DaeHun Nyang
Exploring the attack surface of blockchain: A comprehensive survey
M Saad, J Spaulding, L Njilla, C Kamhoua, S Shetty, DH Nyang, ...
IEEE Communications Surveys & Tutorials 22 (3), 1977-2008, 2020
Method of providing completely automated public turing test to tell computer and human apart based on image
D Nyang, JI Kang
US Patent 8,352,598, 2013
Improvement of Das's Two-Factor Authentication Protocol in Wireless Sensor Networks.
DH Nyang, MK Lee
IACR Cryptol. ePrint Arch. 2009, 631, 2009
A survey on deep packet inspection for intrusion detection systems
T AbuHmed, A Mohaisen, DH Nyang
arXiv preprint arXiv:0803.0037, 2008
Toward characterizing blockchain-based cryptocurrencies for highly accurate predictions
M Saad, J Choi, DH Nyang, J Kim, A Mohaisen
IEEE Systems Journal 14 (1), 321-332, 2019
Group signatures with controllable linkability for dynamic membership
JY Hwang, S Lee, BH Chung, HS Cho, DH Nyang
Information Sciences 222, 761-778, 2013
Software-based remote code attestation in wireless sensor network
T AbuHmed, N Nyamaa, DH Nyang
GLOBECOM 2009-2009 IEEE Global Telecommunications Conference, 1-8, 2009
Short dynamic group signature scheme supporting controllable linkability
JY Hwang, L Chen, HS Cho, DH Nyang
IEEE Transactions on Information Forensics and Security 10 (6), 1109-1124, 2015
Keylogging-resistant visual authentication protocols
DH Nyang, A Mohaisen, J Kang
IEEE Transactions on Mobile Computing 13 (11), 2566-2579, 2014
Analyzing and detecting emerging internet of things malware: A graph-based approach
H Alasmary, A Khormali, A Anwar, J Park, J Choi, A Abusnaina, A Awad, ...
IEEE Internet of Things Journal 6 (5), 8977-8988, 2019
Proactive code verification protocol in wireless sensor network
YG Choi, J Kang, DH Nyang
International Conference on Computational Science and Its Applications, 1085 …, 2007
Short group signatures with controllable linkability
JY Hwang, S Lee, BH Chung, HS Cho, DH Nyang
2011 Workshop on Lightweight Security & Privacy: Devices, Protocols, and …, 2011
Two-factor face authentication using matrix permutation transformation and a user password
J Kang, DH Nyang, KH Lee
Information Sciences 269, 1-20, 2014
Large-scale and language-oblivious code authorship identification
M Abuhamad, T AbuHmed, A Mohaisen, DH Nyang
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
Knowledge-proof based versatile smart card verification protocol
DH Nyang, JS Song
ACM SIGCOMM Computer Communication Review 30 (3), 39-44, 2000
RFID 시스템에서의 프라이버시 보호기술
강전일, 박주성, 양대헌
정보보호학회지 14 (6), 28-36, 2004
SSD-insider: Internal defense of solid-state drive against ransomware with perfect data recovery
SH Baek, Y Jung, A Mohaisen, S Lee, DH Nyang
2018 IEEE 38th International Conference on Distributed Computing Systems …, 2018
RFlow+: An SDN-based WLAN monitoring and management framework
RH Jang, DG Cho, Y Noh, DH Nyang
IEEE INFOCOM 2017-IEEE Conference on Computer Communications, 1-9, 2017
Hierarchical grid-based pairwise key predistribution scheme for wireless sensor networks
A Mohaisen, DH Nyang
European workshop on wireless sensor networks, 83-98, 2006
RFID authentication protocol with strong resistance against traceability and denial of service attacks
J Kang, DH Nyang
European Workshop on Security in Ad-hoc and Sensor Networks, 164-175, 2005
현재 시스템이 작동되지 않습니다. 나중에 다시 시도해 주세요.
학술자료 1–20