Type | Year | Title | Cited | Download |
---|---|---|---|---|
Conference
|
2024 | A Study on Security Enhancement for FIDO Attestation 김영세 전자 정보 통신 학술 대회 (CEIC) 2024, pp.244-247 | ||
Conference
|
2024 | K-RMF Characteristics and Complementary Measures Based on NIST SP 800-53 Rev. 4 양우열 한국정보보호학회 학술 대회 (동계) 2024, pp.221-224 | ||
Journal
|
2024 | TPM-Based Anti-Tampering Solutions to Protect Weapon Systems Technologies 이재훈 전자통신동향분석, v.39, no.5, pp.49-60 | ||
Conference
|
2024 | Introduction to System Integrity Verification Technology 김도형 한국인터넷정보학회 학술 발표 대회 (추계) 2024, pp.307-308 | ||
Journal
|
2024 | A Comprehensive Survey of TPM for Defense Systems Cheol Ryu KSII Transactions on Internet and Information Systems, v.18, no.7, pp.1953-1967 | 0 | |
Conference
|
2022 | Implementation of an Efficient Image De-identification System in Offline Environments 김영세 전자 정보 통신 학술 대회 (CEIC) 2022, pp.48-50 | ||
Conference
|
2021 | Courier Invoice Privacy and Door Lock Password Protection Methods 한진희 대한임베디드공학회 학술 대회 (추계) 2021, pp.296-299 | ||
Conference
|
2021 | Design of an Effective Method for Image Protection in Offline Environments 김영세 대한임베디드공학회 학술 대회 (추계) 2021, pp.250-253 | ||
Conference
|
2020 | Design of an efficient image protection method based on QR code Young-Sae Kim International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.1448-1450 | 0 | |
Conference
|
2020 | De-identification and Restoration Methods for Protecting Privacy in Off-line Documents Jin-Hee Han International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.1543-1545 | 0 | |
Conference
|
2019 | A Design of an Efficient Image Protection Scheme Based on QR code 김영세 한국정보보호학회 충청 지부 학술 대회 2019, pp.1-3 | ||
Conference
|
2018 | A Performance Analysis of Lightweight Cryptography Algorithm for Data Privacy in IoT Devices Young-Sae Kim International Conference on Information and Communication Technology Convergence (ICTC) 2018, pp.936-938 | 6 | |
Conference
|
2018 | A Performance Analysis of Lightweight Cryptography in IoT Devices 김영세 통신 정보 합동 학술 대회 (JCCI) 2018, pp.327-328 | ||
Conference
|
2017 | Design and Implementation of Secure OTP Generation for IoT Devices Young-Sae Kim International Conference on Future Generation Communication and Networking (FGCN) 2017 (ASTL 146), pp.75-80 | ||
Journal
|
2015 | Implementation of a Hardware Security Chip for Mobile Devices Hongil Ju IEEE Transactions on Consumer Electronics, v.61, no.4, pp.500-506 | 13 | |
Journal
|
2015 | Implementation of a MTM-based secure OTP Generator for IoT Devices 김영세 대한임베디드공학회논문지, v.10, no.4, pp.199-206 | ||
Conference
|
2014 | A Study on Trends in SIM Card Design Young-Sae Kim 대한임베디드공학회 학술 대회 (추계) 2014, pp.445-448 | ||
Conference
|
2014 | Design and Requirements for Video Encryption in Intelligent Surveillance System YoungSae Kim International Conference on Information and Communication Technology Convergence (ICTC) 2014, pp.763-764 | 0 | |
Conference
|
2014 | Implementation of a Video Streaming Security System for Smart Device Yongsung Jeon International Conference on Consumer Electronics (ICCE) 2014, pp.97-100 | 5 | |
Journal
|
2012 | Nano-SIM 기술 및 표준화 이슈 김영세 주간기술동향, v.1554, pp.1-14 | ||
Conference
|
2010 | Design of Smart Camera for Video Encryption 전용성 차세대 통신 소프트웨어 학술 대회 (NCS) 2010, pp.1-3 | ||
Conference
|
2010 | Partial Encryption and Watermarking of H.264 Video in Codestream Domain Jin-Hee Han International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC) 2010, pp.1-3 | ||
Conference
|
2010 | Design and Implementation of Modular Multiplier for Embedded System 김영세 한국통신학회 종합 학술 발표회 (하계) 2010, pp.1165-1166 | ||
Conference
|
2010 | Partial Encryption and Watermarking of H.264 Video in Codestream Domain 한진희 한국통신학회 종합 학술 발표회 (하계) 2010, pp.1147-1148 | ||
Journal
|
2010 | Design and Implementation of Mobile Trusted Module for Trusted Mobile Computing Mooseop Kim IEEE Transactions on Consumer Electronics, v.56, no.1, pp.134-140 | 24 | |
Conference
|
2010 | Design and Implementation of Mobile Trusted Module for Trusted Mobile Computing Moo Seop Kim International Conference on Consumer Electronics (ICCE) 2010, pp.1-2 | 2 | |
Conference
|
2009 | Design Issue of Smart Camera Hardware Design 전용성 차세대 통신 소프트웨어 학술 대회 (NCS) 2009, pp.1-3 | ||
Journal
|
2009 | Design of Cryptographic Hardware Architecture for Mobile Computing Moo Seop Kim Journal of Information Processing Systems, v.5, no.4, pp.187-196 | ||
Conference
|
2009 | Smart Camera Hardware Design based on the TI DaVinci Processor Yong Sung Jeon International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC) 2009, pp.622-624 | ||
Conference
|
2007 | An Efficient Implemetation of Modular Multiplier for Embedded Systems Young-Sae Kim International Technical Conference on Circuits Systems, Computers and Communications (ITC-CSCC) 2007, pp.268-269 | ||
Conference
|
2007 | A Resistance Deviation-to-Time Interval Converter and its Application to a Passive RFID Tag for Security Ji Mann Park International Conference on CIRCUITS 2007, pp.126-130 | ||
Conference
|
2007 | Efficient Implementation of the Keyed-Hash Message Authentication Code Based on SHA-1 Algorithm for Mobile Trusted Computing Moo Seop Kim International Conference on Autonomic and Trusted Computing (ATC) 2007 (LNCS 4610), v.4610, pp.410-419 | 4 | |
Journal
|
2007 | Trusted Computing & Trusted Computing Group Standardization Trends 김영수 전자통신동향분석, v.22, no.1, pp.83-96 | ||
Conference
|
2006 | Implementation of Authentication Mechanism for CDMA based on R-UIM 한진희 차세대 통신 소프트웨어 학술 대회 (NCS) 2005, pp.1-5 | ||
Conference
|
2006 | An Efficient Design of Modular Multiplier 김영세 차세대 통신 소프트웨어 학술 대회 (NCS) 2005, pp.1-5 | ||
Conference
|
2006 | A Resistance Deviation-to-Time Interval Converter for Sensor RFID Tag Ji Mann Park International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC) 2006, pp.1-3 | ||
Journal
|
2006 | On the Optimal Selection of Wireless Access in Interoperating Heterogeneous Wireless Networks 조근호 한국통신학회논문지, v.31, no.5B, pp.456-477 | ||
Conference
|
2005 | Mutual Authentication Mechanism for 2.3GHz band Portable Internet Service 한진희 차세대 통신 소프트웨어 학술 대회 (NCS) 2005, pp.131-135 | ||
Conference
|
2005 | A Controller Design for RFID Tag 김영세 차세대 통신 소프트웨어 학술 대회 (NCS) 2005, pp.390-393 | ||
Journal
|
2005 | Interworking Security for Public WLAN, WiBro and WCDMA : Mobile and wireless systems 전성익 정보통신 : 한국통신학회지, v.22, no.8, pp.63-80 | ||
Journal
|
2005 | Trends of Interworking Security Technologies for the Wireless Networks 김영세 전자통신동향분석, v.20, no.1, pp.100-111 | ||
Conference
|
2004 | The Optimal Selection of Wireless Service in Interoprating Heterogeneous Wireless Networks 조근호 한국통신학회 종합 학술 발표회 (추계) 2004, pp.1780-1783 | ||
Conference
|
2003 | Design and Implementation of an Efficient Divider over GF(2m) for Elliptic Curve Cryptography 이상우 전자 정보 통신 학술 대회 (CEIC) 2003, pp.384-387 | ||
Conference
|
2003 | Design and implementation of Elliptic Curve Cryptography Accelerator for Smart Card 이상우 통신 정보 합동 학술 대회 (JCCI) 2003, pp.85-85 | ||
Conference
|
2001 | USB Controller FPGA Implementation for Secure Token 이상우 한국통신학회 종합 학술 발표회 (추계) 2001, pp.1106-1109 |