Yousung Kang

Orcid: 0000-0002-1967-8941

Affiliations:
  • Electronics and Telecommunication Ressearch Institute, Daejeon, Korea


According to our database1, Yousung Kang authored at least 36 papers between 2004 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Correction: MPMCT gate decomposition method reducing T-depth quickly in proportion to the number of work qubits.
Quantum Inf. Process., November, 2023

MPMCT gate decomposition method reducing T-depth quickly in proportion to the number of work qubits.
Quantum Inf. Process., October, 2023

Cryptanalysis and Countermeasures of the Recent Authentication and Key Agreement Scheme for Internet of Drones.
Proceedings of the 14th International Conference on Information and Communication Technology Convergence, 2023

Security enhancement scheme for mobile device using H/W cryptographic module.
Proceedings of the 14th International Conference on Information and Communication Technology Convergence, 2023

Security Technology for C-Band Modem Communication in Unmanned Vehicle Environment.
Proceedings of the 14th International Conference on Information and Communication Technology Convergence, 2023

Client-centric on-demand remote profile provisioning technique for M2M IoT Devices.
Proceedings of the 14th International Conference on Information and Communication Technology Convergence, 2023

2022
Rcryptect: Real-time detection of cryptographic function in the user-space filesystem.
Comput. Secur., 2022

Enhancing IoT security with PUF-based authentication scheme.
Proceedings of the 13th International Conference on Information and Communication Technology Convergence, 2022

Reinforcement of IoT Open Platform Security using PUF -based Device Authentication.
Proceedings of the 13th International Conference on Information and Communication Technology Convergence, 2022

UAV arming Authorization using DIM and Flight Authorization Code.
Proceedings of the 13th International Conference on Information and Communication Technology Convergence, 2022

2021
Multiple PUF-based lightweight authentication method in the IoT.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2021

Wi-SUN Device Authentication using Physical Layer Fingerprint.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2021

PUF-based IoT Device Authentication Scheme on IoT Open Platform.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2021

2020
Wireless Transceiver Aided Run-Time Secret Key Extraction for IoT Device Security.
IEEE Trans. Consumer Electron., 2020

Design of Resistor-Capacitor Physically Unclonable Function for Resource-Constrained IoT Devices.
Sensors, 2020

PUF-based Authentication Scheme for IoT Devices.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2020

Secure IoT Device Authentication Scheme using Key Hiding Technology.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2020

Drone security module for UAV data encryption.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2020

2019
Two-Factor Fuzzy Commitment for Unmanned IoT Devices Security.
IEEE Internet Things J., 2019

RC PUF: A Low-Cost and an Easy-to-Design PUF for Resource-Constrained IoT Devices.
Proceedings of the Information Security Applications - 20th International Conference, 2019

Security Enhancement for IoT Device using Physical Unclonable Functions.
Proceedings of the 2019 International Conference on Information and Communication Technology Convergence, 2019

Crypto-Protector: Multi-threaded RSA to Prevent EM Attacks.
Proceedings of the 2019 International Conference on Information and Communication Technology Convergence, 2019

PUF based IoT Device Authentication Scheme.
Proceedings of the 2019 International Conference on Information and Communication Technology Convergence, 2019

Implementation of UAS identification and authentication on oneM2M IoT platform.
Proceedings of the 2019 International Conference on Information and Communication Technology Convergence, 2019

2018
A Masked White-Box Cryptographic Implementation for Protecting Against Differential Computation Analysis.
IEEE Trans. Inf. Forensics Secur., 2018

Development of the Unified Security Requirements of PUFs During the Standardization Process.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2018

Rapid Run-Time DRAM PUF Based on Bit-Flip Position for Secure IoT Devices.
Proceedings of the 2018 IEEE SENSORS, New Delhi, India, October 28-31, 2018, 2018

Secure Key Extraction for IoT Devices Integrating IEEE 802.15.4g/k Transceiver.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2018

Implementing a phase detection ring oscillator PUF on FPGA.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2018

Abnormal Traffic Detection Mechanism for Protecting IIoT Environments.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2018

2016
A Security Framework for a Drone Delivery Service.
Proceedings of the 2nd Workshop on Micro Aerial Vehicle Networks, 2016

2015
Security Analysis on RFID Mutual Authentication Protocol.
Proceedings of the Information Security Applications - 16th International Workshop, 2015

2014
KeyQ: A Dynamic Key Establishment Method Using an RFID Anti-Collision Protocol.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014

2009
Efficient key detection method in the correlation electromagnetic analysis using peak selection algorithm.
J. Commun. Networks, 2009

A new fault cryptanalysis on montgomery ladder exponentiation algorithm.
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, 2009

2004
Analysis and Countermeasure on Vulnerability of WPA Key Exchange Mechanism.
Proceedings of the Information Networking, 2004


  Loading...