Zobrazeno 1 - 5
of 5
pro vyhledávání: '"Hyeungjun Yeuk"'
Publikováno v:
Computer Standards & Interfaces. 44:137-143
In this paper, we surveyed technical elements of video surveillance systems and proposed several countermeasures to effectively manage a number of keys for image encryption, privacy protection and user authentication. In addition, we proposed several
Publikováno v:
MIST@CCS
In this paper, we analyze manipulation methods of the MAC address and consequent security threats. The Ethernet MAC address is known to be unchanged, and so is highly considered as platform-unique information. For this reason, various services are re
Publikováno v:
BWCCA
In this paper, we analyze security threats against the services that limits allowance only to the registered platforms for their users, of which core technology is called designated platform solution and it has been deployed in several critical servi
Publikováno v:
2015 10th International Conference on Broadband & Wireless Computing, Communication & Applications (BWCCA); 2015, p547-550, 4p
Publikováno v:
2015 10th International Conference on Broadband & Wireless Computing, Communication & Applications (BWCCA); 2015, pv-xv, 11p