Conference
|
2024 |
Security Analysis and Countermeasure of Post Quantum based Authentication Protocol in IoT Environment
이준영
한국통신학회 종합 학술 발표회 (하계) 2024, pp.1972-1973 |
|
|
Journal
|
2024 |
Toffoli-depth reduction method preserving in-place quantum circuits and its application to SHA3-256
Jongheon Lee
Quantum Information Processing, v.23, pp.1-43 |
1 |
|
Conference
|
2023 |
Research on quantum circuit design for multiplicative inversion in finite field
이유석
한국정보보호학회 학술 대회 (동계) 2023, pp.1-4 |
|
|
Conference
|
2023 |
Cryptanalysis and Countermeasures of the Recent Authentication and Key Agreement Scheme for Internet of Drones
Sungjin Yu
International Conference on Information and Communication Technology Convergence (ICTC) 2023, pp.1419-1422 |
2 |
|
Journal
|
2023 |
MPMCT gate decomposition method reducing T-depth quickly in proportion to the number of work qubits
Jongheon Lee
Quantum Information Processing, v.22, pp.1-31 |
2 |
|
Conference
|
2023 |
Client-centric on-demand remote profile provisioning technique for M2M IoT Devices
Boheung Chung
International Conference on Information and Communication Technology Convergence (ICTC) 2023, pp.1-3 |
0 |
|
Journal
|
2021 |
Convolutional Neural Network-based Intrusion Detection System for AVTP Streams in Automotive Ethernet-based Networks
Seonghoon Jeong
Vehicular Communications, v.29, pp.1-11 |
47 |
|
Conference
|
2020 |
A study on the Lightweight Intrusion Detection for Automotive Ethernet based Multi-domian In-Vehicle Network
전부선
전자 정보 통신 학술 대회 (CEIC) 2020, pp.1-4 |
|
|
Conference
|
2020 |
Design and Implementation of Packet Filtering Module for Vehicular Multi-domain Network
Joongyong Choi
International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.1070-1072 |
0 |
|
Conference
|
2020 |
Study for Recovering Crypto Key Mismatch of In-Vehicle Network DTLS
Daewon Kim
International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.992-994 |
1 |
|
Journal
|
2020 |
Secure Key Agreement and Authentication Protocol for Message Confirmation in Vehicular Cloud Computing
JoonYoung Lee
Applied Sciences, v.10, no.18, pp.1-20 |
12 |
|
Conference
|
2020 |
Implementation of Secure On-board Communication using an AUTOSAR based Automotive Gateway
주홍일
대한전자공학회 학술 대회 (하계) 2020, pp.1483-1485 |
|
|
Journal
|
2020 |
Internation standardization trend on vehicular communication and ITS security in ITU-T SG17
이상우
정보보호학회지, v.30, no.4, pp.23-27 |
|
|
Journal
|
2020 |
A Secure and Efficient Three-Factor Authentication Protocol in Global Mobility Networks
SungJin Yu
Applied Sciences, v.10, no.10, pp.1-23 |
20 |
|
Journal
|
2020 |
Privacy-Preserving Lightweight Authentication Protocol for Demand Response Management in Smart Grid Environment
SungJin Yu
Applied Sciences, v.10, no.5, pp.1-26 |
34 |
|
Conference
|
2019 |
Study on Lightweight Control-Mechanism of Message Traffic based on Automotive Ethernet Gateway
최중용
전자 정보 통신 학술 대회 (CEIC) 2019, pp.1-4 |
|
|
Conference
|
2019 |
Study for Securing In-Vehicle Network Communication Based on Hardware Security Module
김대원
한국스마트미디어학회 학술 대회 (추계) 2019, pp.199-202 |
|
|
Conference
|
2019 |
Security Considerations for In-Vehicle Secure Communication
Hongil Ju
International Conference on Information and Communication Technology Convergence (ICTC) 2019, pp.1404-1406 |
11 |
|
Conference
|
2019 |
A Study on Traffic Characteristics for Anomaly Detection of Ethernet-based IVN
Boosun Jeon
International Conference on Information and Communication Technology Convergence (ICTC) 2019, pp.951-953 |
8 |
|
Journal
|
2019 |
A Secure Charging System for Electric Vehicles Based on Blockchain
Myeong Hyun Kim
Sensors, v.19, no.13, pp.1-22 |
58 |
|
Journal
|
2019 |
Trend of international standardization on vehicular commounication and ITS
이상우
정보보호학회지, v.29, no.1, pp.8-12 |
|
|
Conference
|
2018 |
A Study of the Automotive Ethernet and Anomaly Detection System
전부선
전자 정보 통신 학술 대회 (CEIC) 2018, pp.1-3 |
|
|
Conference
|
2018 |
An Access Control Method for Vehicle Management System
Daewon Kim
International Conference on Information and Communication Technology Convergence (ICTC) 2018, pp.949-952 |
5 |
|
Journal
|
2018 |
Trends in Automotive Ethernet Security Technology
정보흥
전자통신동향분석, v.33, no.5, pp.76-85 |
|
|
Conference
|
2016 |
On-demand Security Configuration for IoT Devices
Boheung Chung
International Conference on Information and Communication Technology Convergence (ICTC) 2016, pp.1082-1084 |
18 |
|
Conference
|
2015 |
Dynamic Permission Re-Enforcement Technique for Protecting Application from Others with Over-Privileged Permission at Run Time
Boheung Chung
International Conference on Security Technology (SecTech) 2015, pp.13-16 |
1 |
|
Conference
|
2014 |
User-Defined Privilege Restriction Mechanism for Secure Execution Environments on Android
Boheung Chung
International Conference on Information and Communication Technology Convergence (ICTC) 2014, pp.815-816 |
1 |
|
Journal
|
2013 |
A Survey of Mobile Malware Detection Techniques
문화신
전자통신동향분석, v.28, no.3, pp.39-46 |
|
|
Journal
|
2012 |
The Study on the Cyber Security Requirements of Cyber-Physical Systems for Cyber Security Frameworks
박수열
대한임베디드공학회논문지, v.7, no.5, pp.255-265 |
|
|
Journal
|
2011 |
SecurityTechnologyforDDS
정보흥
전자통신동향분석, v.26, no.5, pp.112-122 |
|
|
Journal
|
2011 |
Prohibiting Internal Data Leakage to Mass Storage Device in Mobile Device
정보흥
정보보호학회논문지, v.21, no.1, pp.125-133 |
|
|
Conference
|
2010 |
Sample Bytes to Protect Important Data from Unintentional Transmission in Advanced Embedded Device
Bo-Heung Chung
International Conferences on Security Technology (SecTech) 2010 / Disaster Recovery and Business Continuity (DRBC) 2010 (CCIS 122), v.122, pp.68-73 |
0 |
|
Conference
|
2009 |
Hardware Based Data Inspection for USB Data Leakage Prevention
Dong Ho Kang
Communications in Computer and Information Science (CCIS) 2009, pp.57-63 |
1 |
|
Conference
|
2009 |
The Design of Signature Selection for Protecting Illegal Outflow of Sensitive Information in Mobile Device
Bo Heung Chung
Communications in Computer and Information Science (CCIS) 2009, pp.51-56 |
0 |
|
Conference
|
2009 |
USB Data Leakage Prevention Using Hardware based Data Inspection Technique
Dong Ho Kang
International Conference on Security and Management (SAM) 2009, pp.1-5 |
|
|
Conference
|
2008 |
Just-on-Time Data Leakage Protection for Mobile Devices
Bo-Heung Chung
International Conference on Advanced Communication Technology (ICACT) 2008, pp.1914-1915 |
2 |
|
Conference
|
2008 |
Protection Profile for Security Enhancement of Embedded Operating System for Mobile Terminals
Youn Seo Jeong
International Conference on Advanced Communication Technology (ICACT) 2008, pp.1908-1911 |
2 |
|
Conference
|
2007 |
Processing of Multi-pattern Signature in Intrusion Detection System with Content Processor
Young-Ho Kim
International Conference on Information, Communications and Signal Processing (ICICS) 2007, pp.1-4 |
1 |
|
Conference
|
2007 |
Implementation of Multi-thread based Intrusion Prevention System for IPv6
Jae-Deok Lim
International Conference on Control, Automation and Systems (ICCAS) 2007, pp.404-407 |
5 |
|
Journal
|
2007 |
An Analysis of Security Threat and Network Attack in IPv6
정보흥
전자통신동향분석, v.22, no.1, pp.37-50 |
|
|
Conference
|
2006 |
Evaluation of Internet Worms Propagation in IPv6 Network
Hwan Kuk Kim
International Conference on Hybrid Information Technology (ICHIT) 2006 (LNCS 4413), v.4413, pp.1-9 |
|
|
Journal
|
2006 |
IPv6 침입 탐지 및 차단 기술
김기영
정보통신 : 한국통신학회지, v.23, no.9, pp.65-74 |
|
|
Conference
|
2006 |
Incorporating Intrusion Detection Functionality into 1XP2800 Network Processor based Router
Seung Ho Ryu
International Conference on Advanced Communication Technology (ICACT) 2006, pp.797-800 |
1 |
|
Conference
|
2006 |
Fragment Packet Partial Re-assembly Method for Intrusion Detection
Bo Heung Chung
International Conference on Advanced Communication Technology (ICACT) 2006, pp.120-122 |
0 |
|
Conference
|
2005 |
IXP2800 네트워크 프로세서 기반 침입 탐지 기능 개발
류승호
차세대 통신 소프트웨어 학술 대회 (NCS) 2005, pp.3-6 |
|
|
Conference
|
2005 |
Kernel-level Intrusion Detection Method Using Simplification and Grouping
Bo-Heung Chung
International Conference on Advanced Communication Technology (ICACT) 2005, pp.251-254 |
|
|
Journal
|
2004 |
라우터 보안 기술 동향
정보흥
주간기술동향, pp.1-12 |
|
|
Conference
|
2004 |
Kernel-level Intrusion Detection System for Minimum Packet Loss
Bo Heung Chung
International Conference on Advanced Communication Technology (ICACT) 2004, pp.207-212 |
|
|
Conference
|
2002 |
Design of Dynamic Intrusion Detection Rule Modification Technique for Kernel Level Intrusion Detection
정보흥
한국정보처리학회 학술 발표 대회 (추계) 2002, pp.1031-1034 |
|
|