Challenge-response based RFID authentication protocol for distributed database environment K Rhee, J Kwak, S Kim, D Won International Conference on Security in Pervasive Computing, 70-84, 2005 | 360 | 2005 |
Security requirements of a mobile device management system K Rhee, W Jeon, D Won International Journal of Security and Its Applications 6 (2), 353-358, 2012 | 93 | 2012 |
Threat modeling of a mobile device management system for secure smart work K Rhee, D Won, SW Jang, S Chae, S Park Electronic Commerce Research 13, 243-256, 2013 | 58 | 2013 |
Security test methodology for an agent of a mobile device management system K Rhee, H Kim, HY Na International Journal of Security and Its Applications 6 (2), 137-142, 2012 | 17 | 2012 |
RFID System with Fairness within the Framework of Security and Privacy J Kwak, K Rhee, S Oh, S Kim, D Won Security and Privacy in Ad-hoc and Sensor Networks: Second European Workshop …, 2005 | 17 | 2005 |
High-level design for a secure mobile device management system K Rhee, SK Eun, MR Joo, J Jeong, D Won Human Aspects of Information Security, Privacy, and Trust: First …, 2013 | 16 | 2013 |
Challenge-Response Based Secure RFID Authentication Protocol for Distributed Database Environment O Dong-Kyu, O Soo-Hyun The KIPS Transactions: PartC 12 (3), 309-316, 2005 | 10* | 2005 |
RFID 활용 현황 및 보호대책 KW Rhee, DH Won, SJ Kim Review of KIISC 18 (2), 12-22, 2008 | 6 | 2008 |
Efficient RFID authentication protocol for minimizing RFID tag computation K Rhee, J Kwak, WS Yi, C Park, S Park, H Yang, S Kim, D Won Advances in Hybrid Information Technology: First International Conference …, 2007 | 5 | 2007 |
Status and Protection of RFID K Rhee, S Kim, D Won Korea Institute of Information Security and Cryptology 18 (2), 0 | 2 | |
An RFID system based MCLT system with improved privacy J Kwak, K Rhee, N Park, H Kim, S Kim, K Sakurai, D Won Emerging Directions in Embedded and Ubiquitous Computing: EUC 2006 Workshops …, 2006 | 1 | 2006 |
Developing the security functional requirements of mobile devices for the Korean government K Rhee, D Jeong The 16th International Common Criteria Conference, 2015 | | 2015 |
Testing of a Mobile Device Management System: The Case of Korean Government K Rhee The 15th International Common Criteria Conference, 2014 | | 2014 |
Protection Profile for Mobile Device Management Systems K Rhee, W Jeon, D Won ISA 2012, 2012 | | 2012 |
Vulnerabilities and Improvements of Du-Xiao-Chen-Wu's Secure Cell Relay Routing Protocol for Sensor Networks K Rhee, B Lee, D Won, HY Na, S Kim 2010 Fourth International Conference on Emerging Security Information …, 2010 | | 2010 |
Unlinkable and Traceable EPC System for Consumer Privacy J Kwak, K Rhee, S Kim, D Won International Journal of Computer Science and Network Security 5 (12), 75-81, 2005 | | 2005 |
Advanced security technique for ZIP file JP Lee, JH Park, SJ Park, YS Choi, KW Rhee, SJ Kim, DH Won Proceedings of the Korea Information Processing Society Conference, 929-932, 2005 | | 2005 |
SECURWARE 2010 K Rhee, B Lee, D Won, HY Na, S Kim | | |