Enhancing security of EPCglobal Gen-2 RFID tag against traceability and cloning DN Duc, J Park, H Lee, K Kim SCIS 2006, 97-97, 2006 | 353 | 2006 |
Mutual authentication protocol for low-cost RFID J Yang, J Park, H Lee, K Ren, K Kim Workshop on RFID and lightweight crypto, 17-24, 2005 | 240 | 2005 |
Method for changing MNO in embedded SIM on basis of dynamic key generation and embedded SIM and recording medium therefor J Park, J Lee, K Lee US Patent 9,775,024, 2017 | 125 | 2017 |
Method for managing profile of Embedded UICC, and Embedded UICC, Embedded UICC-equipped terminal, provision method, and method for changing MNO using same J Park, J Lee US Patent 9,414,233, 2016 | 107 | 2016 |
Profile management method, embedded UICC, and device provided with the embedded UICC J Park US Patent 9,712,996, 2017 | 93 | 2017 |
Method for managing embedded UICC and embedded UICC, MNO system, provision method, and method for changing MNO using same J Park, J Lee US Patent 9,521,547, 2016 | 78 | 2016 |
Method for changing MNO in embedded SIM on basis of special privilege, and embedded SIM and recording medium therefore J Park, J Lee, K Lee US Patent 9,628,981, 2017 | 73 | 2017 |
TM-Coin: Trustworthy management of TCB measurements in IoT J Park, K Kim 2017 IEEE international conference on pervasive computing and communications …, 2017 | 46 | 2017 |
Near field communication terminal for performing secure payment and secure payment method using the same JM Park, KT Kim US Patent 10,318,944, 2019 | 42 | 2019 |
State-based key management scheme for wireless sensor networks J Park, Z Kim, K Kim IEEE International Conference on Mobile Adhoc and Sensor Systems Conference …, 2005 | 29 | 2005 |
Secure profile provisioning architecture for embedded UICC J Park, K Baek, C Kang 2013 International Conference on Availability, Reliability and Security, 297-303, 2013 | 24 | 2013 |
eMotion: An SGX extension for migrating enclaves J Park, S Park, BB Kang, K Kim Computers & Security 80, 173-185, 2019 | 22 | 2019 |
Toward live migration of SGX-enabled virtual machines J Park, S Park, J Oh, JJ Won 2016 IEEE World Congress on Services (SERVICES), 111-112, 2016 | 22 | 2016 |
An enhanced lightweight authentication protocol for access control in wireless LANs K Ren, H Lee, K Han, J Park, K Kim Proceedings. 2004 12th IEEE International Conference on Networks (ICON 2004 …, 2004 | 19 | 2004 |
A practical approach for enhancing security of EPCglobal RFID Gen2 tag J Park, J Na, M Kim Future Generation Communication and Networking (FGCN 2007) 1, 436-441, 2007 | 18 | 2007 |
On the construction of cryptographically strong boolean functions with desirable trade-off R Kui, P Jaemin, K Kwangjo Journal of Zhejiang University-SCIENCE A 6, 358-364, 2005 | 15 | 2005 |
The aegis: Uicc-based security framework J Park, K Kim, M Kim 2008 Second International Conference on Future Generation Communication and …, 2008 | 10 | 2008 |
Method and apparatus for access authentication using mobile terminal JM Park, KYE Dong-Hoon, YK Min US Patent 9,165,415, 2015 | 9 | 2015 |
Method and system for providing financial service JM Park, SEO Myoung-Hee, YK Min US Patent App. 13/336,816, 2012 | 8 | 2012 |
Design and implementation of trusted sensing framework for IoT environment S Park, J Park, J Oh Journal of Communications and Networks 23 (1), 43-52, 2021 | 6 | 2021 |