ETRI-Knowledge Sharing Plaform

KOREAN

Researchers

연구자 검색
Keyword

Detail

사진

Yoon Seung Yong
Department
Cryptography Engineering Research Section
Contact
KSP Keywords
논문 검색결과
Type Year Title Cited Download
Journal
2024 Vectorized Implementation of Kyber and Dilithium on 32-bit Cortex-A Series   Youngbeom Kim  IEEE Access, v.12, pp.104414-104428 0
Conference
2023 A Study on the Application of Lightweight Cryptography for Protecting Drone Remote Control Data   윤정일   한국정보처리학회 학술 발표 대회 (추계) 2023, pp.1185-1186
Conference
2023 Implementation of PQC-based Secure Channel for Drone Services   윤승용   한국정보처리학회 학술 발표 대회 (추계) 2023, pp.1-2
Conference
2023 Security enhancement scheme for mobile device using H/W cryptographic module   Seungyong Yoon   International Conference on Information and Communication Technology Convergence (ICTC) 2023, pp.1450-1452 2
Conference
2022 Enhancing IoT security with PUF-based authentication scheme   Seungyong Yoon   International Conference on Information and Communication Technology Convergence (ICTC) 2022, pp.2319-2321 2
Conference
2022 Reinforcement of IoT Open Platform Security using PUF-based Device Authentication   Byoungkoo Kim   International Conference on Information and Communication Technology Convergence (ICTC) 2022, pp.1969-1971 3
Conference
2021 Multiple PUF-based Lightweight Authentication Method in the IoT   Seungyong Yoon   International Conference on Information and Communication Technology Convergence (ICTC) 2021, pp.1198-1200 8
Conference
2021 PUF-based IoT Device Authentication Scheme on IoT Open Platform   Byoungkoo Kim   International Conference on Information and Communication Technology Convergence (ICTC) 2021, pp.1873-1875 7
Conference
2020 PUF-based Authentication Scheme for IoT Devices   Seungyong Yoon   International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.1792-1794 18
Conference
2020 Secure IoT Device Authentication Scheme using Key Hiding Technology   Byoungkoo Kim   International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.1808-1810 3
Journal
2020 Secure and reliable IoT device authentication technology using key hiding technique   김병구   정보보호학회지, v.30, no.1, pp.35-42
Conference
2019 Security Enhancement for IoT Device using Physical Unclonable Functions   Seungyong Yoon   International Conference on Information and Communication Technology Convergence (ICTC) 2019, pp.1457-1459 3
Conference
2019 PUF based IoT Device Authentication Scheme   Byoungkoo Kim   International Conference on Information and Communication Technology Convergence (ICTC) 2019, pp.1460-1462 26
Conference
2018 Design and Implementation of Lightweight Mutual Authentication Method in IoT   윤승용   통신 정보 합동 학술 대회 (JCCI) 2018, pp.378-379
Conference
2018 Design of an LPWAN Communication Module Based on Secure Element for Smart Parking Application   YongSung Jeon   International Conference on Consumer Electronics (ICCE) 2018, pp.1-2 13
Conference
2017 Remote Security Management Server for IoT Devices   Seungyong Yoon   International Conference on Information and Communication Technology Convergence (ICTC) 2017, pp.1163-1165 21
Conference
2017 Mutual Authentication Scheme for Lightweight IoT Devices   Seungyong Yoon   International Conference on Emerging Security Information, Systems and Technologies (SECURWARE) 2017
Conference
2017 Security Considerations Based on Classification of IoT Device Capabilities   Seungyong Yoon   International Conferences on Advanced Service Computing (SERVICE COMPUTATION) 2017, pp.13-15
Conference
2016 Analyzing Security Threats of Android-based Mobile Malware   Seungyong Yoon   International Conference on Security Technology (SecTech) 2016, pp.310-315
Conference
2015 Supporting a Variety of Secure Services Based on MTM   Seungyong Yoon   International Conference on Systems and Networks Communications (ICSNC) 2015, pp.18-20
Conference
2015 Mobile Security Technology for Smart Devices   Seungyong Yoon   International Conference on Information and Communication Technology Convergence (ICTC) 2015, pp.1174-1176
Conference
2015 Improving MTM-Based Session & Key Management   Seungyong Yoon   International Conference on Green and Human Information Technology (ICGHIT) 2015, pp.333-334
Conference
2014 Security Threats Analysis for Android based Mobile Device   Seungyong Yoon   International Conference on Information and Communication Technology Convergence (ICTC) 2014, pp.775-776 6
Conference
2014 Detection and Response against Mobile Attack using SMS   윤승용   통신 정보 합동 학술 대회 (JCCI) 2014, pp.1-2
Conference
2014 Defenses against ICMP Flooding Attacks   Byoungkoo Kim   International Conference on Electronics, Information and Communication (ICEIC) 2014, pp.1-2
Conference
2014 Detection of SMS Mobile Malware   Seungyong Yoon   International Conference on Electronics, Information and Communication (ICEIC) 2014, pp.1-2 1
Journal
2013 Mobile Malware Detection Using Correlational Analysis   Seungyong Yoon   International Journal of Advancements in Computing Technology, v.5, no.16, pp.52-58
Conference
2013 Malware Detection on Smartphones   Seungyong Yoon   International Conference on Computing and Convergence Technology (ICCCT) 2013, pp.272-275
Conference
2013 Detecting Application Layer-based Slow DDoS Attack   Seungyong Yoon   Asia Pacific International Conference on Information Science and Technology (APIC-IST) 2013, pp.319-322
Conference
2013 Detecting UDP Flooding Attacks Based on Attack Traffic Characteristics   Byoungkoo Kim   Asia Pacific International Conference on Information Science and Technology (APIC-IST) 2013, pp.337-340
Conference
2012 Defense against TCP Flooding Attack   Seungyong Yoon   International Conference on Security and Cryptography (SECRYPT) 2012, pp.416-420 1
Conference
2011 Design and Implementation of ALADDIN System   윤승용   한국정보처리학회 학술 발표 (추계) 2011, pp.992-995
Conference
2009 Abnormal Traffcic Detection using Flow-based Traffic Measuring Scheme   Seung Yong Yoon   International Conference on Security and Management (SAM) 2009, pp.1-5
Conference
2009 Multi-Region based Clustering Analysis Method for Unknown Malicious Code Detection   Byoung Koo Kim   International Conference on Security and Management (SAM) 2009, pp.1-6
Conference
2009 A Case Study of Unknown Attack Detection Against Zero-day Worm in the HoneyNet Environment   Ik Kyun Kim   International Conference on Advanced Communication Technology (ICACT) 2009, pp.1715-1720
Journal
2009 Multi-Hash based Pattern Matching Mechanism for High-Performance Intrusion Detection   Byoung Koo Kim   International Journal of Computers, v.3, no.1, pp.115-124
Conference
2008 An Efficient Multi-hash Pattern Matching Scheme for Intrusion Detection in FPGA-based Reconfiguring Hardware   Byoung Koo Kim   International Conference on Applied Computer Science (ACS) 2008, pp.199-204
Journal
2008 H/W based Stateful Packet Inspection using a Novel Session Architecture   Seung Yong Yoon   International Journal of Computers, v.3, no.2, pp.310-319
Conference
2008 Session Management Architecture for Implementing an FPGA-based Stateful Intrusion Detection System   Seung Yong Yoon   International Conference on Applied Computer Science (ACS) 2008, pp.1-6
Conference
2008 An Architecture of Unknown Attack Detection System against Zero-day Worm   Ik Kyun Kim   International Conference on Applied Computer Science (ACS) 2008, pp.205-211
Journal
2008 A Novel Architecture and Mechanism for High-Performance RealTime Intrusion Detection and Response System   Jin Tae Oh   International Journal of Computer Science and Network Security, v.8, no.3, pp.155-162
Conference
2007 ATPS - Adaptive Threat Prevention System for High-Performance Intrusion Detection and Response   Byoung Koo Kim   Asia-Pacific Network Operations and Management Symposium (APNOMS) 2007 (LNCS 4773), v.4773, pp.344-353 0
Conference
2007 High Performance Session State Management Scheme for Stateful Packet Inspection   Seung Yong Yoon   Asia-Pacific Network Operations and Management Symposium (APNOMS) 2007 (LNCS 4773), v.4773, pp.591-594 6
Journal
2007 Architecture and Mechanisms for Implementing an FPGA-based Stateful Intrusion Detection System   Jin-Tae Oh   International Journal of Computer Science and Network Security, v.7, no.5, pp.110-117
Journal
2007 High-Performance Intrusion Detection Technology in FPGA-Based Reconfiguring Hardware   김병구   전자통신동향분석, v.22, no.1, pp.51-58
Conference
2006 High-Performance SPI-based Intrusion Detection Engine   오진태   차세대 통신 소프트웨어 학술 대회 (NCS) 2006, pp.1-5
Conference
2006 High-Performance Stateful Intrusion Detection System   Seung Yong Yoon   International Conference on Computational Intelligence and Security (CIS) 2006, pp.574-579 4
Conference
2006 Design and Implementation of High-Performance Security Gateway System   Seung Yong Yoon   Joint Workshop on Information Security (JWIS) 2006, pp.1-15
Conference
2006 Design of SPI Module in Large-Scale Network   Seung Yong Yoon   International Conference on Advanced Communication Technology (ICACT) 2006, pp.1706-1711 0
Conference
2003 Design of Security Policy Server based on PBNM Architecture   안개일   통신 정보 합동 학술 대회 (JCCI) 2003, pp.401-401
Conference
2003 Desing and Implementation of Alert Exchange Mechanism for Policy-Based Intrusion Detection & Response System   윤승용   통신 정보 합동 학술 대회 (JCCI) 2003, pp.331-331
Conference
2001 COPS-SECURITY Protocol for Security Policy Information   윤승용   한국정보과학회 학술 발표 (가을) 2001, pp.784-786