Conference
|
2024 |
Architecture Design of Malicious xAPP Attack Detection Systems in Open RAN Environments
정병호
전자 정보 통신 학술 대회 (CEIC) 2024, pp.1-4 |
|
|
Conference
|
2024 |
A RF Jamming Detection Technology in Open RAN
권혁찬
전자 정보 통신 학술 대회 (CEIC) 2024, pp.1-3 |
|
|
Journal
|
2023 |
Technology Trends in Biometric Cryptosystem Based on Electrocardiogram Signals
정병호
전자통신동향분석, v.38, no.5, pp.61-70 |
|
|
Conference
|
2022 |
Non-invasive Intrusion Prevention System against Ransomware in Healthcare
Hyeokchan Kwon
International Conference on Internet (ICONI) 2022, pp.287-288 |
|
|
Conference
|
2022 |
A Behavior-similarity Measurement Scheme for Anomaly Detection in IoT Device Networks
Byungho Chung
International Conference on Internet (ICONI) 2022, pp.295-296 |
|
|
Journal
|
2021 |
ECG Authentication Based on Non-Linear Normalization under Various Physiological Conditions
Ho Bin Hwang
Sensors, v.21, no.21, pp.1-19 |
14 |
|
Journal
|
2021 |
Security Technology Trends to Prevent Medical Device Hacking and Ransomware
권혁찬
전자통신동향분석, v.36, no.5, pp.21-31 |
|
|
Conference
|
2020 |
Anomaly detection of Ransomware behaviors based on Random Forest and LSTM in the medical devices network environment
정병호
전자 정보 통신 학술 대회 (CEIC) 2020, pp.1-3 |
|
|
Conference
|
2020 |
Analysis of bio-signal-based bio-crypto technology trends and service scenarios
권혁찬
전자 정보 통신 학술 대회 (CEIC) 2020, pp.1-4 |
|
|
Conference
|
2018 |
Solution and Performance Analysis for Multi-Ship ID Issue on Maritime Connectivity Platform
안개일
한국CDE학회 학술 대회 (하계) 2018, pp.1-2 |
|
|
Conference
|
2018 |
Design of ID Resolution Mechanism for Supporting Effective Marine Communication in MCP Environment
안개일
한국통신학회 종합 학술 발표회 (하계) 2018, pp.730-731 |
|
|
Conference
|
2018 |
Design of Ship ID-based Automatic Registration Mechanism in Maritime Connectivity Platform Environment
안개일
통신 정보 합동 학술 대회 (JCCI) 2018, pp.405-406 |
|
|
Journal
|
2018 |
Design of MRN-Based Maritime Entity Identification System and Analysis of Identity-Based Message Delivery Performance in Maritime Cloud Environment
안개일
한국통신학회논문지, v.43, no.3, pp.563-571 |
|
|
Conference
|
2018 |
Design and Implementation on the Socket-based Access Control Scheme against V2N-connected Vehicle Attacks
정병호
한국통신학회 종합 학술 발표회 (동계) 2018, pp.1124-1125 |
|
|
Conference
|
2017 |
Security Architecture Design for the Safe Vehicle-to-Nomadic Device(V2N) Service
이석준
전자 정보 통신 학술 대회 (CEIC) 2017, pp.223-226 |
|
|
Conference
|
2017 |
Analysis of Delivery Performance of Maritime Cloud Messaging Server in Network without Alternate Route
Gaeil An
International Conference on Circuits, Systems, Electronics, Control & Signal Processing (CSECS) 2017, pp.1-4 |
|
|
Conference
|
2017 |
In-vehicle Network Access Control Mechanism based on Token
권혁찬
전자 정보 통신 학술 대회 (CEIC) 2017, pp.227-228 |
|
|
Conference
|
2017 |
Security Architecture Design for the Safe Vehicle-to-Nomadic Device(V2N) Service
Sokjoon Lee
The IRES International Conference on Innovative Engineering Technologies (ICIET) 2017, pp.10-13 |
|
|
Conference
|
2017 |
Architecture of Vessel ID Importation System for Efficient Registration of Maritime ID in Maritime Cloud Environment
안개일
한국항해항만학회 학술 대회 (추계) 2017, pp.1-2 |
|
|
Conference
|
2017 |
Efficient Secret Key Delivery Using Heartbeats
Kwantae Cho
International Conference on Circuits, Systems, Communications and Computers (CSCC) 2017, pp.1-6 |
3 |
|
Conference
|
2017 |
Design of Maritime User Management System for safe e-Navigation Service
안개일
한국통신학회 종합 학술 발표회 (하계) 2017, pp.934-935 |
|
|
Conference
|
2016 |
Wi-Fi Fingerprint-based Approach to Securing the Connected Vehicle against Wireless Attack
Hyeokchan Kwon
International Conference on Networks and Communications (NETCOM) 2016, pp.1-7 |
|
|
Journal
|
2016 |
The Secure IEEE 11073:20601 Protocol and Agent Structure for Protecting PHD
Doyoung Chung
International Journal of Security and Its Applications, v.10, no.12, pp.229-240 |
0 |
|
Conference
|
2016 |
Lightweight Biometric Key Agreement Scheme for Secure Body Sensor Networks
Kwantae Cho
International Conference on Data Networks, Communications, Computers (DNCOCO) 2016, pp.218-222 |
|
|
Conference
|
2016 |
Group Signature-based Vehicular PKI without Thousands of Pseudonym Certificates
Sokjoon Lee
International Conference on Computer Engineering and Information Technology (ICCEIT) 2016, pp.25-28 |
|
|
Conference
|
2016 |
The Vessel Trajectory Mechanism for Marine Accidents Analysis
Seung-Hee Oh
World Conference on Information Security Applications (WISA) 2016 (LNCS 10144), pp.388-396 |
1 |
|
Conference
|
2016 |
Architecture for Monitoring Security State of ISO/IEEE 11073 Healthcare User Domain
Gaeil An
International Conference on Informatics and Assistive Technologies for Health-Care, Medical Support and Wellbeing (HEALTHINFO) 2016, pp.6-8 |
|
|
Conference
|
2016 |
The Study on Structure of IEEE 11073:20601 Agent for Protecting PHD
Doyoung Chung
International Conference on Information Technology and Computer Science (ITCS) 2016, pp.144-149 |
|
|
Conference
|
2016 |
The Extraction Mechanism of Ship List and Ship Trajectory based on the Requested Region for VTS
Seung-Hee Oh
International Conference on Information and Knowledge Engineering (IKE) 2016, pp.1-4 |
|
|
Conference
|
2016 |
Design of Security Functionality of Healthcare Gateway in ISO/IEEE 11073
안개일
한국통신학회 종합 학술 발표회 (하계) 2016, pp.1285-1286 |
|
|
Conference
|
2016 |
Design of IEEE 11073-20601 based Security Protocol for Secure Data Transmission of Smart Healthcare Device
이석준
한국통신학회 종합 학술 발표회 (하계) 2016, pp.1316-1317 |
|
|
Conference
|
2016 |
Study on Quality Improvement for Localization of the VTS System
이병길
한국항해항만학회 학술 대회 (춘계) 2016, pp.1-4 |
|
|
Conference
|
2016 |
Design of OpenAPI for Application of Maritime Traffic Data
김주영
한국정보통신학회 종합 학술 대회 (춘계) 2016, pp.522-524 |
|
|
Conference
|
2016 |
IEEE 11073-20601 Security Protocol Design Requirements for Smart Healthcare Device
이석준
한국스마트미디어학회/한국전자거래학회 학술 대회 (춘계) 2016, pp.363-366 |
|
|
Conference
|
2016 |
The study on structure of Agent for protecting IEEE 11073:20601 Transport Layer
정도영
한국스마트미디어학회/한국전자거래학회 학술 대회 (춘계) 2016, pp.367-370 |
|
|
Conference
|
2015 |
Analysis of Cyber-Security Threat on Maritime Cloud proposed as Maritime Communication Framework
안개일
한국정보과학회 학술 발표회 (동계) 2015, pp.892-893 |
|
|
Conference
|
2015 |
Denial of Service Attack against IEEE 802.11 WLAN Fast Initial Link Setup Technology
Sokjoon Lee
International Conference on Computer Engineering and Information Technology (ICCEIT) 2015, pp.335-337 |
|
|
Conference
|
2015 |
K-Diversity E2E Key Establishment for IoT Nano-Things
정도영
한국통신학회 종합 학술 발표회 (추계) 2015, pp.598-599 |
|
|
Conference
|
2015 |
Design of Wireless Device Identification System in WLAN
안개일
한국통신학회 종합 학술 발표회 (추계) 2015, pp.632-633 |
|
|
Conference
|
2015 |
An Identification and Authentication scheme for Maritime Digital Communication Infrastructure
Kwangil Lee
International Conference on Advanced Intelligent Maritime Safety and Technology (Ai-MAST) 2015, pp.304-312 |
|
|
Conference
|
2015 |
Design of Expanded IVEF Protocol for Integrity
김주영
한국정보처리학회 학술 발표 대회 (추계) 2015, pp.708-709 |
|
|
Journal
|
2015 |
클라우드 보안 개요
권혁찬
정보와 통신 : 한국통신학회지, v.32, no.10, pp.71-76 |
|
|
Conference
|
2015 |
Detection of Rogue Devices in WLAN by Analyzing RF Features and Indoor Location of the Device
Hyeokchan Kwon
International Workshop on Information Security Applications (WISA) 2015 (LNCS 9503), v.9503, pp.54-61 |
0 |
|
Conference
|
2015 |
Localization and Evolution of VTS System
이병길
한국항해항만학회 학술 대회 (춘계) 2015, pp.325-327 |
|
|
Journal
|
2015 |
차세대 IoT 네트워크 보안 현황
권혁찬
정보처리학회지, v.22, no.2, pp.39-46 |
|
|
Conference
|
2015 |
Denial of Service Attack against WLAN Fast Link Setup Security Technology
이석준
한국통신학회 종합 학술 발표회 (동계) 2015, pp.1191-1192 |
|
|
Conference
|
2015 |
A Content Access Control Mechanism Through Indoor Location Estimation Based on WLAN
권혁찬
한국통신학회 종합 학술 발표회 (동계) 2015, pp.1187-1188 |
|
|
Conference
|
2015 |
A Method for Detecting Rogue AP based on the Probe Request/Response Frame
정도영
한국통신학회 종합 학술 발표회 (동계) 2015, pp.1181-1182 |
|
|
Conference
|
2014 |
Smart Channel Scheduling for WLAN Intrusion Detection
Sokjoon Lee
Korea-Vietnam International Workshop on Information and Communications 2014, pp.1-4 |
|
|
Conference
|
2014 |
Mutual Authentication between Ships in the E-Navigation Environment
Seung-Hee Oh
International Conference on Security Technology (SecTec) 2014, pp.15-18 |
2 |
|
Conference
|
2014 |
Detecting Cloned Devices in Wireless Network using RSSI and RF Features
Hyeokchan Kwon
International Conference on Internet (ICONI) 2014, pp.1-4 |
|
|
Conference
|
2014 |
Analysis of EVM and RSS for detecting Rogue AP in WLAN
안개일
한국정보과학회 학술 발표회 (동계) 2014, pp.724-726 |
|
|
Conference
|
2014 |
Location-Based Rogue Device Detection Mechanism
권혁찬
한국정보보호학회 충청 지부 학술 대회 2014, pp.1-3 |
|
|
Journal
|
2014 |
Wireless Fingerprinting Technology and Its Applications
정병호
전자통신동향분석, v.29, no.4, pp.110-122 |
|
|
Conference
|
2014 |
Mobile Device Management Scheme using Wireless Intrusion Information
권혁찬
한국정보보호학회 학술 대회 (하계) 2014, pp.1-4 |
|
|
Conference
|
2014 |
e-Navigation을 위한 관제 시스템 정보 연계 및 통합화 방안
이병길
한국항해항만학회 학술 대회 (춘계) 2014, pp.267-269 |
|
|
Conference
|
2014 |
EVM Analysis for MAC Identification of Wireless Device in WLAN Environment
안개일
통신 정보 합동 학술 대회 (JCCI) 2014, pp.1-2 |
|
|
Journal
|
2013 |
Group Signatures with Controllable Linkability for Dynamic Membership
Jung Yeon Hwang
Information Sciences, v.222, pp.761-778 |
50 |
|
Journal
|
2011 |
Anonymous Qualification Verifying Method on Web Environment
이윤경
정보보호학회논문지, v.21, no.5, pp.181-195 |
|
|
Conference
|
2011 |
Design and Performance Evaluation of the Statistical Combining of Decision Models using Novel Video-based Features for Malicious Video Detection
최병철
통신 정보 합동 학술 대회 (JCCI) 2011, pp.1-5 |
|
|
Conference
|
2011 |
Improvement of Processing Performance of Audio Feature Extraction Algorithm for Detecting Objectionable Sounds by Controlling Frame Size
임재덕
통신 정보 합동 학술 대회 (JCCI) 2011, pp.1-3 |
|
|
Conference
|
2011 |
Classification and Detection of Objectionable Sounds Using Repeated Curve-like Spectrum Feature
Jae Deok Lim
International Conference on Information Science and Applications (ICISA) 2011, pp.1-5 |
6 |
|
Conference
|
2011 |
Short Group Signatures with Controllable Linkability
Jung Yeon Hwang
Workshop on Lightweight Security & Privacy: Devices, Protocols and Applications (LightSec) 2011, pp.44-52 |
37 |
|
Conference
|
2011 |
Anonymous Authentication Technology Application Experiments for Mobile Environment
이석준
한국통신학회 종합 학술 발표회 (동계) 2011, pp.180-181 |
|
|
Conference
|
2011 |
모션 에너지, 컬러 에너지, 그리고 컬러 히스토그램의 시간적 특성을 이용한 새로운 유해 비디오 분류 방법 설계 및 성능 분석
최병철
영상 처리 및 이해에 관한 워크샵 (IPIU) 2011, pp.1-3 |
|
|
Conference
|
2011 |
Human Body Parts Candidate Segmentation using Laws Texture Energy Measures with Skin Color
Byeongcheol Choi
International Conference on Advanced Communication Technology (ICACT) 2011, pp.556-560 |
|
|
Conference
|
2010 |
Design and Performance Evaluation of Temporal Motion and Color Energy Features for Objectionable Video Classification
Byeong Cheol Choi
International Conference on Data Mining and Intelligent Information Technology Applications (ICMIA) 2010, pp.37-41 |
|
|
Conference
|
2010 |
Enhancement of Anonymous Authentication Scheme in Wireless Sensor Network
Hye Ran Mun
International Conference for Internet Technology and Secured Transactions (ICITST) 2010, pp.1-4 |
|
|
Conference
|
2010 |
Contents Protection Method usign White Box Cryptography
이윤경
한국해양정보통신학회 종합 학술 대회 (추계) 2010, pp.627-628 |
|
|
Journal
|
2010 |
Analysis on Trends for White-Box Cryptography and its Application Technology
김신효
전자통신동향분석, v.25, no.5, pp.137-146 |
|
|
Conference
|
2010 |
Classifying of Objectionable Contents with Various Audio Signal Features
Jae Deok Lim
International Conference on Information Technology Convergence and Services (ITCS) 2010, pp.1-5 |
2 |
|
Conference
|
2010 |
A Privacy-Enhanced Contents Sharing Mechanism with Secure Removable Media(SRM)
Hye Ran Mun
International Conference on Multimedia and Ubiquitous Engineering (MUE) 2010, pp.1-5 |
0 |
|
Conference
|
2010 |
Anonymous Access Control Framework Based on Group Signature
Yun-Kyung Lee
International Conference on Information Technology Convergence and Services (ITCS) 2010, pp.1-5 |
0 |
|
Journal
|
2010 |
Analysis on Trends for Contents Sharing Technology
문혜란
전자통신동향분석, v.25, no.4, pp.112-120 |
|
|
Conference
|
2010 |
Classification Performance of Pornographic Contents by analyzing the Correlation of Audio Signal
임재덕
대한전자공학회 종합 학술 대회 (하계) 2010, pp.1422-1424 |
|
|
Conference
|
2010 |
Classification Performance of Audio Feature-based Pornographic Contents According to Various Audio Frame Sizes
임재덕
대한전자공학회 종합 학술 대회 (하계) 2010, pp.1446-1448 |
|
|
Conference
|
2010 |
A Study on Collusion-Secure Code against Collusion Attacks
사공명
한국통신학회 종합 학술 발표회 (하계) 2010, pp.1183-1184 |
|
|
Conference
|
2010 |
Consideration of Linkability for Anonymous Application Service
이석준
한국통신학회 종합 학술 발표회 (하계) 2010, pp.1194-1195 |
|
|
Conference
|
2010 |
A Study on Forensic Watermarking Technology
이상우
통신 정보 합동 학술 대회 (JCCI) 2010, pp.1-3 |
|
|
Journal
|
2009 |
The Technology of the Audio Feature Extraction for Classifying Contents
임재덕
전자통신동향분석, v.24, no.6, pp.121-132 |
|
|
Conference
|
2009 |
A Study of Classifying the Objectionable Content by using the MFCCsbased Audio Feature Set
Jae Deok Lim
International Conference on Computer and Communications Security (ICCCS) 2009, pp.1-2 |
|
|
Journal
|
2009 |
Efficient Key Detection Method in the Correlation Electromagnetic Analysis Using Peak Selection Algorithm
You Sung Kang
Journal of Communications and Networks, v.11, no.6, pp.556-563 |
0 |
|
Conference
|
2009 |
Adult Image Detection using Bayesian Decision Rule weighted by SVM Probability
Byeong Cheol Choi
International Conference on Computer Sciences and Convergence Information Technology (ICCIT) 2009, pp.659-662 |
23 |
|
Journal
|
2009 |
내용 기반 유해 멀티미디어 차단 기술 동향
한승완
정보보호학회지, v.19, no.5, pp.38-44 |
|
|
Conference
|
2009 |
Implementation of a SW-based Secure Storage for License Protection
Sang Woo Lee
IASTED International Conference on Internet and Multimedia Systems and Applications (IMSA) 2009, pp.119-123 |
|
|
Conference
|
2009 |
A Method of Providing Local Linkability to Short Group Signature
이석준
한국통신학회 종합 학술 대회 (하계) 2009, pp.1645-1646 |
|
|
Journal
|
2008 |
USN 공격 기법 및 보안 기술 동향
이석준
인터넷정보학회지, v.9, no.1, pp.34-43 |
|
|
Journal
|
2007 |
A Survey of Intelligent Vehicle Security
최병철
전자통신동향분석, v.22, no.1, pp.114-118 |
|
|
Journal
|
2006 |
A Key Management Scheme for Ad Hoc Sensor Networks
김승해
전자공학회논문지 TC, v.43, no.7, pp.32-40 |
|
|
Journal
|
2006 |
A Novel (Re)Association Control Scheme for Inter-AP Security Transition in Mobile Wireless LAN
Byung Ho Chung
IEICE Transactions on Communications, v.E89-B, no.5, pp.1613-1619 |
|
|
Conference
|
2005 |
Intrusion Detection System for IEEE 802.11 based WLAN
이석준
한국통신학회 종합 학술 발표회 (추계) 2008, pp.735-738 |
|
|
Conference
|
2005 |
Vulnerability Analysis and Countermeasures Against Inter-AP Rogue Station Attacks in IEEE802.11i+802.1x+802.11f Supporting Wireless LAN
Byungho Chung
International Technical Conference on Circuits Systems, Computers and Communications (ITC-CSCC) 2005, pp.649-650 |
|
|
Conference
|
2005 |
Experimental Analysis of Pre-Authentication for WLAN Fast and Secure Handoff
You Sung Kang
International Technical Conference on Circuits Systems, Computers and Communications (ITC-CSCC) 2005, pp.465-466 |
|
|
Journal
|
2005 |
무선랜 보안 표준 IEEE 802.11i
강유성
TTA Journal, v.알수없음, no.99, pp.123-130 |
|
|
Journal
|
2005 |
Inter-AP security transition mechanism and its FSM in WLAN AP supporting fast roaming
정병호
한국통신학회논문지 B : 네트워크 및 융합 서비스, v.30, no.6C, pp.601-606 |
|
|
Journal
|
2005 |
Technical Trend of Security in Ubiquitous Sensor Networks
김신효
전자통신동향분석, v.20, no.1, pp.93-99 |
|
|
Conference
|
2005 |
A Distributed Certificate Key Management Method in IEEE 802.15.3 WPAN Environment
Ti Eun Song
International Conference on Advanced Communication Technology (ICACT) 2005, pp.1019-1022 |
|
|
Conference
|
2004 |
The Design of Security Agent for the Detection of Wireless Access Point Attack
함영환
차세대 통신소프트웨어 학술 대회 (NCS) 2004, pp.558-561 |
|
|
Conference
|
2004 |
Wireless LAN Fast Security Roaming System Using IAPP
오경희
한국정보처리학회 학술 발표 대회 (추계) 2004, pp.1263-1266 |
|
|
Conference
|
2004 |
Pre-Authentication of Wireless LAN over IAPP
오경희
한국정보과학회 학술 발표 (가을) 2004, pp.295-297 |
|
|
Conference
|
2004 |
A Study on Secure Interaction of DHCP Server with DNS Server
YoungHwan Ham
International Conference on Electronics, Informations and Communications (ICEIC) 2004, pp.544-548 |
|
|
Conference
|
2004 |
A Study on Intrusion Detection of ARP Poisoning Attack on Wireless LAN
YoungHwan Ham
International Conference on Electronics, Informations and Communications (ICEIC) 2004, pp.540-543 |
|
|
Conference
|
2004 |
The Implementation of IAPP Server Using Diameter Protocol
YoungHwan Ham
International Technical Conference on Circuits Systems, Computers and Communications (ITC-CSCC) 2004, pp.1489-1492 |
|
|
Conference
|
2004 |
Analysis on Security Strength of WLAN AP Configurations
You Sung Kang
International Technical Conference on Circuits Systems, Computers and Communications (ITC-CSCC) 2004, pp.101-104 |
|
|
Journal
|
2004 |
RFID/USN 환경에서의 정보보호 소고
정병호
한국통신학회지, v.21, no.6, pp.102-115 |
|
|
Conference
|
2004 |
Fast and Safe Roaming in Wireless LAN By Forwarding Data Frames between APs
오경희
한국정보처리학회 학술 발표 대회 (춘계) 2004, pp.1185-1188 |
|
|
Journal
|
2004 |
A Study on Dynamic Key Management in Mixed-Mode Wireless LAN
강유성
한국통신학회논문지 B : 네트워크 및 융합 서비스, v.29, no.4C, pp.581-593 |
|
|
Conference
|
2004 |
Analysis and Countermeasure on Vulnerability of WPA Key Exchange Mechanism
You Sung Kang
International Conference on Information Networking (ICOIN) 2004 (LNCS 3090), v.3090, pp.915-924 |
1 |
|
Journal
|
2003 |
The Design of IAPP Server for Secure Handoff of Wireless LAN Termianl
함영환
한국통신학회논문지 B : 네트워크 및 융합 서비스, v.28, no.12C, pp.1258-1267 |
|
|
Journal
|
2003 |
Design of Accounting and Security Sessions for IEEE 802.11 Network
양대헌
정보보호학회논문지, v.13, no.6, pp.85-96 |
|
|
Conference
|
2003 |
Performance Evaluation between Software Implementation and Hardware Implementation of WPA TKIP Algorithm in Access Points
오경희
한국정보처리학회 학술 발표 대회 (추계) 2003, pp.1941-1944 |
|
|
Conference
|
2003 |
WLAN Stations Classification and AP Configurations According to Security Strength
강유성
한국통신학회 종합 학술 발표회 (추계) 2003, pp.1009-1012 |
|
|
Conference
|
2003 |
The Design and Implementation of Diameter Server Management System
함영환
한국정보처리학회 학술 발표 대회 (추계) 2003, pp.1313-1316 |
|
|
Conference
|
2003 |
Software Implementation of WPA Wireless LAN Access Point
오경희
한국정보과학회 학술 발표 (가을) 2003, pp.667-669 |
|
|
Conference
|
2003 |
Design and implementation of an agent embedded AAA system for next generation communication systems
이재화
한국통신학회 종합 학술 발표회 (하계) 2003, pp.908-911 |
|
|
Conference
|
2003 |
The design and implementation of AAA client for wireless LAN System
YoungHwan Ham
International Technical Conference on Circuits Systems, Computers and Communications (ITC-CSCC) 2003, pp.1933-1936 |
|
|
Journal
|
2003 |
무선 LAN 보안 취약점과 단계적 해결 방안
강유성
한국통신학회지, v.20, no.7, pp.117-128 |
|
|
Conference
|
2003 |
The Implementation of Radius Client for 802.laa Authentication and 802.lli Key Exchange
함영환
한국정보과학회 학술 발표 (봄) 2003, pp.371-373 |
|
|
Conference
|
2003 |
Secure Wireless LAN with IEEE 802.1x Authentication and Dynamic WEP Key
오경희
한국정보과학회 학술 발표 (봄) 2003, pp.368-370 |
|
|
Conference
|
2002 |
The Design and Implementation of RadiusClient for 802.1X Acess Point
함영환
한국통신학회 종합 학술 발표회 (추계) 2002, pp.1144-1147 |
|
|
Conference
|
2002 |
New EAP-TLS based on Password Authentication
이석준
한국정보처리학회 학술 발표 대회 (추계) 2002, pp.1067-1070 |
|
|
Conference
|
2002 |
The Design and Implementation of 802.1X Access Point Management System
함영환
한국정보처리학회 학술 발표 대회 (추계) 2002, pp.1329-1332 |
|
|
Journal
|
2002 |
무선 LAN 정보보호 기술 표준화 동향
김신효
정보보호학회지, v.12, no.4, pp.56-66 |
|
|
Conference
|
2002 |
The design of AAA server for Wireless LAN with 802.1x
YoungHwan Ham
International Technical Conference on Circuits Systems, Computers and Communications (ITC-CSCC) 2002, pp.1945-1948 |
|
|
Journal
|
2002 |
무선 전자상거래를 위한 보안 기술
이석준
정보보호학회지, v.12, no.3, pp.1-13 |
|
|
Journal
|
2002 |
무선 랜 보안 구조
송창렬
정보과학회지, v.20, no.4, pp.5-13 |
|
|
Journal
|
2002 |
무선 LAN 보안 기술
정병호
한국통신학회지, v.19, no.5, pp.92-108 |
|
|
Journal
|
2002 |
무선 응용 프로토콜 보안 기술
이동근
정보과학회지, v.20, no.4, pp.58-65 |
|
|
Conference
|
2001 |
A Security Mechanism in support of Proactive Handoff in Wireless LAN Environment
오남호
한국정보과학회 학술 발표 (가을) 2001, pp.631-633 |
|
|
Conference
|
2001 |
A Design and Implementation of End-to-End Security Protocol for Wireless Internet
정병호
한국통신학회 종합 학술 발표회 (춘계) 2001, pp.2581-2584 |
|
|