Type | Year | Title | Cited | Download |
---|---|---|---|---|
Conference
|
2024 | Security Analysis and Countermeasure of Post Quantum based Authentication Protocol in IoT Environment 이준영 한국통신학회 종합 학술 발표회 (하계) 2024, pp.1972-1973 | ||
Journal
|
2024 | Blockchain-Enabled Key Aggregate Searchable Encryption Scheme for Personal Health Record Sharing With Multidelegation JoonYoung Lee IEEE Internet of Things Journal, v.11, no.10, pp.17482-17494 | 3 | |
Conference
|
2023 | Implementation of PQC-based Secure Channel for Drone Services 윤승용 한국정보처리학회 학술 발표 대회 (추계) 2023, pp.1-2 | ||
Conference
|
2023 | Cryptanalysis and Countermeasures of the Recent Authentication and Key Agreement Scheme for Internet of Drones Sungjin Yu International Conference on Information and Communication Technology Convergence (ICTC) 2023, pp.1419-1422 | 2 | |
Conference
|
2023 | Client-centric on-demand remote profile provisioning technique for M2M IoT Devices Boheung Chung International Conference on Information and Communication Technology Convergence (ICTC) 2023, pp.1-3 | 0 | |
Conference
|
2022 | Enhancing IoT security with PUF-based authentication scheme Seungyong Yoon International Conference on Information and Communication Technology Convergence (ICTC) 2022, pp.2319-2321 | 2 | |
Journal
|
2022 | ISO/IEC 22460-2 Drone Identity Module Standardization Trend 김건우 전자공학회지, v.49, no.1, pp.57-65 | ||
Conference
|
2021 | A Study on PX4 Autopilot Secure Booting 김건우 한국항공우주학회 학술 대회 (추계) 2021, pp.1-2 | ||
Conference
|
2020 | Test for mutual authentication between UAV and GCS using hardware security module 김건우 한국항공우주학회 학술 대회 (추계) 2020, pp.1-2 | ||
Conference
|
2020 | Drone Security Module for UAV Data Encryption Keonwoo Kim International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.1672-1674 | 27 | |
Conference
|
2019 | Implementation of UAS Identification and Authentication on OneM2M IoT Platform Keonwoo Kim International Conference on Information and Communication Technology Convergence (ICTC) 2019, pp.948-950 | 4 | |
Journal
|
2019 | Standardization trend of drone ICT security technology 강유성 TTA Journal, v.182, pp.66-71 | ||
Conference
|
2018 | Public Key-based Lightweight Mutual Authentication and Key Agreement Protocol for Drones Keonwoo Kim Asian/Austrailian Rotorcraft Forum (ARF) 2018, pp.1-5 | 1 | |
Journal
|
2018 | Security requirements for drone-based services 강유성 TTA Journal, v.177, pp.74-79 | ||
Journal
|
2018 | Deduplication Technologies over Encrypted Data 김건우 전자통신동향분석, v.33, no.1, pp.68-77 | ||
Journal
|
2017 | Client-Side Deduplication to Enhance Security and Reduce Communication Costs Keonwoo Kim ETRI Journal, v.39, no.1, pp.116-123 | 13 | |
Conference
|
2015 | Hybrid-Type Secure Deduplication Keonwoo Kim International Conference on Internet (ICONI) 2015, pp.143-145 | ||
Conference
|
2015 | Performance Analysis of Format-Preserving Encryption Based on Unbalanced-Feistel Structure Keonwoo Kim International Conference on Ubiquitous Information Technologies and Applications (CUTE) 2015 (LNEE 373), pp.425-430 | 1 | |
Conference
|
2015 | Encoding of Korean Characters with Less Radix in Format-Preserving Encryption Keonwoo Kim International Conference on Information and Communication Technology Convergence (ICTC) 2015, pp.1078-1080 | ||
Conference
|
2014 | BPS Format Preserving Encryption Performance Analysis 김건우 한국통신학회 종합 학술 발표회 (추계) 2014, pp.538-539 | ||
Conference
|
2014 | Performance Analysis of FFX[radix] Over Block Ciphers 김건우 한국통신학회 종합 학술 발표회 (추계) 2014, pp.540-541 | ||
Conference
|
2013 | iPhone Forensic Data Visualization Keonwoo Kim International Conference on Computing and Convergence Technology (ICCCT) 2013, pp.256-259 | ||
Conference
|
2013 | Smartphone Forensic Analysis by Data Visualization 김건우 디지털포렌식 기술 워크샵 2013, pp.29-34 | ||
Conference
|
2012 | Visual Analysis of Portable Computer Forensic Data Keonwoo Kim International Conference on Ubiquitous Information Technologies and Applications (CUTE) 2012 (LNEE 214), v.214, pp.453-459 | 3 | |
Conference
|
2012 | Distributed Password Cracking on GPU Nodes Keonwoo Kim International Conference on Computing and Convergence Technology (ICCCT) 2012, pp.647-650 | ||
Conference
|
2012 | Efficient Implementation of MD5 Algorithm in Password Recovery of a PDF file Keonwoo Kim International Conference on Advanced Communication Technology (ICACT) 2012, pp.1080-1083 | ||
Journal
|
2012 | A Survey of Forensic Techniques Applicable to a New Paradigm 김영수 한국포렌식학회논문지, pp.55-67 | ||
Journal
|
2011 | GPU-Accelerated Password Cracking of PDF Files Keonwoo Kim KSII Transactions on Internet and Information Systems, v.5, no.11, pp.2235-2253 | 9 | |
Conference
|
2011 | Visual Analysis of Web Forensic Data 김건우 디지털 포렌식 기술 워크샵 2011, pp.47-52 | ||
Journal
|
2009 | 고속 디지털 포렌식 기술 김건우 정보보호학회지, v.19, no.5, pp.45-51 | ||
Conference
|
2008 | GPU-based Password Searching of Encrypted PDF File 김건우 안티포렌식 대응 기술 워크숍 2008, pp.1-6 | ||
Conference
|
2008 | Design on Data Acquisition Tools for Mobile Forensics 김건우 한국통신학회 종합 학술 발표회 (하계) 2008, pp.2063-2066 | ||
Conference
|
2008 | Forensic Data Acquisition from Cell Phones using JTAG Interface Keon woo Kim International Conference on Security and Management (SAM) 2008, pp.1-5 | ||
Conference
|
2008 | Forensics for Korean Cell Phone Keon Woo Kim International Conference on Forensic Applications and Techniques in Telecommunications, Information, and Multimedia and Workshop (e-Forensics) 2008, pp.1-4 | 3 | |
Conference
|
2007 | Data acquisition from cell phone flash memory 김건우 안티포렌식 대응 기술 워크샵 2007, pp.1-5 | ||
Conference
|
2007 | A New Fingerprinting Codes for Multimedia Contents Jin-Heung Lee International Multimedia Modeling Conference (MMM) 2007 (LNCS 4352), v.4352, pp.510-519 | ||
Conference
|
2006 | E-Voting System using Mobile Terminal 김건우 한국통신학회 종합 학술 대회 (추계) 2006, pp.1103-1106 | ||
Conference
|
2006 | Weakness and its Improvement about IS-95/cdma2000 Mobile Communication System 김건우 한국정보호호학회 학술 대회 2006 (하계), pp.185-189 | ||
Conference
|
2005 | Proposal on EPC C1G2 Mutual Authentication Protocol 김건우 대한전자공학회 종합 학술 대회 (추계) 2005, pp.1113-1116 | ||
Conference
|
2005 | Analysis about EPC Class 1 and C1G2 Security 김건우 한국정보과학회 학술 발표 (추계) 2005, pp.70-72 | ||
Journal
|
2005 | Standardization Trend about Security Policy for the Secure Mobile Communication 정교일 ICT Standard Weekly, v.권호없음, pp.1-2 | ||
Conference
|
2004 | The Mutual Authentication Scheme of Tag / Reader using of self shrinking generator on RFID System 이항록 차세대 통신소프트웨어 학술 대회 (NCS) 2004, pp.104-108 | ||
Conference
|
2004 | The Problem and Solutation for Implementation of Symmetric Key-Based Key Management System 이항록 한국정보처리학회 학술 발표 대회 (추계) 2004, pp.1287-1290 | ||
Conference
|
2003 | Implementation of 3GPP AKA protocol in USIM 김건우 한국정보처리학회 학술 발표 대회 (추계) 2003, pp.1933-1936 | ||
Conference
|
2003 | Information security for 4G mobile telecommunication 김건우 한국정보과학회 학술 발표 (가을) 2003, pp.661-663 | ||
Journal
|
2002 | 3GPP 네트워크 도메인 보안에 관한 분석 김건우 정보보호학회지, v.12, no.3, pp.57-66 | ||
Journal
|
2001 | A study on the authentication mechanism of W-CDMA IMT-2000 system 김건우 정보보호학회논문지, v.11, no.6, pp.53-65 | ||
Conference
|
2001 | Analysis about security mechanism and cryptographic function for 3GPP wireless network 김건우 한국통신학회 종합 학술 발표회 (추계) 2001, pp.1040-1043 |