Advanced key-management architecture for secure SCADA communications D Choi, H Kim, D Won, S Kim IEEE transactions on Power delivery 24 (3), 1154-1163, 2009 | 135 | 2009 |
Efficient secure group communications for SCADA D Choi, S Lee, D Won, S Kim IEEE Transactions on power delivery 25 (2), 714-722, 2009 | 106 | 2009 |
일회용 패스워드 (OTP: One-Time Password) 기술 분석 및 표준화 동향 최동현, 김승주, 원동호 정보보호학회지 17 (3), 12-17, 2007 | 41 | 2007 |
Domain digital rights management system, license sharing method for domain digital rights management system, and license server DH Choi, YH Lee, SJ Kim, DH Won US Patent 8,165,304, 2012 | 39 | 2012 |
An efficient key management scheme for secure SCADA communication S Lee, D Choi, C Park, S Kim International Journal of Electronics and Communication Engineering 2 (9 …, 2008 | 28 | 2008 |
Hybrid key management architecture for robust SCADA systems D Choi, H Jeong, D Won, S Kim Journal of information science and engineering 29 (2), 281-298, 2013 | 17 | 2013 |
Shared key management method, shared key generating method and message communication method for scada system, and recording medium S Lee, SJ Kim, D Won, DH Choi, LEE Kwang-Woo, B Lee, H Jeong, ... US Patent App. 12/384,173, 2010 | 17 | 2010 |
Security weaknesses of dynamic ID-based remote user authentication protocol H Lee, D Choi, Y Lee, D Won, S Kim Proc. World Academy of Engineering and Technology 1, 190-193, 2009 | 13 | 2009 |
One-time password Technical Analysis and Standardization DH Choi, SJ Kim, DH Won proceeding of KIISC 17 (3), 12-17, 2007 | 10 | 2007 |
Hybrid key management architecture for robust SCADA systems D Choi, H Jeong, D Won, S Kim Journal of Information Science and Engineering 27, 197-211, 2011 | 9 | 2011 |
Secure and efficient code encryption scheme based on indexed table S Cho, D Shin, H Jo, D Choi, D Won, S Kim ETRI Journal 33 (1), 60-70, 2011 | 8 | 2011 |
Cryptanalysis of two-factor authenticated key exchange protocol in public wireless lans H Lee, D Choi, Y Lee, D Won, S Kim World Academyof Science Engineering & Technology, 2009 | 6 | 2009 |
Security analysis on commercial online music streaming service and countermeasures S Lee, D Choi, D Won, S Kim Proceedings of the 4th International Conference on Uniquitous Information …, 2010 | 5 | 2010 |
스마트 그리드 환경에서의 키 관리 기술 동향 분석 최동현, 원동호, 김승주 정보보호학회지 20 (5), 41-47, 2010 | 2 | 2010 |
Security Analysis on Commercial Online Music Streaming Service and Countermeasures SS Lee, DH Choi, DH Won, SJ Kim The KIPS Transactions: PartC 16 (6), 681-690, 2009 | 2 | 2009 |
Protection profile for connected interoperable drm framework D Choi, S Cho, D Won, S Kim International Workshop on Information Security Applications, 320-332, 2008 | 2 | 2008 |
국외 PKI 구축 현황 분석 SJ Lee, DH Choi, DH Won, SJ Kim Review of KIISC 17 (6), 106-120, 2007 | 2 | 2007 |
An efficient and secure rights sharing method for drm system against replay attack D Choi, Y Lee, H Kang, S Kim, D Won Autonomic and Trusted Computing: 4th International Conference, ATC 2007 …, 2007 | 2 | 2007 |
Advanced key management architecture based on tree structure for secure SCADA communications DH Choi, SJ Lee, HJ Jeong, DJ Kang, HM Kim, KS Kim, DH Won, SJ Kim The KIPS Transactions: PartC 16 (1), 37-50, 2009 | 1 | 2009 |
A Secure License Sharing Scheme for Domain DRM System Against Replay Attack DH Choi, YH Lee, HG Kang, SJ Kim, DH Won Journal of the Korea Institute of Information Security & Cryptology 17 (1 …, 2007 | 1 | 2007 |