Privacy-enhancing security protocol in LTE initial attack U Jang, H Lim, H Kim Symmetry 6 (4), 1011-1025, 2014 | 18 | 2014 |
A study on design and implementation of the ubiquitous computing environment-based dynamic smart on/off-line learner tracking system HM Lim, KW Jang, BG Kim Journal of Information Processing Systems 6 (4), 609-620, 2010 | 7 | 2010 |
A license audit model for secure DRM systems in IP-based environments UJ Jang, HM Lim, YT Shin Journal of Information Processing Systems 6 (2), 253-260, 2010 | 3 | 2010 |
Ubiquitous-City Integrated Authentication System (UCIAS) JS Jang, HM Lim Journal of Intelligent Manufacturing 25 (2), 347-355, 2014 | 2 | 2014 |
Security Scheme for LTE Initial Attach U Jang, H Lim, H Kim Ubiquitous Computing Application and Wireless Sensor: UCAWSN-14, 53-66, 2015 | 1 | 2015 |
A Study on the Efficient Management of Android Apps Using a Whitelist U Jang, C Suh, H Lim Frontier and Innovation in Future Computing and Communications, 473-482, 2014 | 1 | 2014 |
Design and Implementation of The Ubiquitous Computing Environment-Based on Dynamic Smart on/off-line Learner Tracking System HM Lim, SH Lee, BG Kim Journal of Korea Multimedia Society 14 (1), 24-32, 2011 | 1 | 2011 |
A Study on the License Management Model for Secure Contents Distribution in Ubiquitous Environment UJ Jang, HM Lim, YT Shin Journal of Korea Multimedia Society 12 (4), 550-558, 2009 | | 2009 |
A Proposal for Digital Forensic Model for Secure Digital Rights Management UJ Jang, BO Jung, HM Lim, YT Shin Journal of the Korea Institute of Information Security & Cryptology 18 (6A …, 2008 | | 2008 |