ETRI-Knowledge Sharing Plaform

KOREAN

Researchers

연구자 검색
Keyword

Detail

사진

Kim Jeong Nyeo
Department
Cyber Security Research Division
Contact
KSP Keywords
Iot DevicesSecurity SolutionsInternet Of Thing(IoT)Mobile SecuritySecurity ThreatsSecure DomainDomain SeparationSecurity ServiceMobile Trusted ModuleSecure Execution EnvironmentSmart Mobile DevicesMobile Device SecurityIot EnvironmentSecurity RequirementsNetwork ProcessorSecure StorageSecurity VulnerabilitiesAndroid OsSecurity IssuesSmart WorkAndroid AppsIot NetworkE-GovernmentIot BotnetsUse CasesLow-CostSmart CardS-BoxGreen ItUser Data
논문 검색결과
Type Year Title Cited Download
Conference
2024 A Study on Security Enhancement for FIDO Attestation   김영세   전자 정보 통신 학술 대회 (CEIC) 2024, pp.244-247
Journal
2024 TPM-Based Anti-Tampering Solutions to Protect Weapon Systems Technologies   이재훈   전자통신동향분석, v.39, no.5, pp.49-60
Conference
2024 Introduction to System Integrity Verification Technology   김도형   한국인터넷정보학회 학술 발표 대회 (추계) 2024, pp.307-308
Journal
2024 Exploring Effective Zero Trust Architecture for Defense Cybersecurity: A Study   Youngho Kim   KSII Transactions on Internet and Information Systems, v.18, no.9, pp.2665-2691 0
Journal
2024 A Comprehensive Survey of TPM for Defense Systems   Cheol Ryu   KSII Transactions on Internet and Information Systems, v.18, no.7, pp.1953-1967 0
Journal
2023 Private 5G Network Trends and Security Technologies   박종근   정보와 통신: 한국통신학회지, v.40, no.9, pp.21-29
Journal
2022 Software Defined Perimeter(SDP) Authentication Mechanism for Zero Trust and Implementation of ECC Cryptoraphy   이윤경   정보보호학회논문지, v.32, no.6, pp.1-12
Conference
2022 An IoT Device-trusted Remote Attestation Framework   Kyeong Tae Kim   International Conference on Advanced Communications Technology (ICACT) 2022, pp.218-223 5
Conference
2021 IoT Standard Platform Architecture that Provides Defense against DDoS Attacks   Yun-kyung Lee   International Conference on Consumer Electronics (ICCE) 2021 : Asia, pp.394-396 0
Journal
2021 A Malware Distribution Simulator for the Verification of Network Threat Prevention Tools   Song-Yi Hwang   Sensors, v.21, no.21, pp.1-23 6
Journal
2021 Bootstrapping Security Technology in IoT   김영호   주간기술동향, v.2009, pp.14-28
Journal
2021 Implementation of Smart Segmentation Framework for Preventing Security Threats Spreading in IoT Networks   임재덕   한국통신학회논문지, v.46, no.8, pp.1321-1331 0
Journal
2021 A Study on the High-Speed Malware Propagation Method for Verification of Threat Propagation Prevent Technology in IoT infrastructure   황송이   정보보호학회논문지, v.31, no.4, pp.617-635
Conference
2020 Dynamic Security Policy Model for Mitigating Threat Spreading in IoT   손선경   전자 정보 통신 학술 대회 (CEIC) 2020, pp.1-3
Conference
2020 Hierarchical Access Control for SDP-IoT   Yun-kyung Lee   International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.1742-1744 2
Conference
2020 Proposal of Smart Segmentation Framework for preventing threats from spreading in IoT   Jaedeok Lim   International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.1757-1759 2
Journal
2020 TwinPeaks: An approach for certificateless public key distribution for the internet and internet of things   Eunsang Cho  Computer Networks, v.175, pp.1-15 7
Conference
2019 A Study on the Automated Attack Tool of IoT Bot for Verification about Security Technique of IoT device   황송이   한국정보보호학회 학술 대회 (동계) 2019, pp.81-84
Conference
2019 A Study on the Technique of DDoS Attack Based on Mirai IoT Botnet   황송이   한국통신학회 종합 학술 발표회 (추계) 2019, pp.332-333
Journal
2019 Security trend and issue of connected medical device   권혁찬   주간기술동향, v.1911, pp.14-26
Conference
2019 Implementation of Remote Attestation and Management Framework for TPM-based IoT devices   임재덕   통신 정보 합동 학술 대회 (JCCI) 2019, pp.1-2
Conference
2019 Improving IoT network security using SDP   이윤경   통신 정보 합동 학술 대회 (JCCI) 2019, pp.1-2
Journal
2018 A study of end-to-end message security protocol based on lightweight ciphers for smart IoT devices   김희정   정보보호학회논문지, v.28, no.6, pp.1309-1317
Journal
2018 Secure Mobile Device Structure for Trust IoT   Yun-kyung Lee   Journal of Supercomputing, v.74, no.12, pp.6646-6664 7
Conference
2018 Implementation of TLS and DTLS on Zephyr OS for IoT Devices   Yun-kyung Lee   International Conference on Information and Communication Technology Convergence (ICTC) 2018, pp.1292-1294 12
Conference
2018 An Energy Efficient Real-Time MAC Protocol   Kyeong Tae Kim   International Conference on Information and Communication Technology Convergence (ICTC) 2018, pp.1180-1184 1
Conference
2018 Design and Implementation of Lightweight Mutual Authentication Method in IoT   윤승용   통신 정보 합동 학술 대회 (JCCI) 2018, pp.378-379
Conference
2018 A Method for Updating Secret Keys between IoT Devices using Dynamic Session Keys   한진희   통신 정보 합동 학술 대회 (JCCI) 2018, pp.301-302
Conference
2018 A Performance Analysis of Lightweight Cryptography in IoT Devices   김영세   통신 정보 합동 학술 대회 (JCCI) 2018, pp.327-328
Conference
2018 Trusted Mobile Zone Solution Based on Virtualization Technology   GeonLyang Kim   International Conference on Universal Accessibility in the Internet of Things and Smart Environments (SMART ACCESSIBILITY) 2018, pp.10-11
Conference
2018 RIPPLE: Adaptive Fine-grained Access Control in Multi-hop LLNs   Youngho Kim   International Conference on Information Networking (ICOIN) 2018, pp.863-868 3
Conference
2017 Design and Implementation of Secure OTP Generation for IoT Devices   Young-Sae Kim   International Conference on Future Generation Communication and Networking (FGCN) 2017 (ASTL 146), pp.75-80
Conference
2017 A Lightweight Authentication Mechanism between IoT Devices   Jin-Hee Han   International Conference on Information and Communication Technology Convergence (ICTC) 2017, pp.1154-1156 19
Conference
2017 Implementation of An Access Control Technology for Internet of Things Environments   Daewon Kim   International Conference on Communications, Computation, Networks and Technologies (INNOV) 2017, pp.17-19
Conference
2017 Remote Security Management Server for IoT Devices   Seungyong Yoon   International Conference on Information and Communication Technology Convergence (ICTC) 2017, pp.1163-1165 21
Conference
2017 Secure Voice Communication Service Based on Security Platform for Mobile Devices   GeonLyang Kim   International Conference on Information and Communication Technology Convergence (ICTC) 2017, pp.1191-1193 1
Conference
2017 Mutual Authentication Scheme for Lightweight IoT Devices   Seungyong Yoon   International Conference on Emerging Security Information, Systems and Technologies (SECURWARE) 2017
Journal
2017 Smart meter security through AMI security threat case analysis   이윤경   정보와 통신 : 한국통신학회지, v.34, no.10, pp.24-30
Conference
2017 Towards Protected Firmware Verification in Low-power Devices   Yong-Hyuk Moon   International Conference on Emerging Security Information, Systems and Technologies (SECURWARE) 2017, pp.177-179
Conference
2017 Network access control technology for AMI security   이윤경   한국통신학회 종합 학술 발표회 (하계) 2017, pp.1184-1185
Conference
2017 A Lightweight Authentication Mechanism between IoT Devices   한진희   통신 정보 합동 학술 대회 (JCCI) 2017, pp.1-2
Journal
2017 SACA: Self-Aware Communication Architecture for IoT Using Mobile Fog Servers   Vishal Sharma  Mobile Information Systems, v.2017, pp.1-17 19
Conference
2017 Security Considerations Based on Classification of IoT Device Capabilities   Seungyong Yoon   International Conferences on Advanced Service Computing (SERVICE COMPUTATION) 2017, pp.13-15
Conference
2017 Mobile Security Solution for Sensitive Data Leakage Prevention   GeonLyang Kim   International Conference on Communications and Broadband Networking (ICCBN) 2017, pp.59-64 2
Journal
2016 Secure User Authentication based on the Trusted Platform for Mobile Devices   GeonLyang Kim   EURASIP Journal on Wireless Communications and Networking, v.2016, no.1, pp.1-15 7
Conference
2016 On the Feasibility of Remote Attestation for IoT Devices   Yong-Hyuk Moon   International Conference on Evolving Internet (INTERNET) 2016, pp.12-13
Conference
2016 Analyzing Security Threats of Android-based Mobile Malware   Seungyong Yoon   International Conference on Security Technology (SecTech) 2016, pp.310-315
Conference
2016 Common Security Requirements for Device Identification System in Internet of Things   Daewon Kim   International Conference on Security Technology (SecTech) 2016, pp.306-309
Conference
2016 Consideration of Security Threats for Identification System in Internet of Things   Daewon Kim   International Conference on Cyber-Technologies and Cyber-Systems (CYBER) 2016, pp.67-68
Conference
2016 Secure Mobile Device Management Based on Domain Separation   GeonLyang Kim   International Conference on Information and Communication Technology Convergence (ICTC) 2016, pp.918-920 5
Conference
2016 On-demand Security Configuration for IoT Devices   Boheung Chung   International Conference on Information and Communication Technology Convergence (ICTC) 2016, pp.1082-1084 18
Conference
2016 A Scheme for Controlling Functionality of Mobile Device Using Specialized Codes   Su-Wan Park   Cyber Science and Technology Congress (CyberSciTech) 2016, pp.75-82 0
Journal
2016 SecureDom: Secure Mobile-sensitive Information Protection with Domain Separation   Su-Wan Park   Journal of Supercomputing, v.72, no.7, pp.2682-2702 7
Journal
2016 Implementation of Domain Separation-based Security Platform for Smart Device   Jeong Nyeo Kim   International Journal of Applied Engineering Research, v.11, no.10, pp.7017-7019 0
Conference
2016 A Study on the Security Features of Operating System for Lightweight IoT Devices   임재덕   한국통신학회 종합 학술 발표회 (하계) 2016, pp.1384-1385
Conference
2016 Analysis of Smart Meter Hacking and Countermeasures   이윤경   한국정보보호학회 학술 대회 (하계) 2016, pp.1-4
Journal
2016 Security Core Technology Implementation for Hardware-based Smart Devices   JeongNyeo Kim   International Journal of Applied Engineering Research, v.11, no.8, pp.5927-5930 0
Conference
2016 Trends and Requirements of Data Management Platform in IoT Environment   Hwashin Moon   International Conference on Green and Human Information Technology (ICGHIT) 2016, pp.140-141
Conference
2015 A Study on the Hardware-based Security Solutions for Smart Devices   Hongil Ju   International Conference on Computational Science and Computational Intelligence (CSCI) 2015, pp.51-51
Journal
2015 Analyzing User Awareness of Privacy Data Leak in Mobile Applications   Youngho Kim   Mobile Information Systems, v.2015, pp.1-12 23
Conference
2015 Dynamic Permission Re-Enforcement Technique for Protecting Application from Others with Over-Privileged Permission at Run Time   Boheung Chung   International Conference on Security Technology (SecTech) 2015, pp.13-16 1
Journal
2015 Implementation of a Hardware Security Chip for Mobile Devices   Hongil Ju   IEEE Transactions on Consumer Electronics, v.61, no.4, pp.500-506 13
Conference
2015 Supporting a Variety of Secure Services Based on MTM   Seungyong Yoon   International Conference on Systems and Networks Communications (ICSNC) 2015, pp.18-20
Conference
2015 Performance Analysis of Encrypted Code Analyzer for Malicious Code Detection   Daewon Kim   International Conference on Communications, Computation, Networks and Technologies (INNOV) 2015, pp.1-3
Conference
2015 Smart Meter and Smart Meter Security   Yun-kyung Lee   International Conference on Computers, Communications and Systems (ICCCS) 2015, pp.1-3
Conference
2015 Mobile Security Technology for Smart Devices   Seungyong Yoon   International Conference on Information and Communication Technology Convergence (ICTC) 2015, pp.1174-1176
Conference
2015 Trusted Military Services Based on the Secure Domain of the Mobile Security Solution   GeonLyang Kim   International Conference on Information and Communication Technology Convergence (ICTC) 2015, pp.1128-1131
Conference
2015 Security Considerations for Secure and Trustworthy Smart Home System in the IoT Environment   Jin-Hee Han   International Conference on Information and Communication Technology Convergence (ICTC) 2015, pp.1119-1121
Conference
2015 Technology Trends of Access Control in IoT and Requirements Analysis   Yun-kyung Lee   International Conference on Information and Communication Technology Convergence (ICTC) 2015, pp.1034-1036
Conference
2015 Cyber Security Technology for Big Change   손명희   한국스마트미디어학회 학술 대회 (추계) 2015, pp.121-123
Conference
2015 A Method Based on Platform Integrity Verification for Activating a Mobile Trusted Module   Daewon Kim   International Conference on Information and Communication Technology Convergence (ICTC) 2015, pp.1177-1179
Journal
2015 클라우드 보안 개요   권혁찬   정보와 통신 : 한국통신학회지, v.32, no.10, pp.71-76
Journal
2015 A Multi-Resolution Port Scan Detection Technique for High-Speed Networks   Hwashin Moon   Journal of Information Science and Engineering, v.31, no.5, pp.1613-1632 2
Conference
2015 The Secure Urgent Situation Propagation System Using the Mobile Security Solution   GeonLyang Kim   International Conference on Computer Science, Computer Engineering, and Social Media (CSCESM) 2015, pp.109-114 2
Conference
2015 Detection of Rogue Devices in WLAN by Analyzing RF Features and Indoor Location of the Device   Hyeokchan Kwon   International Workshop on Information Security Applications (WISA) 2015 (LNCS 9503), v.9503, pp.54-61 0
Journal
2015 온라인 아동 보호   나재훈   정보보호학회지, v.25, no.4, pp.39-43
Journal
2015 Implementation of a MTM-based secure OTP Generator for IoT Devices   김영세   대한임베디드공학회논문지, v.10, no.4, pp.199-206
Conference
2015 A Simple Method for Protecting Privacy in Video Surveillance   Jang-Hee Yoo   US-Korea Conference on Science, Technology, and Entrepreneurship (UKC) 2015, pp.138-138
Conference
2015 Cloud-Based Android Botnet Malware Detection System   Suyash Jadhav  International Conference on Advanced Communication Technology (ICACT) 2015, pp.347-352 17
Conference
2015 Mobile Device Penetration Testing Framework and Platform for the Mobile Device Security Course   Suyash Jadhav  International Conference on Advanced Communication Technology (ICACT) 2015, pp.675-680 6
Conference
2015 A Secure Storage Mechanism for Mobile Device Security Platform Based on Domain Separation   Su-Wan Park   International Conference on Ubiquitous Computing Application and Wireless Sensor Network (UCAWSN) 2015, pp.1-7
Journal
2015 Service and Content Protection Technology Trend Based on Web Mashup   나재훈   한국정보기술학회지, v.13, no.1, pp.13-17
Conference
2015 A Methodology for Live Forensic Acquisition in Secure Domain Based on Domain Separation Technology   Kyung-Soo Lim   International Conference on Communication and Computer Engineering (ICOCOE) 2015 (LNEE 362), v.362, pp.1113-1123 3
Journal
2015 A Secure Storage System for Sensitive Data Protection Based on Mobile Virtualization   Su-Wan Park   International Journal of Distributed Sensor Networks, v.2015, pp.1-9 11
Journal
2015 차세대 IoT 네트워크 보안 현황   권혁찬   정보처리학회지, v.22, no.2, pp.39-46
Conference
2015 Improving MTM-Based Session & Key Management   Seungyong Yoon   International Conference on Green and Human Information Technology (ICGHIT) 2015, pp.333-334
Conference
2015 A Protection Method of Mobile Sensitive Data and Applications over Escrow Service   Su-Wan Park   Global Conference on Information Technology, Computing, and Applications (Global IT) 2015, pp.1-10
Conference
2014 Secure Filesystem for Trusted Virtual Domain in Mobile Device   Su-Wan Park   International Conference on Computer Science and its Applications (CSA) 2014 (LNEE 330), pp.411-417 0
Conference
2014 Mobile Device Security Framework Based on Domain Separation and Use Case   Yun-kyung Lee   Korea-Vietnam International Workshop on Information and Communications 2014, pp.1-4
Conference
2014 New Approach to Determine Metamorphic Malicious Mobile Code on Android based Smartphones   Sangdon Kim  International Conference on Internet (ICONI) 2014, pp.1-6
Conference
2014 Application Authentication and Secure Key Management Scheme using MTM   Jin-Hee Han   International Conference on Computer Science and its Applications (CSA) 2014 (LNEE 330), pp.941-946 0
Conference
2014 The Issue of Data Transfer for the Embedded SE on Mobile Devices   HongIl Ju   International Conference on Computer Science and its Applications (CSA) 2014 (LNEE 330), v.330, pp.317-322 0
Journal
2014 Efficient DRM Mechanism of Scalable Contents Based on H.264/SVC in Convergence Environment   Su-Wan Park   Multimedia Tools and Applications, v.73, no.2, pp.841-855 1
Conference
2014 Reducing the Impact of Repackaged App on Android   Hwashin Moon   International Conference on Information and Communication Technology Convergence (ICTC) 2014, pp.800-801 3
Conference
2014 Protection Method from APP Repackaging Attack on Mobile Device with Separated Domain   Yun-kyung Lee   International Conference on Information and Communication Technology Convergence (ICTC) 2014, pp.667-668 3
Conference
2014 A Secure Channel Establishment Method on a Hardware Security Module   Daewon Kim   International Conference on Information and Communication Technology Convergence (ICTC) 2014, pp.555-556 4
Conference
2014 A Secure Message Service Using the Secure Domain of a Mobile Security Solution   GeonLyang Kim   International Conference on Information and Communication Technology Convergence (ICTC) 2014, pp.619-620 1
Conference
2014 User-Defined Privilege Restriction Mechanism for Secure Execution Environments on Android   Boheung Chung   International Conference on Information and Communication Technology Convergence (ICTC) 2014, pp.815-816 1
Conference
2014 Functional Considerations in Military-Grade Security Platform using a Mobile Hypervisor   Kyung-Soo Lim   International Conference on Information Technology Convergence and Services (ITCS) 2014 (LNEE 330), v.330, pp.1413-1418 2
Conference
2014 A Whitebox Cryptography Application for Mobile Device Security against Whitebox Attacks - How to Apply WBC on Mobile Device   Jong-Yeon Park   International Conference on IT Convergence and Security (ICITCS) 2014, pp.1-4 3
Journal
2014 Automated and Coupled Services of Advanced Smart Surveillance Systems Toward Green IT: Tracking, Retrieval and Digital Evidence   Su-Wan Park   Journal of Supercomputing, v.69, no.3, pp.1215-1234 1
Conference
2014 Unsupervised Clustering of Malware based on Behaviour Analysis   이한성   한국정보보호학회 충청 지부 학술 대회 2014, pp.1-3
Conference
2014 도메인 분리 기반 모바일 단말에서의 앱 리패키징 공격 방어 기법   이윤경   한국정보보호학회 충청 지부 학술 대회 2014, pp.1-3
Journal
2014 Wireless Fingerprinting Technology and Its Applications   정병호   전자통신동향분석, v.29, no.4, pp.110-122
Conference
2014 Forensic Artifacts in Network Surveillance Systems   Kyung-Soo Lim   International Conference on Ubiquitous Computing Application and Wireless Sensor Network (UCAWSN) 2014 (LNEE 331), pp.341-348 1
Journal
2014 Improving Performance of X-Rated Video Classification with the Optimized Repeated Curve-Like Spectrum Feature and the Skip-and-Analysis Processing   Jae-Deok Lim   Multimedia Tools and Applications, v.71, no.2, pp.717-740 1
Conference
2014 The Design of TEE-based Security Platform in Mobile Device   GeonLyang Kim   International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC) 2014, pp.1-3
Conference
2014 A Design of Mobile Trusted Module for Application Dedicated Cryptographic Keys   Daewon Kim   International Conference on Mobile Services, Resources, and Users (MOBILITY) 2014, pp.1-5
Conference
2014 Hidden Evasive Server-Side Polymorphic Malicious Apps Detection Mechanism on Android based Smart Phone Devices   Daeyeol Moon  International Conference on Convergence Technology (ICCT) 2014, pp.819-820
Conference
2014 A Study on the Trusted App.-Based Access Control to the Isolated Trusted Execution Environment in Mobile Device   임재덕   한국통신학회 종합 학술 발표회 (하계) 2014, pp.364-365
Conference
2014 A Study on Data Block Management for Mobile Cloud Computing   Su-Wan Park   International Symposium on Advances in Computing, Communications, Security, and Applications (ACSA) 2014, pp.1-4
Conference
2014 Detection and Response against Mobile Attack using SMS   윤승용   통신 정보 합동 학술 대회 (JCCI) 2014, pp.1-2
Journal
2014 An Improved Side Channel Attack Using Event Information of Subtraction   Jong-Yeon Park   Journal of Network and Computer Applications, v.38, no.1, pp.99-105 6
Conference
2014 Detection of SMS Mobile Malware   Seungyong Yoon   International Conference on Electronics, Information and Communication (ICEIC) 2014, pp.1-2 1
Conference
2014 Smart Network Services using Ticket Issuance in the TSM (Trusted Software Monitor) System   Su-Wan Park   International Symposium on Frontier and Innovation in Future Computing and Communications (FCC) 2014 (LNEE 301), pp.279-287 0
Conference
2014 Implementation of a Video Streaming Security System for Smart Device   Yongsung Jeon   International Conference on Consumer Electronics (ICCE) 2014, pp.97-100 5
Conference
2013 Adult Contents Analysis and Remote Management Framework for Parental Control Based on Android Platform   Jae-Deok Lim   International Conference on Computer Science and its Applications (CSA) 2013 (LNEE 279), v.279, pp.161-166 1
Journal
2013 Mobile Malware Detection Using Correlational Analysis   Seungyong Yoon   International Journal of Advancements in Computing Technology, v.5, no.16, pp.52-58
Journal
2013 Mathematical Analysis for Efficiency of Eavesdropping Attack Using Directional Antenna in mmWave Band   김미정   한국통신학회논문지 C : 융합기술, v.38C, no.11, pp.1074-1077
Journal
2013 Churn-Aware Optimal Layer Scheduling Scheme for Scalable Video Distribution in Super-Peer Overlay Networks   Yong-Hyuk Moon   Journal of Supercomputing, v.66, no.2, pp.700-720 3
Conference
2013 A Method for Application Authentication and Secure Key Management Based on MTM (Mobile Trusted Module)   한진희   한국통신학회 종합 학술 발표회 (추계) 2013, pp.778-779
Conference
2013 Modified User Authentication Method for Mobile Micro Payment   문화신   한국통신학회 종합 학술 발표회 (추계) 2013, pp.773-774
Conference
2013 Study on Forensic Investigation for Mobile Virtualization System   임경수   한국정보처리학회 학술 발표 대회 (추계) 2013, pp.857-860
Conference
2013 Malware Detection on Smartphones   Seungyong Yoon   International Conference on Computing and Convergence Technology (ICCCT) 2013, pp.272-275
Conference
2013 Secure Mobile Services using Secure Region   Yun-kyung Lee   International Conference on Information and Communication Technology Convergence (ICTC) 2013, pp.894-895 1
Conference
2013 Object Retrieval Scheme Using Color Features in Surveillance System   Su-wan Park   International Conference on Future Information Technology (FutureTech) 2013 (LNEE 276), v.276, pp.99-106 0
Conference
2013 DroidVulMon -- Android Based Mobile Device Vulnerability Analysis and Monitoring System   You Joung Ham  International Conference on Next Generation Mobile Apps, Services and Technologies (NGMAST) 2013, pp.26-31 8
Journal
2013 Intelligent Reconfigurable Method of Cloud Computing Resources for Multimedia Data Delivery   Junho CHOI  Informatica, v.24, no.3, pp.381-394 14
Conference
2013 Detecting Application Layer-based Slow DDoS Attack   Seungyong Yoon   Asia Pacific International Conference on Information Science and Technology (APIC-IST) 2013, pp.319-322
Journal
2013 A Survey of Mobile Malware Detection Techniques   문화신   전자통신동향분석, v.28, no.3, pp.39-46
Conference
2013 Mathematical Analysis of Eavesdropping Attack in mmWave Band   김미정   한국통신학회 종합 학술 발표회 (하계) 2013, pp.91-92
Conference
2013 A Multidimensional Peer Selection Scheme in Peer-to-Peer Networks   Yong-Hyuk Moon   International Conference on Computer Applications and Information Processing Technology (CAIPT) 2013, pp.1-4
Journal
2013 A Technical Trend of Secure Storages   박종연   전자통신동향분석, v.28, no.3, pp.30-38
Conference
2013 Signature Generation Based on Executable Parts in Suspicious Packets   Daewon Kim   Advanced International Conference on Telecommunications (AICT) 2013, pp.166-169
Conference
2013 A Study on the Embedded SE Interface for Mobile Devices   HongIl Ju   International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC) 2013, pp.881-882
Conference
2013 Intelligence Video Security Techniques for Wide-Domain Surveillance System   박수완   한국정보처리학회 학술 발표 대회 (추계) 2013, pp.524-526
Journal
2013 The Design of Vulnerability Management System   GeonLyang Kim   International Journal of Computer Science and Network Security, v.13, no.4, pp.19-25
Journal
2012 Implementation of Automatic X-rated Video Classification and Management System based on Multimodal Features   JaeDeok Lim   International Journal of Advancements in Computing Technology, v.4, no.23, pp.178-186 1
Conference
2012 An Equidistant Message Power Attack Using Restricted Number of Traces on Reduction Algorithm   Jong-Yeon Park   International Conference on Ubiquitous Information Technologies and Applications (CUTE) 2012 (LNEE 214), v.214, pp.315-322 0
Conference
2012 Attack and Response Mechanism on Smart Work Device   최욱진   대한임베디드공학회 학술 대회 (추계) 2012, pp.81-84
Conference
2012 Security Architecture for Smart Devices   Hong-Il Ju   International Conference on Information and Communication Technology Convergence (ICTC) 2012, pp.94-95 1
Conference
2012 Endpoint Mitigation of DDoS Attacks Based on Dynamic Thresholding   Daewon Kim   International Conference on Information and Communications Security (ICICS) 2012 (LNCS 7618), v.7618, pp.381-391 1
Journal
2012 The Study on the Cyber Security Requirements of Cyber-Physical Systems for Cyber Security Frameworks   박수열  대한임베디드공학회논문지, v.7, no.5, pp.255-265
Conference
2012 TeeMo: A Generic Trusted Execution Framework for Mobile Devices   Young-ho Kim   International Conference on Computer, Networks, Systems, and Industrial Applications (CNSI) 2012, pp.579-583
Conference
2012 System Requirements of Mobile device for Security Service   Yong-Sung Jeon   International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC) 2012, pp.1-3
Journal
2012 Nano-SIM 기술 및 표준화 이슈   김영세   주간기술동향, v.1554, pp.1-14
Conference
2012 Churn-Aware Optimal Layer Scheduling Scheme for Scalable Video Distribution in Super-Peer Overlay Networks   Yong-Hyuk Moon   High-Performance Grid and Cloud Computing Workshop (HPGC) 2012, pp.1-5
Conference
2012 고정-PTZ 카메라 제어 기반의 원거리 얼굴 검출 방법   이한성   영상 처리 및 이해에 관한 워크샵 (IPIU) 2012, pp.1-4
Conference
2012 A Rooting Vulnerability Analysis and the Related Countermeasure Mechanism on the Android-based Smart Work Device   Won-Jun Jang  International Conference on Convergence Technology (ICCT) 2012, pp.1-4
Conference
2011 Security Issue of Mobile Terminal for Smart Work   전용성   차세대 통신 소프트웨어 학술 대회 (NCS) 2011, pp.1-4
Conference
2011 Secure Service Execution Method on Mobile Device   이윤경   전자 정보 통신 학술 대회 (CEIC) 2011, pp.166-169
Conference
2011 Rooting attack detection method on the Android-based smart phone   Won-Jun Jang  International Conference on Computer Science and Network Technology (ICCSNT) 2011, pp.477-481 8
Conference
2011 A Study on the Mobile Platform Security based on Virtualization Technology   주홍일   대한임베디드공학회 학술 대회 (추계) 2011, pp.399-402
Conference
2011 Design of Secure Execution Environment for Mobile System   김영호   대한임베디드공학회 학술 대회 (추계) 2011, pp.241-244
Journal
2011 Anonymous Qualification Verifying Method on Web Environment   이윤경   정보보호학회논문지, v.21, no.5, pp.181-195
Journal
2011 SecurityTechnologyforDDS   정보흥   전자통신동향분석, v.26, no.5, pp.112-122
Conference
2011 합동 전투 지휘 체계를 위한 스마트폰 보안 기술 동향   김정녀   한국산업융합 학술 대회 2011, pp.1-8
Conference
2011 Building Secure Execution Environment for Mobile Platform   Young-Ho Kim   International Conference on Computers, Networks, Systems and Industrial Engineering (CNSI) 2011, pp.119-122 4
Conference
2011 Adaptive Human Detection Method based on the Distance from a Camera   문대성   통신 정보 합동 학술 대회 (JCCI) 2011, pp.1-3
Journal
2011 Robust Fuzzy Fingerprint Vault System against Correlation Attack   문대성   정보보호학회논문지, v.21, no.2, pp.13-25
Journal
2011 Prohibiting Internal Data Leakage to Mass Storage Device in Mobile Device   정보흥   정보보호학회논문지, v.21, no.1, pp.125-133
Journal
2011 Multimodal Biometric Method that Combines Veins, Prints, and Shape of a Finger   Byung Jun Kang  Optical Engineering, v.50, no.1, pp.1-13 44
Conference
2011 A Secure Fingerprint Template Generation Algorithm for Smart Card   Daesung Moon   International Conference on Consumer Electronics (ICCE) 2011, pp.719-720 2
Conference
2010 Sample Bytes to Protect Important Data from Unintentional Transmission in Advanced Embedded Device   Bo-Heung Chung   International Conferences on Security Technology (SecTech) 2010 / Disaster Recovery and Business Continuity (DRBC) 2010 (CCIS 122), v.122, pp.68-73 0
Journal
2010 Standardization of Air Interface Protocol for RFID Security Services   강유성   한국정보기술학회지, v.8, no.1, pp.43-50
Journal
2010 A Survey of Face Recognition Technologies and Standards   이한성   한국정보기술학회지, v.8, no.1, pp.33-41
Conference
2010 Implementation of ASEF for Eye Detection   So-Hee Park   International Conference on Computers, Communications and Systems (ICCCS) 2010, pp.1-4
Journal
2010 Contactless Fingerprint Recognition Based on LDP   강병준  멀티미디어학회논문지, v.13, no.9, pp.1337-1347
Journal
2010 비디오 분석기술과 초해상도 영상 복원   정윤수   한국멀티미디어학회지, v.14, no.3, pp.39-47
Conference
2010 Face Image Retrieval Using Sparse Representation Classifier with Gabor-LBP Histogram   Han Sung Lee   International Workshop on Information Security Applications (WISA) 2010 (LNCS 6513), v.6513, pp.273-280 26
Journal
2010 Smartphone Threats and Security Technology   강동호   전자통신동향분석, v.25, no.3, pp.72-80
Journal
2010 모바일 보안 위협 및 보안 서비스 기술 동향   강동호   정보과학회지, v.28, no.6, pp.51-56
Conference
2010 Automated Power On/Off Control of a Television by Detecting Eye in Face Images   Jang-Hee Yoo   International Conference on Electronics, Informations and Communications (ICEIC) 2010, pp.429-431
Conference
2010 Secure Fuzzy Fingerprint Vault System   문대성   대한전자공학회 종합 학술 대회 (하계) 2010, pp.1660-1663
Conference
2009 Implementation of Integrity Management Architecture for Scalability   Jae Deok Lim   International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC) 2009, pp.1169-1172
Conference
2009 A study of Management Interface for Cluster System Integrity   Jae Deok Lim   International Conference on Advanced Communication Technology (ICACT) 2009, pp.1261-1264
Conference
2009 Adult image detection with c lose-up face classification   Byeong Cheol Choi   International Conference on Consumer Electronics (ICCE) 2009, pp.1-2 4
Conference
2008 The Design of SAML-based SSO Service for User/Device Integrated Authentication   So Hee Park   International Conference on Computers, Communications and Systems (ICCCS) 2008, pp.1-4
Journal
2008 High-Speed Hardware Architectures for ARIA with Composite Field Arithmetic and Area-Throughput Trade-Offs   Sang-Woo Lee   ETRI Journal, v.30, no.5, pp.707-717 5
Conference
2008 Retrieval of Illegal and Objectionable Multimedia   Byeong Cheol Cho   International Conference on Networked Computing and Advanced Information Management (NCM) 2008, pp.645-647 3
Conference
2008 A Study of Providing the Integrity on Cluster System   Jae Deok Lim   International Conference on Advanced Communication Technology (ICACT) 2008, pp.1925-1928 2
Conference
2007 The Design of SSO Service for Web Portal Mashup Service   박소희   차세대 통신 소프트웨어 학술 대회 (NCS) 2007, pp.1-5
Conference
2007 The Design of SSO Service Architecture for Mashup Service in Web Portals   So Hee Park   International Conference on Information Security and Privacy (ISP) 2007, pp.155-159
Conference
2007 Anonymous PKI Framework for Privacy-guaranteed e-Services   Byeong Cheol Choi   International Conference on Convergence Information Technology (ICCIT) 2007, pp.687-690 1
Conference
2007 Implementation of Multi-thread based Intrusion Prevention System for IPv6   Jae-Deok Lim   International Conference on Control, Automation and Systems (ICCAS) 2007, pp.404-407 5
Conference
2007 Implementation of LSM-Based RBAC Module for Embedded System   Jae-Deok Lim   International Workshop on Information Security Applications (WISA) 2007 (LNCS 4867), v.4867, pp.91-101 2
Journal
2007 A Survey of Intelligent Vehicle Security   최병철   전자통신동향분석, v.22, no.1, pp.114-118
Conference
2005 Design and Implementation of Gigabit Router using Network Processor   Sang-Woo Lee   Internet and Multimedia Systems and Applications (IMSA) 2005, pp.32-35
Conference
2005 Implementation of Gigabit Router with Network Porcesskr   이상우   한국통신학회 종합 학술 발표회 (하계) 2005, pp.110-113
Conference
2005 Implementing Cipher APIs in Inter IXP 2400   Sang-Su Lee   International Conference on Control, Automation and Systems (ICCAS) 2005, pp.374-376
Conference
2005 Implementation of light-Weight IKE Protocol for IPsec VPN within Router   Jae Deok Lim   International Conference on Advanced Communication Technology (ICACT) 2005, pp.81-84
Conference
2005 Design of Firewall in Router using Network Processor   Young Ho Kim  International Conference on Advanced Communication Technology (ICACT) 2005, pp.658-660
Conference
2005 Kernel Migration of Transport Layer Security   Geon-Woo Kim   International Conference on Advanced Communication Technology (ICACT) 2005, pp.69-71
Conference
2005 The design of IPSec application in lXDP2400   Min Ho Han   International Conference on Advanced Communication Technology (ICACT) 2005, pp.584-587
Conference
2005 An implementation of 3DES and HMAC-MD5 in Intel IXP 2400   Sang Su Lee   International Conference on Advanced Communication Technology (ICACT) 2005, pp.369-371
Conference
2005 Kernel-level Intrusion Detection Method Using Simplification and Grouping   Bo-Heung Chung   International Conference on Advanced Communication Technology (ICACT) 2005, pp.251-254
Conference
2004 Secure Management System for Network Equipment   두소영   전자 정보 통신 학술 대회 (CEIC) 2004, pp.219-222
Conference
2004 IPSec Engine Design in IXP2400 Network Processor   한민호   차세대 통신소프트웨어 학술 대회 (NCS) 2004, pp.545-548
Conference
2004 Policy-based Security Management for secure networking of Router   조수형   한국통신학회 종합 학술 발표회 (추계) 2004, pp.626-629
Conference
2004 Survivability Guaranteed RWA Algorithm in the Next Generation OVPN   황진호   한국정보과학회 학술 발표 (가을) 2004, pp.115-117
Conference
2004 Fault/Attack Tolerant Recovery Mechanism Under SRLG Constraint in the Next Generation Optical VPN   Jin Ho Hwang  Universal Multiservice Networks 2009 (LNCS 3262), v.3262, pp.386-396 4
Journal
2004 라우터 보안 기술 동향   정보흥   주간기술동향, v.1154, pp.1-12
Conference
2004 SRLG-constrained Recovery Mechanism robust to Fault/Attack in the Next Generation Optical VPN   황진호  한국통신학회 종합 학술 발표회 (하계) 2004, pp.116-116
Conference
2004 Conformance Test for Open Internet Key Exchange Protocol Implementation   임재덕   한국통신학회 종합 학술 발표회 (하계) 2004, pp.166-166
Conference
2004 Network Processor Architecture for IPSec   Minho Han   International Conference on Advanced Communication Technology (ICACT) 2004, pp.485-487
Conference
2004 Kernel-level Intrusion Detection System for Minimum Packet Loss   Bo Heung Chung   International Conference on Advanced Communication Technology (ICACT) 2004, pp.207-212
Conference
2003 Methods of Defense DoS Attack by Traffic Metering and Controlling Technique in a Router   이호균   한국정보처리학회 학술 발표 대회 (추계) 2003, pp.1985-1988
Conference
2003 Implemetation of DDoS Defense Function Using Traffic Controlling and Intrusion Detection Technique   이호균   한국통신학회 종합 학술 발표회 (추계) 2003, pp.989-992
Conference
2003 Design of Policy based Security Management System for Intrusion Detection   조수형   전자 정보 통신 학술 대회 (CEIC) 2003, pp.161-164
Conference
2003 Design of Packet Filtering System for High Speed Networking Environment   류승호   한국정보처리학회 학술 발표 대회 (추계) 2003, pp.1993-1996
Conference
2003 Establishment of a secure networking between Secure OSs   Jae-Deok Lim   International Conference on Control, Automation and Systems (ICCAS) 2003, pp.2097-2100
Conference
2003 Integrated Security Management Framework for Secure Networking   Su-Hyung Jo   International Conference on Control, Automation and Systems (ICCAS) 2003, pp.2174-2177
Conference
2003 Methods of Defense DoS Attack by Traffic Metering and Controlling Technique in a Router   이호균   한국정보과학회 학술 발표 (가을) 2003, pp.814-816
Journal
2003 동적 기능 구성이 가능한 능동형 Secure OS 시스템   김정녀   정보보호학회지, v.13, no.4, pp.60-67
Journal
2003 안전한 라우터를 위한 능동형 보안 엔진 구현   김정녀   한국통신학회지, v.20, no.8, pp.711-79
Journal
2003 Test on the Security and Performance on the Basis of the Access Control Policy Implemented by Secure OS   김정녀   정보처리학회논문지 D, v.10D, no.5, pp.773-780
Journal
2003 Automatic Encryption Method within Kernel Level using Various Access Control Policy in UNIX system   임재덕   정보처리학회논문지 C, v.10C, no.4, pp.387-396
Conference
2003 A Study of Network Packet Protection between Trusted Systems   임재덕   통신 정보 합동 학술 대회 (JCCI) 2003, pp.213-213
Conference
2003 The Designs and Implementation of Trusted Channel between Secure Operating Systems   Joon-Suk Yu   한국정보처리학회 학술 발표 대회 (춘계) 2003, pp.2117-2120
Conference
2003 The Implementation of Integrated Security Engine's Management System for Secure Networking   조수형   한국정보처리학회 학술 발표 대회 (춘계) 2003, pp.2253-2256
Conference
2003 Suggestion of Mobile Telecommunication Network Management System by Policy based Network management   이호균   통신 정보 합동 학술 대회 (JCCI) 2003, pp.365-365
Journal
2003 Multiple User Authentication based on SecuROS/FreeBSD   두소영   정보처리학회논문지 C, v.10C, no.1, pp.11-16
Conference
2002 Design of Dynamic Intrusion Detection Rule Modification Technique for Kernel Level Intrusion Detection   정보흥   한국정보처리학회 학술 발표 대회 (추계) 2002, pp.1031-1034
Conference
2002 A Study on the Implementation of Trusted Channel on Trusted Systems   유준석   한국정보처리학회 학술 발표 대회 (추계) 2002, pp.1015-1018
Conference
2002 A Prototype of Trusted Authentication   두소영   한국정보처리학회 학술 발표 대회 (추계) 2002, pp.979-982
Conference
2002 Policy-based Security Management for Intrusion Detection   조수형   한국정보과학회 학술 발표 (가을) 2002, pp.574-576
Conference
2002 Implementation of Access Control User Interface for Secure User Data   두소영   통신 정보 합동 학술 대회 (JCCI) 2002, pp.87-87
Conference
2002 Data Encryption used Access Control within Vnode layer based on FreeBSD   임재덕   통신 정보 합동 학술 대회 (JCCI) 2002, pp.191-191
Conference
2002 Design and Implementation of Security Management System for C-ISCAP   조수형   통신 정보 합동 학술 대회 (JCCI) 2002, pp.156-156
Journal
2001 The Blocking of buffer overflow based attack for Linux kernel   김정녀   정보처리학회논문지 A, v.8A, no.4, pp.385-390
Conference
2001 The Trusted Path Authentication System between the User and the Secure OS   두소영   한국정보처리학회 학술 발표 대회 (추계) 2001, pp.961-964
Conference
2001 Design of Crypto-Filesystem using Access Control Model   임재덕   한국정보처리학회 학술 발표 대회 (추계) 2001, pp.835-838
Journal
2001 Secure User and Program Interface for SecuROS   두소영   정보처리학회논문지 C, v.8C, no.5, pp.557-564
Journal
2001 A Study on the Cryptographic Properties of FCSR Sequences   서창호   정보처리학회논문지 C, v.8C, no.1, pp.12-15