ETRI-Knowledge Sharing Plaform

KOREAN

Researchers

연구자 검색
Keyword

Detail

사진

Keonwoo Kim
Department
Cryptography Engineering Research Section
Contact
KSP Keywords
논문 검색결과
Type Year Title Cited Download
Conference
2024 Security Analysis and Countermeasure of Post Quantum based Authentication Protocol in IoT Environment   이준영   한국통신학회 종합 학술 발표회 (하계) 2024, pp.1972-1973
Journal
2024 Blockchain-Enabled Key Aggregate Searchable Encryption Scheme for Personal Health Record Sharing With Multidelegation   JoonYoung Lee   IEEE Internet of Things Journal, v.11, no.10, pp.17482-17494 3
Conference
2023 Implementation of PQC-based Secure Channel for Drone Services   윤승용   한국정보처리학회 학술 발표 대회 (추계) 2023, pp.1-2
Conference
2023 Cryptanalysis and Countermeasures of the Recent Authentication and Key Agreement Scheme for Internet of Drones   Sungjin Yu   International Conference on Information and Communication Technology Convergence (ICTC) 2023, pp.1419-1422 2
Conference
2023 Client-centric on-demand remote profile provisioning technique for M2M IoT Devices   Boheung Chung   International Conference on Information and Communication Technology Convergence (ICTC) 2023, pp.1-3 0
Conference
2022 Enhancing IoT security with PUF-based authentication scheme   Seungyong Yoon   International Conference on Information and Communication Technology Convergence (ICTC) 2022, pp.2319-2321 2
Journal
2022 ISO/IEC 22460-2 Drone Identity Module Standardization Trend   김건우   전자공학회지, v.49, no.1, pp.57-65
Conference
2021 A Study on PX4 Autopilot Secure Booting   김건우   한국항공우주학회 학술 대회 (추계) 2021, pp.1-2
Conference
2020 Test for mutual authentication between UAV and GCS using hardware security module   김건우   한국항공우주학회 학술 대회 (추계) 2020, pp.1-2
Conference
2020 Drone Security Module for UAV Data Encryption   Keonwoo Kim   International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.1672-1674 27
Conference
2019 Implementation of UAS Identification and Authentication on OneM2M IoT Platform   Keonwoo Kim   International Conference on Information and Communication Technology Convergence (ICTC) 2019, pp.948-950 4
Journal
2019 Standardization trend of drone ICT security technology   강유성   TTA Journal, v.182, pp.66-71
Conference
2018 Public Key-based Lightweight Mutual Authentication and Key Agreement Protocol for Drones   Keonwoo Kim   Asian/Austrailian Rotorcraft Forum (ARF) 2018, pp.1-5 1
Journal
2018 Security requirements for drone-based services   강유성   TTA Journal, v.177, pp.74-79
Journal
2018 Deduplication Technologies over Encrypted Data   김건우   전자통신동향분석, v.33, no.1, pp.68-77
Journal
2017 Client-Side Deduplication to Enhance Security and Reduce Communication Costs   Keonwoo Kim   ETRI Journal, v.39, no.1, pp.116-123 13
Conference
2015 Hybrid-Type Secure Deduplication   Keonwoo Kim   International Conference on Internet (ICONI) 2015, pp.143-145
Conference
2015 Performance Analysis of Format-Preserving Encryption Based on Unbalanced-Feistel Structure   Keonwoo Kim   International Conference on Ubiquitous Information Technologies and Applications (CUTE) 2015 (LNEE 373), pp.425-430 1
Conference
2015 Encoding of Korean Characters with Less Radix in Format-Preserving Encryption   Keonwoo Kim   International Conference on Information and Communication Technology Convergence (ICTC) 2015, pp.1078-1080
Conference
2014 BPS Format Preserving Encryption Performance Analysis   김건우   한국통신학회 종합 학술 발표회 (추계) 2014, pp.538-539
Conference
2014 Performance Analysis of FFX[radix] Over Block Ciphers   김건우   한국통신학회 종합 학술 발표회 (추계) 2014, pp.540-541
Conference
2013 iPhone Forensic Data Visualization   Keonwoo Kim   International Conference on Computing and Convergence Technology (ICCCT) 2013, pp.256-259
Conference
2013 Smartphone Forensic Analysis by Data Visualization   김건우   디지털포렌식 기술 워크샵 2013, pp.29-34
Conference
2012 Visual Analysis of Portable Computer Forensic Data   Keonwoo Kim   International Conference on Ubiquitous Information Technologies and Applications (CUTE) 2012 (LNEE 214), v.214, pp.453-459 3
Conference
2012 Distributed Password Cracking on GPU Nodes   Keonwoo Kim   International Conference on Computing and Convergence Technology (ICCCT) 2012, pp.647-650
Conference
2012 Efficient Implementation of MD5 Algorithm in Password Recovery of a PDF file   Keonwoo Kim   International Conference on Advanced Communication Technology (ICACT) 2012, pp.1080-1083
Journal
2012 A Survey of Forensic Techniques Applicable to a New Paradigm   김영수   한국포렌식학회논문지, pp.55-67
Journal
2011 GPU-Accelerated Password Cracking of PDF Files   Keonwoo Kim   KSII Transactions on Internet and Information Systems, v.5, no.11, pp.2235-2253 9
Conference
2011 Visual Analysis of Web Forensic Data   김건우   디지털 포렌식 기술 워크샵 2011, pp.47-52
Journal
2009 고속 디지털 포렌식 기술   김건우   정보보호학회지, v.19, no.5, pp.45-51
Conference
2008 GPU-based Password Searching of Encrypted PDF File   김건우   안티포렌식 대응 기술 워크숍 2008, pp.1-6
Conference
2008 Design on Data Acquisition Tools for Mobile Forensics   김건우   한국통신학회 종합 학술 발표회 (하계) 2008, pp.2063-2066
Conference
2008 Forensic Data Acquisition from Cell Phones using JTAG Interface   Keon woo Kim   International Conference on Security and Management (SAM) 2008, pp.1-5
Conference
2008 Forensics for Korean Cell Phone   Keon Woo Kim   International Conference on Forensic Applications and Techniques in Telecommunications, Information, and Multimedia and Workshop (e-Forensics) 2008, pp.1-4 3
Conference
2007 Data acquisition from cell phone flash memory   김건우   안티포렌식 대응 기술 워크샵 2007, pp.1-5
Conference
2007 A New Fingerprinting Codes for Multimedia Contents   Jin-Heung Lee  International Multimedia Modeling Conference (MMM) 2007 (LNCS 4352), v.4352, pp.510-519
Conference
2006 E-Voting System using Mobile Terminal   김건우   한국통신학회 종합 학술 대회 (추계) 2006, pp.1103-1106
Conference
2006 Weakness and its Improvement about IS-95/cdma2000 Mobile Communication System   김건우   한국정보호호학회 학술 대회 2006 (하계), pp.185-189
Conference
2005 Proposal on EPC C1G2 Mutual Authentication Protocol   김건우   대한전자공학회 종합 학술 대회 (추계) 2005, pp.1113-1116
Conference
2005 Analysis about EPC Class 1 and C1G2 Security   김건우   한국정보과학회 학술 발표 (추계) 2005, pp.70-72
Journal
2005 Standardization Trend about Security Policy for the Secure Mobile Communication   정교일   ICT Standard Weekly, v.권호없음, pp.1-2
Conference
2004 The Mutual Authentication Scheme of Tag / Reader using of self shrinking generator on RFID System   이항록   차세대 통신소프트웨어 학술 대회 (NCS) 2004, pp.104-108
Conference
2004 The Problem and Solutation for Implementation of Symmetric Key-Based Key Management System   이항록   한국정보처리학회 학술 발표 대회 (추계) 2004, pp.1287-1290
Conference
2003 Implementation of 3GPP AKA protocol in USIM   김건우   한국정보처리학회 학술 발표 대회 (추계) 2003, pp.1933-1936
Conference
2003 Information security for 4G mobile telecommunication   김건우   한국정보과학회 학술 발표 (가을) 2003, pp.661-663
Journal
2002 3GPP 네트워크 도메인 보안에 관한 분석   김건우   정보보호학회지, v.12, no.3, pp.57-66
Journal
2001 A study on the authentication mechanism of W-CDMA IMT-2000 system   김건우   정보보호학회논문지, v.11, no.6, pp.53-65
Conference
2001 Analysis about security mechanism and cryptographic function for 3GPP wireless network   김건우   한국통신학회 종합 학술 발표회 (추계) 2001, pp.1040-1043