Name
Playground
About
FAQ
GitHub
Playground
Shortest Path Finder
Community Detector
Connected Papers
Author Trending
Claudia Calabrese
Christoph Langenhan
Hao Mao
Peter Malec
Giovanni Venturelli
Chen Ma
Radu Timofte
Kuanrui Yin
Rick Hank
D. Navarrini
Home
/
Author
/
KYO-IL CHUNG
Author Info
Open Visualization
Name
Affiliation
Papers
KYO-IL CHUNG
Information Security Research Division, Electronics and Telecommunications Research Institute (ETRI), Daejeon, Korea 305-700
26
Collaborators
Citations
PageRank
49
70
12.97
Referers
Referees
References
210
340
157
Search Limit
100
340
Publications (26 rows)
Collaborators (49 rows)
Referers (100 rows)
Referees (100 rows)
Title
Citations
PageRank
Year
A Study on the Quantitative Design and Documentation for the VR Based Training Contents Realism.
0
0.34
2017
Kinematic Skeleton Based Control of a Virtual Simulator for Military Training
2
0.38
2015
Information Security Applications: 9th International Workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers
21
1.48
2009
How to Integrate Diverse Client Authentication Protocol with various authentication means
0
0.34
2008
Forensics for Korean cell phone.
1
0.39
2008
Security Architecture for Authentication and Authorization in the Intelligent and Ubiquitous Home Network
0
0.34
2007
Home Network Device Authentication: Device Authentication Framework and Device Certificate Profile
2
0.48
2007
Intelligent home network authentication: S/key-based home device authentication
1
0.40
2007
Design of Embedded Multimodal Biometric Systems
2
0.48
2007
Efficient exponentiation in GF(pm) using the Frobenius map
0
0.34
2006
A Layered Approach to Design of Light-Weight Middleware Systems for Mobile RFID Security (SMRM : Secure Mobile RFID Middleware System)
1
0.37
2006
XML-signcryption based LBS security protocol acceleration methods in mobile distributed computing
3
0.43
2006
Security enhancement mechanism for ad-hoc OLSR protocol
0
0.34
2006
A security acceleration using XML signcryption scheme in mobile grid web services
2
0.37
2005
XKMS-Based key management for open LBS in web services environment
2
0.40
2005
XML-Based digital signature accelerator in open mobile grid computing
0
0.34
2005
Security frameworks for open LBS based on web services security mechanism
1
0.38
2005
A DPA countermeasure by randomized frobenius decomposition
0
0.34
2005
Design and implementation of crypto co-processor and its application to security systems
2
0.41
2005
An enhanced LBS security protocol in wireless networks
1
0.41
2005
Trusted Certificate Validation Scheme For Open Lbs Application Based On Xml Web Services
3
0.40
2005
Design of Sub-session Based Accounting System for Different Service Level of Mobile IP Roaming User
1
0.35
2004
Hyperelliptic curve coprocessors on a FPGA
10
0.71
2004
The implementation of IPsec-Based internet security system in IPv4/IPv6 network
1
1.10
2004
Implementation of an Elliptic Curve Cryptography Hardware Accelerator for Smart Cards
0
0.34
2003
Implementation of ECC/ECDSA cryptography algorithms based on Java card
14
1.35
2002
1