Graduate School of Information Study

  • Korea, Republic of

Research Output

Filter
Conference article
2009
2006

A flexible DRM system considering ubiquitous environment

Park, J. H., Lee, S. & Koh, B. S., 2006 Jan 1, In : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3983 LNCS, p. 236-244 9 p.

Research output: Contribution to journalConference article

An efficient ID-based delegation network

Youn, T. G., Park, Y. H., Kim, C. H. & Lim, J., 2006 Jan 1, In : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4277 LNCS - I, p. 382-391 10 p.

Research output: Contribution to journalConference article

1 Citation (Scopus)

Secure EPCglobal Class-1 Gen-2 RFID system against security and privacy problems

Kim, K. H., Choi, E. Y., Lee, S. M. & Lee, D. H., 2006 Jan 1, In : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4277 LNCS - I, p. 362-371 10 p.

Research output: Contribution to journalConference article

15 Citations (Scopus)
2005

A secure and efficient communication resume protocol for secure wireless networks

Kim, K., Hong, J. & Lim, J., 2005 Oct 17, In : Lecture Notes in Computer Science. 3543, p. 157-168 12 p.

Research output: Contribution to journalConference article

1 Citation (Scopus)

Fast and secure communication resume protocol for wireless networks

Kim, K., Hong, J. & Lim, J., 2005 Oct 31, In : Lecture Notes in Computer Science. 3648, p. 1120-1129 10 p.

Research output: Contribution to journalConference article

One-way chain based broadcast encryption schemes

Jho, N. S., Hwang, J. Y., Cheon, J. H., Kim, M. H., Lee, D. H. & Yoo, E. S., 2005 Sep 26, In : Lecture Notes in Computer Science. 3494, p. 559-574 16 p.

Research output: Contribution to journalConference article

48 Citations (Scopus)

Related-key rectangle attacks on reduced versions of SHACAL-1 and AES-192

Hong, S., Kim, J., Lee, S. & Preneel, B., 2005 Oct 17, In : Lecture Notes in Computer Science. 3557, p. 368-383 16 p.

Research output: Contribution to journalConference article

44 Citations (Scopus)

Security analysis of a 2/3-rate double length compression function in the black-box model

Nandi, M., Lee, W., Sakurai, K. & Lee, S., 2005 Oct 17, In : Lecture Notes in Computer Science. 3557, p. 243-254 12 p.

Research output: Contribution to journalConference article

23 Citations (Scopus)
2003

Verification and Testing of the RTOS for Safety-Critical Embedded Systems

Lee, N. Y., Kim, J. H., Sung, A. Y., Choi, B. J., Choi, J. Y. & Lee, J. S., 2003 Dec 29, In : Transactions of the American Nuclear Society. 89, 1 p.

Research output: Contribution to journalConference article