
| Type | Year | Title | Cited | Download |
|---|---|---|---|---|
|
Journal
|
2021 | Improvement of Consensus Quality for PoN Blockchain System Using Response Surface Methodology 최진영 품질경영학회지, v.49, no.4, pp.527-537 | ||
|
Conference
|
2021 | A Study on High-speed Synchronization of the PON-based Blockchain 김동오 한국정보처리학회 학술 발표 대회 (추계) 2021, pp.320-321 | ||
|
Journal
|
2021 | Blockchain distributed consensus technology trend 진희상 전자공학회지, v.48, no.5, pp.63-74 | ||
|
Journal
|
2020 | Simulator Design and Performance Analysis of BADA Distributed Consensus Algorithm 김영창 산업경영시스템학회지, v.43, no.4, pp.168-177 | ||
|
Journal
|
2020 | Algorithm based on Byzantine Agreement among Decentralized Agents (BADA) Jintae Oh ETRI Journal, v.42, no.6, pp.872-885 | 3 | |
|
Journal
|
2018 | Past, Present and Future of Blockchain Technology 박정숙 전자통신동향분석, v.33, no.6, pp.139-153 | ||
|
Journal
|
2018 | Performance Improvement of Distributed Consensus Algorithms for Blockchain through Suggestion and Analysis of Assessment Items 김도균 산업경영시스템학회지, v.41, no.4, pp.179-188 | ||
|
Journal
|
2016 | Detecting Weak Signal of Emerging Technologies 최수길 전자통신동향분석, v.31, no.2, pp.18-27 | ||
|
Journal
|
2015 | System Architecture for Real-Time Face Detection on Analog Video Camera Mooseop Kim International Journal of Distributed Sensor Networks, v.2015, pp.1-12 | 10 | |
|
Conference
|
2014 | Hardware Architecture for Real-Time Face Detection on Embedded Analog Video Cameras Mooseop Kim International Conference on Computer Science and its Applications (CSA) 2014 (LNEE 330), v.330, pp.311-316 | 1 | |
|
Conference
|
2014 | Data Forgery Detection for Vehicle Black Box Mooseop Kim International Conference on Information and Communication Technology Convergence (ICTC) 2014, pp.636-637 | 8 | |
|
Conference
|
2014 | Multilingual Sentence Hiding and Displaying System for Digital Cartoon Images Sang-Kwang Lee International Conference on Convergence Content (ICCC) 2014, pp.371-372 | ||
|
Conference
|
2014 | Flying Screen with Cooperative Flocking Quad-Rotors Jinkyeong Kim International Conference on Convergence Content (ICCC) 2014, pp.373-374 | ||
|
Journal
|
2013 | A Security Monitoring System for Security Information Sharing and Cooperative Countermeasure 김기영 전자공학회논문지, v.50, no.2, pp.60-69 | ||
|
Conference
|
2010 | Context-based Remote Security Control for Mobile Communication Device Gae Il An International Symposium on Communications and Information Technologies (ISCIT) 2010, pp.815-820 | 2 | |
|
Journal
|
2010 | 모바일 인터넷 및 스마트폰 보안 기술 김기영 OSIA Standards & Technology Review, v.38, no.1, pp.62-71 | ||
|
Conference
|
2009 | The Design of Signature Selection for Protecting Illegal Outflow of Sensitive Information in Mobile Device Bo Heung Chung Communications in Computer and Information Science (CCIS) 2009, pp.51-56 | 0 | |
|
Journal
|
2009 | Design and Implementation of Security Reconfiguration for Effective Security Management of Mobile Communication Device 안개일 정보처리학회논문지 C, v.16C, no.6, pp.1-11 | ||
|
Conference
|
2009 | Hardware Based Data Inspection for USB Data Leakage Prevention Dong Ho Kang Communications in Computer and Information Science (CCIS) 2009, pp.57-63 | 1 | |
|
Conference
|
2009 | Context-Aware Dynamic Security Configuration for Mobile Communication Device Gae Il An International Conference on New Technologies, Mobility and Security (NTMS) 2009, pp.1-5 | 3 | |
|
Conference
|
2009 | Domain-based Information Control to Enhance Security in Mobile Platforms Gun Tae Bae International Conference on Internet (ICONI) 2009, pp.1-7 | ||
|
Journal
|
2009 | 개방형 모바일 환경에서 스마트폰 보안기술 김기영 정보보호학회지, v.19, no.5, pp.21-28 | ||
|
Conference
|
2009 | USB Data Leakage Prevention Using Hardware based Data Inspection Technique Dong Ho Kang International Conference on Security and Management (SAM) 2009, pp.1-5 | ||
|
Conference
|
2009 | The Design and Implementation of Security Management Prototype for All-in-one Mobile Devices 박원주 통신 정보 합동 학술 대회 (JCCI) 2009, pp.1-4 | ||
|
Journal
|
2008 | The Trends of Secure Operating System Technology for Mobile Platform 배근태 전자통신동향분석, v.23, no.4, pp.39-47 | ||
|
Conference
|
2008 | Real-Time IP Checking and Packet Marking for Preventing ND-DoS Attack Employing Fake Source IP in IPv6 LAN Gae Il An International Conference on Autonomic and Trusted Computing (ATC) 2008 (LNCS 5060), v.5060, pp.36-46 | 4 | |
|
Journal
|
2008 | Trend Analysis of the Operating System for Handheld Devices Based Linux System 오승희 전자통신동향분석, v.23, no.3, pp.152-162 | ||
|
Conference
|
2008 | Just-on-Time Data Leakage Protection for Mobile Devices Bo-Heung Chung International Conference on Advanced Communication Technology (ICACT) 2008, pp.1914-1915 | 2 | |
|
Conference
|
2008 | Protection Profile for Security Enhancement of Embedded Operating System for Mobile Terminals Youn Seo Jeong International Conference on Advanced Communication Technology (ICACT) 2008, pp.1908-1911 | 2 | |
|
Conference
|
2007 | Processing of Multi-pattern Signature in Intrusion Detection System with Content Processor Young-Ho Kim International Conference on Information, Communications and Signal Processing (ICICS) 2007, pp.1-4 | 1 | |
|
Conference
|
2007 | A Static or Dynamic Reconfiguration Method of Security Functions for Mobile Devices by Using the Security Profiles Won Joo Park International Conference on Information Security and Privacy (ISP) 2007, pp.1-5 | ||
|
Conference
|
2007 | Implementation of RBAC using LSM Framework 정연서 차세대 통신 소프트웨어 학술 대회 (NCS) 2007, pp.1-4 | ||
|
Conference
|
2007 | Analysis of SEND Protocol through Implementation and Simulation Gae Il An International Conference on Convergence Information Technology (ICCIT) 2007, pp.670-676 | 16 | |
|
Journal
|
2007 | A Periodical Key Refreshment Scheme for Compromise-prone Sensor Nodes 왕기철 전자공학회논문지 TC, v.44, no.11, pp.67-77 | ||
|
Journal
|
2007 | Recent Trends in Research and Technology of Secure Execution Environment 백광호 전자통신동향분석, v.22, no.5, pp.152-158 | ||
|
Conference
|
2007 | Implementation of Multi-thread based Intrusion Prevention System for IPv6 Jae-Deok Lim International Conference on Control, Automation and Systems (ICCAS) 2007, pp.404-407 | 5 | |
|
Journal
|
2007 | 모바일 데이터 보안 제품 동향 박원주 주간기술동향, v.1309, pp.1-11 | ||
|
Conference
|
2007 | FPGA based light-weight Security Gateway System Dong-Ho Kang International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC) 2007, pp.386-387 | ||
|
Conference
|
2007 | Hardware Implementation of Block Cipher ARIA 이상우 통신 정보 합동 학술 대회 (JCCI) 2007, pp.1-5 | ||
|
Conference
|
2007 | The Proposal of Anomaly Traffic Detection Mechanism 오승희 한국정보처리학회 학술 발표 (춘계) 2007, pp.1031-1034 | ||
|
Conference
|
2007 | Implementation of 10Gb Ethernet Switch Hardware Platform with a Network Processor and a 10Gb EMAC Sang-Woo Lee International Conference on Advanced Communication Technology (ICACT) 2007, pp.563-566 | 3 | |
|
Journal
|
2007 | An Analysis of Security Threat and Network Attack in IPv6 정보흥 전자통신동향분석, v.22, no.1, pp.37-50 | ||
|
Conference
|
2006 | Implementation of IPsec VPN Hardware Platform 이상우 차세대 통신 소프트웨어 학술 대회 (NCS) 2006, pp.1-4 | ||
|
Journal
|
2006 | 무선 확대와 모바일 보안위협 김기영 주간기술동향, v.1271, pp.1-9 | ||
|
Conference
|
2006 | IPv6 Duplicate Address Detection DoS Attack Detector Seung Ho Ryu International Conference on Hybrid Information Technology (ICHIT) 2006, pp.1-10 | ||
|
Conference
|
2006 | Analysis of Security Requirements on Embedded Operating System for Portable Terminal 정연서 한국정보처리학회 학술 대회 (추계) 2006, pp.1653-1656 | ||
|
Conference
|
2006 | Evaluation of Internet Worms Propagation in IPv6 Network Hwan Kuk Kim International Conference on Hybrid Information Technology (ICHIT) 2006 (LNCS 4413), v.4413, pp.1-9 | ||
|
Conference
|
2006 | A Study of Security Policy Enforcement using Priority Su Hyung Jo SICE-ICASE International Joint Conference 2006, pp.3726-3729 | 0 | |
|
Conference
|
2006 | Packet Filter Algorithm to Prevent the Security Hole of Routing Header in IPv6 Jae Deok Lim SICE-ICASE International Joint Conference 2006, pp.3924-3927 | 1 | |
|
Journal
|
2006 | IPv6 침입 탐지 및 차단 기술 김기영 정보통신 : 한국통신학회지, v.23, no.9, pp.65-74 |