Volgen
Byoungjin Seok
Byoungjin Seok
Geverifieerd e-mailadres voor korea.ac.kr
Titel
Geciteerd door
Geciteerd door
Jaar
A Lightweight Hash-Based Blockchain Architecture for Industrial IoT
B Seok, J Park, JH Park
Applied Sciences 9 (18), 2019
1282019
Secure D2D communication for 5G IoT network based on lightweight cryptography
B Seok, JCS Sicato, T Erzhena, C Xuan, Y Pan, JH Park
Applied Sciences 10 (1), 217, 2019
1052019
Digital forensic investigation framework for the metaverse
S Seo, B Seok, C Lee
The Journal of Supercomputing 79 (9), 9467-9485, 2023
362023
Fast implementations of ARX-based lightweight block ciphers (SPARX, CHAM) on 32-bit processor
B Seok, C Lee
International Journal of Distributed Sensor Networks 15 (9), 2019
152019
HANMRE-An authenticated encryption secure against side-channel attacks for nonce-misuse and lightweight approaches
SDP Tran, B Seok, C Lee
Applied Soft Computing 97, 106663, 2020
102020
Decentralized access control for internet of things using decentralized identifiers and multi-signature smart contracts
E Tcydenova, B Seok, M Cho, C Lee
2022 International Conference on Platform Technology and Service (PlatCon …, 2022
62022
Study on Remote Data Acquisition Methods Using OAuth Protocol of Android Operating System
G Nam, S Gong, B Seok, C Lee
Journal of the Korea Institute of Information Security & Cryptology 28 (1 …, 2018
42018
A novel approach to construct a good dataset for differential-neural cryptanalysis
B Seok, D Chang, C Lee
IEEE Transactions on Dependable and Secure Computing, 2024
32024
A Study on Application Method of Crypto-module for Industrial Control System
B Seok, Y Kim, C Lee
Journal of Digital Contents Society 18 (5), 1001-1008, 2017
32017
안드로이드 환경의 OAuth 프로토콜을 이용한 원격지 데이터 수집 방법 연구
남기훈, 공성현, 석병진, 이창훈
정보보호학회논문지 28 (1), 111-122, 2018
22018
A Security Analysis of Cryptocurrency Wallets against Password Brute-Force Attacks
H Byun, J Kim, Y Jeong, B Seok, S Gong, C Lee
Electronics 13 (13), 2433, 2024
12024
Adversarial Attacks on Pre-trained Deep Learning Models for Encrypted Traffic Analysis
B Seok, K Shon
Journal of Web Engineering 23 (6), 749-768, 2024
2024
Truncated Differential-Neural Key Recovery Attacks on Round-Reduced HIGHT
B Seok
Electronics 13 (20), 4053, 2024
2024
Analysis of Digital Forensics Artifacts Based on Deletion Methods in Mobile Wiping Applications
J Kim, S Seo, B Seok, C Lee
2024 International Conference on Platform Technology and Service (PlatCon …, 2024
2024
Related-Key Amplified Boomerang Attack on Full-Round MM-128
H Eom, B Seok, C Lee
HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES 13, 2023
2023
Related-key Neural Distinguisher on Block Ciphers SPECK-32/64, HIGHT and GOST
E Tcydenova, B Seok, C Lee
Journal of Platform Technology 11 (1), 72-84, 2023
2023
A Study on Creating WBC-AES Dummy LUT as a Countermeasure against DCA
M Choi, B Seok, S Seo, C Lee
Journal of the Korea Institute of Information Security & Cryptology 33 (3 …, 2023
2023
국산 경량 블록 암호 PIPO, HIGHT, CHAM 고속 구현 연구
김인영, 석병진, 이창훈
디지털콘텐츠학회논문지 22 (12), 2063-2075, 2021
2021
블록암호에 대한 신경망 암호해독 연구 동향 분석
B Seok, C Lee
Review of KIISC 31 (6), 19-29, 2021
2021
Analysis of DLL Hijacking Vulnerability in System Executable Files for Administrator Privileges of Windows
J Bae, S Gong, B Seok, C Lee
Proceedings of the Korea Information Processing Society Conference, 170-173, 2019
2019
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20