ETRI-Knowledge Sharing Plaform

KOREAN

Researchers

연구자 검색
Keyword

Detail

사진

Kim Jeong Nyeo Principal Researcher
Department
Cyber Security Research Division
Contact
KSP Keywords
논문 검색결과
Type Year Title Cited Download
Conference
2025 Quorum-based Cooperative Authentication Method for Multi-Core SoC   한진희   전자 정보 통신 학술 대회 (CEIC) 2025, pp.1-3
Journal
2025 Malware detection using pre-trained transformer encoder with byte sequences   Eun-Jin Kim  PLoS ONE, v.20, no.10, pp.1-16 0
Conference
2025 Implementation and Evaluation of TPM-Enabled Anti-Tampering Mechanism for Military UAVs   이재호   한국국방기술학회 학술 대회 (추계) 2025, pp.1-3
Journal
2025 White-Box Key Scheduling With Encoded Round Keys for Secure Lookup Table Generation   Kangmin Kim  Electronics Letters, v.61, no.1, pp.1-6 0
Journal
2024 An Approach to Prevent the Spread of IoT Security Threats through Cosine Similarity Analysis among IoT Devices   손선경   정보보호학회논문지, v.34, no.6, pp.1471-1483
Conference
2024 A Study on Security Enhancement for FIDO Attestation   김영세   전자 정보 통신 학술 대회 (CEIC) 2024, pp.244-247
Conference
2024 Introduction to System Integrity Verification Technology   김도형   한국인터넷정보학회 학술 발표 대회 (추계) 2024, pp.307-308
Journal
2024 TPM-Based Anti-Tampering Solutions to Protect Weapon Systems Technologies   이재호   전자통신동향분석, v.39, no.5, pp.49-60
Journal
2024 Exploring Effective Zero Trust Architecture for Defense Cybersecurity: A Study   Youngho Kim   KSII Transactions on Internet and Information Systems, v.18, no.9, pp.2665-2691 7
Journal
2024 Balanced Encoding of Near-Zero Correlation for an AES Implementation   Seungkwang Lee  IEEE Transactions on Information Forensics and Security, v.19, pp.6589-6603 1
Journal
2024 A Comprehensive Survey of TPM for Defense Systems   Cheol Ryu   KSII Transactions on Internet and Information Systems, v.18, no.7, pp.1953-1967 1
Journal
2023 Private 5G Network Trends and Security Technologies   박종근   정보와 통신: 한국통신학회지, v.40, no.9, pp.21-29
Journal
2022 Software Defined Perimeter(SDP) Authentication Mechanism for Zero Trust and Implementation of ECC Cryptoraphy   이윤경   정보보호학회논문지, v.32, no.6, pp.1-12
Conference
2022 An IoT Device-trusted Remote Attestation Framework   Kyeong Tae Kim   International Conference on Advanced Communications Technology (ICACT) 2022, pp.218-223 8
Conference
2021 IoT Standard Platform Architecture that Provides Defense against DDoS Attacks   Yun-kyung Lee   International Conference on Consumer Electronics (ICCE) 2021 : Asia, pp.394-396 1
Journal
2021 A Malware Distribution Simulator for the Verification of Network Threat Prevention Tools   Song-Yi Hwang   Sensors, v.21, no.21, pp.1-23 10
Journal
2021 Bootstrapping Security Technology in IoT   김영호   주간기술동향, v.2009, pp.14-28
Journal
2021 Implementation of Smart Segmentation Framework for Preventing Security Threats Spreading in IoT Networks   임재덕   한국통신학회논문지, v.46, no.8, pp.1321-1331 0
Journal
2021 A Study on the High-Speed Malware Propagation Method for Verification of Threat Propagation Prevent Technology in IoT infrastructure   황송이   정보보호학회논문지, v.31, no.4, pp.617-635
Conference
2020 Dynamic Security Policy Model for Mitigating Threat Spreading in IoT   손선경   전자 정보 통신 학술 대회 (CEIC) 2020, pp.1-3
Conference
2020 Proposal of Smart Segmentation Framework for preventing threats from spreading in IoT   Jaedeok Lim   International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.1757-1759 2
Conference
2020 Hierarchical Access Control for SDP-IoT   Yun-kyung Lee   International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.1742-1744 3
Journal
2020 TwinPeaks: An approach for certificateless public key distribution for the internet and internet of things   Eunsang Cho  Computer Networks, v.175, pp.1-15 8
Conference
2019 A Study on the Automated Attack Tool of IoT Bot for Verification about Security Technique of IoT device   황송이   한국정보보호학회 학술 대회 (동계) 2019, pp.81-84
Conference
2019 A Study on the Technique of DDoS Attack Based on Mirai IoT Botnet   황송이   한국통신학회 종합 학술 발표회 (추계) 2019, pp.332-333
Journal
2019 Security trend and issue of connected medical device   권혁찬   주간기술동향, v.1911, pp.14-26
Conference
2019 Improving IoT network security using SDP   이윤경   통신 정보 합동 학술 대회 (JCCI) 2019, pp.1-2
Conference
2019 Implementation of Remote Attestation and Management Framework for TPM-based IoT devices   임재덕   통신 정보 합동 학술 대회 (JCCI) 2019, pp.1-2
Journal
2018 Secure Mobile Device Structure for Trust IoT   Yun-kyung Lee   Journal of Supercomputing, v.74, no.12, pp.6646-6664 7
Journal
2018 A study of end-to-end message security protocol based on lightweight ciphers for smart IoT devices   김희정   정보보호학회논문지, v.28, no.6, pp.1309-1317
Conference
2018 Implementation of TLS and DTLS on Zephyr OS for IoT Devices   Yun-kyung Lee   International Conference on Information and Communication Technology Convergence (ICTC) 2018, pp.1292-1294 15
Conference
2018 An Energy Efficient Real-Time MAC Protocol   Kyeong Tae Kim   International Conference on Information and Communication Technology Convergence (ICTC) 2018, pp.1180-1184 1
Conference
2018 Design and Implementation of Lightweight Mutual Authentication Method in IoT   윤승용   통신 정보 합동 학술 대회 (JCCI) 2018, pp.378-379
Conference
2018 A Method for Updating Secret Keys between IoT Devices using Dynamic Session Keys   한진희   통신 정보 합동 학술 대회 (JCCI) 2018, pp.301-302
Conference
2018 A Performance Analysis of Lightweight Cryptography in IoT Devices   김영세   통신 정보 합동 학술 대회 (JCCI) 2018, pp.327-328
Conference
2018 Trusted Mobile Zone Solution Based on Virtualization Technology   GeonLyang Kim   International Conference on Universal Accessibility in the Internet of Things and Smart Environments (SMART ACCESSIBILITY) 2018, pp.10-11
Conference
2018 RIPPLE: Adaptive Fine-grained Access Control in Multi-hop LLNs   Youngho Kim   International Conference on Information Networking (ICOIN) 2018, pp.863-868 3
Conference
2017 Design and Implementation of Secure OTP Generation for IoT Devices   Young-Sae Kim   International Conference on Future Generation Communication and Networking (FGCN) 2017 (ASTL 146), pp.75-80
Conference
2017 Remote Security Management Server for IoT Devices   Seungyong Yoon   International Conference on Information and Communication Technology Convergence (ICTC) 2017, pp.1163-1165 21
Conference
2017 Secure Voice Communication Service Based on Security Platform for Mobile Devices   GeonLyang Kim   International Conference on Information and Communication Technology Convergence (ICTC) 2017, pp.1191-1193 1
Conference
2017 A Lightweight Authentication Mechanism between IoT Devices   Jin-Hee Han   International Conference on Information and Communication Technology Convergence (ICTC) 2017, pp.1154-1156 20
Conference
2017 Implementation of An Access Control Technology for Internet of Things Environments   Daewon Kim   International Conference on Communications, Computation, Networks and Technologies (INNOV) 2017, pp.17-19
Conference
2017 Mutual Authentication Scheme for Lightweight IoT Devices   Seungyong Yoon   International Conference on Emerging Security Information, Systems and Technologies (SECURWARE) 2017
Journal
2017 Smart meter security through AMI security threat case analysis   이윤경   정보와 통신 : 한국통신학회지, v.34, no.10, pp.24-30
Conference
2017 Towards Protected Firmware Verification in Low-power Devices   Yong-Hyuk Moon   International Conference on Emerging Security Information, Systems and Technologies (SECURWARE) 2017, pp.177-179
Conference
2017 Network access control technology for AMI security   이윤경   한국통신학회 종합 학술 발표회 (하계) 2017, pp.1184-1185
Conference
2017 A Lightweight Authentication Mechanism between IoT Devices   한진희   통신 정보 합동 학술 대회 (JCCI) 2017, pp.1-2
Journal
2017 SACA: Self-Aware Communication Architecture for IoT Using Mobile Fog Servers   Vishal Sharma  Mobile Information Systems, v.2017, pp.1-17 20
Conference
2017 Mobile Security Solution for Sensitive Data Leakage Prevention   GeonLyang Kim   International Conference on Communications and Broadband Networking (ICCBN) 2017, pp.59-64 3
Conference
2017 Security Considerations Based on Classification of IoT Device Capabilities   Seungyong Yoon   International Conferences on Advanced Service Computing (SERVICE COMPUTATION) 2017, pp.13-15