Search Results - "Kim, Seungjoo"
-
1
Blockchain as a Cyber Defense: Opportunities, Applications, and Challenges
Published in IEEE access (2022)“…Targets of cyber crime are not exclusive to the private sector. Successful cyber attacks on nation-states have proved that cyber threats can jeopardize…”
Get full text
Journal Article -
2
Advanced Key-Management Architecture for Secure SCADA Communications
Published in IEEE transactions on power delivery (01-07-2009)“…Supervisory control and data-acquisition (SCADA) systems are control systems for many national infrastructures. In the past, SCADA systems were designed…”
Get full text
Journal Article -
3
Rethinking selfish mining under pooled mining
Published in ICT express (01-06-2023)“…Bitcoin’s core security requires honest participants to control at least 51% of the total hash power. However, it has been shown that several techniques can…”
Get full text
Journal Article -
4
Development for High-Assurance Software Update Management System Complying With UN R156
Published in IEEE access (2024)“…With the advent of autonomous driving and connected vehicles in the automotive industry, various vehicle software components are now connected to wireless…”
Get full text
Journal Article -
5
Challenges in Dynamic Analysis of Drone Firmware and Its Solutions
Published in IEEE access (2024)“…With the advancement of Internet of Things (IoT) technology, its applications span various sectors such as public, industrial, private and military. In…”
Get full text
Journal Article -
6
Performance Prediction and Validation of a Small-Capacity Twisted Savonius Wind Turbine
Published in Energies (Basel) (07-05-2019)“…In this study, an off-grid–type small wind turbine for street lighting was designed and analyzed. Its performance was predicted using a computational fluid…”
Get full text
Journal Article -
7
Blockchain Based Sensitive Data Management by Using Key Escrow Encryption System from the Perspective of Supply Chain
Published in IEEE access (01-01-2020)“…The security of operation and maintenance phase in systems that share long-life cycles like weapon systems is of great importance. Even if the system passes…”
Get full text
Journal Article -
8
Efficient Secure Group Communications for SCADA
Published in IEEE transactions on power delivery (01-04-2010)“…Modern industrial facilities have command and control systems. These industrial command and control systems are commonly called supervisory control and data…”
Get full text
Journal Article -
9
How to Obtain Common Criteria Certification of Smart TV for Home IoT Security and Reliability
Published in Symmetry (Basel) (01-10-2017)“…In the new era of IoT (Internet of Things), numerous gadgets and services include innovative IoT technologies that provide customers with convenience and…”
Get full text
Journal Article -
10
Trust-Based Access Control Model from Sociological Approach in Dynamic Online Social Network Environment
Published in TheScientificWorld (2014)“…There has been an explosive increase in the population of the OSN (online social network) in recent years. The OSN provides users with many opportunities to…”
Get full text
Journal Article -
11
Preserving Patient's Anonymity for Mobile Healthcare System in IoT Environment
Published in International journal of distributed sensor networks (01-07-2016)“…Emerging IoT (Internet of Things) technologies provide many benefits to the improvement of healthcare service. The successful deployment of IoT depends on…”
Get full text
Journal Article -
12
RSA speedup with Chinese remainder theorem immune against hardware fault cryptanalysis
Published in IEEE transactions on computers (01-04-2003)“…This article considers the problem of how to prevent RSA signature and decryption computation with a residue number system (CRT-based approach) speedup from a…”
Get full text
Journal Article -
13
A weakness in the Bresson-Chevassut-Essiari-Pointcheval's Group Key Agreement scheme for low-power mobile devices
Published in IEEE communications letters (01-05-2005)“…In this letter, we show that Bresson-Chevassut-Essiari-Pointcheval's Group Key Agreement scheme does not meet the main security properties: implicit key…”
Get full text
Journal Article -
14
Shorting attack: Predatory, destructive short selling on Proof‐of‐Stake cryptocurrencies
Published in Concurrency and computation (25-07-2023)“…Summary Bitcoin introduced blockchain which is the transparent and decentralized way of recording the lists of digital currency transactions. Bitcoin's…”
Get full text
Journal Article -
15
CIA-level driven secure SDLC framework for integrating security into SDLC process
Published in Journal of ambient intelligence and humanized computing (01-10-2022)“…From the early 1970s, the U.S. government began to recognize that simple penetration testing could not assure the security quality of products. The results of…”
Get full text
Journal Article -
16
Synthesis and Characterization of Cobalt-Doped WS₂ Nanorods for Lithium Battery Applications
Published in Nanoscale research letters (23-05-2010)“…Cobalt-doped tungsten disulfide nanorods were synthesized by an approach involving exfoliation, intercalation, and the hydrothermal process, using commercial…”
Get full text
Journal Article -
17
Cipher Suite Setting Problem of SSL Protocol and it's Solutions
Published in 2009 International Conference on Advanced Information Networking and Applications Workshops (01-05-2009)“…As the use of Internet is being generalized, the security problems about data transfer are rearing up as the important issue. There are many security protocols…”
Get full text
Conference Proceeding -
18
Enforcing security in mobile RFID networks multilateral approaches and solutions
Published in NOMS 2008 - 2008 IEEE Network Operations and Management Symposium (01-04-2008)“…Mobile RFID (radio frequency identification) is a new application to use mobile phone as RFID reader with a wireless technology and provides new valuable…”
Get full text
Conference Proceeding -
19
Vulnerability analysis of secure USB flash drives
Published in 2007 IEEE International Workshop on Memory Technology, Design and Testing (01-12-2007)“…USB flash drive without any security function causes the exposure of private information. So new USB flash drive supported security function was invented to…”
Get full text
Conference Proceeding -
20
Do You Really Need to Disguise Normal Servers as Honeypots?
Published in MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM) (28-11-2022)“…A honeypot, which is a kind of deception strategy, has been widely used for at least 20 years to mitigate cyber threats. Decision-makers have believed that…”
Get full text
Conference Proceeding