Type | Year | Title | Cited | Download |
---|---|---|---|---|
Conference
|
2024 | Stealth Wi-Fi Technology that can be used for Public Work and Missions 정부금 통신 정보 합동 학술 대회 (JCCI) 2024, pp.213-213 | ||
Conference
|
2022 | ZTA-based Federated Policy Control Paradigm for Enterprise Wireless Network Infrastructure Boo Geum Jung Asia-Pacific Conference on Communications (APCC) 2022, pp.1-5 | 3 | |
Conference
|
2019 | 신뢰기반 네트워크 접속 제어 및 보호 시스템 Yoon-Sik Yoo International Conference on Platform Technology and Service (PlatCon) 2019, pp.71-75 | 1 | |
Journal
|
2017 | 용도 , 등급별 제어가 가능한 신뢰 내재형 서비스 존 제공 기술 유윤식 정보와 통신 : 한국통신학회지, v.34, no.11, pp.45-52 | ||
Journal
|
2017 | Hyper-connected Trust Network Technology 정부금 전자통신동향분석, v.32, no.1, pp.35-45 | ||
Conference
|
2015 | A Semantic-based Approach to Enhance Sleep Management Service in Heterogeneous Sensor Network 권순현 한국정보과학회 학술 발표회 (동계) 2015, pp.422-424 | ||
Conference
|
2015 | The Semantic-based Resource Abstraction Mechanism for the IoT Resource Management 이형규 한국정보과학회 학술 발표회 (동계) 2015, pp.455-457 | ||
Journal
|
2015 | 다양한 IoT 환경을 고려한 IoT 통합 플랫폼 기술 동향 유재학 주간기술동향, pp.10-22 | ||
Conference
|
2014 | Semantic IoT Resource Management Mechanism Based on Spatial Data 이형규 정보 및 제어 학술 대회 (CICS) 2014, pp.462-464 | ||
Journal
|
2014 | 사물 인터넷 기술 동향 및 발전 방향 이형규 정보처리학회지, v.21, no.2, pp.14-21 | ||
Conference
|
2013 | Creation Mechanism for Access Group Based on User Privacy Policy-Based Protection Taekyeong Kang International Conference on Mobile, Ubiquitous, and Intelligent Computing (MUSIC) 2013 (LNEE 274), pp.125-130 | 2 | |
Conference
|
2013 | Use-Cases and Service Modeling Analysis of Open Ubiquitous Sensor Network Platform in Semantic Environment Taegyeong Kang International Conference on Mobile, Ubiquitous, and Intelligent Computing (MUSIC) 2013 (LNEE 274), v.274, pp.463-468 | 0 | |
Conference
|
2013 | The Architecture Design of Semantic Based Open USN Service Platform Model Hyungkyu Lee International Conference on Mobile, Ubiquitous, and Intelligent Computing (MUSIC) 2013 (LNEE 274), v.274, pp.457-462 | 0 | |
Conference
|
2011 | The Systematic Approaches for Multi-Sensor Data Fusion 이형규 정보 및 제어 심포지엄 (ICS) 2011, pp.143-144 | ||
Conference
|
2008 | How to Integrate Diverse Client Authentication Protocol with Various Authentication Means Hyung Kyu Lee International Conference on Security and Management (SAM) 2008, pp.1-5 | ||
Conference
|
2007 | Security Architecture for Authentication and Authorization in the Intelligent and Ubiquitous Home Network Hyung Kyu Lee International Conference on Intelligent Computing (ICIC) 2007 (CCIS 2), v.2, pp.1110-1118 | ||
Conference
|
2006 | A Secure Authentication Protocol for Home Network using an ID/PW Hong Il Ju International Ubiquitous Convergence Conference (IUC) 2006, pp.1-5 | ||
Conference
|
2006 | Secure Biometric Recognition Method in Home Network Yun Kyung Lee Conference of IEEE Industrial Electronics Society (IECON) 2006, pp.3745-3749 | 1 | |
Conference
|
2006 | More Convenient User Authentication Mechanism using Authentication Information Storage Server in Home Network Yun Kyung Lee Joint Workshop on Information Security (JWIS) 2006, pp.1-9 | ||
Conference
|
2006 | Efficient and User Friendly Inter-domain Device Authentication/Access Control for Home Networks Jin Bum Hwang International Conference on Embedded and Ubiquitous Computing (EUC) 2006 (LNCS 4096), v.4096, pp.131-140 | 13 | |
Conference
|
2005 | The Remote Access To IPsec-VPN Gateway over Mobile IPv6 Hyung Kyu Lee International Conference on Advanced Communication Technology (ICACT) 2005, pp.567-569 | ||
Conference
|
2002 | A Study on Password-based key exchange Protocol for Mobile and Remote Access 이형규 통신 정보 합동 학술 대회 (JCCI) 2002, pp.155-155 | ||
Conference
|
2001 | A Study on Interaction of IKE Protocol Engine in IPsec Security Platform 이형규 통신 정보 합동 학술 대회 (JCCI) 2001, pp.77-80 |