Journal
|
2023 |
Technology Trends in Biometric Cryptosystem Based on Electrocardiogram Signals
Chung Byung Ho 전자통신동향분석, v.38, no.5, pp.61-70 |
|
원문
|
Conference
|
2023 |
Security Technology for C-Band Modem Communication in Unmanned Vehicle Environment
Kim Ju Han International Conference on Information and Communication Technology Convergence (ICTC) 2023, pp.1095-1097 |
1 |
원문
|
Conference
|
2021 |
PUF-based IoT Device Authentication Scheme on IoT Open Platform
Byoung Koo Kim International Conference on Information and Communication Technology Convergence (ICTC) 2021, pp.1873-1875 |
8 |
원문
|
Journal
|
2020 |
ETRI AI Strategy #7: Preventing Technological and Social Dysfunction Caused by AI
Kim Tae Wan 전자통신동향분석, v.35, no.7, pp.67-77 |
|
원문
|
Journal
|
2020 |
Trends in Data Privacy Protection Technologies with Enhanced Utilization
Kim Juyoung 전자통신동향분석, v.35, no.6, pp.88-96 |
|
원문
|
Conference
|
2020 |
Study for Recovering Crypto Key Mismatch of In-Vehicle Network DTLS
Kim Dae Won International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.992-994 |
1 |
원문
|
Journal
|
2020 |
Trends in Supply-Chain Security Technologies
Kim Dae Won 전자통신동향분석, v.35, no.4, pp.149-157 |
|
원문
|
Journal
|
2019 |
Design of Network Threat Detection and Classification based on Machine Learning on Cloud Computing
Kim Hyun Joo Cluster Computing, v.22, no.Supp.1, pp.2341-2350 |
38 |
원문
|
Journal
|
2018 |
Trends in Automotive Ethernet Security Technology
Chung Bo-Heung 전자통신동향분석, v.33, no.5, pp.76-85 |
|
원문
|
Journal
|
2017 |
네트워크 주소 이동 기술 동향
Kyungmin Park 전자통신동향분석, v.32, no.6, pp.73-82 |
|
원문
|
Conference
|
2017 |
Self-certifying ID based Trustworthy Networking System for IoT Smart Service Domain
Kim Eung Ha International Conference on Information and Communication Technology Convergence (ICTC) 2017, pp.1300-1302 |
7 |
원문
|
Conference
|
2017 |
Trust Domain Based Trustworthy Networking
Byeongok Kwak International Conference on Information and Communication Technology Convergence (ICTC) 2017, pp.1248-1250 |
5 |
원문
|
Conference
|
2017 |
Building a Big Data Platform for Large-scale Security Data Analysis
Jong-Hoon Lee International Conference on Information and Communication Technology Convergence (ICTC) 2017, pp.977-981 |
5 |
원문
|
Conference
|
2017 |
Trustworthy Gateway System Providing IoT Trust Domain of Smart Home
Kim Eung Ha International Conference on Ubiquitous and Future Networks (ICUFN) 2017, pp.551-553 |
22 |
원문
|
Conference
|
2017 |
Physical Layer Security Based on Coded FTN Signaling for Premium Services in Satellite Digital Broadcasting System
Baek Myung-Sun International Conference on Consumer Electronics (ICCE) 2017 |
8 |
원문
|
Journal
|
2016 |
Implementation of Domain Separation-based Security Platform for Smart Device
Kim Jeong Nyeo International Journal of Applied Engineering Research, v.11, no.10, pp.7017-7019 |
0 |
|
Journal
|
2016 |
Security Core Technology Implementation for Hardware-based Smart Devices
Kim Jeong Nyeo International Journal of Applied Engineering Research, v.11, no.8, pp.5927-5930 |
0 |
|
Conference
|
2016 |
Abnormal Traffic Filtering Mechanism for Protecting ICS Networks
Byoung Koo Kim International Conference on Advanced Communication Technology (ICACT) 2016, pp.436-440 |
7 |
원문
|
Conference
|
2015 |
Supporting a Variety of Secure Services Based on MTM
Yoon Seung Yong International Conference on Systems and Networks Communications (ICSNC) 2015, pp.18-20 |
|
|
Conference
|
2015 |
Mobile Security Technology for Smart Devices
Yoon Seung Yong International Conference on Information and Communication Technology Convergence (ICTC) 2015, pp.1174-1176 |
|
|
Conference
|
2014 |
Design of Industrial Firewall System based on Multiple Access Control Filter
Byoung Koo Kim International Symposium on Frontier and Innovation in Future Computing and Communications (FCC) 2014 (LNEE 301), pp.535-544 |
1 |
원문
|
Conference
|
2013 |
Security Functions for Reliable Video Surveillance System
Kim Geonwoo International Conference on Computing Technology and Information Management (ICCM) 2013, pp.1-4 |
|
|
Conference
|
2013 |
A Secure Real Media Contents Management Model Based on Archetypes using Cloud Computing
송유진 International Conference on Information Security and Assurance (ISA) 2013, pp.327-336 |
|
|
Journal
|
2013 |
Comments on an Improved RFID Security Protocol for ISO/IEC WD 29167-6
Yousung Kang ETRI Journal, v.35, no.1, pp.170-172 |
8 |
원문
|
Journal
|
2011 |
Secure and Scalable Content Sharing Framework for Next-Generation IPTV Service
Seung Min Lee IEICE Transactions on Communications, v.E94.B, no.10, pp.2723-2731 |
0 |
원문
|
Journal
|
2011 |
Security Situation Awareness and Situation Information Generation based on Spatial Linkage of Physical and IT Security
Cho Hyeon Koo International Journal of Computer Science and Network Security, v.11, no.1, pp.85-90 |
|
|
Journal
|
2010 |
Design of Security Framework for Next Generation IPTV Service
Seung Min Lee 정보보호학회논문지, v.20, no.6, pp.33-42 |
|
|
Journal
|
2009 |
Security technologies based on a home gateway for making smart homes secure
Kim Geonwoo Internet Research, v.19, no.2, pp.209-226 |
2 |
원문
|
Conference
|
2006 |
Security Points for BcN Infrastructure
Choi Yangseo International Conference on Advanced Communication Technology (ICACT) 2006, pp.293-297 |
1 |
원문
|
Conference
|
2005 |
Security Frameworks for Open LBS Based on Web Services Security Mechanism
Moon Ki Young International Symposium on Parallel and Distributed Processing and Applications (ISPA) 2005 (LNCS 3759), v.3759, pp.609-618 |
2 |
원문
|
Conference
|
2005 |
Design of Firewall in Router using Network Processor
김영호 International Conference on Advanced Communication Technology (ICACT) 2005, pp.658-660 |
|
원문
|
Conference
|
2004 |
The Implementation of IPsec-Based Internet Security System in IPv4/IPv6 Network
Park So Hee International Conference on AI, Simulation, and Planning in High Autonomy Systems (AIS) 2004 (LNCS 3397), v.3397, pp.109-116 |
0 |
원문
|
Conference
|
2004 |
On the Security Effect of Abnormal Traffic Controller Deployed in Internet Access Point
Kim Kwang Sik International Conference on Information Networking (ICOIN) 2004 (LNCS 3090), v.3090, pp.867-876 |
0 |
원문
|
Conference
|
2004 |
Security Flow Control by Dynamic Stack Allocation
Kim Geonwoo International Conference on Advanced Communication Technology (ICACT) 2004, pp.309-311 |
|
원문
|
Conference
|
2003 |
Certificate Validation Scheme of Open Grid Service Usage XKMS
Park Nam Je International Conference on Grid and Cooperative Computing (GCC) 2003 (LNCS 3032), pp.849-858 |
2 |
원문
|
Conference
|
2003 |
Certificate Validation Service using XKMS for Computational Grid
Park Nam Je ACM Workshop on XML Security (XMLSEC) 2003, pp.112-120 |
7 |
원문
|