Type | Year | Title | Cited | Download |
---|---|---|---|---|
Conference
|
2023 | Security Technology for C-Band Modem Communication in Unmanned Vehicle Environment Juhan Kim International Conference on Information and Communication Technology Convergence (ICTC) 2023, pp.1095-1097 | 0 | |
Conference
|
2022 | UAV arming Authorization using DIM and Flight Authorization Code Juhan Kim International Conference on Information and Communication Technology Convergence (ICTC) 2022, pp.2065-2067 | 1 | |
Journal
|
2019 | Standardization trend of drone ICT security technology 강유성 TTA Journal, v.182, pp.66-71 | ||
Journal
|
2018 | Security requirements for drone-based services 강유성 TTA Journal, v.177, pp.74-79 | ||
Conference
|
2015 | The Study of Document Filter for Smart Device SuHyung Jo Asia-Pacific Network Operations and Management Symposium (APNOMS) 2015, pp.515-518 | 1 | |
Conference
|
2013 | Electromagnetic Wave Side Channel Analysis Using SCARF 김주한 한국정보과학회 학술 발표회 (추계) 2013, pp.814-816 | ||
Conference
|
2013 | Design of EM Waves Collection and Control Module for Side Channel Analysis 김주한 한국 컴퓨터 종합 학술 대회 2013, pp.704-705 | ||
Journal
|
2013 | Technical Trends of Side Channel Analysis System 김주한 전자통신동향분석, v.28, no.3, pp.47-56 | ||
Conference
|
2013 | Parallelized Processing for Real Time Side Channel Analysis 오경희 통신 정보 합동 학술 대회 (JCCI) 2013, pp.1-2 | ||
Journal
|
2013 | User-centric Side Channel Analysis System 김주한 정보과학회논문지 : 컴퓨팅의 실제 및 레터, v.19, no.1, pp.56-60 | ||
Conference
|
2012 | SCARF: profile-based Side Channel Analysis Resistant Framework Juhan Kim International Conference on Security and Management (SAM) 2012, pp.1-6 | ||
Conference
|
2012 | Side Channel Analysis System - SCARF 김주한 한국 컴퓨터 종합 학술 대회 2012, pp.C266-C268 | ||
Conference
|
2012 | Analysis of Security Architecture of Electric Vehicle Charging Infrastructure 강유성 대한전자공학회 종합 학술 대회 (하계) 2012, pp.1869-1871 | ||
Conference
|
2012 | Fast Alignment Method for Side Channel Analysis System Juhan Kim International Conference on Electronics, Information, and Communication (ICEIC) 2012, pp.1-2 | ||
Conference
|
2010 | Wireless Sensor Network Platform of a Practical Implementation 오경희 한국통신학회 종합 학술 발표회 (하계) 2010, pp.1161-1162 | ||
Conference
|
2009 | Secure Gateway Systems for a Wireless Sensor Network Ju Han Kim International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC) 2009, pp.1165-1168 | ||
Conference
|
2009 | Secure Gateway System for USN 김주한 통신 정보 합동 학술 대회 (JCCI) 2009, pp.1-4 | ||
Conference
|
2009 | Sensor Network Management using Mobile Management Tool 이신경 한국정보처리학회 학술 대회 (춘계) 2009, pp.1457-1458 | ||
Conference
|
2008 | Implementation of Secure Wireless Sensor Network Based on Public Key Cryptography 오경희 한국정보처리학회 학술 발표 대회 (추계) 2008, pp.1493-1495 | ||
Conference
|
2008 | esGate: Secure Embedded Gateway System for a Wireless Sensor Network Ju Han Kim International Symposium on Consumer Electronics (ISCE) 2008, pp.1-4 | 6 | |
Conference
|
2007 | E-Pedigree Discovery System and its Verification Service for Consumer's mobile RFID Device Ju Han Kim International Symposium on Consumer Electronics (ISCE) 2007, pp.1-4 | 2 | |
Conference
|
2006 | Product Authentication Service of Consumer's mobile RFID Device Ju Han Kim International Symposium on Consumer Electronics (ISCE) 2006, pp.660-665 | 0 | |
Conference
|
2006 | Security Vulnerability and Considerations in Mobile RFID Environment Ju Han Kim International Conference on Advanced Communication Technology (ICACT) 2006, pp.801-804 | 10 | |
Conference
|
2006 | A Wireless Service for Product Authentication in Mobile RFID Environment Ju Han Kim International Symposium on Wireless Pervasive Computing (ISWPC) 2006, pp.1-5 | ||
Conference
|
2005 | Low Power Circuit Architecture of AES Crypto Module for Wireless Sensor Network MooSeop Kim ICIT 2005, pp.1213-1217 | ||
Conference
|
2005 | Anti-Counterfeiting Solution employing Mobile RFID environment Juhan Kim ICIT 2005, pp.1-5 | ||
Conference
|
2005 | Design of Integration Security System using XML Security Juhan Kim ICIT 2005, pp.1-5 | ||
Conference
|
2005 | Document security model based on RFID technology Juhan Kim International Technical Conference on Circuits Systems, Computers and Communications (ITC-CSCC) 2005, pp.659-660 | ||
Journal
|
2005 | Standardization and Market Trends of Web Services Security Technologies 김주한 전자통신동향분석, v.20, no.1, pp.43-53 | ||
Conference
|
2005 | Design of Unified Key Management Model using XKMS Ju Han Kim International Conference on Advanced Communication Technology (ICACT) 2005, pp.77-80 | ||
Conference
|
2003 | A Study on Secure and Efficient in Electronic Auction System 박장수 한국멀티미디어학회 학술 발표 (추계) 2003, pp.132-135 | ||
Journal
|
2003 | XML 기반 접근 제어 기술 동향 김주한 정보보호학회지, v.13, no.4, pp.68-73 | ||
Journal
|
2002 | Development of the XML Security Platform for E-Commerce 문기영 전자통신동향분석, v.17, no.6, pp.29-38 | ||
Journal
|
2002 | Implementation of Key Recovery Model based on XML for B2B 김주한 정보보호학회논문지, v.12, no.5, pp.53-61 | ||
Journal
|
2002 | A Identity Escrow mechanism supporting key recovery 이용호 정보보호학회논문지, v.12, no.3, pp.119-128 | ||
Conference
|
2002 | A Study on the WAKE Key Recovery Protocol 이용호 한국멀티미디어학회 학술 발표 (춘계) 2002, pp.912-915 | ||
Journal
|
2001 | Implementing the ESES for Secure Electronic Commerce Platform 이주영 정보처리학회논문지 C, v.8C, no.5, pp.551-556 | ||
Journal
|
2001 | XML 암호화 표준 동향 김주한 정보보호학회지, v.11, no.4, pp.29-34 | ||
Conference
|
2001 | ESES/j-Crypto and its application Joo-Young Lee International Symposium on Industrial Electronics (ISIE) 2001, pp.1373-1377 |