Survey on security in Internet of Things: State of the art and challenges M Sain, YJ Kang, HJ Lee 2017 19th International conference on advanced communication technology …, 2017 | 124 | 2017 |
Cross-method-based analysis and classification of malicious behavior by api calls extraction B Ndibanje, KH Kim, YJ Kang, HH Kim, TY Kim, HJ Lee Applied Sciences 9 (2), 239, 2019 | 66 | 2019 |
Obstacles effects on signal attenuation in line of sight for different environments in v2v communication MA Al-Absi, AA Al-Absi, YJ Kang, HJ Lee 2018 20th International Conference on Advanced Communication Technology …, 2018 | 22 | 2018 |
An experimental cpa attack for arduino cryptographic module YJ Kang, TY Kim, JB Jo, HJ Lee International Journal of Security and Its Applications 8 (2), 261-270, 2014 | 15 | 2014 |
A study on detection of anomaly behavior in automation industry SM Ryu, YJ Kang, HJ Lee 2018 20th International Conference on Advanced Communication Technology …, 2018 | 10 | 2018 |
On modeling protocol-based clustering tag in RFID systems with formal security analysis N Bruce, H Kim, Y Kang, Y Lee, H Lee 2015 IEEE 29th International Conference on Advanced Information Networking …, 2015 | 5 | 2015 |
A secure and efficient mutual authentication hand-off protocol for sensor device support in internet of things B Ndibanje, K Kim, Y Kang, H Kim, T Kim, H Lee Sensors and Materials 29 (7), 953-960, 2017 | 4 | 2017 |
A study on information security attack based side-channel attacks YJ Kang, N Bruce, SH Park, HJ Lee 2016 18th International Conference on Advanced Communication Technology …, 2016 | 4 | 2016 |
An approach to designing a network security-based application for communications safety N Bruce, YJ Kang, M Sain, HJ Lee Proceedings of the 2015 IEEE/ACM International Conference on Advances in …, 2015 | 4 | 2015 |
Correlation Power Analysis Attack on the Ping Pong-128 Key Stream Generator YJ Kang, HH Kim, N Bruce, YG Park, H Lee 2015 IEEE 29th International Conference on Advanced Information Networking …, 2015 | 3 | 2015 |
Scrambler Based AES for Countermeasure Against Power Analysis Attacks YJ Kang, KH Kim, HJ Lee Advanced Multimedia and Ubiquitous Engineering: MUE/FutureTech 2019 13, 152-157, 2020 | 2 | 2020 |
Detects abnormal behavior using motor power consumption KH Kim, SM Ryu, MK Kim, YJ Kang, HH Kim, HJ Lee, JH Lee Journal of The Korea Society of Computer and Information 23 (10), 65-72, 2018 | 2 | 2018 |
A Security Protocol based-on Mutual Authentication Application toward Wireless Sensor Network N Bruce, YJ Kang, HR Kim, SH Park, HJ Lee Information Science and Applications, 27-34, 2015 | 2 | 2015 |
A design of elliptic curve cryptography-based authentication using qr code N Thiranant, YJ Kang, T Kim, W Jang, S Park, H Lee 2014 IEEE 17th International Conference on Computational Science and …, 2014 | 2 | 2014 |
An improved two factor user authentication framework based on captcha and visual secret sharing M Sain, KH Kim, YJ Kang, HJ Lee 2019 IEEE International Conference on Computational Science and Engineering …, 2019 | 1 | 2019 |
AIM—Adaptive invalidation mechanism for wireless networks M Sain, S Varanasi, YJ Kang, HJ Lee 2017 19th International Conference on Advanced Communication Technology …, 2017 | 1 | 2017 |
Smartphone-Based Secure Access Control in Wireless Network Analysis H Kim, YJ Kang, N Bruce, S Park, H Lee 2015 IEEE 29th International Conference on Advanced Information Networking …, 2015 | 1 | 2015 |
A survey of security threats on u-healthcare YJ Kang, HJ Lee Proceedings of the Korean Society of Computer Information Conference, 55-58, 2012 | 1 | 2012 |
Implementation of AES and ARIA algorithm with Secure Structure for Power Analysis using LFSR Masking YJ Kang, KH Kim, HJ Lee Journal of The Korea Society of Computer and Information 25 (1), 79-86, 2020 | | 2020 |
Proposal of PingPong-128 Countermeasure against Power Analysis Attack YJ Kang, KH Kim, HJ Lee 2019 21st International Conference on Advanced Communication Technology …, 2019 | | 2019 |