Author of the publication

A Practical Analysis of TLS Vulnerabilities in Korea Web Environment.

, , , and . WISA, volume 10144 of Lecture Notes in Computer Science, page 112-123. (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis of NTP pool monitoring system based on multiple monitoring stations., , and . MobiHoc, page 259-264. ACM, (2022)Secure Device-to-Device Authentication in Mobile Multi-hop Networks., , , , and . WASA, volume 8491 of Lecture Notes in Computer Science, page 267-278. Springer, (2014)A Distributed Deterministic and Resilient Replication Attack Detection Protocol in Wireless Sensor Networks., , , , and . FGIT-FGCN, volume 56 of Communications in Computer and Information Science, page 405-412. Springer, (2009)Cache Side-Channel Attack on Mail User Agent., , , and . ICOIN, page 236-238. IEEE, (2020)Fully-distributed multicast routing protocol for IEEE 802.15.8 peer-aware communications., , , , , , , , and . ICOIN, page 64-69. IEEE Computer Society, (2014)A Survey on Security Threats in Blockchain-based Internet of Things Systems., and . ICTC, page 2134-2138. IEEE, (2022)A Comparative Analysis of Searchable Encryption Schemes using SGX., and . ICTC, page 526-528. IEEE, (2020)Downgrading Backward Privacy of Searchable Encryption., , , , and . ICOIN, page 324-328. IEEE, (2022)A reliable adaptive forwarding approach in named data networking., , , , and . Future Gener. Comput. Syst., (2019)Design and QoS of a Wireless System for Real-Time Remote Electrocardiography., , , and . IEEE J. Biomed. Health Informatics, 17 (3): 745-755 (2013)