ETRI-Knowledge Sharing Plaform

KOREAN

Researchers

연구자 검색
Keyword

Detail

사진

Chung Byung Ho
Department
AI Data Security Research Section
Contact
KSP Keywords
논문 검색결과
Type Year Title Cited Download
Journal
2023 Technology Trends in Biometric Cryptosystem Based on Electrocardiogram Signals   정병호   전자통신동향분석, v.38, no.5, pp.61-70
Conference
2022 Non-invasive Intrusion Prevention System against Ransomware in Healthcare   Hyeokchan Kwon   International Conference on Internet (ICONI) 2022, pp.287-288
Conference
2022 A Behavior-similarity Measurement Scheme for Anomaly Detection in IoT Device Networks   Byungho Chung   International Conference on Internet (ICONI) 2022, pp.295-296
Journal
2021 Security Technology Trends to Prevent Medical Device Hacking and Ransomware   권혁찬   전자통신동향분석, v.36, no.5, pp.21-31
Journal
2021 ECG Authentication Based on Non-Linear Normalization under Various Physiological Conditions   Ho Bin Hwang  Sensors, v.21, no.21, pp.1-19 12
Conference
2020 Analysis of bio-signal-based bio-crypto technology trends and service scenarios   권혁찬   전자 정보 통신 학술 대회 (CEIC) 2020, pp.1-4
Conference
2020 Anomaly detection of Ransomware behaviors based on Random Forest and LSTM in the medical devices network environment   정병호   전자 정보 통신 학술 대회 (CEIC) 2020, pp.1-3
Conference
2018 Solution and Performance Analysis for Multi-Ship ID Issue on Maritime Connectivity Platform   안개일   한국CDE학회 학술 대회 (하계) 2018, pp.1-2
Conference
2018 Design of ID Resolution Mechanism for Supporting Effective Marine Communication in MCP Environment   안개일   한국통신학회 종합 학술 발표회 (하계) 2018, pp.730-731
Conference
2018 Design of Ship ID-based Automatic Registration Mechanism in Maritime Connectivity Platform Environment   안개일   통신 정보 합동 학술 대회 (JCCI) 2018, pp.405-406
Journal
2018 Design of MRN-Based Maritime Entity Identification System and Analysis of Identity-Based Message Delivery Performance in Maritime Cloud Environment   안개일   한국통신학회논문지, v.43, no.3, pp.563-571
Conference
2018 Design and Implementation on the Socket-based Access Control Scheme against V2N-connected Vehicle Attacks   정병호   한국통신학회 종합 학술 발표회 (동계) 2018, pp.1124-1125
Conference
2017 Security Architecture Design for the Safe Vehicle-to-Nomadic Device(V2N) Service   이석준   전자 정보 통신 학술 대회 (CEIC) 2017, pp.223-226
Conference
2017 In-vehicle Network Access Control Mechanism based on Token   권혁찬   전자 정보 통신 학술 대회 (CEIC) 2017, pp.227-228
Conference
2017 Analysis of Delivery Performance of Maritime Cloud Messaging Server in Network without Alternate Route   Gaeil An   International Conference on Circuits, Systems, Electronics, Control & Signal Processing (CSECS) 2017, pp.1-4
Conference
2017 Architecture of Vessel ID Importation System for Efficient Registration of Maritime ID in Maritime Cloud Environment   안개일   한국항해항만학회 학술 대회 (추계) 2017, pp.1-2
Conference
2017 Security Architecture Design for the Safe Vehicle-to-Nomadic Device(V2N) Service   Sokjoon Lee   The IRES International Conference on Innovative Engineering Technologies (ICIET) 2017, pp.10-13
Conference
2017 Efficient Secret Key Delivery Using Heartbeats   Kwantae Cho   International Conference on Circuits, Systems, Communications and Computers (CSCC) 2017, pp.1-6 3
Conference
2017 Design of Maritime User Management System for safe e-Navigation Service   안개일   한국통신학회 종합 학술 발표회 (하계) 2017, pp.934-935
Journal
2016 The Secure IEEE 11073:20601 Protocol and Agent Structure for Protecting PHD   Doyoung Chung   International Journal of Security and Its Applications, v.10, no.12, pp.229-240 0
Conference
2016 Group Signature-based Vehicular PKI without Thousands of Pseudonym Certificates   Sokjoon Lee   International Conference on Computer Engineering and Information Technology (ICCEIT) 2016, pp.25-28
Conference
2016 Wi-Fi Fingerprint-based Approach to Securing the Connected Vehicle against Wireless Attack   Hyeokchan Kwon   International Conference on Networks and Communications (NETCOM) 2016, pp.1-7
Conference
2016 Lightweight Biometric Key Agreement Scheme for Secure Body Sensor Networks   Kwantae Cho   International Conference on Data Networks, Communications, Computers (DNCOCO) 2016, pp.218-222
Conference
2016 Architecture for Monitoring Security State of ISO/IEEE 11073 Healthcare User Domain   Gaeil An   International Conference on Informatics and Assistive Technologies for Health-Care, Medical Support and Wellbeing (HEALTHINFO) 2016, pp.6-8
Conference
2016 The Vessel Trajectory Mechanism for Marine Accidents Analysis   Seung-Hee Oh   World Conference on Information Security Applications (WISA) 2016 (LNCS 10144), pp.388-396 1
Conference
2016 The Study on Structure of IEEE 11073:20601 Agent for Protecting PHD   Doyoung Chung   International Conference on Information Technology and Computer Science (ITCS) 2016, pp.144-149
Conference
2016 The Extraction Mechanism of Ship List and Ship Trajectory based on the Requested Region for VTS   Seung-Hee Oh   International Conference on Information and Knowledge Engineering (IKE) 2016, pp.1-4
Conference
2016 Design of IEEE 11073-20601 based Security Protocol for Secure Data Transmission of Smart Healthcare Device   이석준   한국통신학회 종합 학술 발표회 (하계) 2016, pp.1316-1317
Conference
2016 Design of Security Functionality of Healthcare Gateway in ISO/IEEE 11073   안개일   한국통신학회 종합 학술 발표회 (하계) 2016, pp.1285-1286
Conference
2016 Study on Quality Improvement for Localization of the VTS System   이병길   한국항해항만학회 학술 대회 (춘계) 2016, pp.1-4
Conference
2016 Design of OpenAPI for Application of Maritime Traffic Data   김주영   한국정보통신학회 종합 학술 대회 (춘계) 2016, pp.522-524
Conference
2016 IEEE 11073-20601 Security Protocol Design Requirements for Smart Healthcare Device   이석준   한국스마트미디어학회/한국전자거래학회 학술 대회 (춘계) 2016, pp.363-366
Conference
2016 The study on structure of Agent for protecting IEEE 11073:20601 Transport Layer   정도영   한국스마트미디어학회/한국전자거래학회 학술 대회 (춘계) 2016, pp.367-370
Conference
2015 Analysis of Cyber-Security Threat on Maritime Cloud proposed as Maritime Communication Framework   안개일   한국정보과학회 학술 발표회 (동계) 2015, pp.892-893
Conference
2015 Denial of Service Attack against IEEE 802.11 WLAN Fast Initial Link Setup Technology   Sokjoon Lee   International Conference on Computer Engineering and Information Technology (ICCEIT) 2015, pp.335-337
Conference
2015 K-Diversity E2E Key Establishment for IoT Nano-Things   정도영   한국통신학회 종합 학술 발표회 (추계) 2015, pp.598-599
Conference
2015 Design of Wireless Device Identification System in WLAN   안개일   한국통신학회 종합 학술 발표회 (추계) 2015, pp.632-633
Conference
2015 An Identification and Authentication scheme for Maritime Digital Communication Infrastructure   Kwangil Lee   International Conference on Advanced Intelligent Maritime Safety and Technology (Ai-MAST) 2015, pp.304-312
Conference
2015 Design of Expanded IVEF Protocol for Integrity   김주영   한국정보처리학회 학술 발표 대회 (추계) 2015, pp.708-709
Journal
2015 클라우드 보안 개요   권혁찬   정보와 통신 : 한국통신학회지, v.32, no.10, pp.71-76
Conference
2015 Detection of Rogue Devices in WLAN by Analyzing RF Features and Indoor Location of the Device   Hyeokchan Kwon   International Workshop on Information Security Applications (WISA) 2015 (LNCS 9503), v.9503, pp.54-61 0
Conference
2015 Localization and Evolution of VTS System   이병길   한국항해항만학회 학술 대회 (춘계) 2015, pp.325-327
Journal
2015 차세대 IoT 네트워크 보안 현황   권혁찬   정보처리학회지, v.22, no.2, pp.39-46
Conference
2015 A Content Access Control Mechanism Through Indoor Location Estimation Based on WLAN   권혁찬   한국통신학회 종합 학술 발표회 (동계) 2015, pp.1187-1188
Conference
2015 A Method for Detecting Rogue AP based on the Probe Request/Response Frame   정도영   한국통신학회 종합 학술 발표회 (동계) 2015, pp.1181-1182
Conference
2015 Denial of Service Attack against WLAN Fast Link Setup Security Technology   이석준   한국통신학회 종합 학술 발표회 (동계) 2015, pp.1191-1192
Conference
2014 Smart Channel Scheduling for WLAN Intrusion Detection   Sokjoon Lee   Korea-Vietnam International Workshop on Information and Communications 2014, pp.1-4
Conference
2014 Mutual Authentication between Ships in the E-Navigation Environment   Seung-Hee Oh   International Conference on Security Technology (SecTec) 2014, pp.15-18 2
Conference
2014 Detecting Cloned Devices in Wireless Network using RSSI and RF Features   Hyeokchan Kwon   International Conference on Internet (ICONI) 2014, pp.1-4
Conference
2014 Analysis of EVM and RSS for detecting Rogue AP in WLAN   안개일   한국정보과학회 학술 발표회 (동계) 2014, pp.724-726
Conference
2014 Location-Based Rogue Device Detection Mechanism   권혁찬   한국정보보호학회 충청 지부 학술 대회 2014, pp.1-3
Journal
2014 Wireless Fingerprinting Technology and Its Applications   정병호   전자통신동향분석, v.29, no.4, pp.110-122
Conference
2014 e-Navigation을 위한 관제 시스템 정보 연계 및 통합화 방안   이병길   한국항해항만학회 학술 대회 (춘계) 2014, pp.267-269
Conference
2014 Mobile Device Management Scheme using Wireless Intrusion Information   권혁찬   한국정보보호학회 학술 대회 (하계) 2014, pp.1-4
Conference
2014 EVM Analysis for MAC Identification of Wireless Device in WLAN Environment   안개일   통신 정보 합동 학술 대회 (JCCI) 2014, pp.1-2
Journal
2013 Group Signatures with Controllable Linkability for Dynamic Membership   Jung Yeon Hwang   Information Sciences, v.222, pp.761-778 50
Journal
2011 Anonymous Qualification Verifying Method on Web Environment   이윤경   정보보호학회논문지, v.21, no.5, pp.181-195
Conference
2011 Improvement of Processing Performance of Audio Feature Extraction Algorithm for Detecting Objectionable Sounds by Controlling Frame Size   임재덕   통신 정보 합동 학술 대회 (JCCI) 2011, pp.1-3
Conference
2011 Design and Performance Evaluation of the Statistical Combining of Decision Models using Novel Video-based Features for Malicious Video Detection   최병철   통신 정보 합동 학술 대회 (JCCI) 2011, pp.1-5
Conference
2011 Classification and Detection of Objectionable Sounds Using Repeated Curve-like Spectrum Feature   Jae Deok Lim   International Conference on Information Science and Applications (ICISA) 2011, pp.1-5 6
Conference
2011 Short Group Signatures with Controllable Linkability   Jung Yeon Hwang   Workshop on Lightweight Security & Privacy: Devices, Protocols and Applications (LightSec) 2011, pp.44-52 37
Conference
2011 Human Body Parts Candidate Segmentation using Laws Texture Energy Measures with Skin Color   Byeongcheol Choi   International Conference on Advanced Communication Technology (ICACT) 2011, pp.556-560
Conference
2011 모션 에너지, 컬러 에너지, 그리고 컬러 히스토그램의 시간적 특성을 이용한 새로운 유해 비디오 분류 방법 설계 및 성능 분석   최병철   영상 처리 및 이해에 관한 워크샵 (IPIU) 2011, pp.1-3
Conference
2011 Anonymous Authentication Technology Application Experiments for Mobile Environment   이석준   한국통신학회 종합 학술 발표회 (동계) 2011, pp.180-181
Conference
2010 Design and Performance Evaluation of Temporal Motion and Color Energy Features for Objectionable Video Classification   Byeong Cheol Choi   International Conference on Data Mining and Intelligent Information Technology Applications (ICMIA) 2010, pp.37-41
Conference
2010 Enhancement of Anonymous Authentication Scheme in Wireless Sensor Network   Hye Ran Mun  International Conference for Internet Technology and Secured Transactions (ICITST) 2010, pp.1-4
Journal
2010 Analysis on Trends for White-Box Cryptography and its Application Technology   김신효   전자통신동향분석, v.25, no.5, pp.137-146
Conference
2010 Contents Protection Method usign White Box Cryptography   이윤경   한국해양정보통신학회 종합 학술 대회 (추계) 2010, pp.627-628
Journal
2010 Analysis on Trends for Contents Sharing Technology   문혜란   전자통신동향분석, v.25, no.4, pp.112-120
Conference
2010 A Privacy-Enhanced Contents Sharing Mechanism with Secure Removable Media(SRM)   Hye Ran Mun  International Conference on Multimedia and Ubiquitous Engineering (MUE) 2010, pp.1-5 0
Conference
2010 Anonymous Access Control Framework Based on Group Signature   Yun-Kyung Lee   International Conference on Information Technology Convergence and Services (ITCS) 2010, pp.1-5 0
Conference
2010 Classifying of Objectionable Contents with Various Audio Signal Features   Jae Deok Lim   International Conference on Information Technology Convergence and Services (ITCS) 2010, pp.1-5 2
Conference
2010 Classification Performance of Audio Feature-based Pornographic Contents According to Various Audio Frame Sizes   임재덕   대한전자공학회 종합 학술 대회 (하계) 2010, pp.1446-1448
Conference
2010 Classification Performance of Pornographic Contents by analyzing the Correlation of Audio Signal   임재덕   대한전자공학회 종합 학술 대회 (하계) 2010, pp.1422-1424
Conference
2010 Consideration of Linkability for Anonymous Application Service   이석준   한국통신학회 종합 학술 발표회 (하계) 2010, pp.1194-1195
Conference
2010 A Study on Collusion-Secure Code against Collusion Attacks   사공명  한국통신학회 종합 학술 발표회 (하계) 2010, pp.1183-1184
Conference
2010 A Study on Forensic Watermarking Technology   이상우   통신 정보 합동 학술 대회 (JCCI) 2010, pp.1-3
Journal
2009 Efficient Key Detection Method in the Correlation Electromagnetic Analysis Using Peak Selection Algorithm   You Sung Kang   Journal of Communications and Networks, v.11, no.6, pp.556-563 0
Conference
2009 A Study of Classifying the Objectionable Content by using the MFCCsbased Audio Feature Set   Jae Deok Lim   International Conference on Computer and Communications Security (ICCCS) 2009, pp.1-2
Journal
2009 The Technology of the Audio Feature Extraction for Classifying Contents   임재덕   전자통신동향분석, v.24, no.6, pp.121-132
Conference
2009 Adult Image Detection using Bayesian Decision Rule weighted by SVM Probability   Byeong Cheol Choi   International Conference on Computer Sciences and Convergence Information Technology (ICCIT) 2009, pp.659-662 23
Journal
2009 내용 기반 유해 멀티미디어 차단 기술 동향   한승완   정보보호학회지, v.19, no.5, pp.38-44
Conference
2009 Implementation of a SW-based Secure Storage for License Protection   Sang Woo Lee   IASTED International Conference on Internet and Multimedia Systems and Applications (IMSA) 2009, pp.119-123
Conference
2009 A Method of Providing Local Linkability to Short Group Signature   이석준   한국통신학회 종합 학술 대회 (하계) 2009, pp.1645-1646
Journal
2008 USN 공격 기법 및 보안 기술 동향   이석준   인터넷정보학회지, v.9, no.1, pp.34-43
Journal
2007 A Survey of Intelligent Vehicle Security   최병철   전자통신동향분석, v.22, no.1, pp.114-118
Journal
2006 A Key Management Scheme for Ad Hoc Sensor Networks   김승해  전자공학회논문지 TC, v.43, no.7, pp.32-40
Journal
2006 A Novel (Re)Association Control Scheme for Inter-AP Security Transition in Mobile Wireless LAN   Byung Ho Chung   IEICE Transactions on Communications, v.E89-B, no.5, pp.1613-1619
Conference
2005 Intrusion Detection System for IEEE 802.11 based WLAN   이석준   한국통신학회 종합 학술 발표회 (추계) 2008, pp.735-738
Conference
2005 Vulnerability Analysis and Countermeasures Against Inter-AP Rogue Station Attacks in IEEE802.11i+802.1x+802.11f Supporting Wireless LAN   Byungho Chung   International Technical Conference on Circuits Systems, Computers and Communications (ITC-CSCC) 2005, pp.649-650
Conference
2005 Experimental Analysis of Pre-Authentication for WLAN Fast and Secure Handoff   You Sung Kang   International Technical Conference on Circuits Systems, Computers and Communications (ITC-CSCC) 2005, pp.465-466
Journal
2005 Inter-AP security transition mechanism and its FSM in WLAN AP supporting fast roaming   정병호   한국통신학회논문지 B : 네트워크 및 융합 서비스, v.30, no.6C, pp.601-606
Journal
2005 무선 랜 보안 표준 IEEE 802.11i   강유성   TTA Journal, v.알수없음, no.99, pp.123-130
Journal
2005 Technical Trend of Security in Ubiquitous Sensor Networks   김신효   전자통신동향분석, v.20, no.1, pp.93-99
Conference
2005 A Distributed Certificate Key Management Method in IEEE 802.15.3 WPAN Environment   Ti Eun Song   International Conference on Advanced Communication Technology (ICACT) 2005, pp.1019-1022
Conference
2004 The Design of Security Agent for the Detection of Wireless Access Point Attack   함영환   차세대 통신소프트웨어 학술 대회 (NCS) 2004, pp.558-561
Conference
2004 Wireless LAN Fast Security Roaming System Using IAPP   오경희   한국정보처리학회 학술 발표 대회 (추계) 2004, pp.1263-1266
Conference
2004 Pre-Authentication of Wireless LAN over IAPP   오경희   한국정보과학회 학술 발표 (가을) 2004, pp.295-297
Conference
2004 A Study on Intrusion Detection of ARP Poisoning Attack on Wireless LAN   YoungHwan Ham   International Conference on Electronics, Informations and Communications (ICEIC) 2004, pp.540-543
Conference
2004 A Study on Secure Interaction of DHCP Server with DNS Server   YoungHwan Ham   International Conference on Electronics, Informations and Communications (ICEIC) 2004, pp.544-548
Conference
2004 Analysis on Security Strength of WLAN AP Configurations   You Sung Kang   International Technical Conference on Circuits Systems, Computers and Communications (ITC-CSCC) 2004, pp.101-104
Conference
2004 The Implementation of IAPP Server Using Diameter Protocol   YoungHwan Ham   International Technical Conference on Circuits Systems, Computers and Communications (ITC-CSCC) 2004, pp.1489-1492
Journal
2004 RFID/USN 환경에서의 정보 보호 소고   정병호   한국통신학회지, v.21, no.6, pp.102-115
Conference
2004 Fast and Safe Roaming in Wireless LAN By Forwarding Data Frames between APs   오경희   한국정보처리학회 학술 발표 대회 (춘계) 2004, pp.1185-1188
Journal
2004 A Study on Dynamic Key Management in Mixed-Mode Wireless LAN   강유성   한국통신학회논문지 B : 네트워크 및 융합 서비스, v.29, no.4C, pp.581-593
Conference
2004 Analysis and Countermeasure on Vulnerability of WPA Key Exchange Mechanism   You Sung Kang   International Conference on Information Networking (ICOIN) 2004 (LNCS 3090), v.3090, pp.915-924 1
Journal
2003 The Design of IAPP Server for Secure Handoff of Wireless LAN Termianl   함영환   한국통신학회논문지 B : 네트워크 및 융합 서비스, v.28, no.12C, pp.1258-1267
Journal
2003 Design of Accounting and Security Sessions for IEEE 802.11 Network   양대헌   정보보호학회논문지, v.13, no.6, pp.85-96
Conference
2003 Performance Evaluation between Software Implementation and Hardware Implementation of WPA TKIP Algorithm in Access Points   오경희   한국정보처리학회 학술 발표 대회 (추계) 2003, pp.1941-1944
Conference
2003 The Design and Implementation of Diameter Server Management System   함영환   한국정보처리학회 학술 발표 대회 (추계) 2003, pp.1313-1316
Conference
2003 WLAN Stations Classification and AP Configurations According to Security Strength   강유성   한국통신학회 종합 학술 발표회 (추계) 2003, pp.1009-1012
Conference
2003 Software Implementation of WPA Wireless LAN Access Point   오경희   한국정보과학회 학술 발표 (가을) 2003, pp.667-669
Conference
2003 The design and implementation of AAA client for wireless LAN System   YoungHwan Ham   International Technical Conference on Circuits Systems, Computers and Communications (ITC-CSCC) 2003, pp.1933-1936
Journal
2003 무선 LAN 보안 취약점과 단계적 해결 방안   강유성   한국통신학회지, v.20, no.7, pp.117-128
Conference
2003 Design and implementation of an agent embedded AAA system for next generation communication systems   이재화   한국통신학회 종합 학술 발표회 (하계) 2003, pp.908-911
Conference
2003 Secure Wireless LAN with IEEE 802.1x Authentication and Dynamic WEP Key   오경희   한국정보과학회 학술 발표 (봄) 2003, pp.368-370
Conference
2003 The Implementation of Radius Client for 802.laa Authentication and 802.lli Key Exchange   함영환   한국정보과학회 학술 발표 (봄) 2003, pp.371-373
Conference
2002 New EAP-TLS based on Password Authentication   이석준   한국정보처리학회 학술 발표 대회 (추계) 2002, pp.1067-1070
Conference
2002 The Design and Implementation of 802.1X Access Point Management System   함영환   한국정보처리학회 학술 발표 대회 (추계) 2002, pp.1329-1332
Conference
2002 The Design and Implementation of RadiusClient for 802.1X Acess Point   함영환   한국통신학회 종합 학술 발표회 (추계) 2002, pp.1144-1147
Journal
2002 무선 LAN 정보 보호 기술 표준화 동향   김신효   정보보호학회지, v.12, no.4, pp.56-66
Conference
2002 The design of AAA server for Wireless LAN with 802.1x   YoungHwan Ham   International Technical Conference on Circuits Systems, Computers and Communications (ITC-CSCC) 2002, pp.1945-1948
Journal
2002 무선 전자 상거래를 위한 보안 기술   이석준   정보보호학회지, v.12, no.3, pp.1-13
Journal
2002 무선 LAN 보안 기술   정병호   한국통신학회지, v.19, no.5, pp.92-108
Journal
2002 무선 랜 보안 구조   송창렬  정보과학회지, v.20, no.4, pp.5-13
Journal
2002 무선 응용 프로토콜 보안 기술   이동근   정보과학회지, v.20, no.4, pp.58-65
Conference
2001 A Security Mechanism in support of Proactive Handoff in Wireless LAN Environment   오남호  한국정보과학회 학술 발표 (가을) 2001, pp.631-633
Conference
2001 A Design and Implementation of End-to-End Security Protocol for Wireless Internet   정병호   한국통신학회 종합 학술 발표회 (춘계) 2001, pp.2581-2584