Hyun Seok Kim

According to our database1, Hyun Seok Kim authored at least 21 papers between 2005 and 2020.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Ergonomic Issues in Brain-Computer Interface Technologies: Current Status, Challenges, and Future Direction.
Comp. Int. and Neurosc., 2020

2018
Real-time apnea-hypopnea event detection during sleep by convolutional neural networks.
Comp. in Bio. and Med., 2018

2017
Spatiotemporal Pixelization to Increase the Recognition Score of Characters for Retinal Prostheses.
Sensors, 2017

2016
Computational discovery of pathway-level genetic vulnerabilities in non-small-cell lung cancer.
Bioinform., 2016

2015
A Smartphone-Based Automatic Diagnosis System for Facial Nerve Palsy.
Sensors, 2015

2009
Enhanced password-based simple three-party key exchange protocol.
Comput. Electr. Eng., 2009

2008
Formal Verification of Cryptographic Protocol for Secure RFID System.
Proceedings of the NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008, 2008

A Lightweight Protocol Analysis and Modification for Secure RFID System.
Proceedings of the 17th International Conference on Computer Communications and Networks, 2008

Weaknesses Analysis and Countermeasure of a Verifier-Based Key Agreement Protocol.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications, 2008

2007
RFID Privacy Protection Scheme for Secure Ubiquitous Computing.
Proceedings of the RFID Technology - Concepts, Applications, Challenges, Proceedings of the 1st International Workshop on RFID Technology, 2007

Multi-stacked artificial muscle actuator based on synthetic elastomer.
Proceedings of the 2007 IEEE/RSJ International Conference on Intelligent Robots and Systems, October 29, 2007

A Light-weight Security Protocol for RFID System.
Proceedings of the Personal Wireless Communications, 2007

Security and Privacy Analysis of RFID Authentication Protocol for Ubiquitous Computing.
Proceedings of the 16th International Conference on Computer Communications and Networks, 2007

The Design and Verification of RFID Authentication Protocol for Ubiquitous Computing.
Proceedings of the 18th International Workshop on Database and Expert Systems Applications (DEXA 2007), 2007

A Secure Communication Protocol for Low-Cost RFID System.
Proceedings of the Seventh International Conference on Computer and Information Technology (CIT 2007), 2007

2006
EAFoC: Enterprise Architecture Framework Based on Commonality.
J. Comput. Sci. Technol., 2006

Security and Privacy Analysis of RFID Systems Using Model Checking.
Proceedings of the High Performance Computing and Communications, 2006

Security Analysis of RFID Authentication for Pervasive Systems using Model Checking.
Proceedings of the 30th Annual International Computer Software and Applications Conference, 2006

Secrecy Analysis of Purchase Transaction in Electronic Purses.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

The Vulnerabilities Analysis and Design of the Security Protocol for RFID System.
Proceedings of the Sixth International Conference on Computer and Information Technology (CIT 2006), 2006

2005
Analysis of Security Protocols with Certificate over Open Networks: Electronic Payment System.
Proceedings of the 25th International Conference on Distributed Computing Systems Workshops (ICDCS 2005 Workshops), 2005


  Loading...