ETRI-Knowledge Sharing Plaform

KOREAN

Researchers

연구자 검색
Keyword

Detail

사진

Yousung Kang
Department
Cryptography Engineering Research Section
Contact
KSP Keywords
논문 검색결과
Type Year Title Cited Download
Conference
2024 Unmanned Vehicle Security and its Management in a C-Band Modem Communication Environment   Juhan Kim   International Conference on Information and Communication Technology Convergence (ICTC) 2024, pp.1666-1667
Conference
2024 Physical Qubits Estimation for Quantum S-box   You-Seok Lee   International Conference on Information and Communication Technology Convergence (ICTC) 2024, pp.1369-1370
Conference
2024 Applying Lightweight Cryptography to Enhance Drone RC Security   Joungil Yun   International Conference on Information and Communication Technology Convergence (ICTC) 2024, pp.1367-1368
Journal
2024 Toffoli-depth reduction method preserving in-place quantum circuits and its application to SHA3-256   Jongheon Lee   Quantum Information Processing, v.23, pp.1-43 1
Conference
2023 Research on quantum circuit design for multiplicative inversion in finite field   이유석   한국정보보호학회 학술 대회 (동계) 2023, pp.1-4
Conference
2023 Implementation of PQC-based Secure Channel for Drone Services   윤승용   한국정보처리학회 학술 발표 대회 (추계) 2023, pp.1-2
Conference
2023 A Study on the Application of Lightweight Cryptography for Protecting Drone Remote Control Data   윤정일   한국정보처리학회 학술 발표 대회 (추계) 2023, pp.1185-1186
Conference
2023 Security Technology for C-Band Modem Communication in Unmanned Vehicle Environment   Juhan Kim   International Conference on Information and Communication Technology Convergence (ICTC) 2023, pp.1095-1097 0
Conference
2023 Cryptanalysis and Countermeasures of the Recent Authentication and Key Agreement Scheme for Internet of Drones   Sungjin Yu   International Conference on Information and Communication Technology Convergence (ICTC) 2023, pp.1419-1422 2
Conference
2023 Client-centric on-demand remote profile provisioning technique for M2M IoT Devices   Boheung Chung   International Conference on Information and Communication Technology Convergence (ICTC) 2023, pp.1-3 0
Journal
2023 MPMCT gate decomposition method reducing T-depth quickly in proportion to the number of work qubits   Jongheon Lee   Quantum Information Processing, v.22, pp.1-31 3
Conference
2023 Security enhancement scheme for mobile device using H/W cryptographic module   Seungyong Yoon   International Conference on Information and Communication Technology Convergence (ICTC) 2023, pp.1450-1452 2
Journal
2023 Implementation and characterization of flash‐based hardware security primitives for cryptographic key generation   Mi-Kyung Oh   ETRI Journal, v.45, no.2, pp.346-357 4
Conference
2022 UAV arming Authorization using DIM and Flight Authorization Code   Juhan Kim   International Conference on Information and Communication Technology Convergence (ICTC) 2022, pp.2065-2067 1
Conference
2022 Enhancing IoT security with PUF-based authentication scheme   Seungyong Yoon   International Conference on Information and Communication Technology Convergence (ICTC) 2022, pp.2319-2321 2
Conference
2022 Reinforcement of IoT Open Platform Security using PUF -based Device Authentication   Byoungkoo Kim   International Conference on Information and Communication Technology Convergence (ICTC) 2022, pp.1969-1971 3
Conference
2022 A Study on the MCT gate for AES based Grover Oracle   이유석   한국정보보호학회 학술 대회 (하계) 2022, pp.30-33
Journal
2022 Rcryptect: Real-time Detection of Cryptographic Function in the User-space Filesystem   Seungkwang Lee   Computers & Security, v.112, pp.1-13 9
Journal
2022 ISO/IEC 22460-2 Drone Identity Module Standardization Trend   김건우   전자공학회지, v.49, no.1, pp.57-65
Conference
2021 A Study on PX4 Autopilot Secure Booting   김건우   한국항공우주학회 학술 대회 (추계) 2021, pp.1-2
Conference
2021 Multiple PUF-based Lightweight Authentication Method in the IoT   Seungyong Yoon   International Conference on Information and Communication Technology Convergence (ICTC) 2021, pp.1198-1200 8
Conference
2021 Wi-SUN Device Authentication using Physical Layer Fingerprint   Mi-Kyung Oh   International Conference on Information and Communication Technology Convergence (ICTC) 2021, pp.160-162 4
Conference
2021 PUF-based IoT Device Authentication Scheme on IoT Open Platform   Byoungkoo Kim   International Conference on Information and Communication Technology Convergence (ICTC) 2021, pp.1873-1875 7
Conference
2020 Test for mutual authentication between UAV and GCS using hardware security module   김건우   한국항공우주학회 학술 대회 (추계) 2020, pp.1-2
Conference
2020 Secure IoT Device Authentication Scheme using Key Hiding Technology   Byoungkoo Kim   International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.1808-1810 3
Conference
2020 PUF-based Authentication Scheme for IoT Devices   Seungyong Yoon   International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.1792-1794 18
Conference
2020 Drone Security Module for UAV Data Encryption   Keonwoo Kim   International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.1672-1674 27
Conference
2020 Implementation of execution code integrity verification function for embedded device using hardware security module   전용성   대한전자공학회 학술 대회 (하계) 2020, pp.1765-1768
Journal
2020 Secure and reliable IoT device authentication technology using key hiding technique   김병구   정보보호학회지, v.30, no.1, pp.35-42
Journal
2020 Wireless Transceiver Aided Run-Time Secret Key Extraction for IoT Device Security   Mi-Kyung Oh   IEEE Transactions on Consumer Electronics, v.66, no.1, pp.11-21 14
Journal
2020 Design of Resistor-Capacitor Physically Unclonable Function for Resource-Constrained IoT Devices   Sangjae Lee   Sensors, v.20, no.2, pp.1-16 7
Conference
2019 Security Enhancement for IoT Device using Physical Unclonable Functions   Seungyong Yoon   International Conference on Information and Communication Technology Convergence (ICTC) 2019, pp.1457-1459 3
Conference
2019 Crypto-Protector: Multi-threaded RSA to Prevent EM Attacks   Seungkwang Lee   International Conference on Information and Communication Technology Convergence (ICTC) 2019, pp.945-947 0
Conference
2019 PUF based IoT Device Authentication Scheme   Byoungkoo Kim   International Conference on Information and Communication Technology Convergence (ICTC) 2019, pp.1460-1462 26
Conference
2019 Implementation of UAS Identification and Authentication on OneM2M IoT Platform   Keonwoo Kim   International Conference on Information and Communication Technology Convergence (ICTC) 2019, pp.948-950 4
Conference
2019 RC PUF: A Low-Cost and an Easy-to-Design PUF for Resource-Constrained IoT Devices   Sangjae Lee   World Conference on Information Security Applications (WISA) 2019 (LNCS 11897), pp.275-285 1
Conference
2019 Implementation of a LoRaWAN Protocol Processing Module on an Embedded Device using Secure Element   YongSung Jeon   International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC) 2019, pp.1-3 5
Journal
2019 Standardization trend of drone ICT security technology   강유성   TTA Journal, v.182, pp.66-71
Journal
2019 Two-Factor Fuzzy Commitment for Unmanned IoT Devices Security   Dooho Choi   IEEE Internet of Things Journal, v.6, no.1, pp.335-348 29
Conference
2018 Secure Key Extraction for IoT Devices Integrating IEEE 802.15.4g/k Transceiver   Mi-Kyung Oh   International Conference on Information and Communication Technology Convergence (ICTC) 2018, pp.833-835 3
Journal
2018 A Masked White-Box Cryptographic Implementation for Protecting Against Differential Computation Analysis   Seungkwang Lee   IEEE Transactions on Information Forensics and Security, v.13, no.10, pp.2602-2615 27
Conference
2018 Public Key-based Lightweight Mutual Authentication and Key Agreement Protocol for Drones   Keonwoo Kim   Asian/Austrailian Rotorcraft Forum (ARF) 2018, pp.1-5 1
Conference
2018 Abnormal Traffic Detection Mechanism for Protecting IIoT Environments   Byoung-Koo Kim   International Conference on Information and Communication Technology Convergence (ICTC) 2018, pp.943-945 8
Conference
2018 Implementing a Phase Detection Ring Oscillator PUF on FPGA   Sangjae Lee   International Conference on Information and Communication Technology Convergence (ICTC) 2018, pp.845-847 6
Journal
2018 International standardization trend of security requirements and test methods for physically unclonable function   강유성   정보보호학회지, v.28, no.4, pp.34-40
Conference
2018 Design of a LPWAN Communication Device based on Hardware Security Module   YongSung Jeon   International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC) 2018, pp.1-3
Journal
2018 Security requirements for drone-based services   강유성   TTA Journal, v.177, pp.74-79
Conference
2015 Security Analysis on RFID Mutual Authentication Protocol   You Sung Kang   International Workshop on Information Security Applications (WISA) 2015 (LNCS 9503), v.9503, pp.65-74 4
Journal
2014 KeyQ: A Dynamic Key Establishment Method Using an RFID Anti-Collision Protocol   You Sung KANG   IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, v.E97.A, no.12, pp.2662-2666 0
Journal
2013 Comments on an Improved RFID Security Protocol for ISO/IEC WD 29167-6   You Sung Kang   ETRI Journal, v.35, no.1, pp.170-172 8
Conference
2012 Security-Enhanced Key Establishment Schemes Using Network Coding   You Sung Kang   International Conference on Computing and Convergence Technology (ICCCT) 2012, pp.1056-1061
Conference
2012 Analysis of Security Architecture of Electric Vehicle Charging Infrastructure   강유성   대한전자공학회 종합 학술 대회 (하계) 2012, pp.1869-1871
Journal
2012 수동형 UHF RFID 보안기술 국제 표준화 동향   강유성   정보보호학회지, v.22, no.1, pp.31-38
Journal
2010 Standardization of Air Interface Protocol for RFID Security Services   강유성   한국정보기술학회지, v.8, no.1, pp.43-50
Journal
2010 Design Implementation of Lightweight and High Speed Security Protocol Suitable for UHF Passive RFID Systems   강유성   정보보호학회논문지, v.20, no.4, pp.117-134
Journal
2009 Efficient Key Detection Method in the Correlation Electromagnetic Analysis Using Peak Selection Algorithm   You Sung Kang   Journal of Communications and Networks, v.11, no.6, pp.556-563 0
Conference
2009 A New Fault Cryptanalysis on Montgomery Ladder Exponentiation Algorithm   Jea Hoon Park  International Conference on Interaction Sciences: Information Technology, Culture and Human (ICIS) 2009, pp.896-899 1
Conference
2008 RFID Stamp with RFID Passive Reader   Jun Ki Kang   International Conference on Convergence and Hybrid Information Technology (ICHIT) 2008, pp.802-805 0
Journal
2008 Standardization Trend and Strategy of Mobile RFID Security Technology   강유성   전자통신동향분석, v.23, no.2, pp.142-152
Journal
2008 모바일 RFID 보안 기술   박남제   TTA Journal, pp.108-114
Journal
2007 Trend of RFID-Based Securities Protection Technology   강유성   전자통신동향분석, v.22, no.6, pp.150-157
Conference
2007 Side-Channel Analysis for Wireless Sensor Mote Using Peak Value Selection   강유성   대한전자공학회 종합 학술 대회 (추계) 2007, pp.114-115
Journal
2007 화물 컨테이너 보호를 위한 RFID 보안장치 기술 동향   강유성   정보와 통신 : 한국통신학회지, v.24, no.11, pp.43-50
Journal
2006 ISO/IEC JTC1 SC31 WG4 SG3 파리 회의   강유성   TTA Journal, v.알수없음, no.107, pp.130-134
Conference
2006 Design of Lightweight Security Protocol for Electronic Seal Data Protection   You Sung Kang   International Workshop on Information Security Applications (WISA) 2006 (LNCS 4298), v.4298, pp.517-531
Conference
2006 Privileged Tracking and Clone Detection for RFIDEnabled Banknotes   You Sung Kang   Applied Cryptography and Network Security, pp.1-13
Conference
2005 Design of an Authentication Protocol for Secure Electronic Seals   Seong Soo Park  International Conference on Information Systems (ICIS) 2005, pp.1-5
Conference
2005 Experimental Analysis of Pre-Authentication for WLAN Fast and Secure Handoff   You Sung Kang   International Technical Conference on Circuits Systems, Computers and Communications (ITC-CSCC) 2005, pp.465-466
Journal
2005 무선랜 보안 표준 IEEE 802.11i   강유성   TTA Journal, v.알수없음, no.99, pp.123-130
Journal
2005 능동 및 모바일 RFID 서비스 환경에서의 정보보호 기술   이병길   정보보호학회지, v.15, no.3, pp.40-47
Journal
2005 Inter-AP security transition mechanism and its FSM in WLAN AP supporting fast roaming   정병호   한국통신학회논문지 B : 네트워크 및 융합 서비스, v.30, no.6C, pp.601-606
Journal
2005 Technical Trend of Security in Ubiquitous Sensor Networks   김신효   전자통신동향분석, v.20, no.1, pp.93-99
Conference
2004 Wireless LAN Fast Security Roaming System Using IAPP   오경희   한국정보처리학회 학술 발표 대회 (추계) 2004, pp.1263-1266
Conference
2004 Pre-Authentication of Wireless LAN over IAPP   오경희   한국정보과학회 학술 발표 (가을) 2004, pp.295-297
Conference
2004 Analysis on Security Strength of WLAN AP Configurations   You Sung Kang   International Technical Conference on Circuits Systems, Computers and Communications (ITC-CSCC) 2004, pp.101-104
Journal
2004 RFID/USN 환경에서의 정보보호 소고   정병호   한국통신학회지, v.21, no.6, pp.102-115
Conference
2004 Fast and Safe Roaming in Wireless LAN By Forwarding Data Frames between APs   오경희   한국정보처리학회 학술 발표 대회 (춘계) 2004, pp.1185-1188
Journal
2004 A Study on Dynamic Key Management in Mixed-Mode Wireless LAN   강유성   한국통신학회논문지 B : 네트워크 및 융합 서비스, v.29, no.4C, pp.581-593
Conference
2004 Analysis and Countermeasure on Vulnerability of WPA Key Exchange Mechanism   You Sung Kang   International Conference on Information Networking (ICOIN) 2004 (LNCS 3090), v.3090, pp.915-924 1
Journal
2003 Design of Accounting and Security Sessions for IEEE 802.11 Network   양대헌   정보보호학회논문지, v.13, no.6, pp.85-96
Conference
2003 WLAN Stations Classification and AP Configurations According to Security Strength   강유성   한국통신학회 종합 학술 발표회 (추계) 2003, pp.1009-1012
Conference
2003 Performance Evaluation between Software Implementation and Hardware Implementation of WPA TKIP Algorithm in Access Points   오경희   한국정보처리학회 학술 발표 대회 (추계) 2003, pp.1941-1944
Conference
2003 Software Implementation of WPA Wireless LAN Access Point   오경희   한국정보과학회 학술 발표 (가을) 2003, pp.667-669
Journal
2003 무선 LAN 보안 취약점과 단계적 해결 방안   강유성   한국통신학회지, v.20, no.7, pp.117-128
Conference
2003 Secure Wireless LAN with IEEE 802.1x Authentication and Dynamic WEP Key   오경희   한국정보과학회 학술 발표 (봄) 2003, pp.368-370
Journal
2002 무선 LAN 정보보호 기술 표준화 동향   김신효   정보보호학회지, v.12, no.4, pp.56-66