Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Seungjoo KimProfessor at the School of Cybersecurity in Korea UniversityVerified email at korea.ac.kr
- Julian Jang-JaccardCyber-Defence Campus, armasuisse S+T, Swiss Federal Department of DefenseVerified email at ar.admin.ch
- Keunwoo RheeSenior Member of Engineering Staff, NSRVerified email at nsr.re.kr
- Namje ParkProfessor of Computer Education, Jeju National University Verified email at jejunu.ac.kr
- Seung-hwan JUAUTOCRYPT Co., LtdVerified email at autocrypt.io
- wen xuJunior Research OfficerVerified email at massey.ac.nz
- Sang-Soo YeoMokwon UniversityVerified email at mokwon.ac.kr
- Jeeyeon KimconsultantVerified email at daum.net
- Amardeep SinghUCOL Te PūkengaVerified email at ucol.ac.nz
- Chung-Huang YangNational Kaohsiung Normal UniversityVerified email at nknu.edu.tw
- Doo-Soon ParkSoonchunhyang UniversityVerified email at sch.ac.kr
- Kwangwoo LeeSungkyunkwan UniversityVerified email at security.re.kr
- Junghyun NamProfessor of Computer Engineering, Konkuk UniversityVerified email at kku.ac.kr
- Sun-Ho Lee순천향대 컴퓨터소프트웨어공학과Verified email at sch.ac.kr
- Jong Hyuk ParkSeoulTech, Dept. of Com. Sci. & Eng.Verified email at seoultech.ac.kr
- Sijae WooThe Affiliated Institute of ETRIVerified email at nsr.re.kr
- Jinting ZhuPhD
Follow