
| Type | Year | Title | Cited | Download |
|---|---|---|---|---|
|
Conference
|
2025 | Quorum-based Cooperative Authentication Method for Multi-Core SoC 한진희 전자 정보 통신 학술 대회 (CEIC) 2025, pp.1-3 | ||
|
Journal
|
2025 | Malware detection using pre-trained transformer encoder with byte sequences Eun-Jin Kim PLoS ONE, v.20, no.10, pp.1-16 | 0 | |
|
Conference
|
2025 | Implementation and Evaluation of TPM-Enabled Anti-Tampering Mechanism for Military UAVs 이재호 한국국방기술학회 학술 대회 (추계) 2025, pp.1-3 | ||
|
Journal
|
2025 | White-Box Key Scheduling With Encoded Round Keys for Secure Lookup Table Generation Kangmin Kim Electronics Letters, v.61, no.1, pp.1-6 | 0 | |
|
Journal
|
2024 | An Approach to Prevent the Spread of IoT Security Threats through Cosine Similarity Analysis among IoT Devices 손선경 정보보호학회논문지, v.34, no.6, pp.1471-1483 | ||
|
Conference
|
2024 | A Study on Security Enhancement for FIDO Attestation 김영세 전자 정보 통신 학술 대회 (CEIC) 2024, pp.244-247 | ||
|
Conference
|
2024 | Introduction to System Integrity Verification Technology 김도형 한국인터넷정보학회 학술 발표 대회 (추계) 2024, pp.307-308 | ||
|
Journal
|
2024 | TPM-Based Anti-Tampering Solutions to Protect Weapon Systems Technologies 이재호 전자통신동향분석, v.39, no.5, pp.49-60 | ||
|
Journal
|
2024 | Exploring Effective Zero Trust Architecture for Defense Cybersecurity: A Study Youngho Kim KSII Transactions on Internet and Information Systems, v.18, no.9, pp.2665-2691 | 7 | |
|
Journal
|
2024 | Balanced Encoding of Near-Zero Correlation for an AES Implementation Seungkwang Lee IEEE Transactions on Information Forensics and Security, v.19, pp.6589-6603 | 1 | |
|
Journal
|
2024 | A Comprehensive Survey of TPM for Defense Systems Cheol Ryu KSII Transactions on Internet and Information Systems, v.18, no.7, pp.1953-1967 | 1 | |
|
Journal
|
2023 | Private 5G Network Trends and Security Technologies 박종근 정보와 통신: 한국통신학회지, v.40, no.9, pp.21-29 | ||
|
Journal
|
2022 | Software Defined Perimeter(SDP) Authentication Mechanism for Zero Trust and Implementation of ECC Cryptoraphy 이윤경 정보보호학회논문지, v.32, no.6, pp.1-12 | ||
|
Conference
|
2022 | An IoT Device-trusted Remote Attestation Framework Kyeong Tae Kim International Conference on Advanced Communications Technology (ICACT) 2022, pp.218-223 | 8 | |
|
Conference
|
2021 | IoT Standard Platform Architecture that Provides Defense against DDoS Attacks Yun-kyung Lee International Conference on Consumer Electronics (ICCE) 2021 : Asia, pp.394-396 | 1 | |
|
Journal
|
2021 | A Malware Distribution Simulator for the Verification of Network Threat Prevention Tools Song-Yi Hwang Sensors, v.21, no.21, pp.1-23 | 10 | |
|
Journal
|
2021 | Bootstrapping Security Technology in IoT 김영호 주간기술동향, v.2009, pp.14-28 | ||
|
Journal
|
2021 | Implementation of Smart Segmentation Framework for Preventing Security Threats Spreading in IoT Networks 임재덕 한국통신학회논문지, v.46, no.8, pp.1321-1331 | 0 | |
|
Journal
|
2021 | A Study on the High-Speed Malware Propagation Method for Verification of Threat Propagation Prevent Technology in IoT infrastructure 황송이 정보보호학회논문지, v.31, no.4, pp.617-635 | ||
|
Conference
|
2020 | Dynamic Security Policy Model for Mitigating Threat Spreading in IoT 손선경 전자 정보 통신 학술 대회 (CEIC) 2020, pp.1-3 | ||
|
Conference
|
2020 | Proposal of Smart Segmentation Framework for preventing threats from spreading in IoT Jaedeok Lim International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.1757-1759 | 2 | |
|
Conference
|
2020 | Hierarchical Access Control for SDP-IoT Yun-kyung Lee International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.1742-1744 | 3 | |
|
Journal
|
2020 | TwinPeaks: An approach for certificateless public key distribution for the internet and internet of things Eunsang Cho Computer Networks, v.175, pp.1-15 | 8 | |
|
Conference
|
2019 | A Study on the Automated Attack Tool of IoT Bot for Verification about Security Technique of IoT device 황송이 한국정보보호학회 학술 대회 (동계) 2019, pp.81-84 | ||
|
Conference
|
2019 | A Study on the Technique of DDoS Attack Based on Mirai IoT Botnet 황송이 한국통신학회 종합 학술 발표회 (추계) 2019, pp.332-333 | ||
|
Journal
|
2019 | Security trend and issue of connected medical device 권혁찬 주간기술동향, v.1911, pp.14-26 | ||
|
Conference
|
2019 | Improving IoT network security using SDP 이윤경 통신 정보 합동 학술 대회 (JCCI) 2019, pp.1-2 | ||
|
Conference
|
2019 | Implementation of Remote Attestation and Management Framework for TPM-based IoT devices 임재덕 통신 정보 합동 학술 대회 (JCCI) 2019, pp.1-2 | ||
|
Journal
|
2018 | Secure Mobile Device Structure for Trust IoT Yun-kyung Lee Journal of Supercomputing, v.74, no.12, pp.6646-6664 | 7 | |
|
Journal
|
2018 | A study of end-to-end message security protocol based on lightweight ciphers for smart IoT devices 김희정 정보보호학회논문지, v.28, no.6, pp.1309-1317 | ||
|
Conference
|
2018 | Implementation of TLS and DTLS on Zephyr OS for IoT Devices Yun-kyung Lee International Conference on Information and Communication Technology Convergence (ICTC) 2018, pp.1292-1294 | 15 | |
|
Conference
|
2018 | An Energy Efficient Real-Time MAC Protocol Kyeong Tae Kim International Conference on Information and Communication Technology Convergence (ICTC) 2018, pp.1180-1184 | 1 | |
|
Conference
|
2018 | Design and Implementation of Lightweight Mutual Authentication Method in IoT 윤승용 통신 정보 합동 학술 대회 (JCCI) 2018, pp.378-379 | ||
|
Conference
|
2018 | A Method for Updating Secret Keys between IoT Devices using Dynamic Session Keys 한진희 통신 정보 합동 학술 대회 (JCCI) 2018, pp.301-302 | ||
|
Conference
|
2018 | A Performance Analysis of Lightweight Cryptography in IoT Devices 김영세 통신 정보 합동 학술 대회 (JCCI) 2018, pp.327-328 | ||
|
Conference
|
2018 | Trusted Mobile Zone Solution Based on Virtualization Technology GeonLyang Kim International Conference on Universal Accessibility in the Internet of Things and Smart Environments (SMART ACCESSIBILITY) 2018, pp.10-11 | ||
|
Conference
|
2018 | RIPPLE: Adaptive Fine-grained Access Control in Multi-hop LLNs Youngho Kim International Conference on Information Networking (ICOIN) 2018, pp.863-868 | 3 | |
|
Conference
|
2017 | Design and Implementation of Secure OTP Generation for IoT Devices Young-Sae Kim International Conference on Future Generation Communication and Networking (FGCN) 2017 (ASTL 146), pp.75-80 | ||
|
Conference
|
2017 | Remote Security Management Server for IoT Devices Seungyong Yoon International Conference on Information and Communication Technology Convergence (ICTC) 2017, pp.1163-1165 | 21 | |
|
Conference
|
2017 | Secure Voice Communication Service Based on Security Platform for Mobile Devices GeonLyang Kim International Conference on Information and Communication Technology Convergence (ICTC) 2017, pp.1191-1193 | 1 | |
|
Conference
|
2017 | A Lightweight Authentication Mechanism between IoT Devices Jin-Hee Han International Conference on Information and Communication Technology Convergence (ICTC) 2017, pp.1154-1156 | 20 | |
|
Conference
|
2017 | Implementation of An Access Control Technology for Internet of Things Environments Daewon Kim International Conference on Communications, Computation, Networks and Technologies (INNOV) 2017, pp.17-19 | ||
|
Conference
|
2017 | Mutual Authentication Scheme for Lightweight IoT Devices Seungyong Yoon International Conference on Emerging Security Information, Systems and Technologies (SECURWARE) 2017 | ||
|
Journal
|
2017 | Smart meter security through AMI security threat case analysis 이윤경 정보와 통신 : 한국통신학회지, v.34, no.10, pp.24-30 | ||
|
Conference
|
2017 | Towards Protected Firmware Verification in Low-power Devices Yong-Hyuk Moon International Conference on Emerging Security Information, Systems and Technologies (SECURWARE) 2017, pp.177-179 | ||
|
Conference
|
2017 | Network access control technology for AMI security 이윤경 한국통신학회 종합 학술 발표회 (하계) 2017, pp.1184-1185 | ||
|
Conference
|
2017 | A Lightweight Authentication Mechanism between IoT Devices 한진희 통신 정보 합동 학술 대회 (JCCI) 2017, pp.1-2 | ||
|
Journal
|
2017 | SACA: Self-Aware Communication Architecture for IoT Using Mobile Fog Servers Vishal Sharma Mobile Information Systems, v.2017, pp.1-17 | 20 | |
|
Conference
|
2017 | Mobile Security Solution for Sensitive Data Leakage Prevention GeonLyang Kim International Conference on Communications and Broadband Networking (ICCBN) 2017, pp.59-64 | 3 | |
|
Conference
|
2017 | Security Considerations Based on Classification of IoT Device Capabilities Seungyong Yoon International Conferences on Advanced Service Computing (SERVICE COMPUTATION) 2017, pp.13-15 |