Analysis and study on invasion threat and security measures for smart home services in IoT environment

M Lee, J Park - The Journal of the Institute of Internet, Broadcasting …, 2016 - koreascience.kr
Abstract In general, IoT (Internet of things) designate the intelligence technologies and
services which interact all necessity information between human and things, things and …

Time‐and‐ID‐Based Proxy Reencryption Scheme

K Mtonga, A Paul, S Rho - Journal of Applied Mathematics, 2014 - Wiley Online Library
Time‐and ID‐based proxy reencryption scheme is proposed in this paper in which a type‐
based proxy reencryption enables the delegator to implement fine‐grained policies with one …

[PDF][PDF] 스마트홈활성화를위한서비스분야의연구동향분석: 국외연구동향및등재학술지를중심으로

이종호, 이재욱, 서동구, 황은경 - 한국산학기술학회논문지, 2022 - kais99.org
요 약 본 연구의 목적은 스마트홈의 국외 연구, 시장, 기술 동향을 파악하고, 국내의 스마트홈
관련 서비스 연구 내용을자세히 조사하는 것에 있다. 그리고 이를 바탕으로 스마트홈 서비스 …

[HTML][HTML] AUDIO SYSTEM USING LIGHT FIDELITY

L Seungjik - Science and innovation, 2024 - cyberleninka.ru
Currently, wireless communication technologies such as Wi-Fi and Bluetooth are widely
used in our daily lives. Their wireless communication technology uses radio waves and uses …

Case studies of elderly-friendly context-aware smart home system

HM Bae, BS Kim - The journal of the institute of internet …, 2015 - koreascience.kr
As the population in Korea is feastly aging, various issues for living environment for elderly
people are reported. Context-aware-based smart home system is also considered as one of …

Real-Time Copyright Security Scheme of Immersive Content based on HEVC

CS Yun, JH Jun, SH Kim, DS Kim - The Journal of the Institute of …, 2021 - koreascience.kr
In this paper, we propose a copyright protection scheme for real-time streaming of HEVC
(High Efficiency Video Coding) based realistic content. Previous research uses encryption …

A Study on the Usage Model for Cloud Media Service Using Cloud DRM

YM Kim, B Kim, HM Lim, SY Kim - … Information Institute (Tokyo) …, 2016 - search.proquest.com
Abstract A Cloud Media Service uses DRM (Digital Rights Management) to protect copyright
but there are several problems to be addressed, as follows. If a cloud is chosen, there is a …

영상의유해성을나타내는인체의구성요소검출

장석우, 허문행 - 한국정보기술학회논문지, 2013 - dbpia.co.kr
본 논문에서는 성인영상을 검출하는데 사용하기 위해서, 유두 맵과 평균 색상필터를 정의하여
입력영상으로부터 유해성을 대표하는 신체의 구성요소 중의 하나인 여성의 유두 영역을 …

[引用][C] Collusion-Resistant Identity-based Proxy Re-encryption

WK Koo, JY Hwang, DH Lee