Type | Year | Title | Cited | Download |
---|---|---|---|---|
Conference
|
2024 | Unmanned Vehicle Security and its Management in a C-Band Modem Communication Environment Juhan Kim International Conference on Information and Communication Technology Convergence (ICTC) 2024, pp.1666-1667 | ||
Conference
|
2024 | Physical Qubits Estimation for Quantum S-box You-Seok Lee International Conference on Information and Communication Technology Convergence (ICTC) 2024, pp.1369-1370 | ||
Conference
|
2024 | Applying Lightweight Cryptography to Enhance Drone RC Security Joungil Yun International Conference on Information and Communication Technology Convergence (ICTC) 2024, pp.1367-1368 | ||
Journal
|
2024 | Toffoli-depth reduction method preserving in-place quantum circuits and its application to SHA3-256 Jongheon Lee Quantum Information Processing, v.23, pp.1-43 | 1 | |
Conference
|
2023 | Research on quantum circuit design for multiplicative inversion in finite field 이유석 한국정보보호학회 학술 대회 (동계) 2023, pp.1-4 | ||
Conference
|
2023 | Implementation of PQC-based Secure Channel for Drone Services 윤승용 한국정보처리학회 학술 발표 대회 (추계) 2023, pp.1-2 | ||
Conference
|
2023 | A Study on the Application of Lightweight Cryptography for Protecting Drone Remote Control Data 윤정일 한국정보처리학회 학술 발표 대회 (추계) 2023, pp.1185-1186 | ||
Conference
|
2023 | Security Technology for C-Band Modem Communication in Unmanned Vehicle Environment Juhan Kim International Conference on Information and Communication Technology Convergence (ICTC) 2023, pp.1095-1097 | 0 | |
Conference
|
2023 | Cryptanalysis and Countermeasures of the Recent Authentication and Key Agreement Scheme for Internet of Drones Sungjin Yu International Conference on Information and Communication Technology Convergence (ICTC) 2023, pp.1419-1422 | 2 | |
Conference
|
2023 | Client-centric on-demand remote profile provisioning technique for M2M IoT Devices Boheung Chung International Conference on Information and Communication Technology Convergence (ICTC) 2023, pp.1-3 | 0 | |
Journal
|
2023 | MPMCT gate decomposition method reducing T-depth quickly in proportion to the number of work qubits Jongheon Lee Quantum Information Processing, v.22, pp.1-31 | 3 | |
Conference
|
2023 | Security enhancement scheme for mobile device using H/W cryptographic module Seungyong Yoon International Conference on Information and Communication Technology Convergence (ICTC) 2023, pp.1450-1452 | 2 | |
Journal
|
2023 | Implementation and characterization of flash‐based hardware security primitives for cryptographic key generation Mi-Kyung Oh ETRI Journal, v.45, no.2, pp.346-357 | 4 | |
Conference
|
2022 | UAV arming Authorization using DIM and Flight Authorization Code Juhan Kim International Conference on Information and Communication Technology Convergence (ICTC) 2022, pp.2065-2067 | 1 | |
Conference
|
2022 | Enhancing IoT security with PUF-based authentication scheme Seungyong Yoon International Conference on Information and Communication Technology Convergence (ICTC) 2022, pp.2319-2321 | 2 | |
Conference
|
2022 | Reinforcement of IoT Open Platform Security using PUF -based Device Authentication Byoungkoo Kim International Conference on Information and Communication Technology Convergence (ICTC) 2022, pp.1969-1971 | 3 | |
Conference
|
2022 | A Study on the MCT gate for AES based Grover Oracle 이유석 한국정보보호학회 학술 대회 (하계) 2022, pp.30-33 | ||
Journal
|
2022 | Rcryptect: Real-time Detection of Cryptographic Function in the User-space Filesystem Seungkwang Lee Computers & Security, v.112, pp.1-13 | 9 | |
Journal
|
2022 | ISO/IEC 22460-2 Drone Identity Module Standardization Trend 김건우 전자공학회지, v.49, no.1, pp.57-65 | ||
Conference
|
2021 | A Study on PX4 Autopilot Secure Booting 김건우 한국항공우주학회 학술 대회 (추계) 2021, pp.1-2 | ||
Conference
|
2021 | Multiple PUF-based Lightweight Authentication Method in the IoT Seungyong Yoon International Conference on Information and Communication Technology Convergence (ICTC) 2021, pp.1198-1200 | 8 | |
Conference
|
2021 | Wi-SUN Device Authentication using Physical Layer Fingerprint Mi-Kyung Oh International Conference on Information and Communication Technology Convergence (ICTC) 2021, pp.160-162 | 4 | |
Conference
|
2021 | PUF-based IoT Device Authentication Scheme on IoT Open Platform Byoungkoo Kim International Conference on Information and Communication Technology Convergence (ICTC) 2021, pp.1873-1875 | 7 | |
Conference
|
2020 | Test for mutual authentication between UAV and GCS using hardware security module 김건우 한국항공우주학회 학술 대회 (추계) 2020, pp.1-2 | ||
Conference
|
2020 | Secure IoT Device Authentication Scheme using Key Hiding Technology Byoungkoo Kim International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.1808-1810 | 3 | |
Conference
|
2020 | PUF-based Authentication Scheme for IoT Devices Seungyong Yoon International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.1792-1794 | 18 | |
Conference
|
2020 | Drone Security Module for UAV Data Encryption Keonwoo Kim International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.1672-1674 | 27 | |
Conference
|
2020 | Implementation of execution code integrity verification function for embedded device using hardware security module 전용성 대한전자공학회 학술 대회 (하계) 2020, pp.1765-1768 | ||
Journal
|
2020 | Secure and reliable IoT device authentication technology using key hiding technique 김병구 정보보호학회지, v.30, no.1, pp.35-42 | ||
Journal
|
2020 | Wireless Transceiver Aided Run-Time Secret Key Extraction for IoT Device Security Mi-Kyung Oh IEEE Transactions on Consumer Electronics, v.66, no.1, pp.11-21 | 14 | |
Journal
|
2020 | Design of Resistor-Capacitor Physically Unclonable Function for Resource-Constrained IoT Devices Sangjae Lee Sensors, v.20, no.2, pp.1-16 | 7 | |
Conference
|
2019 | Security Enhancement for IoT Device using Physical Unclonable Functions Seungyong Yoon International Conference on Information and Communication Technology Convergence (ICTC) 2019, pp.1457-1459 | 3 | |
Conference
|
2019 | Crypto-Protector: Multi-threaded RSA to Prevent EM Attacks Seungkwang Lee International Conference on Information and Communication Technology Convergence (ICTC) 2019, pp.945-947 | 0 | |
Conference
|
2019 | PUF based IoT Device Authentication Scheme Byoungkoo Kim International Conference on Information and Communication Technology Convergence (ICTC) 2019, pp.1460-1462 | 26 | |
Conference
|
2019 | Implementation of UAS Identification and Authentication on OneM2M IoT Platform Keonwoo Kim International Conference on Information and Communication Technology Convergence (ICTC) 2019, pp.948-950 | 4 | |
Conference
|
2019 | RC PUF: A Low-Cost and an Easy-to-Design PUF for Resource-Constrained IoT Devices Sangjae Lee World Conference on Information Security Applications (WISA) 2019 (LNCS 11897), pp.275-285 | 1 | |
Conference
|
2019 | Implementation of a LoRaWAN Protocol Processing Module on an Embedded Device using Secure Element YongSung Jeon International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC) 2019, pp.1-3 | 5 | |
Journal
|
2019 | Standardization trend of drone ICT security technology 강유성 TTA Journal, v.182, pp.66-71 | ||
Journal
|
2019 | Two-Factor Fuzzy Commitment for Unmanned IoT Devices Security Dooho Choi IEEE Internet of Things Journal, v.6, no.1, pp.335-348 | 29 | |
Conference
|
2018 | Secure Key Extraction for IoT Devices Integrating IEEE 802.15.4g/k Transceiver Mi-Kyung Oh International Conference on Information and Communication Technology Convergence (ICTC) 2018, pp.833-835 | 3 | |
Journal
|
2018 | A Masked White-Box Cryptographic Implementation for Protecting Against Differential Computation Analysis Seungkwang Lee IEEE Transactions on Information Forensics and Security, v.13, no.10, pp.2602-2615 | 27 | |
Conference
|
2018 | Public Key-based Lightweight Mutual Authentication and Key Agreement Protocol for Drones Keonwoo Kim Asian/Austrailian Rotorcraft Forum (ARF) 2018, pp.1-5 | 1 | |
Conference
|
2018 | Abnormal Traffic Detection Mechanism for Protecting IIoT Environments Byoung-Koo Kim International Conference on Information and Communication Technology Convergence (ICTC) 2018, pp.943-945 | 8 | |
Conference
|
2018 | Implementing a Phase Detection Ring Oscillator PUF on FPGA Sangjae Lee International Conference on Information and Communication Technology Convergence (ICTC) 2018, pp.845-847 | 6 | |
Journal
|
2018 | International standardization trend of security requirements and test methods for physically unclonable function 강유성 정보보호학회지, v.28, no.4, pp.34-40 | ||
Conference
|
2018 | Design of a LPWAN Communication Device based on Hardware Security Module YongSung Jeon International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC) 2018, pp.1-3 | ||
Journal
|
2018 | Security requirements for drone-based services 강유성 TTA Journal, v.177, pp.74-79 | ||
Conference
|
2015 | Security Analysis on RFID Mutual Authentication Protocol You Sung Kang International Workshop on Information Security Applications (WISA) 2015 (LNCS 9503), v.9503, pp.65-74 | 4 | |
Journal
|
2014 | KeyQ: A Dynamic Key Establishment Method Using an RFID Anti-Collision Protocol You Sung KANG IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, v.E97.A, no.12, pp.2662-2666 | 0 | |
Journal
|
2013 | Comments on an Improved RFID Security Protocol for ISO/IEC WD 29167-6 You Sung Kang ETRI Journal, v.35, no.1, pp.170-172 | 8 | |
Conference
|
2012 | Security-Enhanced Key Establishment Schemes Using Network Coding You Sung Kang International Conference on Computing and Convergence Technology (ICCCT) 2012, pp.1056-1061 | ||
Conference
|
2012 | Analysis of Security Architecture of Electric Vehicle Charging Infrastructure 강유성 대한전자공학회 종합 학술 대회 (하계) 2012, pp.1869-1871 | ||
Journal
|
2012 | 수동형 UHF RFID 보안기술 국제 표준화 동향 강유성 정보보호학회지, v.22, no.1, pp.31-38 | ||
Journal
|
2010 | Standardization of Air Interface Protocol for RFID Security Services 강유성 한국정보기술학회지, v.8, no.1, pp.43-50 | ||
Journal
|
2010 | Design Implementation of Lightweight and High Speed Security Protocol Suitable for UHF Passive RFID Systems 강유성 정보보호학회논문지, v.20, no.4, pp.117-134 | ||
Journal
|
2009 | Efficient Key Detection Method in the Correlation Electromagnetic Analysis Using Peak Selection Algorithm You Sung Kang Journal of Communications and Networks, v.11, no.6, pp.556-563 | 0 | |
Conference
|
2009 | A New Fault Cryptanalysis on Montgomery Ladder Exponentiation Algorithm Jea Hoon Park International Conference on Interaction Sciences: Information Technology, Culture and Human (ICIS) 2009, pp.896-899 | 1 | |
Conference
|
2008 | RFID Stamp with RFID Passive Reader Jun Ki Kang International Conference on Convergence and Hybrid Information Technology (ICHIT) 2008, pp.802-805 | 0 | |
Journal
|
2008 | Standardization Trend and Strategy of Mobile RFID Security Technology 강유성 전자통신동향분석, v.23, no.2, pp.142-152 | ||
Journal
|
2008 | 모바일 RFID 보안 기술 박남제 TTA Journal, pp.108-114 | ||
Journal
|
2007 | Trend of RFID-Based Securities Protection Technology 강유성 전자통신동향분석, v.22, no.6, pp.150-157 | ||
Conference
|
2007 | Side-Channel Analysis for Wireless Sensor Mote Using Peak Value Selection 강유성 대한전자공학회 종합 학술 대회 (추계) 2007, pp.114-115 | ||
Journal
|
2007 | 화물 컨테이너 보호를 위한 RFID 보안장치 기술 동향 강유성 정보와 통신 : 한국통신학회지, v.24, no.11, pp.43-50 | ||
Journal
|
2006 | ISO/IEC JTC1 SC31 WG4 SG3 파리 회의 강유성 TTA Journal, v.알수없음, no.107, pp.130-134 | ||
Conference
|
2006 | Design of Lightweight Security Protocol for Electronic Seal Data Protection You Sung Kang International Workshop on Information Security Applications (WISA) 2006 (LNCS 4298), v.4298, pp.517-531 | ||
Conference
|
2006 | Privileged Tracking and Clone Detection for RFIDEnabled Banknotes You Sung Kang Applied Cryptography and Network Security, pp.1-13 | ||
Conference
|
2005 | Design of an Authentication Protocol for Secure Electronic Seals Seong Soo Park International Conference on Information Systems (ICIS) 2005, pp.1-5 | ||
Conference
|
2005 | Experimental Analysis of Pre-Authentication for WLAN Fast and Secure Handoff You Sung Kang International Technical Conference on Circuits Systems, Computers and Communications (ITC-CSCC) 2005, pp.465-466 | ||
Journal
|
2005 | 무선랜 보안 표준 IEEE 802.11i 강유성 TTA Journal, v.알수없음, no.99, pp.123-130 | ||
Journal
|
2005 | 능동 및 모바일 RFID 서비스 환경에서의 정보보호 기술 이병길 정보보호학회지, v.15, no.3, pp.40-47 | ||
Journal
|
2005 | Inter-AP security transition mechanism and its FSM in WLAN AP supporting fast roaming 정병호 한국통신학회논문지 B : 네트워크 및 융합 서비스, v.30, no.6C, pp.601-606 | ||
Journal
|
2005 | Technical Trend of Security in Ubiquitous Sensor Networks 김신효 전자통신동향분석, v.20, no.1, pp.93-99 | ||
Conference
|
2004 | Wireless LAN Fast Security Roaming System Using IAPP 오경희 한국정보처리학회 학술 발표 대회 (추계) 2004, pp.1263-1266 | ||
Conference
|
2004 | Pre-Authentication of Wireless LAN over IAPP 오경희 한국정보과학회 학술 발표 (가을) 2004, pp.295-297 | ||
Conference
|
2004 | Analysis on Security Strength of WLAN AP Configurations You Sung Kang International Technical Conference on Circuits Systems, Computers and Communications (ITC-CSCC) 2004, pp.101-104 | ||
Journal
|
2004 | RFID/USN 환경에서의 정보보호 소고 정병호 한국통신학회지, v.21, no.6, pp.102-115 | ||
Conference
|
2004 | Fast and Safe Roaming in Wireless LAN By Forwarding Data Frames between APs 오경희 한국정보처리학회 학술 발표 대회 (춘계) 2004, pp.1185-1188 | ||
Journal
|
2004 | A Study on Dynamic Key Management in Mixed-Mode Wireless LAN 강유성 한국통신학회논문지 B : 네트워크 및 융합 서비스, v.29, no.4C, pp.581-593 | ||
Conference
|
2004 | Analysis and Countermeasure on Vulnerability of WPA Key Exchange Mechanism You Sung Kang International Conference on Information Networking (ICOIN) 2004 (LNCS 3090), v.3090, pp.915-924 | 1 | |
Journal
|
2003 | Design of Accounting and Security Sessions for IEEE 802.11 Network 양대헌 정보보호학회논문지, v.13, no.6, pp.85-96 | ||
Conference
|
2003 | WLAN Stations Classification and AP Configurations According to Security Strength 강유성 한국통신학회 종합 학술 발표회 (추계) 2003, pp.1009-1012 | ||
Conference
|
2003 | Performance Evaluation between Software Implementation and Hardware Implementation of WPA TKIP Algorithm in Access Points 오경희 한국정보처리학회 학술 발표 대회 (추계) 2003, pp.1941-1944 | ||
Conference
|
2003 | Software Implementation of WPA Wireless LAN Access Point 오경희 한국정보과학회 학술 발표 (가을) 2003, pp.667-669 | ||
Journal
|
2003 | 무선 LAN 보안 취약점과 단계적 해결 방안 강유성 한국통신학회지, v.20, no.7, pp.117-128 | ||
Conference
|
2003 | Secure Wireless LAN with IEEE 802.1x Authentication and Dynamic WEP Key 오경희 한국정보과학회 학술 발표 (봄) 2003, pp.368-370 | ||
Journal
|
2002 | 무선 LAN 정보보호 기술 표준화 동향 김신효 정보보호학회지, v.12, no.4, pp.56-66 |