Follow
Young-Jin Kang
Young-Jin Kang
Dong-eui University
Verified email at deu.ac.kr
Title
Cited by
Cited by
Year
Survey on security in Internet of Things: State of the art and challenges
M Sain, YJ Kang, HJ Lee
2017 19th International conference on advanced communication technology …, 2017
1172017
Cross-method-based analysis and classification of malicious behavior by api calls extraction
B Ndibanje, KH Kim, YJ Kang, HH Kim, TY Kim, HJ Lee
Applied Sciences 9 (2), 239, 2019
502019
Obstacles effects on signal attenuation in line of sight for different environments in v2v communication
MA Al-Absi, AA Al-Absi, YJ Kang, HJ Lee
2018 20th International Conference on Advanced Communication Technology …, 2018
232018
An experimental cpa attack for arduino cryptographic module
YJ Kang, TY Kim, JB Jo, HJ Lee
International Journal of Security and Its Applications 8 (2), 261-270, 2014
152014
A study on detection of anomaly behavior in automation industry
SM Ryu, YJ Kang, HJ Lee
2018 20th International Conference on Advanced Communication Technology …, 2018
92018
On modeling protocol-based clustering tag in RFID systems with formal security analysis
N Bruce, H Kim, Y Kang, Y Lee, H Lee
2015 IEEE 29th International Conference on Advanced Information Networking …, 2015
52015
A secure and efficient mutual authentication hand-off protocol for sensor device support in internet of things
B Ndibanje, K Kim, Y Kang, H Kim, T Kim, H Lee
Sensors and Materials 29 (7), 953-960, 2017
42017
A study on information security attack based side-channel attacks
YJ Kang, N Bruce, SH Park, HJ Lee
2016 18th International Conference on Advanced Communication Technology …, 2016
42016
Scrambler Based AES for Countermeasure Against Power Analysis Attacks
YJ Kang, KH Kim, HJ Lee
Advanced Multimedia and Ubiquitous Engineering: MUE/FutureTech 2019 13, 152-157, 2020
32020
Detects abnormal behavior using motor power consumption
KH Kim, SM Ryu, MK Kim, YJ Kang, HH Kim, HJ Lee, JH Lee
Journal of The Korea Society of Computer and Information 23 (10), 65-72, 2018
32018
An approach to designing a network security-based application for communications safety
N Bruce, YJ Kang, M Sain, HJ Lee
Proceedings of the 2015 IEEE/ACM International Conference on Advances in …, 2015
32015
Correlation Power Analysis Attack on the Ping Pong-128 Key Stream Generator
YJ Kang, HH Kim, N Bruce, YG Park, H Lee
2015 IEEE 29th International Conference on Advanced Information Networking …, 2015
32015
A Security Protocol based-on Mutual Authentication Application toward Wireless Sensor Network
N Bruce, YJ Kang, HR Kim, SH Park, HJ Lee
Information Science and Applications, 27-34, 2015
32015
A Design of Elliptic Curve Cryptography-Based Authentication Using QR Code
N Thiranant, YJ Kang, T Kim, W Jang, S Park, H Lee
2014 IEEE 17th International Conference on Computational Science and …, 2014
22014
An improved two factor user authentication framework based on captcha and visual secret sharing
M Sain, KH Kim, YJ Kang, HJ Lee
2019 IEEE International Conference on Computational Science and Engineering …, 2019
12019
Mutual Authentication Protocol Design for Public Facility Management
YJ Kang, YS Lee, HJ Lee, TY Kim
International Conference on Future Information & Communication Engineering 9 …, 2017
12017
AIM—Adaptive invalidation mechanism for wireless networks
M Sain, S Varanasi, YJ Kang, HJ Lee
2017 19th International Conference on Advanced Communication Technology …, 2017
12017
Smartphone-Based Secure Access Control in Wireless Network Analysis
H Kim, YJ Kang, N Bruce, S Park, H Lee
2015 IEEE 29th International Conference on Advanced Information Networking …, 2015
12015
A survey of security threats on u-healthcare
YJ Kang, HJ Lee
Proceedings of the Korean Society of Computer Information Conference, 55-58, 2012
12012
Implementation of AES and ARIA algorithm with Secure Structure for Power Analysis using LFSR Masking
YJ Kang, KH Kim, HJ Lee
Journal of the Korea Society of Computer and Information 25 (1), 79-86, 2020
2020
The system can't perform the operation now. Try again later.
Articles 1–20