Conference on Advanced Communication Technology (ICACT) 2005, pp.1208-1211 원문
Conference 2005 Design of network security policy information model for policy-based network management   Seon-Gyoung Sohn  International Conference on Advanced Communication Technology (ICACT) 2005, pp.701-705 원문
특허 검색결과
Status Year Patent Name Country Family Pat. KIPRIS
Registered 2006 METHOD OF BLOCKING NETWORK ATTACKS USING PACKET INFORMATION AND APPARATUS THEREOF UNITED STATES
연구보고서 검색결과
Type Year Research Project Primary Investigator Download
No search results.