Digital Library


Search: "[ author: 변진욱 ]" (11)
    , , , , Vol. 31, No. 6, pp. 1247-1260, Dec. 2021
    10.13089/JKIISC.2021.31.6.1247

    Analysis of Security Vulnerability in U2U Authentication Using MEC in IoD Environment
    최재현, 이상훈, 정익래, 변진욱, Vol. 31, No. 1, pp. 11-17, Feb. 2021
    10.13089/JKIISC.2021.31.1.11
    Keywords: Internet of Drone, MEC, authentication, Pseudonym, Internet of Drone, MEC, authentication, Pseudonym

    An Enhanced System of Group Key Management Based on MIPUF in IoT
    탁금지, 정익래, 변진욱, Vol. 29, No. 6, pp. 1243-1257, Dec. 2019
    10.13089/JKIISC.2019.29.6.1243
    Keywords: Internet of Things, physical unclonable function, multistage interconnection physical unclonable function, Key Management, Key Distribution, Internet of Things, physical unclonable function, multistage interconnection physical unclonable function, Key Management, Key Distribution

    An Enhanced Scheme of PUF-Assisted Group Key Distribution in SDWSN
    오정민, 정익래, 변진욱, Vol. 29, No. 1, pp. 29-43, Jan. 2019
    10.13089/JKIISC.2019.29.1.29
    Keywords: Wireless Sensor Networks, Software-Defined Networking, Key Distribution, physical unclonable functions, Fuzzy extractor, Wireless Sensor Networks, Software-Defined Networking, Key Distribution, physical unclonable functions, Fuzzy extractor

    A Brief Consideration on the Security of Hash-Based Authenticator
    Jin Wook Byun, Vol. 26, No. 3, pp. 609-612, Jun. 2016
    10.13089/JKIISC.2016.26.3.609
    Keywords: Authenticator, authenticated key exchange, Security analysis

    A Study on Efficient Design of PUF-Based RFID Authentication Protocol
    Jin Wook Byun, Vol. 24, No. 5, pp. 987-1000, Oct. 2014
    10.13089/JKIISC.2014.24.5.987
    Keywords: RFID authentication, PUF, Authentication Protocol

    On the Security of Pointcheval-Zimmer Multi-Factor Authenticated Key Exchange Protocol
    Jin Wook Byun, Vol. 23, No. 3, pp. 351-358, Jun. 2013
    10.13089/JKIISC.2013.23.3.351
    Keywords: multi-factor authenticated key exchange, authentication, biometrics, Password

    On the Security of a New C2C-PAKA Protocol
    Jin-Wook Byun, Vol. 22, No. 3, pp. 473-484, Jun. 2012
    10.13089/JKIISC.2012.22.3.473
    Keywords: password authentication, Key Exchange, Different Password, Security analysis

    Secure Mutual Authentication Protocol for RFID System without Online Back-End-Database
    Tae-Youn Won, Young-Jun Yu, Ji-Young Chun, Jin-Wook Byun, Dong-Hoon Lee, Vol. 20, No. 1, pp. 63-72, Feb. 2010
    10.13089/JKIISC.2010.20.1.63
    Keywords: RFID, Privacy, Security, Mutual Authentication

    Secure Index Searching Schemes for Groups
    Park Hyun-A, Byun Jin-Uk, Lee Hyun-Suk, Lee Dong-Hun, Vol. 15, No. 1, pp. 87-98, Feb. 2005
    10.13089/JKIISC.2005.15.1.87
    Keywords: Index search, Privacy, trapdoor, keyword, encrypted documents