DaeHun Nyang
제목
인용
인용
연도
Method of providing completely automated public turing test to tell computer and human apart based on image
D Nyang, JI Kang
US Patent 8,352,598, 2013
1172013
Improvement of Das's Two-Factor Authentication Protocol in Wireless Sensor Networks.
DH Nyang, MK Lee
IACR Cryptol. ePrint Arch. 2009, 631, 2009
1102009
A survey on deep packet inspection for intrusion detection systems
T AbuHmed, A Mohaisen, DH Nyang
arXiv preprint arXiv:0803.0037, 2008
912008
Group signatures with controllable linkability for dynamic membership
JY Hwang, S Lee, BH Chung, HS Cho, DH Nyang
Information Sciences 222, 761-778, 2013
572013
Software-based remote code attestation in wireless sensor network
T AbuHmed, N Nyamaa, DH Nyang
GLOBECOM 2009-2009 IEEE Global Telecommunications Conference, 1-8, 2009
502009
Exploring the attack surface of blockchain: A systematic overview
M Saad, J Spaulding, L Njilla, C Kamhoua, S Shetty, DH Nyang, ...
arXiv preprint arXiv:1904.03487, 2019
482019
Keylogging-resistant visual authentication protocols
DH Nyang, A Mohaisen, J Kang
IEEE Transactions on Mobile Computing 13 (11), 2566-2579, 2014
462014
Short dynamic group signature scheme supporting controllable linkability
JY Hwang, L Chen, HS Cho, DH Nyang
IEEE Transactions on Information Forensics and Security 10 (6), 1109-1124, 2015
442015
Proactive code verification protocol in wireless sensor network
YG Choi, J Kang, DH Nyang
International Conference on Computational Science and Its Applications, 1085 …, 2007
432007
Short group signatures with controllable linkability
JY Hwang, S Lee, BH Chung, HS Cho, DH Nyang
2011 Workshop on Lightweight Security & Privacy: Devices, Protocols, and …, 2011
412011
Two-factor face authentication using matrix permutation transformation and a user password
J Kang, DH Nyang, KH Lee
Information Sciences 269, 1-20, 2014
392014
Toward characterizing blockchain-based cryptocurrencies for highly accurate predictions
M Saad, J Choi, DH Nyang, J Kim, A Mohaisen
IEEE Systems Journal 14 (1), 321-332, 2019
382019
RFID 시스템에서의 프라이버시 보호기술
강전일, 박주성, 양대헌
정보보호학회지 14 (6), 28-36, 2004
312004
Hierarchical grid-based pairwise key predistribution scheme for wireless sensor networks
A Mohaisen, DH Nyang
European workshop on wireless sensor networks, 83-98, 2006
302006
Knowledge-proof based versatile smart card verification protocol
DH Nyang, JS Song
ACM SIGCOMM Computer Communication Review 30 (3), 39-44, 2000
292000
Large-scale and language-oblivious code authorship identification
M Abuhamad, T AbuHmed, A Mohaisen, DH Nyang
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
252018
On grid-based key pre-distribution: Toward a better connectivity in wireless sensor network
A Mohaisen, YJ Maeng, DH Nyang
Pacific-Asia conference on knowledge discovery and data mining, 527-537, 2007
252007
RFID authentication protocol with strong resistance against traceability and denial of service attacks
J Kang, DH Nyang
European Workshop on Security in Ad-hoc and Sensor Networks, 164-175, 2005
252005
SSD-insider: Internal defense of solid-state drive against ransomware with perfect data recovery
SH Baek, Y Jung, A Mohaisen, S Lee, DH Nyang
2018 IEEE 38th International Conference on Distributed Computing Systems …, 2018
242018
Analyzing and detecting emerging internet of things malware: A graph-based approach
H Alasmary, A Khormali, A Anwar, J Park, J Choi, A Abusnaina, A Awad, ...
IEEE Internet of Things Journal 6 (5), 8977-8988, 2019
232019
현재 시스템이 작동되지 않습니다. 나중에 다시 시도해 주세요.
학술자료 1–20