ETRI-Knowledge Sharing Plaform

KOREAN

Researchers

연구자 검색
Keyword

Detail

사진

Kim Ki Young Principal Researcher
Department
Trustworthy Network Research Section
Contact
KSP Keywords
논문 검색결과
Type Year Title Cited Download
Journal
2021 Improvement of Consensus Quality for PoN Blockchain System Using Response Surface Methodology   최진영  품질경영학회지, v.49, no.4, pp.527-537
Conference
2021 A Study on High-speed Synchronization of the PON-based Blockchain   김동오   한국정보처리학회 학술 발표 대회 (추계) 2021, pp.320-321
Journal
2021 Blockchain distributed consensus technology trend   진희상   전자공학회지, v.48, no.5, pp.63-74
Journal
2020 Simulator Design and Performance Analysis of BADA Distributed Consensus Algorithm   김영창   산업경영시스템학회지, v.43, no.4, pp.168-177
Journal
2020 Algorithm based on Byzantine Agreement among Decentralized Agents (BADA)   Jintae Oh   ETRI Journal, v.42, no.6, pp.872-885 3
Journal
2018 Past, Present and Future of Blockchain Technology   박정숙   전자통신동향분석, v.33, no.6, pp.139-153
Journal
2018 Performance Improvement of Distributed Consensus Algorithms for Blockchain through Suggestion and Analysis of Assessment Items   김도균  산업경영시스템학회지, v.41, no.4, pp.179-188
Journal
2016 Detecting Weak Signal of Emerging Technologies   최수길   전자통신동향분석, v.31, no.2, pp.18-27
Journal
2015 System Architecture for Real-Time Face Detection on Analog Video Camera   Mooseop Kim   International Journal of Distributed Sensor Networks, v.2015, pp.1-12 10
Conference
2014 Hardware Architecture for Real-Time Face Detection on Embedded Analog Video Cameras   Mooseop Kim   International Conference on Computer Science and its Applications (CSA) 2014 (LNEE 330), v.330, pp.311-316 1
Conference
2014 Data Forgery Detection for Vehicle Black Box   Mooseop Kim   International Conference on Information and Communication Technology Convergence (ICTC) 2014, pp.636-637 8
Conference
2014 Multilingual Sentence Hiding and Displaying System for Digital Cartoon Images   Sang-Kwang Lee   International Conference on Convergence Content (ICCC) 2014, pp.371-372
Conference
2014 Flying Screen with Cooperative Flocking Quad-Rotors   Jinkyeong Kim   International Conference on Convergence Content (ICCC) 2014, pp.373-374
Journal
2013 A Security Monitoring System for Security Information Sharing and Cooperative Countermeasure   김기영   전자공학회논문지, v.50, no.2, pp.60-69
Conference
2010 Context-based Remote Security Control for Mobile Communication Device   Gae Il An   International Symposium on Communications and Information Technologies (ISCIT) 2010, pp.815-820 2
Journal
2010 모바일 인터넷 및 스마트폰 보안 기술   김기영   OSIA Standards & Technology Review, v.38, no.1, pp.62-71
Conference
2009 The Design of Signature Selection for Protecting Illegal Outflow of Sensitive Information in Mobile Device   Bo Heung Chung   Communications in Computer and Information Science (CCIS) 2009, pp.51-56 0
Journal
2009 Design and Implementation of Security Reconfiguration for Effective Security Management of Mobile Communication Device   안개일   정보처리학회논문지 C, v.16C, no.6, pp.1-11
Conference
2009 Hardware Based Data Inspection for USB Data Leakage Prevention   Dong Ho Kang   Communications in Computer and Information Science (CCIS) 2009, pp.57-63 1
Conference
2009 Context-Aware Dynamic Security Configuration for Mobile Communication Device   Gae Il An   International Conference on New Technologies, Mobility and Security (NTMS) 2009, pp.1-5 3
Conference
2009 Domain-based Information Control to Enhance Security in Mobile Platforms   Gun Tae Bae   International Conference on Internet (ICONI) 2009, pp.1-7
Journal
2009 개방형 모바일 환경에서 스마트폰 보안기술   김기영   정보보호학회지, v.19, no.5, pp.21-28
Conference
2009 USB Data Leakage Prevention Using Hardware based Data Inspection Technique   Dong Ho Kang   International Conference on Security and Management (SAM) 2009, pp.1-5
Conference
2009 The Design and Implementation of Security Management Prototype for All-in-one Mobile Devices   박원주   통신 정보 합동 학술 대회 (JCCI) 2009, pp.1-4
Journal
2008 The Trends of Secure Operating System Technology for Mobile Platform   배근태   전자통신동향분석, v.23, no.4, pp.39-47
Conference
2008 Real-Time IP Checking and Packet Marking for Preventing ND-DoS Attack Employing Fake Source IP in IPv6 LAN   Gae Il An   International Conference on Autonomic and Trusted Computing (ATC) 2008 (LNCS 5060), v.5060, pp.36-46 4
Journal
2008 Trend Analysis of the Operating System for Handheld Devices Based Linux System   오승희   전자통신동향분석, v.23, no.3, pp.152-162
Conference
2008 Just-on-Time Data Leakage Protection for Mobile Devices   Bo-Heung Chung   International Conference on Advanced Communication Technology (ICACT) 2008, pp.1914-1915 2
Conference
2008 Protection Profile for Security Enhancement of Embedded Operating System for Mobile Terminals   Youn Seo Jeong   International Conference on Advanced Communication Technology (ICACT) 2008, pp.1908-1911 2
Conference
2007 Processing of Multi-pattern Signature in Intrusion Detection System with Content Processor   Young-Ho Kim   International Conference on Information, Communications and Signal Processing (ICICS) 2007, pp.1-4 1
Conference
2007 A Static or Dynamic Reconfiguration Method of Security Functions for Mobile Devices by Using the Security Profiles   Won Joo Park   International Conference on Information Security and Privacy (ISP) 2007, pp.1-5
Conference
2007 Implementation of RBAC using LSM Framework   정연서   차세대 통신 소프트웨어 학술 대회 (NCS) 2007, pp.1-4
Conference
2007 Analysis of SEND Protocol through Implementation and Simulation   Gae Il An   International Conference on Convergence Information Technology (ICCIT) 2007, pp.670-676 16
Journal
2007 A Periodical Key Refreshment Scheme for Compromise-prone Sensor Nodes   왕기철  전자공학회논문지 TC, v.44, no.11, pp.67-77
Journal
2007 Recent Trends in Research and Technology of Secure Execution Environment   백광호   전자통신동향분석, v.22, no.5, pp.152-158
Conference
2007 Implementation of Multi-thread based Intrusion Prevention System for IPv6   Jae-Deok Lim   International Conference on Control, Automation and Systems (ICCAS) 2007, pp.404-407 5
Journal
2007 모바일 데이터 보안 제품 동향   박원주   주간기술동향, v.1309, pp.1-11
Conference
2007 FPGA based light-weight Security Gateway System   Dong-Ho Kang   International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC) 2007, pp.386-387
Conference
2007 Hardware Implementation of Block Cipher ARIA   이상우   통신 정보 합동 학술 대회 (JCCI) 2007, pp.1-5
Conference
2007 The Proposal of Anomaly Traffic Detection Mechanism   오승희   한국정보처리학회 학술 발표 (춘계) 2007, pp.1031-1034
Conference
2007 Implementation of 10Gb Ethernet Switch Hardware Platform with a Network Processor and a 10Gb EMAC   Sang-Woo Lee   International Conference on Advanced Communication Technology (ICACT) 2007, pp.563-566 3
Journal
2007 An Analysis of Security Threat and Network Attack in IPv6   정보흥   전자통신동향분석, v.22, no.1, pp.37-50
Conference
2006 Implementation of IPsec VPN Hardware Platform   이상우   차세대 통신 소프트웨어 학술 대회 (NCS) 2006, pp.1-4
Journal
2006 무선 확대와 모바일 보안위협   김기영   주간기술동향, v.1271, pp.1-9
Conference
2006 IPv6 Duplicate Address Detection DoS Attack Detector   Seung Ho Ryu  International Conference on Hybrid Information Technology (ICHIT) 2006, pp.1-10
Conference
2006 Analysis of Security Requirements on Embedded Operating System for Portable Terminal   정연서   한국정보처리학회 학술 대회 (추계) 2006, pp.1653-1656
Conference
2006 Evaluation of Internet Worms Propagation in IPv6 Network   Hwan Kuk Kim   International Conference on Hybrid Information Technology (ICHIT) 2006 (LNCS 4413), v.4413, pp.1-9
Conference
2006 A Study of Security Policy Enforcement using Priority   Su Hyung Jo   SICE-ICASE International Joint Conference 2006, pp.3726-3729 0
Conference
2006 Packet Filter Algorithm to Prevent the Security Hole of Routing Header in IPv6   Jae Deok Lim   SICE-ICASE International Joint Conference 2006, pp.3924-3927 1
Journal
2006 IPv6 침입 탐지 및 차단 기술   김기영   정보통신 : 한국통신학회지, v.23, no.9, pp.65-74