The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Hyun Seok Kim: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Hyun Seok Kim, Jung-Hyun Oh, Jin-Young Choi, Jin-Woo Kim
    The Vulnerabilities Analysis and Design of the Security Protocol for RFID System. [Citation Graph (0, 0)][DBLP]
    CIT, 2006, pp:152- [Conf]
  2. Il-Gon Kim, Hyun Seok Kim, Ji-Yeon Lee, Jin-Young Choi, Inhye Kang
    Secrecy Analysis of Purchase Transaction in Electronic Purses. [Citation Graph (0, 0)][DBLP]
    AINA (1), 2006, pp:979-984 [Conf]
  3. Hyun Seok Kim, Jeong-Hyun Oh, Jin-Young Choi
    Security Analysis of RFID Authentication for Pervasive Systems using Model Checking. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2006, pp:195-202 [Conf]
  4. Hyun Seok Kim, Il-Gon Kim, Keun-Hee Han, Jin-Young Choi
    Security and Privacy Analysis of RFID Systems Using Model Checking. [Citation Graph (0, 0)][DBLP]
    HPCC, 2006, pp:495-504 [Conf]
  5. Hyun Seok Kim, Il-Gon Kim, Jin-Young Choi
    Analysis of Security Protocols with Certificate over Open Networks: Electronic Payment System. [Citation Graph (0, 0)][DBLP]
    ICDCS Workshops, 2005, pp:217-223 [Conf]
  6. Jin-Woo Kim, JuHum Kwon, Young-Gab Kim, Chee-Yang Song, Hyun Seok Kim, Doo-Kwon Baik
    EAFoC: Enterprise Architecture Framework Based on Commonality. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2006, v:21, n:6, pp:952-964 [Journal]
  7. Hyun Seok Kim, Jin-Young Choi
    The Design and Verification of RFID Authentication Protocol for Ubiquitous Computing. [Citation Graph (0, 0)][DBLP]
    DEXA Workshops, 2007, pp:693-697 [Conf]

  8. A Secure Communication Protocol for Low-Cost RFID System. [Citation Graph (, )][DBLP]


  9. Weaknesses Analysis and Countermeasure of a Verifier-Based Key Agreement Protocol. [Citation Graph (, )][DBLP]


  10. Security and Privacy Analysis of RFID Authentication Protocol for Ubiquitous Computing. [Citation Graph (, )][DBLP]


  11. A Lightweight Protocol Analysis and Modification for Secure RFID System. [Citation Graph (, )][DBLP]


  12. A Light-weight Security Protocol for RFID System. [Citation Graph (, )][DBLP]


  13. RFID Privacy Protection Scheme for Secure Ubiquitous Computing. [Citation Graph (, )][DBLP]


  14. Multi-stacked artificial muscle actuator based on synthetic elastomer. [Citation Graph (, )][DBLP]


  15. Formal Verification of Cryptographic Protocol for Secure RFID System. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002