Search Results - "Kim, Seungjoo"

Refine Results
  1. 1

    Blockchain as a Cyber Defense: Opportunities, Applications, and Challenges by Lee, Suhyeon, Kim, Seungjoo

    Published in IEEE access (2022)
    “…Targets of cyber crime are not exclusive to the private sector. Successful cyber attacks on nation-states have proved that cyber threats can jeopardize…”
    Get full text
    Journal Article
  2. 2

    Advanced Key-Management Architecture for Secure SCADA Communications by CHOI, Donghyun, KIM, Hakman, WON, Dongho, KIM, Seungjoo

    Published in IEEE transactions on power delivery (01-07-2009)
    “…Supervisory control and data-acquisition (SCADA) systems are control systems for many national infrastructures. In the past, SCADA systems were designed…”
    Get full text
    Journal Article
  3. 3

    Rethinking selfish mining under pooled mining by Lee, Suhyeon, Kim, Seungjoo

    Published in ICT express (01-06-2023)
    “…Bitcoin’s core security requires honest participants to control at least 51% of the total hash power. However, it has been shown that several techniques can…”
    Get full text
    Journal Article
  4. 4

    Development for High-Assurance Software Update Management System Complying With UN R156 by Seo, Jaewan, Kwak, Jiwon, Kim, Seungjoo

    Published in IEEE access (2024)
    “…With the advent of autonomous driving and connected vehicles in the automotive industry, various vehicle software components are now connected to wireless…”
    Get full text
    Journal Article
  5. 5

    Challenges in Dynamic Analysis of Drone Firmware and Its Solutions by Kim, Yejun, Cho, Kwangsoo, Kim, Seungjoo

    Published in IEEE access (2024)
    “…With the advancement of Internet of Things (IoT) technology, its applications span various sectors such as public, industrial, private and military. In…”
    Get full text
    Journal Article
  6. 6

    Performance Prediction and Validation of a Small-Capacity Twisted Savonius Wind Turbine by Jang, Hyeonmu, Paek, Insu, Kim, Seungjoo, Jeong, Deockjin

    Published in Energies (Basel) (07-05-2019)
    “…In this study, an off-grid–type small wind turbine for street lighting was designed and analyzed. Its performance was predicted using a computational fluid…”
    Get full text
    Journal Article
  7. 7

    Blockchain Based Sensitive Data Management by Using Key Escrow Encryption System from the Perspective of Supply Chain by Cha, Sungyong, Baek, Seoungsoo, Kim, Seungjoo

    Published in IEEE access (01-01-2020)
    “…The security of operation and maintenance phase in systems that share long-life cycles like weapon systems is of great importance. Even if the system passes…”
    Get full text
    Journal Article
  8. 8

    Efficient Secure Group Communications for SCADA by CHOI, Donghyun, LEE, Sungjin, WON, Dongho, KIM, Seungjoo

    Published in IEEE transactions on power delivery (01-04-2010)
    “…Modern industrial facilities have command and control systems. These industrial command and control systems are commonly called supervisory control and data…”
    Get full text
    Journal Article
  9. 9

    How to Obtain Common Criteria Certification of Smart TV for Home IoT Security and Reliability by Kang, Sooyoung, Kim, Seungjoo

    Published in Symmetry (Basel) (01-10-2017)
    “…In the new era of IoT (Internet of Things), numerous gadgets and services include innovative IoT technologies that provide customers with convenience and…”
    Get full text
    Journal Article
  10. 10

    Trust-Based Access Control Model from Sociological Approach in Dynamic Online Social Network Environment by Baek, Seungsoo, Kim, Seungjoo

    Published in TheScientificWorld (2014)
    “…There has been an explosive increase in the population of the OSN (online social network) in recent years. The OSN provides users with many opportunities to…”
    Get full text
    Journal Article
  11. 11

    Preserving Patient's Anonymity for Mobile Healthcare System in IoT Environment by Baek, Seungsoo, Seo, Seung-Hyun, Kim, Seungjoo

    “…Emerging IoT (Internet of Things) technologies provide many benefits to the improvement of healthcare service. The successful deployment of IoT depends on…”
    Get full text
    Journal Article
  12. 12

    RSA speedup with Chinese remainder theorem immune against hardware fault cryptanalysis by Yen, Sung-Ming, Kim, Seungjoo, Lim, Seongan, Moon, Sang-Jae

    Published in IEEE transactions on computers (01-04-2003)
    “…This article considers the problem of how to prevent RSA signature and decryption computation with a residue number system (CRT-based approach) speedup from a…”
    Get full text
    Journal Article
  13. 13

    A weakness in the Bresson-Chevassut-Essiari-Pointcheval's Group Key Agreement scheme for low-power mobile devices by NAM, Junghyun, KIM, Seungjoo, WON, Dongho

    Published in IEEE communications letters (01-05-2005)
    “…In this letter, we show that Bresson-Chevassut-Essiari-Pointcheval's Group Key Agreement scheme does not meet the main security properties: implicit key…”
    Get full text
    Journal Article
  14. 14

    Shorting attack: Predatory, destructive short selling on Proof‐of‐Stake cryptocurrencies by Lee, Suhyeon, Kim, Seungjoo

    Published in Concurrency and computation (25-07-2023)
    “…Summary Bitcoin introduced blockchain which is the transparent and decentralized way of recording the lists of digital currency transactions. Bitcoin's…”
    Get full text
    Journal Article
  15. 15

    CIA-level driven secure SDLC framework for integrating security into SDLC process by Kang, Sooyoung, Kim, Seungjoo

    “…From the early 1970s, the U.S. government began to recognize that simple penetration testing could not assure the security quality of products. The results of…”
    Get full text
    Journal Article
  16. 16

    Synthesis and Characterization of Cobalt-Doped WS₂ Nanorods for Lithium Battery Applications by Wang, Shiquan, Li, Guohua, Du, Guodong, Li, Li, Jiang, Xueya, Feng, Chuanqi, Guo, Zaiping, Kim, Seungjoo

    Published in Nanoscale research letters (23-05-2010)
    “…Cobalt-doped tungsten disulfide nanorods were synthesized by an approach involving exfoliation, intercalation, and the hydrothermal process, using commercial…”
    Get full text
    Journal Article
  17. 17

    Cipher Suite Setting Problem of SSL Protocol and it's Solutions by Yoonyoung Lee, Soonhaeng Hur, Dongho Won, Seungjoo Kim

    “…As the use of Internet is being generalized, the security problems about data transfer are rearing up as the important issue. There are many security protocols…”
    Get full text
    Conference Proceeding
  18. 18

    Enforcing security in mobile RFID networks multilateral approaches and solutions by Namje Park, Dooho Choi, Seungjoo Kim, Dongho Won

    “…Mobile RFID (radio frequency identification) is a new application to use mobile phone as RFID reader with a wireless technology and provides new valuable…”
    Get full text
    Conference Proceeding
  19. 19

    Vulnerability analysis of secure USB flash drives by Hanjae Jeong, Younsung Choi, Woongryel Jeon, Fei Yang, Yunho Lee, Seungjoo Kim, Dongho Won

    “…USB flash drive without any security function causes the exposure of private information. So new USB flash drive supported security function was invented to…”
    Get full text
    Conference Proceeding
  20. 20

    Do You Really Need to Disguise Normal Servers as Honeypots? by Lee, Suhyeon, Cho, Kwangsoo, Kim, Seungjoo

    “…A honeypot, which is a kind of deception strategy, has been widely used for at least 20 years to mitigate cyber threats. Decision-makers have believed that…”
    Get full text
    Conference Proceeding