Type | Year | Title | Cited | Download |
---|---|---|---|---|
Journal
|
2020 | Trends in Dynamic Crime Prediction Technologies based on Intelligent CCTV 박상욱 전자통신동향분석, v.35, no.2, pp.17-27 | ||
Journal
|
2016 | Single Authentication Through in Convergence Space Using Collaborative Smart Cameras Geon Woo Kim Security and Communication Networks, v.9, no.6, pp.561-570 | 0 | |
Journal
|
2014 | Protection Method for Data Communication between ADS-B Sensor and Next-Generation Air Traffic Control Systems Seoung-Hyeon Lee Information, v.5, no.4, pp.622-633 | 11 | |
Journal
|
2014 | Automated and Coupled Services of Advanced Smart Surveillance Systems Toward Green IT: Tracking, Retrieval and Digital Evidence Su-Wan Park Journal of Supercomputing, v.69, no.3, pp.1215-1234 | 1 | |
Conference
|
2014 | Trajectory Prediction for using Real Data and Real Meteorological Data Yong Kyun Kim International Conference on Ubiquitous Computing Application and Wireless Sensor Network (UCAWSN) 2014 (LNEE 331), pp.89-103 | 6 | |
Conference
|
2014 | The ADS-B Protection Method for Next-Generation Air Traffic Management System Seoung-Hyeon Lee International Conference on Ubiquitous Computing Application and Wireless Sensor Network (UCAWSN) 2014 (LNEE 331), pp.105-113 | 2 | |
Journal
|
2014 | Flight Protection Data via Dynamic Sensor Networks Deok Gyu Lee International Journal of Distributed Sensor Networks, v.2014, pp.1-7 | 0 | |
Conference
|
2013 | A Study on Aircraft Ground Speed Calculation Method Using Aircraft's Environmental Parameters(True Air Speed, Tracking Angle, Climb Rate, Wind Velocity and Wind direction) 김용균 한국정보처리학회 학술 발표 대회 (추계) 2013, pp.936-938 | ||
Conference
|
2013 | Flight-Plan States Modeling for Air Traffic Management Byengcheol Choi International Conference on Computing and Convergence Technology (ICCCT) 2013, pp.1-4 | ||
Conference
|
2013 | Object Retrieval Scheme Using Color Features in Surveillance System Su-wan Park International Conference on Future Information Technology (FutureTech) 2013 (LNEE 276), v.276, pp.99-106 | 0 | |
Conference
|
2013 | Protection Flight Data using Sensor Networks DeokGyu Lee International Conference on Ubiquitous Context-Awareness and Wireless Sensor Network (UCAWSN) 2013, pp.652-657 | ||
Conference
|
2013 | The Route Adherence Monitoring Method for Performance Based Navigation 이성현 한국통신학회 종합 학술 발표회 (하계) 2013, pp.808-809 | ||
Conference
|
2013 | A Network Theoretic Analysis of Flight Plan States Management System 최병철 통신 정보 합동 학술 대회 (JCCI) 2013, pp.1-2 | ||
Conference
|
2013 | A Study on Flight Control Position State and Flow Management in Flight Control 이덕규 한국정보처리학회 학술 발표 대회 (춘계) 2013, pp.1124-1125 | ||
Conference
|
2013 | Trajectory Calculation Based on Position and Speed for Effective Air Traffic Flow Management Yong-Kyun Kim International Conference on Multimedia and Ubiquitous Engineering (MUE) 2013 (LNEE 240), v.240, pp.377-384 | 0 | |
Conference
|
2013 | Intelligence Video Security Techniques for Wide-Domain Surveillance System 박수완 한국정보처리학회 학술 발표 대회 (추계) 2013, pp.524-526 | ||
Conference
|
2013 | A Based on Single Image Authentication System in Aviation Security Deok Gyu Lee International Conference on Multimedia and Ubiquitous Engineering (MUE) 2013 (LNEE 240), v.240, pp.293-302 | 0 | |
Conference
|
2013 | A Study on Multi-Control Working Position Authentication System in Aviation Security Deok-Gyu Lee International Conference on Advanced IT, engineering Management (AIM) 2013, pp.226-230 | ||
Journal
|
2012 | A Security Architecture of the Inter-VTS System for Shore Side Collaboration of e-Navigation 이병길 한국항해항만학회지, v.36, no.1, pp.1-7 | ||
Conference
|
2012 | ID Globalization Across Multiple Convergence Spaces Using Smart Cameras Geon Woo Kim International Conference on Ubiquitous Information Technologies and Applications (CUTE) 2012 (LNEE 214), v.214, pp.165-174 | 0 | |
Conference
|
2012 | The Fault Recovery Method for Flight Data Processor 이성현 한국통신학회 종합 학술 발표회 (추계) 2012, pp.404-405 | ||
Conference
|
2012 | A Study on Flight Data Protection System Data in Flight Control 이덕규 한국정보처리학회 학술 발표 대회 (추계) 2012, pp.1479-1481 | ||
Conference
|
2012 | A Study on the Trajectory Prediction Parameters 김용균 한국통신학회 종합 학술 발표회 (추계) 2012, pp.370-371 | ||
Conference
|
2012 | Security Model for Video Surveillance System Geon-Woo Kim International Conference on Information and Communication Technology Convergence (ICTC) 2012, pp.100-104 | 7 | |
Conference
|
2012 | An Efficient Tracking System Using Adaptive Approach for Online Feature Selection Chi Yoon Jeong International Conference on Information and Communication Technology Convergence (ICTC) 2012, pp.763-764 | 1 | |
Conference
|
2012 | Fine-level Moving Object Detection using Region-based Background/Foreground Model SuGil Choi International Conference on Information and Communication Technology Convergence (ICTC) 2012, pp.761-762 | 1 | |
Conference
|
2012 | Compact Hardware Architecture for First One Detector using Priority-based Uniform Partition Mooseop Kim International Conference on Information and Communication Technology Convergence (ICTC) 2012, pp.179-180 | 1 | |
Journal
|
2012 | Technical Trends of Abnormal Event Detection in Video Analytics 정치윤 전자통신동향분석, v.27, no.4, pp.114-122 | ||
Journal
|
2012 | Security Issues and Trends in Automotive Black-Box 김무섭 전자통신동향분석, v.27, no.4, pp.123-129 | ||
Conference
|
2012 | Video Retrieval Method and System for Multiple surveillance cameras 박수완 한국정보기술융합학회 학술 발표 대회 (하계) 2012, pp.1-4 | ||
Conference
|
2012 | A Design of Interface for Retrieval of Video Evidence based on Intelligent Video Analytics 임경수 한국정보기술융합학회 학술 발표 대회 (하계) 2012, pp.1-4 | ||
Conference
|
2012 | Videos Analytic Retrieval System for CCTV Surveillance Su-wan Park International Conference on Future Information Technology (FutureTech) 2012 (LNEE 179), pp.239-247 | 3 | |
Conference
|
2012 | Smart Camera-Based Single Authentication Method in Multiple Convergence Spaces 김건우 한국 컴퓨터 종합 학술 대회 2012, pp.C272-C273 | ||
Conference
|
2012 | A based on Identity Surveillance System in Aviation Security Deok Gyu Lee International Conference on Future Information Technology (FutureTech) 2012 (LNEE 179), v.179, pp.215-224 | 0 | |
Conference
|
2012 | EVM: A New Methodology for Evidential Video Management in Digital CCTV Systems Kyung-Soo Lim International Symposium on Digital Forensics and Information Security (DFIS) 2012 (LNEE 179), v.179, pp.225-230 | 2 | |
Conference
|
2012 | The Data Synchronization Method for Flight Data Processor 이성현 한국통신학회 종합 학술 발표회 (하계) 2012, pp.830-831 | ||
Conference
|
2012 | Correlation Filter 를 이용한 휴먼 검출 및 추적 김건우 영상 처리 및 이해에 관한 워크샵 (IPIU) 2012, pp.1-3 | ||
Conference
|
2012 | Efficient DRM Mechanism for Scalable Contents based on H.264/SVC Su-Wan Park International Conference on Advanced IT, engineering and Management (AIM) 2012, pp.19-20 | ||
Journal
|
2011 | Privacy-Preserving H.264 Video Encryption Scheme SuGil Choi ETRI Journal, v.33, no.6, pp.935-944 | 11 | |
Journal
|
2011 | Technical Trends of Smart Cameras 김무섭 전자통신동향분석, v.26, no.6, pp.139-153 | ||
Journal
|
2011 | Object Tracking Framework of Video Surveillance System based on Non-Overlapping Multi-Camera 한민호 정보보호학회논문지, v.21, no.6, pp.141-152 | ||
Conference
|
2011 | A New Proposal for a Digital Evidence Container for Security Convergence Kyung-Soo Lim International Conference on Control System, Computing and Engineering (ICCSCE) 2011, pp.171-175 | 2 | |
Conference
|
2011 | Secure Service Mechanism of Video Surveillance System Based on H.264/SVC Su-Wan Park International Conference on Information Technology and Multimedia (ICIM) 2011, pp.1-4 | 6 | |
Conference
|
2011 | A Study on Aircraft Departure and Arrival Management using Automatic Update of METAR Data 오승희 한국통신학회 종합 학술 발표회 (추계) 2011, pp.492-493 | ||
Conference
|
2011 | Real-Time Privacy Masking and Evaluation on Consecutive Video Frames Geon Woo Kim International Conference on Advancements in Computing Technology (ICACT) 2011, pp.1-3 | ||
Conference
|
2011 | The Propose of Control Sector Management for Efficient Air Traffic Control 김용균 한국통신학회 종합 학술 발표회 (추계) 2011, pp.461-462 | ||
Conference
|
2011 | A Study on Automatical Recovery System for Flight Data in Flight Control 이덕규 한국정보처리학회 학술 발표 (춘계) 2011, pp.955-957 | ||
Conference
|
2011 | The Flight Alert Generation Method of Flight Data Processor 이성현 한국통신학회 종합 학술 발표회 (추계) 2011, pp.371-372 | ||
Conference
|
2011 | A Study on the Efficient Posting Management Mechanism using Automatic Posting Method 오승희 한국해양정보통신학회 종합 학술 대회 (추계) 2011, pp.691-694 | ||
Conference
|
2011 | 레이더와 AIS기반 기존 관제 시스템에서 위그선 등 초 고속 물표 추적을 위한 개선 방안 연구 이병길 한국항해항만학회 학술 대회 (추계) 2014, pp.58-60 | ||
Conference
|
2011 | A Study on the Enhanced Mechanism for Flight Plan State Management at Aviation Control Systems 오승희 한국통신학회 종합 학술 발표회 (하계) 2011, pp.1070-1071 | ||
Conference
|
2011 | For Aviation Security Using Surveillance System Deok Gyu Lee FTRA International Workshop on Convergence Security in Pervasive Environments (IWCS) / International Workshop on STAVE / Conference on Secure and Trust Computing, Data Management, and Applications (STA) 2011 (CCIS 187), v.187, pp.103-115 | 0 | |
Conference
|
2011 | VTS의 추적 및 융합 알고리즘 시뮬레이터 설계 이병길 한국항해항만학회 학술 대회 (춘계) 2011, pp.101-103 | ||
Conference
|
2011 | u-VTS를 위한 국내 관제 센터의 센서 및 정보 융합 관제 요구 사항 수렴 및 분석 이병길 한국항해항만학회 학술 대회 (춘계) 2011, pp.156-158 | ||
Conference
|
2011 | Air Traffic Flow Management using Flight Trajectory Modeling 이성현 한국통신학회 종합 학술 발표회 (하계) 2011, pp.809-810 | ||
Conference
|
2011 | Design of System Architecture for secure Inter-VTS Data Exchange 이병길 정보 및 제어 심포지움 (ICS) 2011, pp.305-306 | ||
Conference
|
2011 | The Efficient Distribution and Management Mechanism of Flight Messages for Next Aviation Control 오승희 한국통신학회 종합 학술 발표회 (동계) 2011, pp.368-369 | ||
Journal
|
2011 | Hybrid Security Protocol for Wireless Body Area Networks Chol Soon Jang Wireless Communications and Mobile Computing, v.11, no.2, pp.277-288 | 42 | |
Conference
|
2010 | Region-based Video Encryption Method 최수길 차세대 통신 소프트웨어 학술 대회 (NCS) 2010, pp.1-4 | ||
Conference
|
2010 | Design of Smart Camera for Video Encryption 전용성 차세대 통신 소프트웨어 학술 대회 (NCS) 2010, pp.1-3 | ||
Conference
|
2010 | The Implementation and Efficient Deployment of Video Security Policy 김건우 차세대 통신 소프트웨어 학술 대회 (NCS) 2010, pp.1-6 | ||
Conference
|
2010 | Design of Aids to Navigation Structure based on Situation Awareness for Maritime Safety Byung Gil Lee Asia Navigation Conference (ANC) 2010, pp.1-5 | ||
Conference
|
2010 | e-Navigation 국제 표준화 방향에 따른 차세대 한국형 VTS(u-VTS) 시스템 구조 이병길 한국항해항만학회 학술 대회 (추계) 2010, pp.146-148 | ||
Conference
|
2010 | The Proposal of Efficient SSR Code Management in Flight Data Processor System 오승희 한국해양정보통신학회 종합 학술 대회 (추계) 2010, pp.613-615 | ||
Conference
|
2010 | Privacy Preservation in SAT (Single Authentication Through) Geon-Woo Kim International Conference on Information Technology Convergence and Services (ITCS) 2010, pp.1-4 | 0 | |
Conference
|
2010 | Partial Encryption and Watermarking of H.264 Video in Codestream Domain Jin-Hee Han International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC) 2010, pp.1-3 | ||
Journal
|
2010 | Design of Situation Awareness and Aids to Navigation Structure of VTS for Maritime Safety 이병길 한국통신학회논문지 B : 네트워크 및 융합 서비스, v.35, no.7, pp.1073-1080 | ||
Conference
|
2010 | Design and Implementation of Modular Multiplier for Embedded System 김영세 한국통신학회 종합 학술 발표회 (하계) 2010, pp.1165-1166 | ||
Conference
|
2010 | A Study on the Interoperability between Video Surveillance Systems 주홍일 한국통신학회 종합 학술 발표회 (하계) 2010, pp.741-742 | ||
Conference
|
2010 | The Generation Method of Progress Report in Flight Data Processor 이성현 한국통신학회 종합 학술 발표회 (하계) 2010, pp.749-750 | ||
Conference
|
2010 | Partial Encryption and Watermarking of H.264 Video in Codestream Domain 한진희 한국통신학회 종합 학술 발표회 (하계) 2010, pp.1147-1148 | ||
Journal
|
2010 | 실시간 영상에서의 휴먼 검출 및 얼굴 분류 김건우 정보보호학회지, v.20, no.3, pp.48-57 | ||
Journal
|
2010 | 차세대 영상보안 기술 동향 전용성 정보보호학회지, v.20, no.3, pp.9-17 | ||
Conference
|
2010 | A Study on the Security Issues in the Automotive Black Box 김무섭 한국통신학회 종합 학술 발표회 (하계) 2010, pp.1149-1150 | ||
Conference
|
2009 | On the Challenges of Applying Selective Encryption on Region-of-Interest in H.264 Video Coding Su Gil Choi International Conference on Computer Science and its Applications (CSA) 2009, pp.1-5 | 5 | |
Conference
|
2009 | Design Issue of Smart Camera Hardware Design 전용성 차세대 통신 소프트웨어 학술 대회 (NCS) 2009, pp.1-3 | ||
Conference
|
2009 | The Correlation Method of Flight Plan and System Trac 이성현 한국통신학회 종합 학술 대회 (추계) 2009, pp.450-451 | ||
Conference
|
2009 | The USN Application’s Security Profile by Analysis of the Threats and Attack Scenarios 이병길 정보 및 제어 학술 대회 (CICS) 2009, pp.289-292 | ||
Conference
|
2009 | The Propose of Flight Plan State Management foe Next Aviation Control 오승희 한국해양정보통신학회 종합 학술 대회 (추계) 2009, pp.798-800 | ||
Conference
|
2009 | A Study on Position Estimation of Aircraft in Flight Data Processor 이성현 한국해양정보통신학회 종합 학술 대회 (추계) 2009, pp.871-872 | ||
Journal
|
2009 | Security Policy Specification for Home Network Geon Woo Kim International Journal Ad Hoc and Ubiquitous Computing, v.4, no.6, pp.372-378 | 1 | |
Conference
|
2009 | The Detection and Response Mechanism Against Abnormal Traffic Attack in ATN Network Seung Hee Oh International Conference on Security and Management (SAM) 2009, pp.1-6 | ||
Conference
|
2009 | Compact Design of a Combined MixColumn/InvMixColumn Transformation Module for AES Yong Sung Jeon International Conference on Computer Design (CDES) 2009, pp.38-41 | ||
Conference
|
2009 | Smart Camera Hardware Design based on the TI DaVinci Processor Yong Sung Jeon International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC) 2009, pp.622-624 | ||
Journal
|
2009 | IT융합환경에서 안전한 해상교통관제 및 해상보안기술 이병길 정보처리학회지, v.16, no.4, pp.64-74 | ||
Conference
|
2009 | A Study on Reliable Communication in ATN Environment Do Woo Kim International Conference on Information & Knowledge Engineering (IKE) 2009, pp.370-373 | ||
Conference
|
2009 | Security Requirements for Secure Video Surveillance System 김건우 한국통신학회 종합 학술 대회 (하계) 2009, pp.1623-1624 | ||
Conference
|
2009 | The Requirement of Trajectory Modeling for ATN 오승희 한국통신학회 종합 학술 대회 (하계) 2009, pp.1047-1048 | ||
Conference
|
2009 | The Countermeasure about DoS Attack in Aeronautical Telecommunication Network 이성현 한국통신학회 종합 학술 대회 (하계) 2009, pp.1625-1626 | ||
Conference
|
2009 | The Analysis of Flight Data Processing System 김도우 한국해양정보통신학회 종합 학술 대회 (춘계) 2009, pp.785-788 | ||
Journal
|
2009 | Security technologies based on a home gateway for making smart homes secure Geon Woo Kim Internet Research, v.19, no.2, pp.209-226 | 2 | |
Conference
|
2009 | Intelligent Pervasive Network Authentication: S/Key Based Device Authentication Deok Gyu Lee Consumer Communications and Networking Conference (CCNC) 2009, pp.1-5 | 5 | |
Conference
|
2008 | The Traceback Method about DoS Attack in Open Grid Computing Environment Seoung-Hyeon Lee International Conference on Future Generation Communication and Networking (FGCN) 2008, pp.391-394 | 1 | |
Conference
|
2008 | The Mechanism and Requirements for Detecting the Cross-Service Attack Seung-Hee Oh Asia-Pacific Services Computing Conference (APSCC) 2008, pp.656-661 | 1 | |
Journal
|
2008 | Security Architecture for Secure Mobile Web Services 이재승 한국엔터테인먼트산업학회논문지, v.2, no.2, pp.43-48 | ||
Conference
|
2008 | The Countermeasure about DoS Attack in Grid Web Services 이성현 한국엔터테인먼트산업학회 학술 대회 (추계) 2008, pp.425-428 | ||
Conference
|
2008 | Study on Security Framework of Thin-Client Robot 김건우 한국해양정보통신학회 종합 학술 대회 (추계) 2008, pp.720-723 | ||
Conference
|
2008 | Smart Environment Authentication: Multi-domain Authentication, Authorization, Security Policy for Pervasive Network Deok Gyu Lee International Symposium on Ubiquitous Multimedia Computing (UMC) 2008, pp.99-104 | 3 | |
Conference
|
2008 | Key Management Technology for RUPI-based Robot Environment 김건우 한국해양정보통신학회 종합 학술 대회 (추계) 2008, pp.712-715 | ||
Journal
|
2008 | Light-weight Access Control Mechanism Based on Authoricate Issued for Smart Home Geon-Woo Kim International Journal of Smart Home, v.2, no.4, pp.49-58 | ||
Journal
|
2008 | Trend of Home Network Security Technology and Standardization 이덕규 전자통신동향분석, v.23, no.4, pp.89-101 | ||
Conference
|
2008 | Identity-based Applicatioins Located by Surveillance System Geon-Woo Kim International Conference on Multimedia, Information Technology and its Applications (MITA) 2008, pp.49-52 | ||
Conference
|
2008 | How to Integrate Diverse Client Authentication Protocol with Various Authentication Means Hyung Kyu Lee International Conference on Security and Management (SAM) 2008, pp.1-5 | ||
Conference
|
2008 | Time Stamp Protocol for Smart Environment Services Deok-Gyu Lee International Conference on Ubiquitous Intelligence and Computing (UIC) 2008 (LNCS 5061), v.5061, pp.591-601 | 0 | |
Conference
|
2008 | Protection Techniques of Secret Information in Non-tamper Proof Devices of Smart Home Network Abedelaziz Mohaisen International Conference on Ubiquitous Intelligence and Computing (UIC) 2008 (LNCS 5061), v.5061, pp.548-562 | 0 | |
Conference
|
2008 | A Study on Information Security System Security Assurance Scheme and Mehod 이덕규 한국정보기술학회 학술 발표회 (하계) 2008, pp.1-4 | ||
Conference
|
2008 | The Study on the Security Requirement at Aeronautical Telecommunication Network 김도우 한국해양정보통신학회 종합 학술 대회 (춘계) 2008, pp.628-631 | ||
Conference
|
2008 | The Proposal of Detection Mechanism Against Cross-service Attack 오승희 한국해양정보통신학회 종합 학술 대회 (춘계) 2008, pp.647-650 | ||
Conference
|
2008 | Software Engineering for Security : Towards Secure Software Architecture Deok Gyu Lee 한국멀티미디어학회 학술 발표 대회 (춘계) 2008, pp.711-714 | ||
Conference
|
2008 | Intelligent Security for Inter-space Surveillance Applications Geon-Woo Kim International Conference on Multimedia and Ubiquitous Engineering (MUE) 2008, pp.419-422 | 1 | |
Journal
|
2008 | 홈디바이스 인증/인가 기술 동향 김도우 주간기술동향, v.1329, pp.1-2 | ||
Conference
|
2007 | Home Device Authentication Method based on PKI Yun-Kyung Lee International Conference on Future Generation Communication and Networking (FGCN) 2007, pp.1-5 | 3 | |
Conference
|
2007 | Intelligent Home Network Authentication: Home Device Authentication Using Device Certification Deok-Gyu Lee OTM Confederated International Conferences CoopIS, DOA, ODBASE, GADA, and IS 2007 (LNCS 4804), v.4804, pp.1688-1700 | 1 | |
Conference
|
2007 | A Study on a Illegal Copy Protection Model using Hidden Agent in Embedded Computing Environment 이덕규 한국해양정보통신학회 종합 학술 대회 (추계) 2007, pp.709-712 | ||
Conference
|
2007 | Home Device Authentication System Construction based on PKI 이윤경 한국해양정보통신학회 종합 학술 대회 (추계) 2007, pp.729-732 | ||
Conference
|
2007 | Security Architecture for Authentication and Authorization in the Intelligent and Ubiquitous Home Network Hyung Kyu Lee International Conference on Intelligent Computing (ICIC) 2007 (CCIS 2), v.2, pp.1110-1118 | ||
Conference
|
2007 | Intelligent Home Network Authentication: S/Key-Based Home Device Authentication Deok-Gyu Lee International Symposium on Parallel and Distributed Processing and Applications (ISPA) 2007 (LNCS 4743), v.4743, pp.214-223 | 5 | |
Conference
|
2007 | Access Control Mechanisms for Home Network using Home Server Do-Woo Kim International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC) 2007, pp.378-379 | ||
Conference
|
2007 | Design of Hiding Secret Information System on Home Network Devices 김도우 한국해양정보통신학회 종합 학술 대회 (춘계) 2007, pp.841-844 | ||
Conference
|
2007 | Home Device Authentication Method in Ubiquitous Environment Yun-Kyung Lee International Symposium on Consumer Electronics (ISCE) 2007, pp.1-5 | 5 | |
Conference
|
2007 | PKI Based Home Device Authentication in Home Network 이윤경 한국해양정보통신학회 종합 학술 대회 (춘계) 2007, pp.811-814 | ||
Conference
|
2007 | Traitor Tracing using an Efficient Key Renewal 이덕규 한국해양정보통신학회 종합 학술 대회 (춘계) 2007, pp.799-802 | ||
Conference
|
2007 | Security Framework for Home Network: Authentication, Authorization, and Security Policy Geon Woo Kim Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD) 2007 (LNCS 4819), v.4819, pp.621-628 | 7 | |
Conference
|
2007 | User Authentication for Multi Domain in Home Network Environments Deok Gyu Lee International Conference on Multimedia and Ubiquitous Engineering (MUE) 2007, pp.1-6 | 1 | |
Journal
|
2007 | Trend of Home Network Security Standardization 이윤경 전자통신동향분석, v.22, no.1, pp.73-82 | ||
Conference
|
2006 | A Secure Authentication Protocol for Home Network using an ID/PW Hong Il Ju International Ubiquitous Convergence Conference (IUC) 2006, pp.1-5 | ||
Journal
|
2006 | 홈디바이스 인증/인가 기술 동향 한종욱 한국정보보호학회지, v.16, no.6, pp.33-41 | ||
Conference
|
2006 | Access Control System based on a Home Server 김도우 한국해양정보통신학회 종합 학술 대회 (추계) 2006, pp.731-734 | ||
Conference
|
2006 | A Study on Efficient Authentication for Intelligent Service on Ubi-Home 한종욱 한국해양정보통신학회 종합 학술 대회 (추계) 2006, pp.717-720 | ||
Conference
|
2006 | More Convenient User Authentication Mechanism using Authentication Information Storage Server in Home Network Yun Kyung Lee Joint Workshop on Information Security (JWIS) 2006, pp.1-9 | ||
Journal
|
2006 | 홈 네트워크 보안 기술 동향 한종욱 정보통신 : 한국통신학회지, v.23, no.9, pp.113-124 | ||
Conference
|
2006 | Efficient and User Friendly Inter-domain Device Authentication/Access Control for Home Networks Jin Bum Hwang International Conference on Embedded and Ubiquitous Computing (EUC) 2006 (LNCS 4096), v.4096, pp.131-140 | 13 | |
Conference
|
2006 | Home Network Modelling and Home Network User Authentication Mechanism Using Biometric Information Yun Kyung Lee International Symposium on Consumer Electronics (ISCE) 2006, pp.59-63 | 7 | |
Journal
|
2006 | Method to Verify the Validity of Device in a Home Network 김도우 한국해양정보통신학회논문지, v.10, no.6, pp.1065-1069 | ||
Conference
|
2006 | Two Layered PKI Model for Device Authentication in Multi-Domain Home Networks Jin Bum Hwang International Symposium on Consumer Electronics (ISCE) 2006, pp.634-639 | 3 | |
Conference
|
2006 | Service Flow Control for Accesses to Home Network 김건우 한국해양정보통신학회 종합 학술 대회 (춘계) 2006, pp.737-740 | ||
Conference
|
2006 | Home Gateway-based Home Network Access Control Mechanism 김건우 한국해양정보통신학회 종합 학술 대회 (춘계) 2006, pp.733-736 | ||
Conference
|
2006 | Home Network Security Description Language 김건우 한국해양정보통신학회 종합 학술 대회 (춘계) 2006, pp.741-744 | ||
Conference
|
2006 | Secure Discovery Method of Devices based on a Home Server 김도우 한국해양정보통신학회 종합 학술 대회 (춘계) 2006, pp.745-748 | ||
Conference
|
2006 | A Security Model for Home Networks with Authority Delegation Jin Bum Hwang International Conference on Computational Science and Its Applications (ICCSA) 2006 (LNCS 3983), v.3983, pp.360-369 | 6 | |
Conference
|
2006 | Analysis of Various PKI Certificates Profile 이윤경 한국해양정보통신학회 종합 학술 대회 (춘계) 2006, pp.757-760 | ||
Conference
|
2006 | Secure Discovery Method of Devices for a Home Network Middleware Do Woo Kim International Conference on Advanced Communication Technology (ICACT) 2006, pp.1733-1735 | 0 | |
Conference
|
2006 | User Authentication Mechanism Using Authentication Server in Home Network Yun Kyung Lee International Conference on Advanced Communication Technology (ICACT) 2006, pp.503-506 | 5 | |
Conference
|
2006 | Consideration of Efficient Nearest Node Discovering Mechanisms for Key Infection Jin Bum Hwang International Conference on Advanced Communication Technology (ICACT) 2006, pp.1686-1689 | 0 | |
Conference
|
2006 | Considerations on Security Model of Home Network Geon Woo Kim International Conference on Advanced Communication Technology (ICACT) 2006, pp.109-112 | 6 | |
Conference
|
2005 | Design of Access Control System based RBAC for Home Network Services 김도우 한국해양정보통신학회 종합 학술 대회 (추계) 2005, pp.833-836 | ||
Conference
|
2005 | A study on Access Control Model for Home Network 김건우 한국해양정보통신학회 종합 학술 대회 (추계) 2005, pp.841-844 | ||
Conference
|
2005 | A study of the DHCP Message Authentication at Home Network 주홍일 한국해양정보통신학회 종합 학술 대회 (추계) 2005, pp.837-840 | ||
Conference
|
2005 | Implementation of the authentication for DHCP message Hongil Ju International Technical Conference on Circuits Systems, Computers and Communications (ITC-CSCC) 2005, pp.665-666 | ||
Conference
|
2005 | Access Control Model using RBAC in Digital Home Environments Do-Woo Kim International Technical Conference on Circuits Systems, Computers and Communications (ITC-CSCC) 2005, pp.671-672 | ||
Conference
|
2005 | Design and Implementation of Authentication System for RFID Security 이지용 한국해양정보통신학회 종합 학술 대회 (춘계) 2005, pp.328-331 | ||
Conference
|
2005 | Security Policy Framework for Home Network 김건우 한국해양정보통신학회 종합 학술 대회 (춘계) 2005, pp.839-842 | ||
Conference
|
2005 | User Authentication Mechanisms for Home Network 박지혜 한국해양정보통신학회 종합 학술 대회 (춘계) 2005, pp.1-4 | ||
Conference
|
2005 | Protocols for Service Discovery in a Home Network Enviromnents 김도우 한국해양정보통신학회 종합 학술 대회 (춘계) 2005, pp.856-859 | ||
Conference
|
2004 | Design of Access Control System for Home Network Service 김도우 한국멀티미디어학회 학술 발표 대회 (추계) 2004, pp.737-740 | ||
Journal
|
2004 | 홈 네트워크 보안 프레임워크 구축을 위한 고려 사항 한종욱 정보과학회지, v.22, no.9, pp.17-23 | ||
Conference
|
2004 | An ASIC Implementation of Rijndael Crypto-processor Supporting 128/192/256 Bits Key Length for Smart Card Yun-kyung Lee International Technical Conference on Circuits Systems, Computers and Communications (ITC-CSCC) 2004, pp.69-72 | ||
Journal
|
2004 | 안전한 홈네트워크 구축을 위한 보안요구사항 한종욱 정보처리학회지, v.11, no.3, pp.38-45 | ||
Conference
|
2004 | Security Flow Control by Dynamic Stack Allocation Geon Woo Kim International Conference on Advanced Communication Technology (ICACT) 2004, pp.309-311 | ||
Journal
|
2004 | Giga급 보안 프로세서 및 VPN 장비 기술 동향 김기현 주간기술동향, v.1131, pp.1-13 | ||
Conference
|
2004 | Optical encryption and decryption using personal fingerprint image Sang-Su Lee International Conference on Advanced Communication Technology (ICACT) 2004, pp.413-415 | ||
Conference
|
2003 | Secure sharing method for a secret binary image and its reconstruction system Sang-Su Lee International Conference on Control, Automation and Systems (ICCAS) 2003, pp.1240-1243 | ||
Conference
|
2003 | Mobile IPv6 security while traversing a NAT Geon-Woo Kim International Conference on Networks (ICON) 2003, pp.331-335 | 0 | |
Conference
|
2003 | Access Policy Transfer Between Active Nodes Using Identities Youngsoo Kim International Conference on Control, Automation and Systems (ICCAS) 2003, pp.2178-2181 | ||
Journal
|
2003 | 보안프로세서의 동향 및 성능 비교 이상수 정보보호학회지, v.13, no.4, pp.15-24 | ||
Conference
|
2003 | Encryption of divided images and its decryption method using linearly polarized light 이상수 통신 정보 합동 학술 대회 (JCCI) 2003, pp.81-81 | ||
Journal
|
2003 | 전광 전달망(AOTN)에서의 물리적 보안 관리 김성운 정보보호학회지, v.13, no.1, pp.42-55 |