Type | Year | Title | Cited | Download |
---|---|---|---|---|
Conference
|
2024 | Security Analysis and Countermeasure of Post Quantum based Authentication Protocol in IoT Environment 이준영 한국통신학회 종합 학술 발표회 (하계) 2024, pp.1972-1973 | ||
Conference
|
2023 | Cryptanalysis and Countermeasures of the Recent Authentication and Key Agreement Scheme for Internet of Drones Sungjin Yu International Conference on Information and Communication Technology Convergence (ICTC) 2023, pp.1419-1422 | 2 | |
Conference
|
2023 | Client-centric on-demand remote profile provisioning technique for M2M IoT Devices Boheung Chung International Conference on Information and Communication Technology Convergence (ICTC) 2023, pp.1-3 | 0 | |
Conference
|
2018 | 딥러닝을 활용한 부채널 이차 차분 분석 성능 향상에 관한 연구 김태성 한국정보보호학회 학술 대회 (동계) 2018, pp.376-379 | ||
Journal
|
2018 | A Masked White-Box Cryptographic Implementation for Protecting Against Differential Computation Analysis Seungkwang Lee IEEE Transactions on Information Forensics and Security, v.13, no.10, pp.2602-2615 | 27 | |
Conference
|
2018 | A Study of Template Clustering in the Side Channel Template Analysis Taesung Kim International Conference on Information and Communication Technology Convergence (ICTC) 2018, pp.1295-1297 | 1 | |
Conference
|
2018 | False Secret Keys to Disturb Power Analysis Seungkwang Lee International Conference on Ubiquitous and Future Networks (ICUFN) 2018, pp.296-298 | 0 | |
Journal
|
2016 | Protecting Secret Keys in Networked Devices with Table Encoding Against Power Analysis Attacks Taesung Kim Journal of High Speed Networks, v.22, no.4, pp.293-307 | 3 | |
Conference
|
2015 | Improved Differential Cluster Analysis with Power Model Taesung KIM International Conference on Computers, Communications and Systems (ICCCS) 2015, pp.1-3 | ||
Conference
|
2014 | Function Masking: A New Countermeasure Against Side Channel Attack Taesung Kim International Workshop on Information Security Applications 2014 (LNCS 8909), v.8909, pp.331-342 | 0 | |
Journal
|
2013 | Technical Trends of Side Channel Analysis System 김주한 전자통신동향분석, v.28, no.3, pp.47-56 | ||
Conference
|
2013 | Parallelized Processing for Real Time Side Channel Analysis 오경희 통신 정보 합동 학술 대회 (JCCI) 2013, pp.1-2 | ||
Journal
|
2013 | User-centric Side Channel Analysis System 김주한 정보과학회논문지 : 컴퓨팅의 실제 및 레터, v.19, no.1, pp.56-60 | ||
Conference
|
2012 | Side Channel Analysis System - SCARF 김주한 한국 컴퓨터 종합 학술 대회 2012, pp.C266-C268 | ||
Conference
|
2008 | Implementation of Publickey-based Key Distribution in Wireless Sensor Network 오경희 한국방송공학회 학술 대회 (동계) 2008, pp.95-98 | ||
Conference
|
2007 | Method of Location Privacy and Non-repudation of user in Mobile RFID 김태성 대한전자공학회 종합 학술 대회 (추계) 2007, pp.197-198 | ||
Conference
|
2006 | Authorization Policy for Middleware in RFID System Tae Sung Kim International Symposium on Consumer Electronics (ISCE) 2006, pp.678-681 | 3 | |
Conference
|
2006 | Low Power Implementation of SHA-1 Algorithm for RFID System Yong Je Choi International Symposium on Consumer Electronics (ISCE) 2006, pp.682-686 | 5 | |
Conference
|
2006 | Access Control for Middleware in RFID Systems Tae Sung Kim International Conference on Advanced Communication Technology (ICACT) 2006, pp.1020-1022 | 9 | |
Conference
|
2006 | Privacy Protection for Secure Mobile RFID Service Doo Ho Choi International Symposium on Wireless Pervasive Computing (ISWPC) 2006, pp.1-4 | 3 | |
Conference
|
2005 | Security Enhanced RFID Middleware System Ji Eun Song International Conference on Computer and Information Science (ICIS) 2005, pp.1-4 | ||
Conference
|
2005 | The Design of Privacy Aware Identity Information Sharing Protocol Taesung Kim International Technical Conference on Circuits Systems, Computers and Communications (ITC-CSCC) 2005, pp.679-680 | ||
Conference
|
2004 | Authentication and Authorization Service for Network Security System 김태성 한국정보처리학회 학술 발표 대회 (춘계) 2004, pp.1137-1140 | ||
Journal
|
2004 | Self-Reputation System in P2P Networks 조남수 정보보호학회논문지, v.14, no.2, pp.35-47 | ||
Journal
|
2003 | Design of Privilege Delegation Mechanism using Proxy Certificate 진승헌 정보처리학회논문지 C, v.10C, no.6, pp.739-746 | ||
Conference
|
2003 | Certificate-based Digital Library Authentication and Authorization Architecture 원형석 한국정보과학회 학술 발표 (봄) 2003, pp.494-497 | ||
Conference
|
2003 | Research for Implementation of Licensed Web SSO 최대선 한국정보과학회 학술 발표 (봄) 2003, pp.452-454 | ||
Journal
|
2003 | ID-based Proxy Signature Scheme from the Bilinear Map 이정연 정보보호학회논문지, v.13, no.2, pp.3-11 | ||
Conference
|
2002 | A study on a digital library authentication and authorization architecture 원형석 한국정보처리학회 학술 발표 대회 (추계) 2002, pp.1103-1106 | ||
Conference
|
2002 | The Design of Integrated Cryptographic API 김태성 한국정보과학회 학술 발표 (가을) 2002, pp.505-507 | ||
Conference
|
2002 | Building Certification Paths in Certificate Validation Server 노종혁 한국정보과학회 학술 발표 (가을) 2002, pp.604-606 | ||
Conference
|
2002 | Proxy Signature Technology using Proxy Certificate 조상래 한국정보과학회 학술 발표 (가을) 2002, pp.676-678 | ||
Conference
|
2001 | The Mechanism of Certification Path Validation 김태성 한국정보처리학회 학술 발표 대회 (추계) 2001, pp.931-934 | ||
Conference
|
2001 | Collaborative VA Model 노종혁 한국정보과학회 학술 발표 (가을) 2001, pp.751-753 |