Digital Library
Search: "[ author: 변진욱 ]" (11)
Analysis of Security Vulnerability in U2U Authentication Using MEC in IoD Environment
최재현,
이상훈,
정익래,
변진욱,
Vol. 31, No. 1, pp. 11-17,
Feb.
2021
10.13089/JKIISC.2021.31.1.11
Keywords: Internet of Drone, MEC, authentication, Pseudonym, Internet of Drone, MEC, authentication, Pseudonym
10.13089/JKIISC.2021.31.1.11
Keywords: Internet of Drone, MEC, authentication, Pseudonym, Internet of Drone, MEC, authentication, Pseudonym
An Enhanced System of Group Key Management Based on MIPUF in IoT
탁금지,
정익래,
변진욱,
Vol. 29, No. 6, pp. 1243-1257,
Dec.
2019
10.13089/JKIISC.2019.29.6.1243
Keywords: Internet of Things, physical unclonable function, multistage interconnection physical unclonable function, Key Management, Key Distribution, Internet of Things, physical unclonable function, multistage interconnection physical unclonable function, Key Management, Key Distribution
10.13089/JKIISC.2019.29.6.1243
Keywords: Internet of Things, physical unclonable function, multistage interconnection physical unclonable function, Key Management, Key Distribution, Internet of Things, physical unclonable function, multistage interconnection physical unclonable function, Key Management, Key Distribution
An Enhanced Scheme of PUF-Assisted Group Key Distribution in SDWSN
오정민,
정익래,
변진욱,
Vol. 29, No. 1, pp. 29-43,
Jan.
2019
10.13089/JKIISC.2019.29.1.29
Keywords: Wireless Sensor Networks, Software-Defined Networking, Key Distribution, physical unclonable functions, Fuzzy extractor, Wireless Sensor Networks, Software-Defined Networking, Key Distribution, physical unclonable functions, Fuzzy extractor
10.13089/JKIISC.2019.29.1.29
Keywords: Wireless Sensor Networks, Software-Defined Networking, Key Distribution, physical unclonable functions, Fuzzy extractor, Wireless Sensor Networks, Software-Defined Networking, Key Distribution, physical unclonable functions, Fuzzy extractor
A Brief Consideration on the Security of Hash-Based Authenticator
Jin Wook Byun,
Vol. 26, No. 3, pp. 609-612,
Jun.
2016
10.13089/JKIISC.2016.26.3.609
Keywords: Authenticator, authenticated key exchange, Security analysis
10.13089/JKIISC.2016.26.3.609
Keywords: Authenticator, authenticated key exchange, Security analysis
A Study on Efficient Design of PUF-Based RFID Authentication Protocol
Jin Wook Byun,
Vol. 24, No. 5, pp. 987-1000,
Oct.
2014
10.13089/JKIISC.2014.24.5.987
Keywords: RFID authentication, PUF, Authentication Protocol
10.13089/JKIISC.2014.24.5.987
Keywords: RFID authentication, PUF, Authentication Protocol
On the Security of Pointcheval-Zimmer Multi-Factor Authenticated Key Exchange Protocol
Jin Wook Byun,
Vol. 23, No. 3, pp. 351-358,
Jun.
2013
10.13089/JKIISC.2013.23.3.351
Keywords: multi-factor authenticated key exchange, authentication, biometrics, Password
10.13089/JKIISC.2013.23.3.351
Keywords: multi-factor authenticated key exchange, authentication, biometrics, Password
On the Security of a New C2C-PAKA Protocol
Jin-Wook Byun,
Vol. 22, No. 3, pp. 473-484,
Jun.
2012
10.13089/JKIISC.2012.22.3.473
Keywords: password authentication, Key Exchange, Different Password, Security analysis
10.13089/JKIISC.2012.22.3.473
Keywords: password authentication, Key Exchange, Different Password, Security analysis
Secure Mutual Authentication Protocol for RFID System without Online Back-End-Database
Tae-Youn Won,
Young-Jun Yu,
Ji-Young Chun,
Jin-Wook Byun,
Dong-Hoon Lee,
Vol. 20, No. 1, pp. 63-72,
Feb.
2010
10.13089/JKIISC.2010.20.1.63
Keywords: RFID, Privacy, Security, Mutual Authentication
10.13089/JKIISC.2010.20.1.63
Keywords: RFID, Privacy, Security, Mutual Authentication
Secure Index Searching Schemes for Groups
Park Hyun-A,
Byun Jin-Uk,
Lee Hyun-Suk,
Lee Dong-Hun,
Vol. 15, No. 1, pp. 87-98,
Feb.
2005
10.13089/JKIISC.2005.15.1.87
Keywords: Index search, Privacy, trapdoor, keyword, encrypted documents
10.13089/JKIISC.2005.15.1.87
Keywords: Index search, Privacy, trapdoor, keyword, encrypted documents