-
1
-
-
84915820141
-
Entity authentication scheme for secure WEB of Things applications
-
Park, J., Kang, N.: Entity authentication scheme for secure WEB of Things applications. J. KICS 38B(5), 394–400 (2013)
-
(2013)
J. KICS
, vol.38B
, Issue.5
, pp. 394-400
-
-
Park, J.1
Kang, N.2
-
2
-
-
38049147945
-
Efficient user authentication and key agreement in wireless sensor networks
-
In: Lee, J.K., Yi, O., Yung, M. (eds.), Springer, Heidelberg
-
Juang, W.-S.: Efficient user authentication and key agreement in wireless sensor networks. In: Lee, J.K., Yi, O., Yung, M. (eds.) WISA 2006. LNCS, vol. 4298, pp. 15–29. Springer, Heidelberg (2007)
-
(2007)
WISA 2006. LNCS
, vol.4298
, pp. 15-29
-
-
Juang, W.-S.1
-
3
-
-
84915743515
-
Implementation of publickey-based key distribution in wireless sensor network
-
Oh, K., Kim, T., Kim, H.: Implementation of publickey-based key distribution in wireless sensor network. In: Proc. KOSBE, pp. 95–98 (2008)
-
(2008)
Proc. KOSBE
, pp. 95-98
-
-
Oh, K.1
Kim, T.2
Kim, H.3
-
4
-
-
83555176391
-
Security challenges in the IP-based Internet of Things
-
Heer, T., Garcia-Morchon, O., Hummen, R., Keoh, S., Kumar, S., Wehrle, K.: Security challenges in the IP-based Internet of Things. Wireless Personal Commun. 61(3), 527–542 (2011)
-
(2011)
Wireless Personal Commun
, vol.61
, Issue.3
, pp. 527-542
-
-
Heer, T.1
Garcia-Morchon, O.2
Hummen, R.3
Keoh, S.4
Kumar, S.5
Wehrle, K.6
-
5
-
-
84915782611
-
Mutual Authentication and Key Agreement Scheme between Lightweight Devices in Internet of Things
-
Park, J., Shin, S., Kang, N.: Mutual Authentication and Key Agreement Scheme between Lightweight Devices in Internet of Things. The Journal of Korea Information and Communications Society 38B(9), 707–714 (2013)
-
(2013)
The Journal of Korea Information and Communications Society
, vol.38B
, Issue.9
, pp. 707-714
-
-
Park, J.1
Shin, S.2
Kang, N.3
-
6
-
-
80053074547
-
Implementation of Terminal Middleware Platform for Mobile RFID Computing
-
Park, N.: Implementation of Terminal Middleware Platform for Mobile RFID Computing. Int. J. Ad Hoc Ubiquitous Comput. 8, 205–219 (2011)
-
(2011)
Int. J. Ad Hoc Ubiquitous Comput
, vol.8
, pp. 205-219
-
-
Park, N.1
-
7
-
-
80052330084
-
Secure Data Access Control Scheme Using Type-Based Re-encryption in Cloud Environment
-
In: Katarzyniak, R., Chiu, T.-F., Hong, C.-F., Nguyen, N.T., et al. (eds.), Springer, Heidelberg
-
Park, N.: Secure Data Access Control Scheme Using Type-Based Re-encryption in Cloud Environment. In: Katarzyniak, R., Chiu, T.-F., Hong, C.-F., Nguyen, N.T., et al. (eds.) Semantic Methods. SCI, vol. 381, pp. 319–327. Springer, Heidelberg (2011)
-
(2011)
Semantic Methods. SCI
, vol.381
, pp. 319-327
-
-
Park, N.1
-
8
-
-
78649423092
-
Security Scheme for Managing a Large Quantity of Individual Information in RFID Environment
-
In: Zhu, R., Zhang, Y., Liu, B., Liu, C., et al. (eds.), Part II. CCIS, Springer, Heidelberg
-
Park, N.: Security Scheme for Managing a Large Quantity of Individual Information in RFID Environment. In: Zhu, R., Zhang, Y., Liu, B., Liu, C., et al. (eds.) ICICA 2010, Part II. CCIS, vol. 106, pp. 72–79. Springer, Heidelberg (2010)
-
(2010)
ICICA 2010
, vol.106
, pp. 72-79
-
-
Park, N.1
-
9
-
-
84865969179
-
Mobile RFID/NFC Linkage Based on UHF/HF Dual Band’s Integration in USensor Network Era
-
Park, J.H(J.), Kim, J., Zou, D., Lee, Y.S. (eds.), Springer, Heidelberg
-
Park, N.: Mobile RFID/NFC Linkage Based on UHF/HF Dual Band’s Integration in USensor Network Era. In: Park, J.H(J.), Kim, J., Zou, D., Lee, Y.S. (eds.) ITCS & STA 2012. LNEE, vol. 180, pp. 265–271. Springer, Heidelberg (2012)
-
(2012)
ITCS & STA 2012. LNEE
, vol.180
, pp. 265-271
-
-
Park, N.1
-
10
-
-
84871604873
-
Computer Education’s Teaching-Learning Methods Using Educational Programming Language Based on STEAM Education
-
In: Park, J.J., Zomaya, A., Yeo, S.- S., Sahni, S., et al. (eds.), Springer, Heidelberg
-
Park, N., Ko, Y.: Computer Education’s Teaching-Learning Methods Using Educational Programming Language Based on STEAM Education. In: Park, J.J., Zomaya, A., Yeo, S.- S., Sahni, S., et al. (eds.) NPC 2012. LNCS, vol. 7513, pp. 320–327. Springer, Heidelberg (2012)
-
(2012)
NPC 2012. LNCS
, vol.7513
, pp. 320-327
-
-
Park, N.1
Ko, Y.2
-
11
-
-
84869784970
-
Development of Computer, Math, Art Convergence Education Lesson Plans Based on Smart Grid Technology
-
In: Kim, T.-h., Stoica, A., Fang, W.-c., Vasilakos, T., Villalba, J.G., Arnett, K.P., Khan, M.K., Kang, B.-H., et al. (eds.), Springer, Heidelberg
-
Ko, Y., An, J., Park, N.: Development of Computer, Math, Art Convergence Education Lesson Plans Based on Smart Grid Technology. In: Kim, T.-h., Stoica, A., Fang, W.-c., Vasilakos, T., Villalba, J.G., Arnett, K.P., Khan, M.K., Kang, B.-H., et al. (eds.) SecTech/CA/CES3 2012. CCIS, vol. 339, pp. 109–114. Springer, Heidelberg (2012)
-
(2012)
SecTech/CA/CES3 2012. CCIS
, vol.339
, pp. 109-114
-
-
Ko, Y.1
An, J.2
Park, N.3
-
12
-
-
84868582995
-
Security Enhancement of User Authentication Scheme Using IVEF in Vessel Traffic Service System
-
In: Yeo, S., Pan, Y., Lee, Y.S., et al. (eds.), Springer, Heidelberg
-
Park, N., Cho, S., Kim, B., et al.: Security Enhancement of User Authentication Scheme Using IVEF in Vessel Traffic Service System. In: Yeo, S., Pan, Y., Lee, Y.S., et al. (eds.) Computer Science and its Applications. LNEE, vol. 203, pp. 699–705. Springer, Heidelberg (2012)
-
(2012)
Computer Science and its Applications. LNEE
, vol.203
, pp. 699-705
-
-
Park, N.1
Cho, S.2
Kim, B.3
-
13
-
-
84869773856
-
Design and Implementation of IVEF Protocol Using Wireless Communication on Android Mobile Platform
-
In: Kim, T.-h., Stoica, A., Fang, W.-c., Vasilakos, T., Villalba, J.G., Arnett, K.P., Khan, M.K., Kang, B.-H., et al. (eds.), Springer, Heidelberg
-
Kim, K., Kim, B.-D., Lee, B., Park, N.: Design and Implementation of IVEF Protocol Using Wireless Communication on Android Mobile Platform. In: Kim, T.-h., Stoica, A., Fang, W.-c., Vasilakos, T., Villalba, J.G., Arnett, K.P., Khan, M.K., Kang, B.-H., et al. (eds.) SecTech/CA/CES3 2012. CCIS, vol. 339, pp. 94–100. Springer, Heidelberg (2012)
-
(2012)
SecTech/CA/CES3 2012. CCIS
, vol.339
, pp. 94-100
-
-
Kim, K.1
Kim, B.-D.2
Lee, B.3
Park, N.4
-
14
-
-
84869759977
-
Program Development of Science and Culture Education Tapping into Jeju’s Special Characteristics for Adults
-
In: Kim, T.-h., Stoica, A., Fang, W.-c., Vasilakos, T., Villalba, J.G., Arnett, K.P., Khan, M.K., Kang, B.-H., et al. (eds.), Springer, Heidelberg
-
Kim, G., Park, N.: Program Development of Science and Culture Education Tapping into Jeju’s Special Characteristics for Adults. In: Kim, T.-h., Stoica, A., Fang, W.-c., Vasilakos, T., Villalba, J.G., Arnett, K.P., Khan, M.K., Kang, B.-H., et al. (eds.) SecTech/CA/CES3 2012. CCIS, vol. 339, pp. 133–138. Springer, Heidelberg (2012)
-
(2012)
SecTech/CA/CES3 2012. CCIS
, vol.339
, pp. 133-138
-
-
Kim, G.1
Park, N.2
-
15
-
-
84906783185
-
Implementation of load management application system using smart grid privacy policy in energy management service environment
-
March
-
Park, N., Kim, M.: Implementation of load management application system using smart grid privacy policy in energy management service environment. Cluster Computing (March 2014)
-
(2014)
Cluster Computing
-
-
Park, N.1
Kim, M.2
|