Results 1-5 of 5 (Search time: 0.003 seconds).
NO | Title, Author(s) (Publication Title, Volume Issue, Page, Issue Date) |
---|---|
Empirical Approach to Enhance the Security of DNP3 Protocol in SCADA System using Low-latency Block Cipher Kim, HakJu; Kim, Kwangjo, 2013년도 한국정보보호학회 충청지부 학술대회, v.0, 한국정보보호학회, 2013-09-27 | |
Simulated Attack on DNP3 Protocol in SCADA System Lee, Dongsoo; Kim, HakJu; Kim, Kwangjo; Yoo, Paul D., SCIS2014, v.0, The Institute of Electronics, Information and Communication Engineers (IEICE), 2014-01-22 | |
Who can survive in CAESAR competition at round zero? Kim, HakJu; Kim, Kwangjo, SCIS2014, v.31, The Institute of Electronics, Information and Communication Engineers (IEICE), 2014-01-21 | |
Another Fuzzy Anomaly Detection System Based on Ant Clustering Algorithm Aminanto, Erza; Kim, HakJu; Kim, Kyungmin; Kim, Kwangjo, 2016 Symposium on Cryptography and Information Security (SCIS 2016), The Institute of Electronics, Information and Communication Engineers (IEICE), 2016-01-20 | |
Preliminary Design of a Novel Lightweight Authenticated Encryption Scheme based on the Sponge Function Kim, HakJu; Kim, Kwangjo, 10th Asia Joint Conference on Information Security (ASIAJCIS 2015), Chinese Cryptology and Information Security Association, 2015-05-25 |
Discover