
| Type | Year | Title | Cited | Download |
|---|---|---|---|---|
|
Conference
|
2025 | A Comparative Study of Quantum Circuit Mapping Techniques for NISQ Devices You-Seok Lee International Conference on Information and Communication Technology Convergence (ICTC) 2025, pp.2203-2204 | ||
|
Conference
|
2025 | Design of a Progressive MAC for Drone RC Data Protection Joungil Yun International Conference on Information and Communication Technology Convergence (ICTC) 2025, pp.100-102 | ||
|
Conference
|
2025 | A Study on Secure Key Generation Methods Based on Multimodal Attributes in Wireless Communications Daewon Kim International Conference on Information and Communication Technology Convergence (ICTC) 2025, pp.328-329 | ||
|
Conference
|
2024 | Unmanned Vehicle Security and its Management in a C-Band Modem Communication Environment Juhan Kim International Conference on Information and Communication Technology Convergence (ICTC) 2024, pp.1666-1667 | 0 | |
|
Conference
|
2024 | Physical Qubits Estimation for Quantum S-box You-Seok Lee International Conference on Information and Communication Technology Convergence (ICTC) 2024, pp.1369-1370 | 1 | |
|
Conference
|
2024 | Applying Lightweight Cryptography to Enhance Drone RC Security Joungil Yun International Conference on Information and Communication Technology Convergence (ICTC) 2024, pp.1367-1368 | 2 | |
|
Journal
|
2024 | Toffoli-depth reduction method preserving in-place quantum circuits and its application to SHA3-256 Jongheon Lee Quantum Information Processing, v.23, pp.1-43 | 5 | |
|
Conference
|
2023 | Research on quantum circuit design for multiplicative inversion in finite field 이유석 한국정보보호학회 학술 대회 (동계) 2023, pp.1-4 | ||
|
Conference
|
2023 | A Study on the Application of Lightweight Cryptography for Protecting Drone Remote Control Data 윤정일 한국정보처리학회 학술 발표 대회 (추계) 2023, pp.1185-1186 | ||
|
Conference
|
2023 | Implementation of PQC-based Secure Channel for Drone Services 윤승용 한국정보처리학회 학술 발표 대회 (추계) 2023, pp.1-2 | ||
|
Conference
|
2023 | Client-centric on-demand remote profile provisioning technique for M2M IoT Devices Boheung Chung International Conference on Information and Communication Technology Convergence (ICTC) 2023, pp.1-3 | 0 | |
|
Conference
|
2023 | Security enhancement scheme for mobile device using H/W cryptographic module Seungyong Yoon International Conference on Information and Communication Technology Convergence (ICTC) 2023, pp.1450-1452 | 5 | |
|
Conference
|
2023 | Security Technology for C-Band Modem Communication in Unmanned Vehicle Environment Juhan Kim International Conference on Information and Communication Technology Convergence (ICTC) 2023, pp.1095-1097 | 1 | |
|
Conference
|
2023 | Cryptanalysis and Countermeasures of the Recent Authentication and Key Agreement Scheme for Internet of Drones Sungjin Yu International Conference on Information and Communication Technology Convergence (ICTC) 2023, pp.1419-1422 | 3 | |
|
Journal
|
2023 | MPMCT gate decomposition method reducing T-depth quickly in proportion to the number of work qubits Jongheon Lee Quantum Information Processing, v.22, pp.1-31 | 5 | |
|
Journal
|
2023 | Implementation and characterization of flash‐based hardware security primitives for cryptographic key generation Mi-Kyung Oh ETRI Journal, v.45, no.2, pp.346-357 | 5 | |
|
Conference
|
2022 | Enhancing IoT security with PUF-based authentication scheme Seungyong Yoon International Conference on Information and Communication Technology Convergence (ICTC) 2022, pp.2319-2321 | 4 | |
|
Conference
|
2022 | Reinforcement of IoT Open Platform Security using PUF -based Device Authentication Byoungkoo Kim International Conference on Information and Communication Technology Convergence (ICTC) 2022, pp.1969-1971 | 5 | |
|
Conference
|
2022 | UAV arming Authorization using DIM and Flight Authorization Code Juhan Kim International Conference on Information and Communication Technology Convergence (ICTC) 2022, pp.2065-2067 | 2 | |
|
Conference
|
2022 | A Study on the MCT gate for AES based Grover Oracle 이유석 한국정보보호학회 학술 대회 (하계) 2022, pp.30-33 | ||
|
Journal
|
2022 | ISO/IEC 22460-2 Drone Identity Module Standardization Trend 김건우 전자공학회지, v.49, no.1, pp.57-65 | ||
|
Journal
|
2022 | Rcryptect: Real-time Detection of Cryptographic Function in the User-space Filesystem Seungkwang Lee Computers & Security, v.112, pp.1-13 | 16 | |
|
Conference
|
2021 | A Study on PX4 Autopilot Secure Booting 김건우 한국항공우주학회 학술 대회 (추계) 2021, pp.1-2 | ||
|
Conference
|
2021 | Wi-SUN Device Authentication using Physical Layer Fingerprint Mi-Kyung Oh International Conference on Information and Communication Technology Convergence (ICTC) 2021, pp.160-162 | 4 | |
|
Conference
|
2021 | PUF-based IoT Device Authentication Scheme on IoT Open Platform Byoungkoo Kim International Conference on Information and Communication Technology Convergence (ICTC) 2021, pp.1873-1875 | 8 | |
|
Conference
|
2021 | Multiple PUF-based Lightweight Authentication Method in the IoT Seungyong Yoon International Conference on Information and Communication Technology Convergence (ICTC) 2021, pp.1198-1200 | 8 | |
|
Conference
|
2020 | Test for mutual authentication between UAV and GCS using hardware security module 김건우 한국항공우주학회 학술 대회 (추계) 2020, pp.1-2 | ||
|
Conference
|
2020 | Drone Security Module for UAV Data Encryption Keonwoo Kim International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.1672-1674 | 34 | |
|
Conference
|
2020 | Secure IoT Device Authentication Scheme using Key Hiding Technology Byoungkoo Kim International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.1808-1810 | 3 | |
|
Conference
|
2020 | PUF-based Authentication Scheme for IoT Devices Seungyong Yoon International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.1792-1794 | 26 | |
|
Conference
|
2020 | Implementation of execution code integrity verification function for embedded device using hardware security module 전용성 대한전자공학회 학술 대회 (하계) 2020, pp.1765-1768 | ||
|
Journal
|
2020 | Secure and reliable IoT device authentication technology using key hiding technique 김병구 정보보호학회지, v.30, no.1, pp.35-42 | ||
|
Journal
|
2020 | Wireless Transceiver Aided Run-Time Secret Key Extraction for IoT Device Security Mi-Kyung Oh IEEE Transactions on Consumer Electronics, v.66, no.1, pp.11-21 | 20 | |
|
Journal
|
2020 | Design of Resistor-Capacitor Physically Unclonable Function for Resource-Constrained IoT Devices Sangjae Lee Sensors, v.20, no.2, pp.1-16 | 11 | |
|
Conference
|
2019 | Implementation of UAS Identification and Authentication on OneM2M IoT Platform Keonwoo Kim International Conference on Information and Communication Technology Convergence (ICTC) 2019, pp.948-950 | 4 | |
|
Conference
|
2019 | Security Enhancement for IoT Device using Physical Unclonable Functions Seungyong Yoon International Conference on Information and Communication Technology Convergence (ICTC) 2019, pp.1457-1459 | 3 | |
|
Conference
|
2019 | Crypto-Protector: Multi-threaded RSA to Prevent EM Attacks Seungkwang Lee International Conference on Information and Communication Technology Convergence (ICTC) 2019, pp.945-947 | 0 | |
|
Conference
|
2019 | PUF based IoT Device Authentication Scheme Byoungkoo Kim International Conference on Information and Communication Technology Convergence (ICTC) 2019, pp.1460-1462 | 31 | |
|
Conference
|
2019 | RC PUF: A Low-Cost and an Easy-to-Design PUF for Resource-Constrained IoT Devices Sangjae Lee World Conference on Information Security Applications (WISA) 2019 (LNCS 11897), pp.275-285 | 3 | |
|
Conference
|
2019 | Implementation of a LoRaWAN Protocol Processing Module on an Embedded Device using Secure Element YongSung Jeon International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC) 2019, pp.1-3 | 5 | |
|
Journal
|
2019 | Standardization trend of drone ICT security technology 강유성 TTA Journal, v.182, pp.66-71 | ||
|
Journal
|
2019 | Two-Factor Fuzzy Commitment for Unmanned IoT Devices Security Dooho Choi IEEE Internet of Things Journal, v.6, no.1, pp.335-348 | 36 | |
|
Journal
|
2018 | A Masked White-Box Cryptographic Implementation for Protecting Against Differential Computation Analysis Seungkwang Lee IEEE Transactions on Information Forensics and Security, v.13, no.10, pp.2602-2615 | 32 | |
|
Conference
|
2018 | Secure Key Extraction for IoT Devices Integrating IEEE 802.15.4g/k Transceiver Mi-Kyung Oh International Conference on Information and Communication Technology Convergence (ICTC) 2018, pp.833-835 | 3 | |
|
Conference
|
2018 | Public Key-based Lightweight Mutual Authentication and Key Agreement Protocol for Drones Keonwoo Kim Asian/Austrailian Rotorcraft Forum (ARF) 2018, pp.1-5 | 1 | |
|
Conference
|
2018 | Abnormal Traffic Detection Mechanism for Protecting IIoT Environments Byoung-Koo Kim International Conference on Information and Communication Technology Convergence (ICTC) 2018, pp.943-945 | 8 | |
|
Conference
|
2018 | Implementing a Phase Detection Ring Oscillator PUF on FPGA Sangjae Lee International Conference on Information and Communication Technology Convergence (ICTC) 2018, pp.845-847 | 6 | |
|
Journal
|
2018 | International standardization trend of security requirements and test methods for physically unclonable function 강유성 정보보호학회지, v.28, no.4, pp.34-40 | ||
|
Conference
|
2018 | Design of a LPWAN Communication Device based on Hardware Security Module YongSung Jeon International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC) 2018, pp.1-3 | ||
|
Journal
|
2018 | Security requirements for drone-based services 강유성 TTA Journal, v.177, pp.74-79 |