Showing results 1 to 4 of 4
A scalable and efficient key escrow model for lawful interception of IDBC-based secure communication Han, Kyusuk; Yeun, Chan Yeob; Shon, Taeshik; Park, Jonghyuk; Kim, Kwangjo, INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, v.24, no.4, pp.461 - 472, 2011-04 |
Design of Intrusion Detection System Preventing Insider Attack Han, Kyusuk; Mun, Hyeran; Yeun, Chan Yeob; Kim, Kwangjo, The 10th International Workshop on Information Security Applications, 2009-08-24 |
Reconsidering Ryu-Takagi RFID Authentication Protocol Duc, Dang Nguyen; Yeun, Chan Yeob; Kim, Kwang-Jo, International Journal of Intelligent Computing Research (IJICR), v.1, no.4, 2011 |
Security Framework for RFID-based Applications in Smart Home Environment Konidala, Divyan M.; Kim, Daeyoung; Yeun, Chan Yeob; Lee, Byoungcheon, JIPS(Journal of Information Processing Systems), v.7, no.1, pp.111 - 120, 2011-03 |
Discover