|
Search the dblp DataBase
Hyun Seok Kim:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Hyun Seok Kim, Jung-Hyun Oh, Jin-Young Choi, Jin-Woo Kim
The Vulnerabilities Analysis and Design of the Security Protocol for RFID System. [Citation Graph (0, 0)][DBLP] CIT, 2006, pp:152- [Conf]
- Il-Gon Kim, Hyun Seok Kim, Ji-Yeon Lee, Jin-Young Choi, Inhye Kang
Secrecy Analysis of Purchase Transaction in Electronic Purses. [Citation Graph (0, 0)][DBLP] AINA (1), 2006, pp:979-984 [Conf]
- Hyun Seok Kim, Jeong-Hyun Oh, Jin-Young Choi
Security Analysis of RFID Authentication for Pervasive Systems using Model Checking. [Citation Graph (0, 0)][DBLP] COMPSAC (2), 2006, pp:195-202 [Conf]
- Hyun Seok Kim, Il-Gon Kim, Keun-Hee Han, Jin-Young Choi
Security and Privacy Analysis of RFID Systems Using Model Checking. [Citation Graph (0, 0)][DBLP] HPCC, 2006, pp:495-504 [Conf]
- Hyun Seok Kim, Il-Gon Kim, Jin-Young Choi
Analysis of Security Protocols with Certificate over Open Networks: Electronic Payment System. [Citation Graph (0, 0)][DBLP] ICDCS Workshops, 2005, pp:217-223 [Conf]
- Jin-Woo Kim, JuHum Kwon, Young-Gab Kim, Chee-Yang Song, Hyun Seok Kim, Doo-Kwon Baik
EAFoC: Enterprise Architecture Framework Based on Commonality. [Citation Graph (0, 0)][DBLP] J. Comput. Sci. Technol., 2006, v:21, n:6, pp:952-964 [Journal]
- Hyun Seok Kim, Jin-Young Choi
The Design and Verification of RFID Authentication Protocol for Ubiquitous Computing. [Citation Graph (0, 0)][DBLP] DEXA Workshops, 2007, pp:693-697 [Conf]
A Secure Communication Protocol for Low-Cost RFID System. [Citation Graph (, )][DBLP]
Weaknesses Analysis and Countermeasure of a Verifier-Based Key Agreement Protocol. [Citation Graph (, )][DBLP]
Security and Privacy Analysis of RFID Authentication Protocol for Ubiquitous Computing. [Citation Graph (, )][DBLP]
A Lightweight Protocol Analysis and Modification for Secure RFID System. [Citation Graph (, )][DBLP]
A Light-weight Security Protocol for RFID System. [Citation Graph (, )][DBLP]
RFID Privacy Protection Scheme for Secure Ubiquitous Computing. [Citation Graph (, )][DBLP]
Multi-stacked artificial muscle actuator based on synthetic elastomer. [Citation Graph (, )][DBLP]
Formal Verification of Cryptographic Protocol for Secure RFID System. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.002secs
|