Showing results 1 to 60 of 87
3rdParTEE: Securing Third-Party IoT Services Using the Trusted Execution Environment Jang, Jinsoo; Kang, Brent Byunghoon, IEEE INTERNET OF THINGS JOURNAL, v.9, no.17, pp.15814 - 15826, 2022-09 |
A First Step Toward Network Security Virtualization: From Concept To Prototype Shin, Seungwon; Wang, Haopei; Gu, Guofei, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, v.10, no.10, pp.2236 - 2249, 2015-10 |
A Framework for Policy Inconsistency Detection in Software-Defined Networks Lee, Seungsoo; Woo, Seungwon; Kim, Jinwoo; Nam, Jaehyun; Yegneswaran, Vinod; Porras, Phillip; Shin, Seungwon, IEEE-ACM TRANSACTIONS ON NETWORKING, v.30, no.3, pp.1410 - 1423, 2022-06 |
A Noise-Shaped Signaling Method for Vehicle-to-Everything Security Park, Dongryul; Ahn, Jangyong; Choe, Chungjae; Woo, Seongho; Ahn, Seungyoung; Choi, Junsung, IEEE ACCESS, v.9, pp.75385 - 75397, 2021-05 |
A secure cloud environment with trusted hardware = 신뢰성 하드웨어를 이용한 안전한 클라우드 환경 구축에 관한 연구link Seol, Jinho; 설진호; et al, 한국과학기술원, 2015 |
A study on provable security of public-key encryption schemes and key agreement protocols = 공개키 암호화 기법과 키 합의 프로토콜의 증명 가능 안정성에 관한 연구link Baek, Joon-sang; 백준상; et al, 한국정보통신대학원대학교, 2000 |
(A) framework for a security-enhanced SDN controller = 안전성이 향상된 소프트웨어 정의 네트워킹 컨트롤러를 위한 프레임워크link Jo, Hyeonseong; Shin, Seungwon; et al, 한국과학기술원, 2017 |
(A) study on location-based authentiated key agreement scheme in wireless sensor and actor networks = 무선 센서 및 액터 네트워크에서 위치 기반의 인증된 키합의 기법에 관한 연구link Choi, Im-Sung; 최임성; et al, 한국과학기술원, 2010 |
(A) study on risk analysis and security mechanisms for the internet security = 인터네트 보안을 위한 위험 분석과 보안 메카니즘에 관한 연구link Jung, Bum-Suk; 정범석; et al, 한국과학기술원, 1996 |
Ambusher: Exploring the Security of Distributed SDN Controllers Through Protocol State Fuzzing Kim, Jinwoo; Seo, Minjae; Marin, Eduard; Lee, Seungsoo; Nam, Jaehyun; Shin, Seungwon, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, v.19, pp.6264 - 6279, 2024 |
An Opportunistic Power Control Scheme for Mitigating User Location Tracking Attacks in Cellular Networks Bang, Inkyu; Kim, Taehoon; Jang, Han Seung; Sung, Dan Keun, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, v.17, pp.1131 - 1144, 2022-03 |
(An) internet based electronic check system using intelligent agents : safecheck = 지능형 에이젼트를 활용한 인터넷 기반형 전자수표시스템 : safechecklink Yoon, Han-Seong; 윤한성; et al, 한국과학기술원, 1998 |
Authentication and session key establishment scheme in isolated environment = 오프라인 환경에서 스마트 홈 구축을 위한 사물인터넷 장치 간 인증 및 세션 키 분배 기법 연구link Lee, Ha Young; 이하영; et al, 한국과학기술원, 2016 |
Authentication latency reduction technique based on a delegation mechanism and an efficient PKI-based single sign-on protocol = 위임 메커니즘과 연산 효율적인 PKI기반 single sign-on 프로토콜을 통한 인증 지연 시간 감소 기법link Park, Ki-Woong; 박기웅; et al, 한국과학기술원, 2007 |
Confidential concurrency control for secure transaction management in database systems : C3 = 데이터베이스 시스템의 보안거래관리를 위한 기밀적 동시성 제어link Sohn, Yong-Lak; 손용락; et al, 한국과학기술원, 2000 |
Cross-cultural investigation of the security knowledge process Kwak, D.-H.; Kizzier, D.M.; ZO, Hangjung; Jung, E., INTERNATIONAL JOURNAL OF BUSINESS INFORMATION SYSTEMS, v.10, no.1, pp.1 - 19, 2012-05 |
Cross-Layer Encryption of CFB-AES-TURBO for Advanced Satellite Data Transmission Security Jeon, Suhyeon; Kwak, Jeongho; Choi, Jihwan P., IEEE TRANSACTIONS ON AEROSPACE AND ELECTRONIC SYSTEMS, v.58, no.3, pp.2192 - 2205, 2022-06 |
Delegate and Verify the Update Keys of Revocable Identity-Based Encryption Lee, Kwangsu, IEEE ACCESS, v.11, pp.52636 - 52652, 2023 |
Design and implementation of a secure multi-agent marketplace Jaiswal, Ashutosh; Kim, Yongdae; Gini, Maria, Electronic Commerce Research and Applications, v.3, no.4, pp.355 - 368, 2004-12 |
Design and Implementation of Secure Cryptographic System on Chip for Internet of Things Lee, Bongsoo; Lee, Il-Gu; Kim, Myungchul, IEEE ACCESS, v.10, pp.18730 - 18742, 2022-02 |
Dissecting VoLTE = VoLTE 보안 취약점에 관한 연구link Kim, Dongkwan; 김동관; et al, 한국과학기술원, 2016 |
e-business 협업(B2B)을 위한 보안 아키텍처 설계 = Design of security architecture for e-business collaborationlink 이성호; Lee, Sung-Ho; et al, 한국과학기술원, 2003 |
Efficient and secure self organized key management in mobile adhoc network = 모바일 애드혹 네트워크에서의 효율적이고 안전한 자기조직적 키관리 기법link Choi, Dae-Seon; 최대선; et al, 한국과학기술원, 2009 |
Efficient Kernel Integrity Monitor Design for Commodity Mobile Application Processors Heo, Ingoo; Jang, Daehee; Moon, Hyungon; Cho, Hansu; Lee, Seungwook; Kang, Brent Byunghoon; Paek, Yunheung, JOURNAL OF SEMICONDUCTOR TECHNOLOGY AND SCIENCE, v.15, no.1, pp.48 - 59, 2015-02 |
Enforcement of security management system for XML-centric electronic commerce = XML 중심의 전자상거래를 위한 신뢰 자료 관리 시스템의 강화link Kim, Min-Ji; 김민지; et al, 한국정보통신대학교, 2003 |
Essays on legal issues and strategies in electronic transaction, security and intellectual property management = 전자상거래, 보안 및 지적재산권에 관련한 법적 문제에 관한 고찰link Kim, Myun-Soo; 김면수; et al, 한국과학기술원, 2014 |
Factors Affecting Internet Banking Success: A Comparative Investigation between Indonesia and South Korea Aries, Susanto; Lee, Hwan-Soo; ZO, Hang-Jung; Ciganek, Andrew P., JOURNAL OF GLOBAL INFORMATION MANAGEMENT, v.21, no.2, pp.72 - 95, 2013-04 |
Filtering query XPath expressions for efficient access control = XML 문서의 효과적인 접근제어를 위한 XPath 질의 필터링link Jeon, Jae-Myeong; 전재명; et al, 한국과학기술원, 2005 |
FIT: Design and Implementation of Fast ID Tracking System on Chip for Vehicular Ad-hoc Networks Lee, Bongsoo; Lee, Il-Gu; Kim, Myungchul, WIRELESS PERSONAL COMMUNICATIONS, v.124, no.2, pp.1645 - 1659, 2022-05 |
FuzzDocs: An Automated Security Evaluation Framework for IoT You, Myoungsung; Kim, Yeonkeun; Kim, Jaehan; Seo, Minjae; Son, Sooel; Shin, Seungwon; Lee, Seungsoo, IEEE ACCESS, v.10, no.0, pp.102406 - 102420, 2022-09 |
Hardware support for secure virtualization under a vulnerable hypervisor = 하드웨어 지원을 통한 보안성이 강화된 가상화 기법 연구link Jin, Seongwook; 진성욱; et al, 한국과학기술원, 2015 |
Hardware-hardened Sandbox Enclaves for Trusted Serverless Computing Park, Joongun; Kang, Seunghyo; Lee, SangHyeon; Kim, Taehoon; Park, Jongse; Kwon, Youngjin; Huh, Jaehyuk, ACM TRANSACTIONS ON ARCHITECTURE AND CODE OPTIMIZATION, v.21, no.1, 2024-03 |
Implementation of a security structure based on IPsec in UFC-cooperative network = 착용형 단말기 UFC들 간의 협력 네트워크에서 IPsec을 이용한 보안 기능의 설계 및 구현link Seok, Hyun-chul; 석현철; et al, 한국과학기술원, 2008 |
Implicit image tagging via image-based CAPTCHAs = 캡챠(CAPTCHA)를 통한 암묵적 사진 주석 생성 방법link Kim, Jong-Hak; 김종학; et al, 한국과학기술원, 2013 |
Machine Learning for Advanced Wireless Sensor Networks: A Review Kim, Taeyoung; Vecchietti, Luiz Felipe; Choi, Kyujin; Lee, Sangkeum; Har, Dongsoo, IEEE SENSORS JOURNAL, v.21, no.11, pp.12379 - 12397, 2021-06 |
Max-Min Fairness Precoding for Physical Layer Security With Partial Channel Knowledge Lee, Sangmin; Choi, Eunsung; Choi, Jinseok, IEEE WIRELESS COMMUNICATIONS LETTERS, v.12, no.9, pp.1637 - 1641, 2023-09 |
Nuclear safety and nuclear security synergy Gandhi, Sonal; Kang, Jungrnin, ANNALS OF NUCLEAR ENERGY, v.60, pp.357 - 361, 2013-10 |
On the Analysis of Byte-Granularity Heap Randomization Jang, Daehee; Kim, Jonghwan; Lee, Hojoon; Park, Minjoon; Jeong, Yunjong; Kim, Minsu; Kang, Brent Byunghoon, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, v.18, no.5, pp.2237 - 2252, 2021-09 |
Online game security and secure electronic item trading protocol = 온라인게임 보안과 아이템의 안전한 전자거래 프로토콜link Ki, Jun-Baek; 기준백; et al, 한국정보통신대학교, 2003 |
Persistent jamming in wireless local area networks: Attack and defense Lee, Il-Gu; Kim, Myung-Chul, COMPUTER NETWORKS, v.109, pp.67 - 83, 2016-11 |
Pilot and Data Power Allocation in Poisson Interference Field with Protected Zone for Physical-Layer Security Ahn, Sungjun; Park, Sung-Ik; Kang, Joonhyuk; Jeong, Seongah, IEEE WIRELESS COMMUNICATIONS LETTERS, v.10, no.2, pp.271 - 275, 2021-02 |
Providing security vertical handoff in SARAH for heterogeneous networks Han, Kyusuk; Seo, Youngjoon; Yoon, Sungjune; Park, James J. (Jong Hyuk); Shon, Taeshik, JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, v.34, no.6, pp.1903 - 1907, 2011 |
QoSE : Quality of SEcurity(분산 NFV환경을 이용한 네트워크 보안 모듈) = QoSE : quality of security(a network security module using a distributed NFV)link 박태준; Park, Taejune; et al, 한국과학기술원, 2015 |
RecurFI : Practical coarse-grained CFI on windows binary code = RecurFI : 윈도우 바이너리에 대한 효율적 제어흐름 무결성 검사 시스템link Hong, jina; Kim, Kwangjo; 김광조; Cha, Sang Kil; et al, 한국과학기술원, 2017 |
Retrofitting the Partially Privileged Mode for TEE Communication Channel Protection Jang, Jinsoo; Kang, Brent Byunghoon, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, v.17, no.5, pp.1000 - 1014, 2018-05 |
RoleCast: Finding Missing Security Checks When You Do Not Know What Checks Are Son, Sooel; McKinley, Kathryn S.; Shmatikov, Vitaly, ACM SIGPLAN NOTICES, v.46, no.10, pp.1069 - 1083, 2011-10 |
SaVioR: Thwarting Stack-Based Memory Safety Violations by Randomizing Stack Layout LEE, SEONG MAN; Kang, Hyeonwoo; Jang, Jinsoo; Kang, Brent Byunghoon, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, v.19, no.4, pp.2559 - 2575, 2022-07 |
Secure beamforming and self-energy recycling with full-duplex wireless powered relay무선으로 전력을 공급받는 전이중방식 릴레이를 통한 에너지 재활용과 보안 빔포밍link Kim, Hongjun; 김홍준; et al, 한국과학기술원, 2016 |
Secure Transmission for Hierarchical Information Accessibility in Downlink MU-MIMO Lee, Kanguk; Choi, Jinseok; Kim, Dong Ku; Park, Jeonghun, IEEE TRANSACTIONS ON COMMUNICATIONS, v.70, no.9, pp.6181 - 6195, 2022-09 |
Security analysis of FHSS-based drone controller = 주파수 도약식 드론 조종기의 보안성 분석link SHIN, HOCHEOL; 신호철; et al, 한국과학기술원, 2015 |
Security and performance in service-oriented applications: Trading off competing objectives ZO, Hangjung; Nazareth, Derek L; Jain, Hemant K., DECISION SUPPORT SYSTEMS, v.50, pp.336 - 346, 2010-12 |
SECURITY AND PRIVACY IN EMERGING WIRELESS NETWORKS Cao, Guohong; Hubaux, Jean-Pierre; Kim, Yongdae; Zhang, Yanchao, IEEE WIRELESS COMMUNICATIONS, v.17, no.5, pp.10 - 11, 2010-10 |
Security and privacy on authentication protocol for low-cost radio frequency identification = 저가의 RFID를 위한 인증프로토콜의 보안 및 프라이버시에 관한 연구link Yang, Jeong-Kyu; 양정규; et al, 한국정보통신대학교, 2005 |
Sego: Pervasive Trusted Metadata for Efficiently Verified Untrusted System Services Kwon, Youngjin; Dunn, Alan M.; Lee, Michael Z.; Hofmann, Owen S.; Xu, Yuanzhong; Witchel, Emmett, ACM SIGPLAN NOTICES, v.51, no.4, pp.277 - 290, 2016-04 |
Static Analysis of JNI Programs via Binary Decompilation Park, Jihee; Lee, Sungho; Hong, Jaemin; Ryu, Sukyoung, IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, v.49, no.5, pp.3089 - 3105, 2023-05 |
Studying security weaknesses of android system Park, Jae Kyung; Choi, Sang-Yong, INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, v.9, no.3, pp.7 - 12, 2015-03 |
Tamper Resistant Software by Integrity-Based Encryption Lee, Jaewon; Kim, Heeyoul; Yoon, Hyunsoo, Lecture notes in computer science, v.3320, pp.608-612, 2004 |
The Art, Science, and Engineering of Fuzzing: A Survey Manes, Valentin Jean Marie; Han, HyungSeok; Han, Choongwoo; Cha, Sang Kil; Egele, Manuel; Schwartz, Edward J.; Woo, Maverick, IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, v.47, no.11, pp.2312 - 2331, 2021-11 |
The Frog-Boiling Attack: Limitations of Secure Network Coordinate Systems Chan-Tin, Eric; Heorhiadi, Victor; Hopper, Nicholas; Kim, Yongdae, ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, v.14, no.3, 2011-11 |
Tree-based group key agreement Kim, Yongdae; Perrig, A.; Tsudik, G., ACM Transactions on Information and System Security, v.7, no.1, pp.60 - 96, 2004-02 |
Discover