Suivre
Jeong Nyeo Kim
Jeong Nyeo Kim
Adresse e-mail validée de etri.re.kr
Titre
Citée par
Citée par
Année
A survey on activities of daily living and occupations of upper extremity amputees
CH Jang, HS Yang, HE Yang, SY Lee, JW Kwon, BD Yun, JY Choi, ...
Annals of rehabilitation medicine 35 (6), 907-921, 2011
2042011
LoRaWAN-based energy-efficient surveillance by drones for intelligent transportation systems
V Sharma, I You, G Pau, M Collotta, JD Lim, JN Kim
Energies 11 (3), 573, 2018
1142018
A security protocol for route optimization in DMM-based smart home IoT networks
D Shin, K Yun, J Kim, PV Astillo, JN Kim, I You
IEEE Access 7, 142531-142550, 2019
952019
Multimodal biometric method that combines veins, prints, and shape of a finger
BJ Kang, KR Park, JH Yoo, JN Kim
Optical Engineering 50 (1), 017201-017201-13, 2011
572011
Access control method using token having security attributes in computer system
SK Eun, JN Kim, JG Ko, SY Doo, JS Yu, JD Lim
US Patent 7,290,279, 2007
522007
System and method of verifying integrity of software
SW Park, GL Kim, KS Lim, JD Lim, JN Kim
US Patent 9,867,051, 2018
482018
Android mobile application system call event pattern analysis for determination of malicious attack
YJ Ham, D Moon, HW Lee, JD Lim, JN Kim
International Journal of Security and Its Applications 8 (1), 231-246, 2014
472014
Evaluation of DNA extraction methods and their clinical application for direct detection of causative bacteria in continuous ambulatory peritoneal dialysis culture fluids from …
SH Kim, HS Jeong, YH Kim, S Am Song, JY Lee, SH Oh, HR Kim, JN Lee, ...
Annals of laboratory medicine 32 (2), 119, 2012
442012
SACA: Self‐Aware Communication Architecture for IoT Using Mobile Fog Servers
V Sharma, JD Lim, JN Kim, I You
Mobile Information Systems 2017 (1), 3273917, 2017
362017
Self-enforcing game theory-based resource allocation for LoRaWAN assisted public safety communications
V Sharma, G Choudhary, I You, JD Lim, JN Kim
arXiv preprint arXiv:1804.07204, 2018
252018
Design and implementation of integrated security engine for secure networking
JN Kim, K seok Lee, C Lee
The 6th International Conference on Advanced Communication Technology, 2004 …, 2004
232004
Analysis of eavesdropping attack in mmWave-based WPANs with directional antennas
M Kim, E Hwang, JN Kim
Wireless Networks 23, 355-369, 2017
222017
Technology trends of access control in IoT and requirements analysis
Y Lee, J Lim, Y Jeon, J Kim
2015 International conference on information and communication technology …, 2015
202015
A practical implementation of fuzzy fingerprint vault for smart cards
D Moon, Y Chung, C Seo, SY Kim, JN Kim
Journal of intelligent Manufacturing 25, 293-302, 2014
192014
Anti-reversible dynamic tamper detection scheme using distributed image steganography for IoT applications
SR Kim, JN Kim, ST Kim, S Shin, JH Yi
The Journal of Supercomputing 74, 4261-4280, 2018
182018
A secure storage system for sensitive data protection based on mobile virtualization
SW Park, JD Lim, JN Kim
International Journal of Distributed Sensor Networks 11 (2), 929380, 2015
172015
Secure mobile device structure for trust IoT
Y Lee, J Kim, KS Lim, H Yoon
The Journal of Supercomputing 74, 6646-6664, 2018
152018
Building secure execution environment for mobile platform
YH Kim, JN Kim
2011 First ACIS/JNU International Conference on Computers, Networks, Systems …, 2011
152011
Access control for secure freebsd operating system
JG Ko, JN Kim, KI Jeong
Proc. of WISA2001, The Second International Workshop on Information Security …, 2001
152001
Rooting attack detection method on the android-based smart phone
WJ Jang, SW Cho, HW Lee, H Ju, JN Kim
Proceedings of 2011 International Conference on Computer Science and Network …, 2011
142011
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20