Countermeasure to underlying security threats in IoT communication HJ Mun, GH Choi, Y Hwang Journal of convergence society for SMB 6 (2), 37-43, 2016 | 41 | 2016 |
Biometric Information and OTP based on Authentication Mechanism using Blockchain HJ Mun Journal of Convergence for Information Technology 8 (3), 85-90, 2018 | 34 | 2018 |
A design of secure communication protocol using RLWE-based homomorphic encryption in IoT convergence cloud environment BW Jin, JO Park, HJ Mun Wireless Personal Communications 105, 599-618, 2019 | 31 | 2019 |
Blackhole attack: user identity and password seize attack using honeypot HJ Mun, KH Han Journal of Computer Virology and Hacking Techniques 12, 185-190, 2016 | 18 | 2016 |
Face recognition system technologies for authentication system-a survey Y Hwang, HJ Mun, JW Lee Journal of Convergence Society for SMB 5 (3), 9-13, 2015 | 17 | 2015 |
Exploration of emotional labor research trends in Korea through keyword network analysis N Lee, JH Kim, HJ Mun Journal of Convergence for Information Technology 9 (3), 68-74, 2019 | 16 | 2019 |
A study on trend analysis in convergence research applying word cloud in Korea JH Kim, HJ Mun, H Lee Journal of Digital Convergence 19 (2), 33-38, 2021 | 14 | 2021 |
Arm movement activity based user authentication in P2P systems J Shin, MR Islam, MA Rahim, HJ Mun Peer-to-peer networking and applications 13 (2), 635-646, 2020 | 14 | 2020 |
A novel secure and efficient hash function with extra padding against rainbow table attacks HJ Mun, S Hong, J Shin Cluster Computing 21, 1161-1173, 2018 | 14 | 2018 |
Improved Trilateration Method on USN for reducing the Error of a Moving Node Position Measurement HJ Mun, HY Jeong, KH Han Journal of Digital Convergence 14 (5), 301-307, 2016 | 12 | 2016 |
Countermeasure for Prevention and Detection against Attacks to SMB Information System-A Survey HJ Mun, Y Hwang, HY Kim Journal of Convergence Society for SMB 5 (2), 1-6, 2015 | 11 | 2015 |
Person-Wise privacy level access control for personal information directory services HJ Mun, KM Lee, SH Lee International Conference on Embedded and Ubiquitous Computing, 89-98, 2006 | 11 | 2006 |
A Survey on Deep Learning based Face Recognition for User Authentication HJ Mun, GH Kim Journal of Industrial Convergence 17 (3), 23-29, 2019 | 10 | 2019 |
Writer identification using intra-stroke and inter-stroke information for security enhancements in P2P systems J Shin, Z Liu, CM Kim, HJ Mun Peer-to-Peer Networking and Applications 11, 1166-1175, 2018 | 10 | 2018 |
Multi-factor authentication with randomly selected authentication methods with DID on a random terminal S Kim, HJ Mun, S Hong Applied Sciences 12 (5), 2301, 2022 | 9 | 2022 |
Secure short url generation method that recognizes risk of target url HJ Mun, Y Li Wireless Personal Communications 93, 269-283, 2017 | 9 | 2017 |
Design of Curve Road Detection System by Convergence of Sensor GH Kim, SM Jeong, HJ Mun, CG Kim Journal of digital Convergence 14 (8), 253-259, 2016 | 9 | 2016 |
Sensitive Personal Information Protection Model for RBAC System HJ Mun, JS Suh Journal of The Korea Society of Computer and Information 13 (5), 103-110, 2008 | 9 | 2008 |
Design for access control system based on voice recognition for infectious disease prevention HJ Mun, KH Han Journal of the Korea Convergence Society 11 (7), 19-24, 2020 | 8 | 2020 |
Effective Countermeasure to APT Attacks using Big Data HJ Mun, SH Choi, Y Hwang Journal of Convergence Society for SMB 6 (1), 17-23, 2016 | 8 | 2016 |