Digital Library[ Search Result ]
Search : "[ keyword: Security ]" (177)
Vehicle Remote Key Authentication Scheme based on AP List for Preventing Amplification Attack
Shin Woo Joo Kyu-Seek Sohn Seung Yeob Nam
Vol. 42, No. 10, pp. 2012-2021, Oct. 2017
10.7840/kics.2017.42.10.2012
Vol. 42, No. 10, pp. 2012-2021, Oct. 2017
![](https://d2kjln74dkk4oj.cloudfront.net/img/ft_doi.png)
A Secure Mobile Messenger Based on Ethereum Whisper
Boohyung Lee Min-Young Lee Hyeon-Seo Ko So-Hee Myung Mi-Ock Kim
Jong-Hyouk Lee
Vol. 42, No. 7, pp. 1477-1484, Jul. 2017
10.7840/kics.2017.42.7.1477
Jong-Hyouk Lee
Vol. 42, No. 7, pp. 1477-1484, Jul. 2017
![](https://d2kjln74dkk4oj.cloudfront.net/img/ft_doi.png)
A Study on the Throughput Enhancement in Software Implementation of Ultra Light-Weight Cryptography PRESENT
Won-kyu Park G. P. Cebrian Sung-joon Kim Kang-hyun Lee Dae-woon Lim
Ki-soon Yu
Vol. 42, No. 2, pp. 316-322, Feb. 2017
Ki-soon Yu
Vol. 42, No. 2, pp. 316-322, Feb. 2017
![](https://d2kjln74dkk4oj.cloudfront.net/img/ft_doi.png)
Security and Privacy Issues of Fog Computing
Hyun-Jae Nam Ho-Yeol Choi Hyung-June Shin Hyun-Soo Kwon Jong-Min Jeong
Chang-Hee Hahn Jun-Beom Hur
Vol. 42, No. 1, pp. 257-267, Jan. 2017
Chang-Hee Hahn Jun-Beom Hur
Vol. 42, No. 1, pp. 257-267, Jan. 2017
![](https://d2kjln74dkk4oj.cloudfront.net/img/ft_doi.png)