ETRI-Knowledge Sharing Plaform

KOREAN

Researchers

연구자 검색
Keyword

Detail

사진

Kim Young Sae
Department
Cyber Warfare Technology Research Center
Contact
KSP Keywords
논문 검색결과
Type Year Title Cited Download
Journal
2024 A Comprehensive Survey of TPM for Defense Systems   Cheol Ryu   KSII Transactions on Internet and Information Systems, v.18, no.7, pp.1953-1967 0
Conference
2022 Implementation of an Efficient Image De-identification System in Offline Environments   김영세   전자 정보 통신 학술 대회 (CEIC) 2022, pp.48-50
Conference
2021 Design of an Effective Method for Image Protection in Offline Environments   김영세   대한임베디드공학회 학술 대회 (추계) 2021, pp.250-253
Conference
2021 Courier Invoice Privacy and Door Lock Password Protection Methods   한진희   대한임베디드공학회 학술 대회 (추계) 2021, pp.296-299
Conference
2020 De-identification and Restoration Methods for Protecting Privacy in Off-line Documents   Jin-Hee Han   International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.1543-1545 0
Conference
2020 Design of an efficient image protection method based on QR code   Young-Sae Kim   International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.1448-1450 0
Conference
2019 A Design of an Efficient Image Protection Scheme Based on QR code   김영세   한국정보보호학회 충청 지부 학술 대회 2019, pp.1-3
Conference
2018 A Performance Analysis of Lightweight Cryptography Algorithm for Data Privacy in IoT Devices   Young-Sae Kim   International Conference on Information and Communication Technology Convergence (ICTC) 2018, pp.936-938 6
Conference
2018 A Performance Analysis of Lightweight Cryptography in IoT Devices   김영세   통신 정보 합동 학술 대회 (JCCI) 2018, pp.327-328
Conference
2017 Design and Implementation of Secure OTP Generation for IoT Devices   Young-Sae Kim   International Conference on Future Generation Communication and Networking (FGCN) 2017 (ASTL 146), pp.75-80
Journal
2015 Implementation of a Hardware Security Chip for Mobile Devices   Hongil Ju   IEEE Transactions on Consumer Electronics, v.61, no.4, pp.500-506 13
Journal
2015 Implementation of a MTM-based secure OTP Generator for IoT Devices   김영세   대한임베디드공학회논문지, v.10, no.4, pp.199-206
Conference
2014 A Study on Trends in SIM Card Design   Young-Sae Kim   대한임베디드공학회 학술 대회 (추계) 2014, pp.445-448
Conference
2014 Design and Requirements for Video Encryption in Intelligent Surveillance System   YoungSae Kim   International Conference on Information and Communication Technology Convergence (ICTC) 2014, pp.763-764 0
Conference
2014 Implementation of a Video Streaming Security System for Smart Device   Yongsung Jeon   International Conference on Consumer Electronics (ICCE) 2014, pp.97-100 5
Journal
2012 Nano-SIM 기술 및 표준화 이슈   김영세   주간기술동향, pp.1-14
Conference
2010 Design of Smart Camera for Video Encryption   전용성   차세대 통신 소프트웨어 학술 대회 (NCS) 2010, pp.1-3
Conference
2010 Partial Encryption and Watermarking of H.264 Video in Codestream Domain   Jin-Hee Han   International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC) 2010, pp.1-3
Conference
2010 Design and Implementation of Modular Multiplier for Embedded System   김영세   한국통신학회 종합 학술 발표회 (하계) 2010, pp.1165-1166
Conference
2010 Partial Encryption and Watermarking of H.264 Video in Codestream Domain   한진희   한국통신학회 종합 학술 발표회 (하계) 2010, pp.1147-1148
Journal
2010 Design and Implementation of Mobile Trusted Module for Trusted Mobile Computing   Mooseop Kim   IEEE Transactions on Consumer Electronics, v.56, no.1, pp.134-140 24
Conference
2010 Design and Implementation of Mobile Trusted Module for Trusted Mobile Computing   Moo Seop Kim   International Conference on Consumer Electronics (ICCE) 2010, pp.1-2 2
Conference
2009 Design Issue of Smart Camera Hardware Design   전용성   차세대 통신 소프트웨어 학술 대회 (NCS) 2009, pp.1-3
Journal
2009 Design of Cryptographic Hardware Architecture for Mobile Computing   Moo Seop Kim   Journal of Information Processing Systems, v.5, no.4, pp.187-196
Conference
2009 Smart Camera Hardware Design based on the TI DaVinci Processor   Yong Sung Jeon   International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC) 2009, pp.622-624
Conference
2007 Efficient Implementation of the Keyed-Hash Message Authentication Code Based on SHA-1 Algorithm for Mobile Trusted Computing   Moo Seop Kim   International Conference on Autonomic and Trusted Computing (ATC) 2007 (LNCS 4610), v.4610, pp.410-419 4
Conference
2007 A Resistance Deviation-to-Time Interval Converter and its Application to a Passive RFID Tag for Security   Ji Mann Park   International Conference on CIRCUITS 2007, pp.126-130
Conference
2007 An Efficient Implemetation of Modular Multiplier for Embedded Systems   Young-Sae Kim   International Technical Conference on Circuits Systems, Computers and Communications (ITC-CSCC) 2007, pp.268-269
Journal
2007 Trusted Computing & Trusted Computing Group Standardization Trends   김영수   전자통신동향분석, v.22, no.1, pp.83-96
Conference
2006 An Efficient Design of Modular Multiplier   김영세   차세대 통신 소프트웨어 학술 대회 (NCS) 2005, pp.1-5
Conference
2006 Implementation of Authentication Mechanism for CDMA based on R-UIM   한진희   차세대 통신 소프트웨어 학술 대회 (NCS) 2005, pp.1-5
Conference
2006 A Resistance Deviation-to-Time Interval Converter for Sensor RFID Tag   Ji Mann Park   International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC) 2006, pp.1-3
Journal
2006 On the Optimal Selection of Wireless Access in Interoperating Heterogeneous Wireless Networks   조근호  한국통신학회논문지, v.31, no.5B, pp.456-477
Conference
2005 Mutual Authentication Mechanism for 2.3GHz band Portable Internet Service   한진희   차세대 통신 소프트웨어 학술 대회 (NCS) 2005, pp.131-135
Conference
2005 A Controller Design for RFID Tag   김영세   차세대 통신 소프트웨어 학술 대회 (NCS) 2005, pp.390-393
Journal
2005 Interworking Security for Public WLAN, Wibro and WCDMA : Mobile and Wireless Systems   전성익   정보통신 : 한국통신학회지, v.22, no.8, pp.63-80
Journal
2005 Trends of Interworking Security Technologies for the Wireless Networks   김영세   전자통신동향분석, v.20, no.1, pp.100-111
Conference
2004 The Optimal Selection of Wireless Service in Interoprating Heterogeneous Wireless Networks   조근호  한국통신학회 종합 학술 발표회 (추계) 2004, pp.1780-1783
Conference
2003 Design and Implementation of an Efficient Divider over GF(2m) for Elliptic Curve Cryptography   이상우   전자 정보 통신 학술 대회 (CEIC) 2003, pp.384-387
Conference
2003 Design and implementation of Elliptic Curve Cryptography Accelerator for Smart Card   이상우   통신 정보 합동 학술 대회 (JCCI) 2003, pp.85-85
Conference
2001 USB Controller FPGA Implementation for Secure Token   이상우   한국통신학회 종합 학술 발표회 (추계) 2001, pp.1106-1109