DGIST Library Repository
menu
Home
Library
FAQ
search
BROWSE
Communities & Collections
Researchers
Titles
DGIST Scholar
Browse by Researchers
조국래(Cho, Kookrae)
Department
Division of Electronics & Information System
Affiliated Community
Division of Electronics & Information System
Research Interests
Website
E-mail
kookrae
@
dgist.ac.kr
Discover
Infographic
- Co-Author
조국래
71
손종욱
57
박세권
33
조희섭
21
성혜민
14
정우영
10
다음
- Keyword
Authentication
4
Graphical Password
3
User Authentication
3
Android Unlock Patterns
2
Hash chain
2
IVS
2
다음
- Year
2013
12
2014
10
2018
10
2019
8
2017
7
2008
5
다음
Co-Author(s)
FusionCharts.
Related Keyword
[{"link":"javascript:doSearch(DEPRECIATION);","weight":"∞","text":"DEPRECIATION"},{"link":"javascript:doSearch(SUPPORT VECTOR MACHINE LEARNING ALGORITHM);","weight":"∞","text":"SUPPORT VECTOR MACHINE LEARNING ALGORITHM"},{"link":"javascript:doSearch(HASH CHAIN);","weight":"∞","text":"HASH CHAIN"},{"link":"javascript:doSearch(USER AUTHENTICATION);","weight":"∞","text":"USER AUTHENTICATION"},{"link":"javascript:doSearch(DISTANCE BOUNDING);","weight":"∞","text":"DISTANCE BOUNDING"},{"link":"javascript:doSearch(WIRELESS ROUTING PROTOCOL);","weight":"∞","text":"WIRELESS ROUTING PROTOCOL"},{"link":"javascript:doSearch(TWIST(+) ALGORITHM);","weight":"∞","text":"TWIST(+) ALGORITHM"},{"link":"javascript:doSearch(MINING);","weight":"∞","text":"MINING"},{"link":"javascript:doSearch(SECURITY);","weight":"∞","text":"SECURITY"},{"link":"javascript:doSearch(MODEL);","weight":"∞","text":"MODEL"},{"link":"javascript:doSearch(GRAPHIC TECHNIQUES);","weight":"∞","text":"GRAPHIC TECHNIQUES"},{"link":"javascript:doSearch(QUALITY OF SERVICE (QOS));","weight":"∞","text":"QUALITY OF SERVICE (QOS)"},{"link":"javascript:doSearch(COMPUTER SIMULATION);","weight":"∞","text":"COMPUTER SIMULATION"},{"link":"javascript:doSearch(INTER-VEHICLE COMMUNICATION);","weight":"∞","text":"INTER-VEHICLE COMMUNICATION"},{"link":"javascript:doSearch(ANDROID UNLOCK PATTERNS);","weight":"∞","text":"ANDROID UNLOCK PATTERNS"},{"link":"javascript:doSearch(BRUTE FORCE);","weight":"∞","text":"BRUTE FORCE"},{"link":"javascript:doSearch(TWIST INDEX);","weight":"∞","text":"TWIST INDEX"},{"link":"javascript:doSearch(COMPUTATIONAL COSTS);","weight":"∞","text":"COMPUTATIONAL COSTS"},{"link":"javascript:doSearch(AUTHENTICATION);","weight":"∞","text":"AUTHENTICATION"},{"link":"javascript:doSearch(IVS);","weight":"∞","text":"IVS"},{"link":"javascript:doSearch(CRYPTOGRAPHIC TECHNIQUES);","weight":"∞","text":"CRYPTOGRAPHIC TECHNIQUES"},{"link":"javascript:doSearch(WIRELESS MAC PROTOCOLS);","weight":"∞","text":"WIRELESS MAC PROTOCOLS"},{"link":"javascript:doSearch(QOS REQUIREMENTS);","weight":"∞","text":"QOS REQUIREMENTS"},{"link":"javascript:doSearch(SENSOR NODES);","weight":"∞","text":"SENSOR NODES"},{"link":"javascript:doSearch(RESIDENTIAL ENERGY);","weight":"∞","text":"RESIDENTIAL ENERGY"},{"link":"javascript:doSearch(ACCESS CATEGORY);","weight":"∞","text":"ACCESS CATEGORY"},{"link":"javascript:doSearch(WIRELESS ROUTING PROTOCOLS);","weight":"∞","text":"WIRELESS ROUTING PROTOCOLS"},{"link":"javascript:doSearch(MAC PROTOCOL);","weight":"∞","text":"MAC PROTOCOL"},{"link":"javascript:doSearch(SPHINCS);","weight":"∞","text":"SPHINCS"},{"link":"javascript:doSearch(MEDICAL-GRADE QUALITY OF SERVICE (QOS));","weight":"∞","text":"MEDICAL-GRADE QUALITY OF SERVICE (QOS)"},{"link":"javascript:doSearch(RELAY ATTACK);","weight":"∞","text":"RELAY ATTACK"},{"link":"javascript:doSearch(SIMS));","weight":"∞","text":"SIMS)"},{"link":"javascript:doSearch(#8208);","weight":"∞","text":"#8208"},{"link":"javascript:doSearch(UPPER BOUND);","weight":"∞","text":"UPPER BOUND"},{"link":"javascript:doSearch(HASH CHAIN TRAVERSAL);","weight":"∞","text":"HASH CHAIN TRAVERSAL"},{"link":"javascript:doSearch(MANY-TO-ONE COMMUNICATIONS);","weight":"∞","text":"MANY-TO-ONE COMMUNICATIONS"},{"link":"javascript:doSearch(FLIGHT SECONDARY ION MASS SPECTROMETRY (TOF\u0026AMP);","weight":"∞","text":"FLIGHT SECONDARY ION MASS SPECTROMETRY (TOF\u0026AMP"},{"link":"javascript:doSearch(HASH VALUE);","weight":"∞","text":"HASH VALUE"},{"link":"javascript:doSearch(IDENTITY VERIFICATION);","weight":"∞","text":"IDENTITY VERIFICATION"},{"link":"javascript:doSearch(CRIME);","weight":"∞","text":"CRIME"},{"link":"javascript:doSearch(ONE WAY HASH FUNCTIONS);","weight":"∞","text":"ONE WAY HASH FUNCTIONS"},{"link":"javascript:doSearch(NETWORK CONGESTION);","weight":"∞","text":"NETWORK CONGESTION"},{"link":"javascript:doSearch(LOWER BOUND);","weight":"∞","text":"LOWER BOUND"},{"link":"javascript:doSearch(VIGENERE CIPHER);","weight":"∞","text":"VIGENERE CIPHER"},{"link":"javascript:doSearch(FALSE ACCEPTANCE RATE);","weight":"∞","text":"FALSE ACCEPTANCE RATE"},{"link":"javascript:doSearch(HASH CHAINS);","weight":"∞","text":"HASH CHAINS"},{"link":"javascript:doSearch(SIMULATION STUDIES);","weight":"∞","text":"SIMULATION STUDIES"},{"link":"javascript:doSearch(BIOMARKER SCREENING);","weight":"∞","text":"BIOMARKER SCREENING"},{"link":"javascript:doSearch(WIRELESS SENSOR NETWORK (WSN));","weight":"∞","text":"WIRELESS SENSOR NETWORK (WSN)"},{"link":"javascript:doSearch(GRAPHICAL PASSWORD);","weight":"∞","text":"GRAPHICAL PASSWORD"},{"link":"javascript:doSearch(HASH BASED SIGNATURES);","weight":"∞","text":"HASH BASED SIGNATURES"},{"link":"javascript:doSearch(CONNECTING POINTS);","weight":"∞","text":"CONNECTING POINTS"},{"link":"javascript:doSearch(MEDIUM ACCESS CONTROL);","weight":"∞","text":"MEDIUM ACCESS CONTROL"},{"link":"javascript:doSearch(DRAW A SECRETS);","weight":"∞","text":"DRAW A SECRETS"},{"link":"javascript:doSearch(METABOLOMICS);","weight":"∞","text":"METABOLOMICS"},{"link":"javascript:doSearch(ANDROID (OPERATING SYSTEM));","weight":"∞","text":"ANDROID (OPERATING SYSTEM)"},{"link":"javascript:doSearch(TIME PERIODS);","weight":"∞","text":"TIME PERIODS"},{"link":"javascript:doSearch(DIFFERENTIATION);","weight":"∞","text":"DIFFERENTIATION"},{"link":"javascript:doSearch(ROUTING PROTOCOLS);","weight":"∞","text":"ROUTING PROTOCOLS"},{"link":"javascript:doSearch(ROUTE MAINTENANCE);","weight":"∞","text":"ROUTE MAINTENANCE"},{"link":"javascript:doSearch(MEDICAL INFORMATION SYSTEMS);","weight":"∞","text":"MEDICAL INFORMATION SYSTEMS"},{"link":"javascript:doSearch(LOWER BOUNDS);","weight":"∞","text":"LOWER BOUNDS"},{"link":"javascript:doSearch(AUTHENTICATION PROTOCOLS);","weight":"∞","text":"AUTHENTICATION PROTOCOLS"},{"link":"javascript:doSearch(DIRECT USE);","weight":"∞","text":"DIRECT USE"},{"link":"javascript:doSearch(SECRET VALUE);","weight":"∞","text":"SECRET VALUE"},{"link":"javascript:doSearch(IEEE 802.15.4 STANDARDS);","weight":"∞","text":"IEEE 802.15.4 STANDARDS"},{"link":"javascript:doSearch(TIME\u0026AMP);","weight":"∞","text":"TIME\u0026AMP"},{"link":"javascript:doSearch(COLORECTAL-CANCER);","weight":"∞","text":"COLORECTAL-CANCER"},{"link":"javascript:doSearch(FRACTALS);","weight":"∞","text":"FRACTALS"},{"link":"javascript:doSearch(SPHINCS+);","weight":"∞","text":"SPHINCS+"},{"link":"javascript:doSearch(COLORECTAL CANCER);","weight":"∞","text":"COLORECTAL CANCER"},{"link":"javascript:doSearch(HASH FUNCTIONS);","weight":"∞","text":"HASH FUNCTIONS"},{"link":"javascript:doSearch(PUBLIC VALUES);","weight":"∞","text":"PUBLIC VALUES"},{"link":"javascript:doSearch(AMORTIZATION);","weight":"∞","text":"AMORTIZATION"},{"link":"javascript:doSearch(COMPUTER CRIME);","weight":"∞","text":"COMPUTER CRIME"},{"link":"javascript:doSearch(POLYALPHABETIC CIPHER);","weight":"∞","text":"POLYALPHABETIC CIPHER"},{"link":"javascript:doSearch(SUBSTITUTION CIPHER);","weight":"∞","text":"SUBSTITUTION CIPHER"},{"link":"javascript:doSearch(INTERMEDIATE NODE);","weight":"∞","text":"INTERMEDIATE NODE"},{"link":"javascript:doSearch(WIRELESS SENSOR NETWORKS (WSNS));","weight":"∞","text":"WIRELESS SENSOR NETWORKS (WSNS)"},{"link":"javascript:doSearch(DISTANCE HOUNDING PROTOCOL);","weight":"∞","text":"DISTANCE HOUNDING PROTOCOL"},{"link":"javascript:doSearch(PARAMETERS);","weight":"∞","text":"PARAMETERS"},{"link":"javascript:doSearch(CLASSIFICATION);","weight":"∞","text":"CLASSIFICATION"},{"link":"javascript:doSearch(FRACTAL TRAVERSAL);","weight":"∞","text":"FRACTAL TRAVERSAL"},{"link":"javascript:doSearch(KRAS SOMATIC MUTATION);","weight":"∞","text":"KRAS SOMATIC MUTATION"},{"link":"javascript:doSearch(PROFITABILITY);","weight":"∞","text":"PROFITABILITY"},{"link":"javascript:doSearch(MAFIA FRAUD ATTACK);","weight":"∞","text":"MAFIA FRAUD ATTACK"},{"link":"javascript:doSearch(OF\u0026AMP);","weight":"∞","text":"OF\u0026AMP"},{"link":"javascript:doSearch(MULTI HOP COMMUNICATION);","weight":"∞","text":"MULTI HOP COMMUNICATION"},{"link":"javascript:doSearch(POST-QUANTUM CRYPTOGRAPHY);","weight":"∞","text":"POST-QUANTUM CRYPTOGRAPHY"},{"link":"javascript:doSearch(LOWER BOUNDANDROID UNLOCK PATTERNS);","weight":"∞","text":"LOWER BOUNDANDROID UNLOCK PATTERNS"},{"link":"javascript:doSearch(IEEE 802.15.4);","weight":"∞","text":"IEEE 802.15.4"},{"link":"javascript:doSearch(MEMORY STORAGE);","weight":"∞","text":"MEMORY STORAGE"},{"link":"javascript:doSearch(CRYPTOCURRENCY);","weight":"∞","text":"CRYPTOCURRENCY"},{"link":"javascript:doSearch(ROUTING PROTOCOL);","weight":"∞","text":"ROUTING PROTOCOL"},{"link":"javascript:doSearch(BITCOIN);","weight":"∞","text":"BITCOIN"},{"link":"javascript:doSearch(CRYPTANALYSIS);","weight":"∞","text":"CRYPTANALYSIS"},{"link":"javascript:doSearch(WIRELESS MAC PROTOCOL);","weight":"∞","text":"WIRELESS MAC PROTOCOL"},{"link":"javascript:doSearch(TRAFFIC CONCENTRATION);","weight":"∞","text":"TRAFFIC CONCENTRATION"},{"link":"javascript:doSearch(STANDARDS);","weight":"∞","text":"STANDARDS"},{"link":"javascript:doSearch(NETWORK CONGESTIONS);","weight":"∞","text":"NETWORK CONGESTIONS"}]
Journal Articles
Conference Papers
Patent
News
ETC
Journal Articles
Conference Papers
Patent
News
ETC
Issue Date
Title
First-Author(s)
Journal
Issue Date
View
Export XLS
BROWSE
Communities & Collections
Researchers
Titles
LIBRARY