Follow
Keunwoo Rhee
Keunwoo Rhee
Senior Member of Engineering Staff, NSR
Verified email at nsr.re.kr
Title
Cited by
Cited by
Year
Challenge-response based RFID authentication protocol for distributed database environment
K Rhee, J Kwak, S Kim, D Won
International Conference on Security in Pervasive Computing, 70-84, 2005
3602005
Security requirements of a mobile device management system
K Rhee, W Jeon, D Won
International Journal of Security and Its Applications 6 (2), 353-358, 2012
932012
Threat modeling of a mobile device management system for secure smart work
K Rhee, D Won, SW Jang, S Chae, S Park
Electronic Commerce Research 13, 243-256, 2013
582013
Security test methodology for an agent of a mobile device management system
K Rhee, H Kim, HY Na
International Journal of Security and Its Applications 6 (2), 137-142, 2012
172012
RFID System with Fairness within the Framework of Security and Privacy
J Kwak, K Rhee, S Oh, S Kim, D Won
Security and Privacy in Ad-hoc and Sensor Networks: Second European Workshop …, 2005
172005
High-level design for a secure mobile device management system
K Rhee, SK Eun, MR Joo, J Jeong, D Won
Human Aspects of Information Security, Privacy, and Trust: First …, 2013
162013
Challenge-Response Based Secure RFID Authentication Protocol for Distributed Database Environment
O Dong-Kyu, O Soo-Hyun
The KIPS Transactions: PartC 12 (3), 309-316, 2005
10*2005
RFID 활용 현황 및 보호대책
KW Rhee, DH Won, SJ Kim
Review of KIISC 18 (2), 12-22, 2008
62008
Efficient RFID authentication protocol for minimizing RFID tag computation
K Rhee, J Kwak, WS Yi, C Park, S Park, H Yang, S Kim, D Won
Advances in Hybrid Information Technology: First International Conference …, 2007
52007
Status and Protection of RFID
K Rhee, S Kim, D Won
Korea Institute of Information Security and Cryptology 18 (2), 0
2
An RFID system based MCLT system with improved privacy
J Kwak, K Rhee, N Park, H Kim, S Kim, K Sakurai, D Won
Emerging Directions in Embedded and Ubiquitous Computing: EUC 2006 Workshops …, 2006
12006
Developing the security functional requirements of mobile devices for the Korean government
K Rhee, D Jeong
The 16th International Common Criteria Conference, 2015
2015
Testing of a Mobile Device Management System: The Case of Korean Government
K Rhee
The 15th International Common Criteria Conference, 2014
2014
Protection Profile for Mobile Device Management Systems
K Rhee, W Jeon, D Won
ISA 2012, 2012
2012
Vulnerabilities and Improvements of Du-Xiao-Chen-Wu's Secure Cell Relay Routing Protocol for Sensor Networks
K Rhee, B Lee, D Won, HY Na, S Kim
2010 Fourth International Conference on Emerging Security Information …, 2010
2010
Unlinkable and Traceable EPC System for Consumer Privacy
J Kwak, K Rhee, S Kim, D Won
International Journal of Computer Science and Network Security 5 (12), 75-81, 2005
2005
Advanced security technique for ZIP file
JP Lee, JH Park, SJ Park, YS Choi, KW Rhee, SJ Kim, DH Won
Proceedings of the Korea Information Processing Society Conference, 929-932, 2005
2005
SECURWARE 2010
K Rhee, B Lee, D Won, HY Na, S Kim
The system can't perform the operation now. Try again later.
Articles 1–18