Type | Year | Title | Cited | Download |
---|---|---|---|---|
Conference
|
2024 | A Study on the Security Technology for the Low Earth Orbit Satellite 한진희 전자 정보 통신 학술 대회 (CEIC) 2024, pp.1-3 | ||
Conference
|
2024 | Introduction to System Integrity Verification Technology 김도형 한국인터넷정보학회 학술 발표 대회 (추계) 2024, pp.307-308 | ||
Journal
|
2024 | TPM-Based Anti-Tampering Solutions to Protect Weapon Systems Technologies 이재훈 전자통신동향분석, v.39, no.5, pp.49-60 | ||
Journal
|
2024 | A Comprehensive Survey of TPM for Defense Systems Cheol Ryu KSII Transactions on Internet and Information Systems, v.18, no.7, pp.1953-1967 | 0 | |
Conference
|
2022 | A Study on the Method to improve Image Restoration Performance using Histogram Data 한진희 전자 정보 통신 학술 대회 (CEIC) 2022, pp.55-57 | ||
Conference
|
2021 | Courier Invoice Privacy and Door Lock Password Protection Methods 한진희 대한임베디드공학회 학술 대회 (추계) 2021, pp.296-299 | ||
Conference
|
2021 | Design of an Effective Method for Image Protection in Offline Environments 김영세 대한임베디드공학회 학술 대회 (추계) 2021, pp.250-253 | ||
Conference
|
2020 | De-identification and Restoration Methods for Protecting Privacy in Off-line Documents Jin-Hee Han International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.1543-1545 | 0 | |
Conference
|
2020 | Design of an efficient image protection method based on QR code Young-Sae Kim International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.1448-1450 | 0 | |
Conference
|
2019 | Off-line document protection methods to prevent personal information disclosure 한진희 한국정보보호학회 충청 지부 학술 대회 2019, pp.1-3 | ||
Conference
|
2018 | A Secret Key Updating Method between Devices for Secure Smart Services Jin-Hee Han International Conference on Information and Communication Technology Convergence (ICTC) 2018, pp.946-948 | 2 | |
Conference
|
2018 | A Method for Updating Secret Keys between IoT Devices using Dynamic Session Keys 한진희 통신 정보 합동 학술 대회 (JCCI) 2018, pp.301-302 | ||
Conference
|
2017 | A Lightweight Authentication Mechanism between IoT Devices Jin-Hee Han International Conference on Information and Communication Technology Convergence (ICTC) 2017, pp.1154-1156 | 19 | |
Conference
|
2017 | A Lightweight Authentication Mechanism between IoT Devices 한진희 통신 정보 합동 학술 대회 (JCCI) 2017, pp.1-2 | ||
Conference
|
2015 | Security Considerations for Secure and Trustworthy Smart Home System in the IoT Environment Jin-Hee Han International Conference on Information and Communication Technology Convergence (ICTC) 2015, pp.1119-1121 | ||
Conference
|
2015 | A Study on the Remote Authentication Method between IoT Devices using a Trusted Security Module 한진희 한국정보처리학회 학술 발표 대회 (추계) 2015, pp.587-590 | ||
Journal
|
2015 | Implementation of a MTM-based secure OTP Generator for IoT Devices 김영세 대한임베디드공학회논문지, v.10, no.4, pp.199-206 | ||
Conference
|
2014 | Application Authentication and Secure Key Management Scheme using MTM Jin-Hee Han International Conference on Computer Science and its Applications (CSA) 2014 (LNEE 330), pp.941-946 | 0 | |
Conference
|
2014 | A Method for Safe and Efficient Integrity Verification of Smartphones 한진희 한국정보처리학회 학술 발표 대회 (추계) 2014, pp.423-426 | ||
Conference
|
2014 | Design and Requirements for Video Encryption in Intelligent Surveillance System YoungSae Kim International Conference on Information and Communication Technology Convergence (ICTC) 2014, pp.763-764 | 0 | |
Conference
|
2013 | A Method for Application Authentication and Secure Key Management Based on MTM (Mobile Trusted Module) 한진희 한국통신학회 종합 학술 발표회 (추계) 2013, pp.778-779 | ||
Journal
|
2012 | Nano-SIM 기술 및 표준화 이슈 김영세 주간기술동향, v.1554, pp.1-14 | ||
Conference
|
2010 | Partial Encryption and Watermarking of H.264 Video in Codestream Domain Jin-Hee Han International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC) 2010, pp.1-3 | ||
Conference
|
2010 | Partial Encryption and Watermarking of H.264 Video in Codestream Domain 한진희 한국통신학회 종합 학술 발표회 (하계) 2010, pp.1147-1148 | ||
Journal
|
2010 | Smartphone Threats and Security Technology 강동호 전자통신동향분석, v.25, no.3, pp.72-80 | ||
Conference
|
2008 | Implementation of a TCG-based Trusted Computing in Mobile Device Su Gil Choi International Conference on Trust, Privacy and Security in Digital Business (TrustBus) 2008 (LNCS 5185), v.5185, pp.18-27 | 6 | |
Journal
|
2008 | A Secure Maintenance Scheme of Secret Data on Trusted Mobile Platform Environment 강동완 정보보호학회논문지, v.18, no.4, pp.79-91 | ||
Journal
|
2008 | Trusted Computing Technology and TCG Standard Trend 박정숙 전자통신동향분석, v.23, no.4, pp.48-60 | ||
Conference
|
2007 | A Study on Update of Sealed Data for Trusted Mobile Platform 김동완 한국멀티미디어학회 학술 발표 대회 (추계) 2007, pp.1-4 | ||
Journal
|
2007 | Key Management Protocol for Roaming in Wireless Interworking System Tae Nam Cho International Journal of Computer Science and Network Security, v.7, no.8, pp.59-68 | ||
Conference
|
2007 | Improvement on TCG Attestation and Its Implication for DRM Su Gil Choi International Conference on Computational Science and its Applications (ICCSA) 2007 (LNCS 4705), v.4705, pp.912-925 | ||
Conference
|
2007 | A Unified Authentication Method for Integrated WCDMA/WLAN/WiBro Networks Jin-Hee Han International Technical Conference on Circuits Systems, Computers and Communications (ITC-CSCC) 2007, pp.380-381 | ||
Journal
|
2007 | Key Management for Wireless Interworking 조태남 정보처리학회논문지 C, v.14, no.1, pp.7-16 | ||
Journal
|
2007 | Key Management for Roaming in Wireless Networks 조태남 정보처리학회논문지 C, v.14, no.1, pp.7-16 | ||
Conference
|
2006 | Implementation of the EAP-AKA Fast Re-Authentication 이정우 차세대 통신 소프트웨어 학술 대회 (NCS) 2006, pp.1-4 | ||
Conference
|
2006 | Implementation of Authentication Mechanism for CDMA based on R-UIM 한진희 차세대 통신 소프트웨어 학술 대회 (NCS) 2005, pp.1-5 | ||
Journal
|
2006 | 2.3GHz 휴대 인터넷(와이브로™) 상호 인증 메커니즘 (TTAS.KO-06.0110) 한진희 TTA Journal, pp.92-94 | ||
Journal
|
2006 | A Study on EAP-AKA Authentication Architecture for WiBro Wireless Network 임선희 한국통신학회논문지, v.31, no.4C, pp.441-450 | ||
Conference
|
2005 | WiBro 환경에서 단말의 EAP-AKA 메시지 처리 방법 김학두 차세대 통신 소프트웨어 학술 대회 (NCS) 2005, pp.136-139 | ||
Conference
|
2005 | Wireless Inter-Network Prepaid-System using USIM Card 신진아 차세대 통신 소프트웨어 학술 대회 (NCS) 2005, pp.497-500 | ||
Conference
|
2005 | Study on Authentication for Interworking Security between WLAN and WiBro 최효민 한국정보보호학회 학술 대회 (동계) 2005, pp.1-4 | ||
Conference
|
2005 | 무선 네트워크 연동에 따른 보안 취약성 및 그 대응 방안 김종필 차세대 통신 소프트웨어 학술 대회 (NCS) 2005, pp.13-16 | ||
Conference
|
2005 | Mutual Authentication Mechanism for 2.3GHz band Portable Internet Service 한진희 차세대 통신 소프트웨어 학술 대회 (NCS) 2005, pp.131-135 | ||
Conference
|
2005 | An Analysis of Key Management Protocols in WiBro 박은진 한국정보보호학회 학술 대회 (동계) 2005, pp.1-4 | ||
Journal
|
2005 | Interworking Security for Public WLAN, WiBro and WCDMA : Mobile and wireless systems 전성익 정보통신 : 한국통신학회지, v.22, no.8, pp.63-80 | ||
Journal
|
2005 | Trends of Interworking Security Technologies for the Wireless Networks 김영세 전자통신동향분석, v.20, no.1, pp.100-111 | ||
Conference
|
2004 | Implementation methods for EAP-AKA Applet Based on USIM Card 한진희 차세대 통신소프트웨어 학술 대회 (NCS) 2004, pp.549-553 | ||
Journal
|
2003 | Implementation of authentication mechanism for 3GPP, 3GPP2 on java card 조승환 정보보호학회논문지, v.13, no.6, pp.67-75 | ||
Conference
|
2002 | Java Card Integrated Development Environment for implementing Java Card Crypto API 한진희 한국통신학회 종합 학술 발표회 (추계) 2002, pp.288-291 | ||
Conference
|
2002 | An Integrated Development Environment for Java Card 한진희 한국정보과학회 학술 발표 (가을) 2002, pp.484-486 |