-
2
-
-
33750934542
-
A network reference model for B2C RFID applications
-
Kim, Y., Lee, J., Yoo, S., Kim, H.: A Network Reference Model for B2C RFID Applications. In: Proceedings of ICACT (2006)
-
(2006)
Proceedings of ICACT
-
-
Kim, Y.1
Lee, J.2
Yoo, S.3
Kim, H.4
-
3
-
-
33750340320
-
-
ISO/IEC JTC 1/SC 31/WG 4 N 0922, Information paper, ISO/IEC JTC 1 SC 31 WG4 SG 5
-
Chae, J., Oh, S.: Information Report on Mobile RFID in Korea. ISO/IEC JTC 1/SC 31/WG 4 N 0922, Information paper, ISO/IEC JTC 1 SC 31 WG4 SG 5 (2005)
-
(2005)
Information Report on Mobile RFID in Korea
-
-
Chae, J.1
Oh, S.2
-
4
-
-
43749118401
-
Multilateral approaches to the mobile RFID security problem using web service
-
DOI 10.1007/978-3-540-78849-2-34, Progress in WWW Research and Development - 10th Asia-Pacific Web Conference, APWeb 2008, Proceedings
-
Park, N., Song, Y., Won, D., Kim, H.: Multilateral Approaches to the Mobile RFID Security Problem Using Web Service. In: Zhang, Y., Yu, G., Hwang, J., Xu, G. (eds.) APWeb 2008. LNCS, vol. 4976, pp. 331-341. Springer, Heidelberg (2008) (Pubitemid 351693438)
-
(2008)
Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4976
, pp. 331-341
-
-
Park, N.1
Song, Y.2
Won, D.3
Kim, H.4
-
5
-
-
84971017435
-
Proposal for participating in the correspondence group on RFID in ITU-T
-
ASTAP Forum
-
Park, W., Lee, B.: Proposal for participating in the Correspondence Group on RFID in ITU-T. Information Paper. ASTAP Forum (2004)
-
(2004)
Information Paper
-
-
Park, W.1
Lee, B.2
-
6
-
-
33745653332
-
WIPI mobile platform with secure service for mobile RFID network environment
-
DOI 10.1007/11610496-100, Advanced Web and Network Technologies, and Applications - APWeb 2006 International Workshops: XRA, IWSN, MEGA, and ICSE, Proceedings
-
Park, N., Kwak, J., Kim, S., Won, D., Kim, H.: WIPI Mobile Platform with Secure Service for Mobile RFID Network Environment. In: Shen, H.T., Li, J., Li, M., Ni, J., Wang, W. (eds.) APWeb Workshops 2006. LNCS, vol. 3842, pp. 741-748. Springer, Heidelberg (2006) (Pubitemid 43973412)
-
(2006)
Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3842
, pp. 741-748
-
-
Park, N.1
Kwak, J.2
Kim, S.3
Won, D.4
Kim, H.5
-
7
-
-
24944554983
-
Open location-based service using secure middleware infrastructure in web services
-
Computational Science and Its Applications - ICCSA 2005: International Conference, Proceedings
-
Park, N., Kim, H., Kim, S., Won, D.: Open Location-Based Service Using Secure Middleware Infrastructure in Web Services. In: Gervasi, O., Gavrilova, M.L., Kumar, V., Laganá, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005. LNCS, vol. 3481, pp. 1146-1155. Springer, Heidelberg (2005) (Pubitemid 41313797)
-
(2005)
Lecture Notes in Computer Science
, vol.3481
, Issue.2
, pp. 1146-1155
-
-
Park, N.1
Kim, H.W.2
Kim, S.3
Won, D.4
-
8
-
-
80053071093
-
Proposal for the study on a security framework for mobile RFID applications as a new work item on mobile security
-
Q9/17, Contribution 116, Geneva
-
Chug, B., et al.: Proposal for the study on a security framework for mobile RFID applications as a new work item on mobile security. ITU-T, COM17D116E, Q9/17, Contribution 116, Geneva (2005)
-
(2005)
ITU-T, COM17D116E
-
-
Chug, B.1
-
9
-
-
24944554983
-
Open location-based service using secure middleware infrastructure in web services
-
Computational Science and Its Applications - ICCSA 2005: International Conference, Proceedings
-
Park, N., Kim, H.W., Kim, S., Won, D.H.: Open Location-Based Service Using Secure Middleware Infrastructure in Web Services. In: Gervasi, O., Gavrilova, M.L., Kumar, V., Laganá, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005. LNCS, vol. 3481, pp. 1146-1155. Springer, Heidelberg (2005) (Pubitemid 41313797)
-
(2005)
Lecture Notes in Computer Science
, vol.3481
, Issue.2
, pp. 1146-1155
-
-
Park, N.1
Kim, H.W.2
Kim, S.3
Won, D.4
-
10
-
-
33750945450
-
RFID code structure and tag data structure for mobile RFID services in Korea
-
Lee, J., Kim, H.: RFID Code Structure and Tag Data Structure for Mobile RFID Services in Korea. In: Proceedings of ICACT (2006)
-
(2006)
Proceedings of ICACT
-
-
Lee, J.1
Kim, H.2
-
11
-
-
43749088314
-
Privacy preserving enhanced service mechanism in mobile RFID network
-
Springer, Heidelberg
-
Park, N., Kim, S., Won, D.: Privacy Preserving Enhanced Service Mechanism in Mobile RFID Network. In: ASC. Advances in Soft Computing, vol. 43, pp. 151-156. Springer, Heidelberg (2007)
-
(2007)
ASC. Advances in Soft Computing
, vol.43
, pp. 151-156
-
-
Park, N.1
Kim, S.2
Won, D.3
-
12
-
-
78649423092
-
Security scheme for managing a large quantity of individual information in RFID environment
-
Zhu, R., Zhang, Y., Liu, B., Liu, C. (eds.) Springer, Heidelberg
-
Park, N.: Security scheme for managing a large quantity of individual information in RFID environment. In: Zhu, R., Zhang, Y., Liu, B., Liu, C. (eds.) ICICA 2010. CCIS, vol. 106, pp. 72-79. Springer, Heidelberg (2010)
-
(2010)
ICICA 2010. CCIS
, vol.106
, pp. 72-79
-
-
Park, N.1
-
13
-
-
33750298289
-
Security analysis and implementation leveraging globally networked RFIDs
-
Personal Wireless Communications - IFIP TC6 11th International Conference, PWC 2006, Proceedings
-
Park, N., Kim, S., Won, D., Kim, H.: Security Analysis and Implementation Leveraging Globally Networked RFIDs. In: Cuenca, P., Orozco-Barbosa, L. (eds.) PWC 2006. LNCS, vol. 4217, pp. 494-505. Springer, Heidelberg (2006) (Pubitemid 44617839)
-
(2006)
Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4217
, pp. 494-505
-
-
Park, N.1
Kim, S.2
Won, D.3
Kim, H.4
-
14
-
-
47849119135
-
A security and privacy enhanced protection scheme for secure 900MHz UHF RFID reader on mobile phone
-
ISCE 2006 IEEE, Los Alamitos
-
Park, N., Lee, H., Kim, H., Won, D.: A Security and Privacy Enhanced Protection Scheme for Secure 900MHz UHF RFID Reader on Mobile Phone. In: IEEE Tenth International Symposium on Consumer Electronics, ISCE 2006, pp. 1-5. IEEE, Los Alamitos (2006)
-
(2006)
IEEE Tenth International Symposium on Consumer Electronics
, pp. 1-5
-
-
Park, N.1
Lee, H.2
Kim, H.3
Won, D.4
-
15
-
-
34547265683
-
Design of an extended architecture for secure low-cost 900MHz UHF mobile RFID systems
-
ISCE 2006 IEEE, Los Alamitos
-
Park, N., Kim, H., Chung, K., Sohn, S.: Design of an Extended Architecture for Secure Low-Cost 900MHz UHF Mobile RFID Systems. In: IEEE Tenth International Symposium on Consumer Electronics, ISCE 2006, pp. 1-6. IEEE, Los Alamitos (2006)
-
(2006)
IEEE Tenth International Symposium on Consumer Electronics
, pp. 1-6
-
-
Park, N.1
Kim, H.2
Chung, K.3
Sohn, S.4
-
16
-
-
77950158660
-
Implementation of cellular phone-based secure light-weight middleware platform for networked RFID
-
ICCE 2010 IEEE, Los Alamitos
-
Park, N., Gadh, R.: Implementation of Cellular Phone-based Secure Light-Weight Middleware Platform for Networked RFID. In: 28th International Conference on Consumer Electronics, ICCE 2010, pp. 495-496. IEEE, Los Alamitos (2010)
-
(2010)
28th International Conference on Consumer Electronics
, pp. 495-496
-
-
Park, N.1
Gadh, R.2
-
19
-
-
80053076189
-
-
MIC (Ministry of Information and Communication) of Korea (2005)
-
MIC (Ministry of Information and Communication) of Korea (2005) RFID Privacy Protection Guideline. MIC Report Paper (2005)
-
(2005)
RFID Privacy Protection Guideline. MIC Report Paper
-
-
-
25
-
-
78649572669
-
Harmful adult multimedia contents filtering method in mobile RFID service environment
-
Pan, J.-S., Chen, S.-M., Nguyen, N.T. (eds.) LNCS(LNAI) Springer, Heidelberg
-
Park, N., Kim, Y.: Harmful Adult Multimedia Contents Filtering Method in Mobile RFID Service Environment. In: Pan, J.-S., Chen, S.-M., Nguyen, N.T. (eds.) ICCCI 2010. LNCS(LNAI), vol. 6422, pp. 193-202. Springer, Heidelberg (2010)
-
(2010)
ICCCI 2010
, vol.6422
, pp. 193-202
-
-
Park, N.1
Kim, Y.2
-
26
-
-
78649566523
-
AONT encryption based application data management in mobile RFID environment
-
Pan, J.-S., Chen, S.-M., Nguyen, N.T. (eds.) LNCS(LNAI) Springer, Heidelberg
-
Park, N., Song, Y.: AONT Encryption Based Application Data Management in Mobile RFID Environment. In: Pan, J.-S., Chen, S.-M., Nguyen, N.T. (eds.) ICCCI 2010. LNCS(LNAI), vol. 6422, pp. 142-152. Springer, Heidelberg (2010)
-
(2010)
ICCCI 2010
, vol.6422
, pp. 142-152
-
-
Park, N.1
Song, Y.2
-
27
-
-
77958482600
-
Secure RFID application data management using all-or-nothing transform encryption
-
Pandurangan, G., Anil Kumar, V.S., Ming, G., Liu, Y., Li, Y. (eds.) LNCS Springer, Heidelberg
-
Park, N., Song, Y.: Secure RFID Application Data Management Using All-Or-Nothing Transform Encryption. In: Pandurangan, G., Anil Kumar, V.S., Ming, G., Liu, Y., Li, Y. (eds.) WASA 2010. LNCS, vol. 6221, pp. 245-252. Springer, Heidelberg (2010)
-
(2010)
WASA 2010
, vol.6221
, pp. 245-252
-
-
Park, N.1
Song, Y.2
|