Browse by Subject Security

Showing results 1 to 60 of 87

1
3rdParTEE: Securing Third-Party IoT Services Using the Trusted Execution Environment

Jang, Jinsoo; Kang, Brent Byunghoon, IEEE INTERNET OF THINGS JOURNAL, v.9, no.17, pp.15814 - 15826, 2022-09

2
A First Step Toward Network Security Virtualization: From Concept To Prototype

Shin, Seungwon; Wang, Haopei; Gu, Guofei, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, v.10, no.10, pp.2236 - 2249, 2015-10

3
A Framework for Policy Inconsistency Detection in Software-Defined Networks

Lee, Seungsoo; Woo, Seungwon; Kim, Jinwoo; Nam, Jaehyun; Yegneswaran, Vinod; Porras, Phillip; Shin, Seungwon, IEEE-ACM TRANSACTIONS ON NETWORKING, v.30, no.3, pp.1410 - 1423, 2022-06

4
A Noise-Shaped Signaling Method for Vehicle-to-Everything Security

Park, Dongryul; Ahn, Jangyong; Choe, Chungjae; Woo, Seongho; Ahn, Seungyoung; Choi, Junsung, IEEE ACCESS, v.9, pp.75385 - 75397, 2021-05

5
A secure cloud environment with trusted hardware = 신뢰성 하드웨어를 이용한 안전한 클라우드 환경 구축에 관한 연구link

Seol, Jinho; 설진호; et al, 한국과학기술원, 2015

6
A study on provable security of public-key encryption schemes and key agreement protocols = 공개키 암호화 기법과 키 합의 프로토콜의 증명 가능 안정성에 관한 연구link

Baek, Joon-sang; 백준상; et al, 한국정보통신대학원대학교, 2000

7
(A) framework for a security-enhanced SDN controller = 안전성이 향상된 소프트웨어 정의 네트워킹 컨트롤러를 위한 프레임워크link

Jo, Hyeonseong; Shin, Seungwon; et al, 한국과학기술원, 2017

8
(A) study on location-based authentiated key agreement scheme in wireless sensor and actor networks = 무선 센서 및 액터 네트워크에서 위치 기반의 인증된 키합의 기법에 관한 연구link

Choi, Im-Sung; 최임성; et al, 한국과학기술원, 2010

9
(A) study on risk analysis and security mechanisms for the internet security = 인터네트 보안을 위한 위험 분석과 보안 메카니즘에 관한 연구link

Jung, Bum-Suk; 정범석; et al, 한국과학기술원, 1996

10
Ambusher: Exploring the Security of Distributed SDN Controllers Through Protocol State Fuzzing

Kim, Jinwoo; Seo, Minjae; Marin, Eduard; Lee, Seungsoo; Nam, Jaehyun; Shin, Seungwon, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, v.19, pp.6264 - 6279, 2024

11
An Opportunistic Power Control Scheme for Mitigating User Location Tracking Attacks in Cellular Networks

Bang, Inkyu; Kim, Taehoon; Jang, Han Seung; Sung, Dan Keun, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, v.17, pp.1131 - 1144, 2022-03

12
(An) internet based electronic check system using intelligent agents : safecheck = 지능형 에이젼트를 활용한 인터넷 기반형 전자수표시스템 : safechecklink

Yoon, Han-Seong; 윤한성; et al, 한국과학기술원, 1998

13
Authentication and session key establishment scheme in isolated environment = 오프라인 환경에서 스마트 홈 구축을 위한 사물인터넷 장치 간 인증 및 세션 키 분배 기법 연구link

Lee, Ha Young; 이하영; et al, 한국과학기술원, 2016

14
Authentication latency reduction technique based on a delegation mechanism and an efficient PKI-based single sign-on protocol = 위임 메커니즘과 연산 효율적인 PKI기반 single sign-on 프로토콜을 통한 인증 지연 시간 감소 기법link

Park, Ki-Woong; 박기웅; et al, 한국과학기술원, 2007

15
Confidential concurrency control for secure transaction management in database systems : C3 = 데이터베이스 시스템의 보안거래관리를 위한 기밀적 동시성 제어link

Sohn, Yong-Lak; 손용락; et al, 한국과학기술원, 2000

16
Cross-cultural investigation of the security knowledge process

Kwak, D.-H.; Kizzier, D.M.; ZO, Hangjung; Jung, E., INTERNATIONAL JOURNAL OF BUSINESS INFORMATION SYSTEMS, v.10, no.1, pp.1 - 19, 2012-05

17
Cross-Layer Encryption of CFB-AES-TURBO for Advanced Satellite Data Transmission Security

Jeon, Suhyeon; Kwak, Jeongho; Choi, Jihwan P., IEEE TRANSACTIONS ON AEROSPACE AND ELECTRONIC SYSTEMS, v.58, no.3, pp.2192 - 2205, 2022-06

18
Delegate and Verify the Update Keys of Revocable Identity-Based Encryption

Lee, Kwangsu, IEEE ACCESS, v.11, pp.52636 - 52652, 2023

19
Design and implementation of a secure multi-agent marketplace

Jaiswal, Ashutosh; Kim, Yongdae; Gini, Maria, Electronic Commerce Research and Applications, v.3, no.4, pp.355 - 368, 2004-12

20
Design and Implementation of Secure Cryptographic System on Chip for Internet of Things

Lee, Bongsoo; Lee, Il-Gu; Kim, Myungchul, IEEE ACCESS, v.10, pp.18730 - 18742, 2022-02

21
Dissecting VoLTE = VoLTE 보안 취약점에 관한 연구link

Kim, Dongkwan; 김동관; et al, 한국과학기술원, 2016

22
e-business 협업(B2B)을 위한 보안 아키텍처 설계 = Design of security architecture for e-business collaborationlink

이성호; Lee, Sung-Ho; et al, 한국과학기술원, 2003

23
Efficient and secure self organized key management in mobile adhoc network = 모바일 애드혹 네트워크에서의 효율적이고 안전한 자기조직적 키관리 기법link

Choi, Dae-Seon; 최대선; et al, 한국과학기술원, 2009

24
Efficient Kernel Integrity Monitor Design for Commodity Mobile Application Processors

Heo, Ingoo; Jang, Daehee; Moon, Hyungon; Cho, Hansu; Lee, Seungwook; Kang, Brent Byunghoon; Paek, Yunheung, JOURNAL OF SEMICONDUCTOR TECHNOLOGY AND SCIENCE, v.15, no.1, pp.48 - 59, 2015-02

25
Enforcement of security management system for XML-centric electronic commerce = XML 중심의 전자상거래를 위한 신뢰 자료 관리 시스템의 강화link

Kim, Min-Ji; 김민지; et al, 한국정보통신대학교, 2003

26
Essays on legal issues and strategies in electronic transaction, security and intellectual property management = 전자상거래, 보안 및 지적재산권에 관련한 법적 문제에 관한 고찰link

Kim, Myun-Soo; 김면수; et al, 한국과학기술원, 2014

27
Factors Affecting Internet Banking Success: A Comparative Investigation between Indonesia and South Korea

Aries, Susanto; Lee, Hwan-Soo; ZO, Hang-Jung; Ciganek, Andrew P., JOURNAL OF GLOBAL INFORMATION MANAGEMENT, v.21, no.2, pp.72 - 95, 2013-04

28
Filtering query XPath expressions for efficient access control = XML 문서의 효과적인 접근제어를 위한 XPath 질의 필터링link

Jeon, Jae-Myeong; 전재명; et al, 한국과학기술원, 2005

29
FIT: Design and Implementation of Fast ID Tracking System on Chip for Vehicular Ad-hoc Networks

Lee, Bongsoo; Lee, Il-Gu; Kim, Myungchul, WIRELESS PERSONAL COMMUNICATIONS, v.124, no.2, pp.1645 - 1659, 2022-05

30
FuzzDocs: An Automated Security Evaluation Framework for IoT

You, Myoungsung; Kim, Yeonkeun; Kim, Jaehan; Seo, Minjae; Son, Sooel; Shin, Seungwon; Lee, Seungsoo, IEEE ACCESS, v.10, no.0, pp.102406 - 102420, 2022-09

31
Hardware support for secure virtualization under a vulnerable hypervisor = 하드웨어 지원을 통한 보안성이 강화된 가상화 기법 연구link

Jin, Seongwook; 진성욱; et al, 한국과학기술원, 2015

32
Hardware-hardened Sandbox Enclaves for Trusted Serverless Computing

Park, Joongun; Kang, Seunghyo; Lee, SangHyeon; Kim, Taehoon; Park, Jongse; Kwon, Youngjin; Huh, Jaehyuk, ACM TRANSACTIONS ON ARCHITECTURE AND CODE OPTIMIZATION, v.21, no.1, 2024-03

33
Implementation of a security structure based on IPsec in UFC-cooperative network = 착용형 단말기 UFC들 간의 협력 네트워크에서 IPsec을 이용한 보안 기능의 설계 및 구현link

Seok, Hyun-chul; 석현철; et al, 한국과학기술원, 2008

34
Implicit image tagging via image-based CAPTCHAs = 캡챠(CAPTCHA)를 통한 암묵적 사진 주석 생성 방법link

Kim, Jong-Hak; 김종학; et al, 한국과학기술원, 2013

35
Machine Learning for Advanced Wireless Sensor Networks: A Review

Kim, Taeyoung; Vecchietti, Luiz Felipe; Choi, Kyujin; Lee, Sangkeum; Har, Dongsoo, IEEE SENSORS JOURNAL, v.21, no.11, pp.12379 - 12397, 2021-06

36
Max-Min Fairness Precoding for Physical Layer Security With Partial Channel Knowledge

Lee, Sangmin; Choi, Eunsung; Choi, Jinseok, IEEE WIRELESS COMMUNICATIONS LETTERS, v.12, no.9, pp.1637 - 1641, 2023-09

37
Nuclear safety and nuclear security synergy

Gandhi, Sonal; Kang, Jungrnin, ANNALS OF NUCLEAR ENERGY, v.60, pp.357 - 361, 2013-10

38
On the Analysis of Byte-Granularity Heap Randomization

Jang, Daehee; Kim, Jonghwan; Lee, Hojoon; Park, Minjoon; Jeong, Yunjong; Kim, Minsu; Kang, Brent Byunghoon, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, v.18, no.5, pp.2237 - 2252, 2021-09

39
Online game security and secure electronic item trading protocol = 온라인게임 보안과 아이템의 안전한 전자거래 프로토콜link

Ki, Jun-Baek; 기준백; et al, 한국정보통신대학교, 2003

40
Persistent jamming in wireless local area networks: Attack and defense

Lee, Il-Gu; Kim, Myung-Chul, COMPUTER NETWORKS, v.109, pp.67 - 83, 2016-11

41
Pilot and Data Power Allocation in Poisson Interference Field with Protected Zone for Physical-Layer Security

Ahn, Sungjun; Park, Sung-Ik; Kang, Joonhyuk; Jeong, Seongah, IEEE WIRELESS COMMUNICATIONS LETTERS, v.10, no.2, pp.271 - 275, 2021-02

42
Providing security vertical handoff in SARAH for heterogeneous networks

Han, Kyusuk; Seo, Youngjoon; Yoon, Sungjune; Park, James J. (Jong Hyuk); Shon, Taeshik, JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, v.34, no.6, pp.1903 - 1907, 2011

43
QoSE : Quality of SEcurity(분산 NFV환경을 이용한 네트워크 보안 모듈) = QoSE : quality of security(a network security module using a distributed NFV)link

박태준; Park, Taejune; et al, 한국과학기술원, 2015

44
RecurFI : Practical coarse-grained CFI on windows binary code = RecurFI : 윈도우 바이너리에 대한 효율적 제어흐름 무결성 검사 시스템link

Hong, jina; Kim, Kwangjo; 김광조; Cha, Sang Kil; et al, 한국과학기술원, 2017

45
Retrofitting the Partially Privileged Mode for TEE Communication Channel Protection

Jang, Jinsoo; Kang, Brent Byunghoon, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, v.17, no.5, pp.1000 - 1014, 2018-05

46
RoleCast: Finding Missing Security Checks When You Do Not Know What Checks Are

Son, Sooel; McKinley, Kathryn S.; Shmatikov, Vitaly, ACM SIGPLAN NOTICES, v.46, no.10, pp.1069 - 1083, 2011-10

47
SaVioR: Thwarting Stack-Based Memory Safety Violations by Randomizing Stack Layout

LEE, SEONG MAN; Kang, Hyeonwoo; Jang, Jinsoo; Kang, Brent Byunghoon, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, v.19, no.4, pp.2559 - 2575, 2022-07

48
Secure beamforming and self-energy recycling with full-duplex wireless powered relay무선으로 전력을 공급받는 전이중방식 릴레이를 통한 에너지 재활용과 보안 빔포밍link

Kim, Hongjun; 김홍준; et al, 한국과학기술원, 2016

49
Secure Transmission for Hierarchical Information Accessibility in Downlink MU-MIMO

Lee, Kanguk; Choi, Jinseok; Kim, Dong Ku; Park, Jeonghun, IEEE TRANSACTIONS ON COMMUNICATIONS, v.70, no.9, pp.6181 - 6195, 2022-09

50
Security analysis of FHSS-based drone controller = 주파수 도약식 드론 조종기의 보안성 분석link

SHIN, HOCHEOL; 신호철; et al, 한국과학기술원, 2015

51
Security and performance in service-oriented applications: Trading off competing objectives

ZO, Hangjung; Nazareth, Derek L; Jain, Hemant K., DECISION SUPPORT SYSTEMS, v.50, pp.336 - 346, 2010-12

52
SECURITY AND PRIVACY IN EMERGING WIRELESS NETWORKS

Cao, Guohong; Hubaux, Jean-Pierre; Kim, Yongdae; Zhang, Yanchao, IEEE WIRELESS COMMUNICATIONS, v.17, no.5, pp.10 - 11, 2010-10

53
Security and privacy on authentication protocol for low-cost radio frequency identification = 저가의 RFID를 위한 인증프로토콜의 보안 및 프라이버시에 관한 연구link

Yang, Jeong-Kyu; 양정규; et al, 한국정보통신대학교, 2005

54
Sego: Pervasive Trusted Metadata for Efficiently Verified Untrusted System Services

Kwon, Youngjin; Dunn, Alan M.; Lee, Michael Z.; Hofmann, Owen S.; Xu, Yuanzhong; Witchel, Emmett, ACM SIGPLAN NOTICES, v.51, no.4, pp.277 - 290, 2016-04

55
Static Analysis of JNI Programs via Binary Decompilation

Park, Jihee; Lee, Sungho; Hong, Jaemin; Ryu, Sukyoung, IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, v.49, no.5, pp.3089 - 3105, 2023-05

56
Studying security weaknesses of android system

Park, Jae Kyung; Choi, Sang-Yong, INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, v.9, no.3, pp.7 - 12, 2015-03

57
Tamper Resistant Software by Integrity-Based Encryption

Lee, Jaewon; Kim, Heeyoul; Yoon, Hyunsoo, Lecture notes in computer science, v.3320, pp.608-612, 2004

58
The Art, Science, and Engineering of Fuzzing: A Survey

Manes, Valentin Jean Marie; Han, HyungSeok; Han, Choongwoo; Cha, Sang Kil; Egele, Manuel; Schwartz, Edward J.; Woo, Maverick, IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, v.47, no.11, pp.2312 - 2331, 2021-11

59
The Frog-Boiling Attack: Limitations of Secure Network Coordinate Systems

Chan-Tin, Eric; Heorhiadi, Victor; Hopper, Nicholas; Kim, Yongdae, ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, v.14, no.3, 2011-11

60
Tree-based group key agreement

Kim, Yongdae; Perrig, A.; Tsudik, G., ACM Transactions on Information and System Security, v.7, no.1, pp.60 - 96, 2004-02

rss_1.0 rss_2.0 atom_1.0