KAIST Logo 이미지 Science Logo 이미지
top 이미지 KOASAS top 이미지
top 이미지
top 이미지 top 이미지 top 이미지 top 이미지
top 이미지

Receltly Added Documents

NO
Title / Author(s) ( Publication Title, Volume Issue, Page, Issue Date ) PDF(size)
1
Formal Construction and Verification of Home Service Robots: A Case Study / Kim, Moonzoo; Kang, Kyo Chul (, 2015-11-03) View File (423kb)
dot_line
2
Formal Construction and Verification of Home Service Robots: A Case Study / Kim, Moonzoo; Kang, Kyo Chul (, 2015-11-03) View File (423kb)
dot_line
3
Foundations for the Run-Time Monitoring of Reactive Systems / Viswanathan, Mahesh; Kim, Moonzoo (, 2015-11-03) View File (205kb)
dot_line
4
Foundations for the Run-Time Monitoring of Reactive Systems / Viswanathan, Mahesh; Kim, Moonzoo (, 2015-11-03) View File (205kb)
dot_line
5
중·소규모 조직을 위한 소프트웨어 프로세스 모델 / 강, 동원; 박, 승훈; 홍, 장의; 이, 병걸; 김, 정아; 박, 수용; 고, 병선; 이, 은중; 이, 상은; 배, 두환 (2007 한국소프트웨어공학 학술대회 논문집, 제 9권, 제 1호, 2007) View File (1072kb)
dot_line
6
중·소규모 조직을 위한 소프트웨어 프로세스 모델 / 강, 동원; 박, 승훈; 홍, 장의; 이, 병걸; 김, 정아; 박, 수용; 고, 병선; 이, 은중; 이, 상은; 배, 두환 (2007 한국소프트웨어공학 학술대회 논문집, 제 9권, 제 1호, 2007) View File (1072kb)
dot_line
7
Impersonation Attack of a Mutual Authentication Scheme Using Smart Card and its Improvement / Liem, Vo; Kim, Kwangjo (Korea Institute of Information Security and Cryptology, CISC2007 Winter Proceeding, Vol.17, no.2, pp. 697-700, 2007-12) View File (4275kb)
dot_line
8
Impersonation Attack of a Mutual Authentication Scheme Using Smart Card and its Improvement / Liem, Vo; Kim, Kwangjo (Korea Institute of Information Security and Cryptology, CISC2007 Winter Proceeding, Vol.17, no.2, pp. 697-700, 2007-12) View File (4275kb)
dot_line
9
무선 센서네트워크 기반 차량 검기 시스템; Wireless Sensor Network based Vehicle Detection System / 유, 성은; 박, 태수; 김, 대영; 신, 창섭; 성, 경복; Kim, Daeyoung (대한임베디드공학회 추계학술대회, 2007-11-09) View File (673kb)
dot_line
10
무선 센서네트워크 기반 차량 검기 시스템; Wireless Sensor Network based Vehicle Detection System / 유, 성은; 박, 태수; 김, 대영; 신, 창섭; 성, 경복; Kim, Daeyoung (대한임베디드공학회 추계학술대회, 2007-11-09) View File (673kb)
dot_line
11
유비쿼터스 로보틱 스페이스 구축을 위한 USN 플랫폼 개발; (Development of USN Platform for building Ubiquitous Robotic Space / 김, 태홍; 김, 대영; 강, 지훈; 하, 영국; 손, 주찬; Kim, Daeyoung (대한임베디드공학회 추계학술대회, 2007-11-09) View File (2750kb)
dot_line
12
유비쿼터스 로보틱 스페이스 구축을 위한 USN 플랫폼 개발; (Development of USN Platform for building Ubiquitous Robotic Space / 김, 태홍; 김, 대영; 강, 지훈; 하, 영국; 손, 주찬; Kim, Daeyoung (대한임베디드공학회 추계학술대회, 2007-11-09) View File (2750kb)
dot_line
13
SCIS'99를 통한 일본의 정보보호기술 연구 동향 / 김 (Kim), 광조 (KIISC 학회지, pp.17-31, Vol.9, No.2, 1999., 1999) View File (1764kb)
dot_line
14
SCIS'99를 통한 일본의 정보보호기술 연구 동향 / 김 (Kim), 광조 (KIISC 학회지, pp.17-31, Vol.9, No.2, 1999., 1999) View File (1764kb)
dot_line
15
An Automatic Generating Framework for Bit Message Parser; 비트 메시지 파서 자동 생성 프레임워크 / Lee, Choon-oh; Song, Jisoo; Kang, Byeongwoo; Han, Dong-soo; Lim, Wongi (, 2015-11-03) View File (322kb)
dot_line
16
An Automatic Generating Framework for Bit Message Parser; 비트 메시지 파서 자동 생성 프레임워크 / Lee, Choon-oh; Song, Jisoo; Kang, Byeongwoo; Han, Dong-soo; Lim, Wongi (, 2015-11-03) View File (322kb)
dot_line
17
Security and User Privacy for Mobile-RFID Applications in Public Zone / Divyan, M. Konidala; Lee, Hyunrok; Duc, Dang Nguyen; Kim, Kwangjo (Triangle Symposium on Advanced ICT 2008 (TriSAI 2008), Oct. 6-9, 2008, Daejeon, Korea, 2008-10-06) View File (284kb)
dot_line
18
Security and User Privacy for Mobile-RFID Applications in Public Zone / Divyan, M. Konidala; Lee, Hyunrok; Duc, Dang Nguyen; Kim, Kwangjo (Triangle Symposium on Advanced ICT 2008 (TriSAI 2008), Oct. 6-9, 2008, Daejeon, Korea, 2008-10-06) View File (284kb)
dot_line
19
A User Authentication Scheme with Privacy Protection for Wireless Sensor Networks / Yoon, Sungjune; Lee, Hyunrok; Ji, Sungbae; Kim, Kwangjo (The 2nd Joint Workshop on Information Security, pp.233-244, Aug. 6-7, 2007, Tokyo, 2007-01-23) View File (387kb)
dot_line
20
A User Authentication Scheme with Privacy Protection for Wireless Sensor Networks / Yoon, Sungjune; Lee, Hyunrok; Ji, Sungbae; Kim, Kwangjo (The 2nd Joint Workshop on Information Security, pp.233-244, Aug. 6-7, 2007, Tokyo, 2007-01-23) View File (387kb)
dot_line
21
A 6-DOF tracker using LED directivity / Han, Jaehyun; Heo, Seongkook; Lee, Geehyuk; Bang, Won-Chul; Kim, DoKyoon; Kim, ChangYeong (, 2011-02-03) View File (202kb)
dot_line
22
A 6-DOF tracker using LED directivity / Han, Jaehyun; Heo, Seongkook; Lee, Geehyuk; Bang, Won-Chul; Kim, DoKyoon; Kim, ChangYeong (, 2011-02-03) View File (202kb)
dot_line
23
비트 스크램블을 통해 개선된 RFIDsec07의 상호 인증 프로토콜 / 신, 승목; 이, 현록; Konidala, Divyan M.; 김, 광조; Shin, Sung-Mok; Lee, Hyunrok; Konidala, Divyan M.; Kim, Kwangjo (2008년도 한국정보보호학회 영남지부 학술발표회 논문집, pp.89-93, 2008-02-20) View File (3778kb)
dot_line
24
비트 스크램블을 통해 개선된 RFIDsec07의 상호 인증 프로토콜 / 신, 승목; 이, 현록; Konidala, Divyan M.; 김, 광조; Shin, Sung-Mok; Lee, Hyunrok; Konidala, Divyan M.; Kim, Kwangjo (2008년도 한국정보보호학회 영남지부 학술발표회 논문집, pp.89-93, 2008-02-20) View File (3778kb)
dot_line
25
New Novel Approaches for Securing VoIP Applications / Yeun, Chanyeob; Han, Kyusuk; Kim, Kwangjo (The Sixth International Workshop for Applied PKC IWAP, Dec 3-4, 2007, Perth, Australia., 2007-12-03) View File (1109kb)
dot_line
26
New Novel Approaches for Securing VoIP Applications / Yeun, Chanyeob; Han, Kyusuk; Kim, Kwangjo (The Sixth International Workshop for Applied PKC IWAP, Dec 3-4, 2007, Perth, Australia., 2007-12-03) View File (1109kb)
dot_line
27
A Lightweight Key Agreement Protocol Based on LPN Problem / Nguyen, Duc; Kim, Kwangjo (Korea Institute of Information Security and Cryptology, CISC2007 Winter Proceeding, Vol.17, no.2, pp. 709-712, 2007-12) View File (4181kb)
dot_line
28
A Lightweight Key Agreement Protocol Based on LPN Problem / Nguyen, Duc; Kim, Kwangjo (Korea Institute of Information Security and Cryptology, CISC2007 Winter Proceeding, Vol.17, no.2, pp. 709-712, 2007-12) View File (4181kb)
dot_line
29
The Bifurcating Neuron Network 3 As Coloring Problem Solver and N-ary Associative Memory / Jinhyuk, Choi; Geehyuk, Lee (, 2006-10-03) View File (315kb)
dot_line
30
The Bifurcating Neuron Network 3 As Coloring Problem Solver and N-ary Associative Memory / Jinhyuk, Choi; Geehyuk, Lee (, 2006-10-03) View File (315kb)
dot_line
31
Two-Tree Collective Communication in Distributed Heterogeneous SystemsView Edit Outline / Cha, Kwangho; Han, Dongsoo; Yu, Chansu; Byeon, Okhwan (, 2002) View File (236kb)
dot_line
32
Two-Tree Collective Communication in Distributed Heterogeneous SystemsView Edit Outline / Cha, Kwangho; Han, Dongsoo; Yu, Chansu; Byeon, Okhwan (, 2002) View File (236kb)
dot_line
33
How to Exchange Secret on Low cost Devices / Duc, Dang Nguyen; Kim, Kwangjo (Triangle Symposium on Advanced ICT 2008 (TriSAI 2008), Oct. 6-9, 2008, Daejeon, Korea, 2008-10-06) View File (98kb)
dot_line
34
How to Exchange Secret on Low cost Devices / Duc, Dang Nguyen; Kim, Kwangjo (Triangle Symposium on Advanced ICT 2008 (TriSAI 2008), Oct. 6-9, 2008, Daejeon, Korea, 2008-10-06) View File (98kb)
dot_line
35
Enhancing Security for Vertical Handoff in SARAH under the Heterogeneous Networks / 한, 규석; Han, Kyusuk; 서, 영준; Seo, Youngjoon; 윤, 성준; Yoon, Sungjune; 김, 광조; Kim, Kwangjo (Korea Institute of Information Security and Cryptology, Choongcheong branch Proceeding, pp.159-166, 2007-09) View File (314kb)
dot_line
36
Enhancing Security for Vertical Handoff in SARAH under the Heterogeneous Networks / 한, 규석; Han, Kyusuk; 서, 영준; Seo, Youngjoon; 윤, 성준; Yoon, Sungjune; 김, 광조; Kim, Kwangjo (Korea Institute of Information Security and Cryptology, Choongcheong branch Proceeding, pp.159-166, 2007-09) View File (314kb)
dot_line
37
An Enhanced Secure Key Issuing Protocol / Liem, Vo; Kim, Kwangjo (Korea Institute of Information Security and Cryptology, CIS2006 Winter Proceeding, pp. 21-26, 2006-12) View File (6182kb)
dot_line
38
An Enhanced Secure Key Issuing Protocol / Liem, Vo; Kim, Kwangjo (Korea Institute of Information Security and Cryptology, CIS2006 Winter Proceeding, pp. 21-26, 2006-12) View File (6182kb)
dot_line
39
Guideline of Cyber Security Policy for Digitial I&C Systems in Nuclear Power Plant / Kim, Zeen; Kim, Jangseong; Kang, Youngdoo; Kim, Kwangjo; Kim, Dai I; Jeong, Choongheui (Transactions of the Korean Nuclear Society Autumn Meeting, 2007-10) View File (41kb)
dot_line
40
Guideline of Cyber Security Policy for Digitial I&C Systems in Nuclear Power Plant / Kim, Zeen; Kim, Jangseong; Kang, Youngdoo; Kim, Kwangjo; Kim, Dai I; Jeong, Choongheui (Transactions of the Korean Nuclear Society Autumn Meeting, 2007-10) View File (41kb)
dot_line
41
Secure HB+ against Man-in-the-middle Attacks / Nguyen, Duc; Kim, Kwangjo (Korea Institute of Information Security and Cryptology, CIS2006 Winter Proceeding, pp.265-272, 2006-12) View File (5491kb)
dot_line
42
Secure HB+ against Man-in-the-middle Attacks / Nguyen, Duc; Kim, Kwangjo (Korea Institute of Information Security and Cryptology, CIS2006 Winter Proceeding, pp.265-272, 2006-12) View File (5491kb)
dot_line
43
Enhancing Privacy and Authentication for Location Based Service using Trusted Authority / Han, Kyusuk; Kim, Kwangjo (Proc. of The 2nd Joint Workshop on Information Security, pp.219 - 232, Aug. 6-7, 2007, Tokyo, Japan, 2007-08-06) View File (219kb)
dot_line
44
Enhancing Privacy and Authentication for Location Based Service using Trusted Authority / Han, Kyusuk; Kim, Kwangjo (Proc. of The 2nd Joint Workshop on Information Security, pp.219 - 232, Aug. 6-7, 2007, Tokyo, Japan, 2007-08-06) View File (219kb)
dot_line
45
A Secure and Privacy Enhanced Protocol for Location-based Services in Ubiquitous Society / Konidala, Divyan M.; Yeun, Chan Yeob; Kim, Kwangjo (Proc. of GLOBECOM2004, Volume 4, Pages 2164- 2168, 2004-11-29) View File (475kb)
dot_line
46
A Secure and Privacy Enhanced Protocol for Location-based Services in Ubiquitous Society / Konidala, Divyan M.; Yeun, Chan Yeob; Kim, Kwangjo (Proc. of GLOBECOM2004, Volume 4, Pages 2164- 2168, 2004-11-29) View File (475kb)
dot_line
47
On the Construction of Cryptographically Strong Boolean Functions with Desirable Trade-off / Ren, Kui; Park, Jaemin; Kim, Kwangjo (Journal of Zhejiang University (Science), Vol. 6A(5), pp.358-364, 2006-05) View File (276kb)
dot_line
48
On the Construction of Cryptographically Strong Boolean Functions with Desirable Trade-off / Ren, Kui; Park, Jaemin; Kim, Kwangjo (Journal of Zhejiang University (Science), Vol. 6A(5), pp.358-364, 2006-05) View File (276kb)
dot_line
49
A Capability-based Privacy-preserving Scheme for Pervasive Computing Environments / Konidala, Divyan M.; Duc, Dang N.; Lee, Dongman; Kim, Kwangjo (Proc. of IEEE PerSec2005, pp.136-140, 2005-03-08) View File (213kb)
dot_line
50
A Capability-based Privacy-preserving Scheme for Pervasive Computing Environments / Konidala, Divyan M.; Duc, Dang N.; Lee, Dongman; Kim, Kwangjo (Proc. of IEEE PerSec2005, pp.136-140, 2005-03-08) View File (213kb)
dot_line
bottom 이미지 KOASAS Logo 이미지
DSpace Software Copyright(c) 2008 MIT and Hewlett-Packard   KOASAS TEL. 82-42-350-4494 E-mail. koasas@kaist.ac.kr