Name
Affiliation
Papers
KYO-IL CHUNG
Information Security Research Division, Electronics and Telecommunications Research Institute (ETRI), Daejeon, Korea 305-700
26
Collaborators
Citations 
PageRank 
49
70
12.97
Referers 
Referees 
References 
210
340
157
Search Limit
100340
Title
Citations
PageRank
Year
A Study on the Quantitative Design and Documentation for the VR Based Training Contents Realism.00.342017
Kinematic Skeleton Based Control of a Virtual Simulator for Military Training20.382015
Information Security Applications: 9th International Workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers211.482009
How to Integrate Diverse Client Authentication Protocol with various authentication means00.342008
Forensics for Korean cell phone.10.392008
Security Architecture for Authentication and Authorization in the Intelligent and Ubiquitous Home Network00.342007
Home Network Device Authentication: Device Authentication Framework and Device Certificate Profile20.482007
Intelligent home network authentication: S/key-based home device authentication10.402007
Design of Embedded Multimodal Biometric Systems20.482007
Efficient exponentiation in GF(pm) using the Frobenius map00.342006
A Layered Approach to Design of Light-Weight Middleware Systems for Mobile RFID Security (SMRM : Secure Mobile RFID Middleware System)10.372006
XML-signcryption based LBS security protocol acceleration methods in mobile distributed computing30.432006
Security enhancement mechanism for ad-hoc OLSR protocol00.342006
A security acceleration using XML signcryption scheme in mobile grid web services20.372005
XKMS-Based key management for open LBS in web services environment20.402005
XML-Based digital signature accelerator in open mobile grid computing00.342005
Security frameworks for open LBS based on web services security mechanism10.382005
A DPA countermeasure by randomized frobenius decomposition00.342005
Design and implementation of crypto co-processor and its application to security systems20.412005
An enhanced LBS security protocol in wireless networks10.412005
Trusted Certificate Validation Scheme For Open Lbs Application Based On Xml Web Services30.402005
Design of Sub-session Based Accounting System for Different Service Level of Mobile IP Roaming User10.352004
Hyperelliptic curve coprocessors on a FPGA100.712004
The implementation of IPsec-Based internet security system in IPv4/IPv6 network11.102004
Implementation of an Elliptic Curve Cryptography Hardware Accelerator for Smart Cards00.342003
Implementation of ECC/ECDSA cryptography algorithms based on Java card141.352002