Conference
|
2024 |
A Study on Mapping Digital Identities between EU and US
진승헌
한국정보기술학회 종합 학술 대회 (하계) 2024, pp.91-95 |
|
|
Conference
|
2023 |
Evolution of digital wallets and consideration of security threats
진승헌
한국정보보호학회 학술 대회 (하계) 2023, pp.1-4 |
|
|
Journal
|
2023 |
Facial Landmark, Head Pose, and Occlusion Analysis using Multitask Stacked Hourglass
Youngsam Kim
IEEE Access, v.11, pp.30970-30981 |
1 |
|
Conference
|
2022 |
Lightweight Signature-based Range Proof
Kwantae Cho
International Conference on Information and Communication Technology Convergence (ICTC) 2022, pp.1862-1865 |
1 |
|
Journal
|
2022 |
Review for ID management technology according to Metaverse phase
정수용
정보보호학회지, v.32, no.4, pp.49-59 |
|
|
Conference
|
2022 |
A Study on Metaverse Security Threats
진승헌
한국정보보호학회 학술 대회 (하계) 2022, pp.699-702 |
|
|
Conference
|
2021 |
Major Issues and Implications for 20 Years of Accredited Certificate
진승헌
한국정보기술학회 종합 학술 대회 (추계) 2021, pp.16-20 |
|
|
Conference
|
2021 |
LSFD: Lightweight Single Stage Masked Face Detector with a CPU Real-time Speed
Youngsam Kim
International Conference on Information and Communication Technology Convergence (ICTC) 2021, pp.1818-1822 |
1 |
|
Journal
|
2021 |
World Without Boundaries and Trends in User Authentication Technology
진승헌
전자통신동향분석, v.36, no.4, pp.135-144 |
|
|
Conference
|
2021 |
Analysis of Digital ID Management Technology Requirements for the Post-COVID-19 Er
진승헌
한국정보기술학회 종합 학술 대회 (하계) 2021, pp.24-28 |
|
|
Journal
|
2020 |
Trends of Digital Identity Technology
진승헌
주간기술동향, v.1975, pp.2-13 |
|
|
Journal
|
2020 |
Is Your Android App Insecure? Patching Security Functions With Dynamic Policy Based on a Java Reflection Technique
Sung-Hoon Lee
IEEE Access, v.8, pp.83248-83264 |
4 |
|
Journal
|
2019 |
Symmetric Keyring Encryption Scheme for Biometric Cryptosystem
Yen-Lung Lai
Information Sciences, v.502, pp.492-509 |
18 |
|
Journal
|
2019 |
Analysis of Blockchain-based Access Control Technology
김승현
전자통신동향분석, v.34, no.4, pp.117-128 |
|
|
Journal
|
2019 |
Fuzzy Vector Signature and Its Application to Privacy-Preserving Authentication
Minhye Seo
IEEE Access, v.7, pp.69892-69906 |
5 |
|
Journal
|
2019 |
A Study on Identity Management Technology Trend based Blockchain
김석현
OSIA S&TR Journal, v.32, no.1, pp.16-22 |
|
|
Conference
|
2019 |
Field Level Encryption Scheme of Customer Information Using Blockchain and Biometric Authentication
나윤석
한국통신학회 종합 학술 발표회 (동계) 2019, pp.727-728 |
|
|
Conference
|
2019 |
A Study on Blockchain Based Identity Management Systems
김석현
한국통신학회 종합 학술 발표회 (동계) 2019, pp.738-739 |
|
|
Conference
|
2018 |
Analysis of bitcoin network attack methods and countermeasures
나윤석
한국정보처리학회 학술 발표 대회 (추계) 2018, pp.189-192 |
|
|
Journal
|
2018 |
Detection of Spoofing Attacks in Face Recognition
이성훈
주간기술동향, v.1870, pp.17-26 |
|
|
Conference
|
2018 |
AppWrapper: Patching Security Functions with Dynamic Policy on Your Insecure Android Apps
Sung-Hoon Lee
International Symposium on Software Reliability Engineering Workshops (ISSREW) 2018, pp.36-41 |
2 |
|
Journal
|
2018 |
Context-Aware Multimodal FIDO Authenticator for Sustainable IT Services
Seung-Hyun Kim
Sustainability, v.10, no.5, pp.1-21 |
4 |
|
Journal
|
2018 |
Feature Subset for Improving Accuracy of Keystroke Dynamics on Mobile Environment
Sung-Hoon Lee
Journal of Information Processing Systems, v.14, no.2, pp.523-538 |
9 |
|
Conference
|
2018 |
Design of Aging-Resistant Wi-Fi Fingerprint-based Localization System with Continuous Active Learning
Youngsam Kim
International Conference on Advanced Communications Technology (ICACT) 2018, pp.1054-1059 |
3 |
|
Journal
|
2018 |
FIDO Universal Authentication System Based on Blockchain
김석현
전자통신동향분석, v.33, no.1, pp.34-44 |
|
|
Journal
|
2018 |
Ranking-Based Locality Sensitive Hashing-Enabled Cancelable Biometrics: Index-of-Max Hashing
Zhe Jin
IEEE Transactions on Information Forensics and Security, v.13, no.2, pp.393-407 |
163 |
|
Journal
|
2018 |
Trends in Implicit Continuous Authentication Technology
김승현
전자통신동향분석, v.33, no.1, pp.57-67 |
|
|
Conference
|
2017 |
Appwrapping Providing Fine-Grained Security Policy Enforcement Per Method Unit in Android
Sung-Hoon Lee
International Symposium on Software Reliability Engineering Workshops (ISSREW) 2017, pp.36-39 |
4 |
|
Journal
|
2017 |
Constructing a Privacy-Protecting Fingerprint-Template Based on a Combination of Encryption
김형균
한국정보기술학회논문지, v.15, no.10, pp.45-53 |
|
|
Journal
|
2017 |
FIDO 기술 표준화 동향
조상래
TTA Journal, v.172, pp.65-70 |
|
|
Journal
|
2017 |
Quality of Private Information (QoPI) Model for Effective Representation and Prediction of Privacy Controls in Mobile Computing
Seung-Hyun Kim
Computers & Security, v.66, pp.1-19 |
4 |
|
Journal
|
2017 |
모바일 보안 관리 기술 소개 및 동향
이성훈
주간기술동향, v.1791, pp.2-12 |
|
|
Conference
|
2017 |
A Study of Adaptive Feature Subset for Improving Accuracy of Keystroke Dynamics Authentication on Mobile Environment
이성훈
한국정보처리학회 학술 발표 대회 (춘계) 2017, pp.287-290 |
|
|
Conference
|
2017 |
Rethinking of Feature Selection Method for Room-Level Localization using Public APs
Youngsam Kim
International Conference on Advanced Communication Technology (ICACT) 2017, pp.24-28 |
4 |
|
Conference
|
2017 |
An Open Interactive Survey Platform to Collect and Analyse Users’ Privacy Decisions in Pervasive Computing Environments
Seung-Hyun Kim
International Conference on Advanced Communication Technology (ICACT) 2017, pp.744-750 |
0 |
|
Conference
|
2016 |
FIDO Authenticator that Support One-time Password Authentication Technology based on Visual Cryptography
김석현
한국정보보호학회 학술 대회 (동계) 2016, pp.1-4 |
|
|
Conference
|
2016 |
Efficient Fuzzy Key Extraction Method with Lighted Template
김형균
한국정보보호학회 학술 대회 (동계) 2016, pp.1-4 |
|
|
Conference
|
2016 |
A Study of App Wrapping for Repackaging Android Binary Application
이성훈
한국정보보호학회 학술 대회 (동계) 2016, pp.1-4 |
|
|
Journal
|
2016 |
Risk Analysis on Various Contextual Situations and Progressive Authentication Method based on Contextual-Situation-based Risk Degree on Android Devices
김지환
정보과학회논문지, v.43, no.10, pp.1154-1164 |
|
|
Conference
|
2016 |
Keystroke Dynamics for Authentication in Smartphone
Jong-hyuk Roh
International Conference on Information and Communication Technology Convergence (ICTC) 2016, pp.1155-1159 |
27 |
|
Conference
|
2016 |
A Study on Feature of Keystroke Dynamics for Improving Accuracy in Mobile Environment
Sung-Hoon Lee
World Conference on Information Security Applications (WISA) 2016 (LNCS 10144), v.10144, pp.1-10 |
2 |
|
Journal
|
2016 |
블록체인 기술 개념 및 적용 현황
김영삼
주간기술동향, pp.2-12 |
|
|
Journal
|
2016 |
핀테크 보안 기술 동향 : 상황 인지 기반 인증 기술
김승현
정보과학회지, v.34, no.4, pp.20-24 |
|
|
Journal
|
2016 |
FIDO 2.0 범용 인증 기술 소개
조상래
정보보호학회지, v.26, no.2, pp.14-19 |
|
|
Journal
|
2016 |
FIDO 표준 기술 동향
김수형
TTA Journal, v.164, pp.70-75 |
|
|
Journal
|
2016 |
Biometric Authentication Protocol Using Hidden Vector Key Encapsulation Mechanism
서민혜
정보보호학회논문지, v.26, no.1, pp.69-79 |
|
|
Conference
|
2016 |
General Authentication Scheme in User-Centric IdM
Seung-Hyun Kim
International Conference on Advanced Communication Technology (ICACT) 2016, pp.737-740 |
2 |
|
Journal
|
2015 |
Customer Data Scanner for Hands-Free Mobile Payment
SooHyung Kim
IEICE Transactions on Communications, v.E98-B, no.11, pp.2291-2299 |
0 |
|
Conference
|
2015 |
Anomaly Detection of Access Patterns in Database
Jong-hyuk Roh
International Conference on Information and Communication Technology Convergence (ICTC) 2015, pp.1115-1118 |
|
|
Conference
|
2015 |
FIDO UAF 1.0 Server Implementation
김석현
한국정보처리학회 학술 발표 대회 (추계) 2015, pp.620-623 |
|
|
Conference
|
2015 |
Accurate Indoor Proximity Zone Detection Based on Time Window and Frequency with Bluetooth Low Energy
Dae-Yeob Kim
International Conference on Mobile Systems and Pervasive Computing (MobiSPC) 2015, pp.88-95 |
|
|
Conference
|
2015 |
FIDO 1.0 Passcode Authenticator Implementation
조영섭
한국정보처리학회 학술 발표 대회 (추계) 2015, pp.598-601 |
|
|
Journal
|
2015 |
핀테크 시대 : 새로운 인증 기술을 요구하다
김수형
정보과학회지, v.33, no.5, pp.17-22 |
|
|
Conference
|
2014 |
Implementation of TouchSign Certificate Management System
조상래
대한전자공학회 종합 학술 대회 (하계) 2014, pp.598-601 |
|
|
Conference
|
2014 |
Implementation of TouchSign Online System
김수형
대한전자공학회 종합 학술 대회 (하계) 2014, pp.595-597 |
|
|
Conference
|
2014 |
The Research on iBeacon Technology Trend and Issue
김대엽
한국 컴퓨터 종합 학술 대회 2014, pp.390-392 |
|
|
Conference
|
2014 |
Implementation of TouchSign Offline Digital Signature System
조영섭
대한전자공학회 종합 학술 대회 (하계) 2014, pp.602-605 |
|
|
Journal
|
2013 |
Mobile Electronic Receipt
김수형
TTA Journal, v.146, pp.57-60 |
|
|
Journal
|
2011 |
ID 관리 기술 및 시장 동향
조영섭
정보보호학회지, v.21, no.4, pp.62-68 |
|
|
Conference
|
2010 |
Shoulder-Surfing Resistant User Authentication Method Based on PIN and Pattern Image
김영삼
한국정보처리학회 학술 대회 (추계) 2010, pp.1138-1141 |
|
|
Conference
|
2008 |
A Method for User Authentication using One-time Identification Information and Mobile Device
정관수
한국통신학회 종합 학술 발표회 (추계) 2008, pp.691-694 |
|
|
Conference
|
2008 |
Mobile Digital Identity Wallet
김수형
한국정보처리학회 학술 발표 대회 (추계) 2008, pp.1489-1492 |
|
|
Conference
|
2008 |
Personalized Identity Agent for User-Centric IdM
Seung-Hyun Kim
International Conference on Advanced Communication Technology (ICACT) 2008, pp.1308-1313 |
2 |
|
Conference
|
2008 |
Context-Aware Service System Architecture based on Identity Interchange Layer
Soo-Hyung Kim
International Conference on Advanced Communication Technology (ICACT) 2008, pp.1482-1486 |
1 |
|
Journal
|
2007 |
Technologies for Identity Metasystem
김수형
전자통신동향분석, v.22, no.3, pp.144-153 |
|
|
Conference
|
2005 |
Design of Integration Security System using XML Security
Juhan Kim
ICIT 2005, pp.1-5 |
|
|
Journal
|
2005 |
Standardization and Market Trends of Web Services Security Technologies
김주한
전자통신동향분석, v.20, no.1, pp.43-53 |
|
|
Conference
|
2004 |
An Implementation of Mobile Business Application Server
장철수
한국정보과학회 학술 발표 (봄) 2004, pp.718-720 |
|
|
Conference
|
2004 |
Design and Implementation of security service framework for mobile adaptation system
김수형
한국정보과학회 학술 발표 (봄) 2004, pp.319-321 |
|
|
Conference
|
2003 |
Design and Implementation of Security Framework for Application Server
김수형
한국정보처리학회 학술 발표 대회 (추계) 2003, pp.1157-1160 |
|
|
Conference
|
2003 |
An implementation of the transcorder for wireless contents using Meta-markup Language
노명찬
한국정보과학회 학술 발표 (가을) 2003, pp.193-195 |
|
|
Conference
|
2003 |
Design and Implementation of user management system for mobile application server
김수형
한국정보과학회 학술 발표 (가을) 2003, pp.196-198 |
|
|
Conference
|
2003 |
An Implementation of the Clustering Environment for the Mobile Application Server
장철수
한국정보과학회 학술 발표 (가을) 2003, pp.178-180 |
|
|
Conference
|
2003 |
A Study of Multicast Security in Clustered EJB Server
김수형
한국정보과학회 학술 발표 (봄) 2003, pp.293-295 |
|
|
Conference
|
2002 |
A Study on the Multicast Framework for the Clustered EJB Server
김수형
한국정보처리학회 학술 발표 대회 (추계) 2002, pp.2235-2238 |
|
|
Conference
|
2002 |
The Security Management Architecture for E504 EJB Container System
서범수
한국정보과학회 학술 발표 (가을) 2002, pp.190-192 |
|
|
Conference
|
2002 |
A Study and a Design of Mobile Application Sewer Security Framework
김수형
한국정보과학회 학술 발표 (가을) 2002, pp.556-558 |
|
|