Type | Year | Title | Cited | Download |
---|---|---|---|---|
Conference
|
2024 | Physical Qubits Estimation for Quantum S-box You-Seok Lee International Conference on Information and Communication Technology Convergence (ICTC) 2024, pp.1369-1370 | ||
Conference
|
2024 | Security Analysis and Countermeasure of Post Quantum based Authentication Protocol in IoT Environment 이준영 한국통신학회 종합 학술 발표회 (하계) 2024, pp.1972-1973 | ||
Journal
|
2024 | Toffoli-depth reduction method preserving in-place quantum circuits and its application to SHA3-256 Jongheon Lee Quantum Information Processing, v.23, pp.1-43 | 1 | |
Conference
|
2023 | Research on quantum circuit design for multiplicative inversion in finite field 이유석 한국정보보호학회 학술 대회 (동계) 2023, pp.1-4 | ||
Conference
|
2023 | Cryptanalysis and Countermeasures of the Recent Authentication and Key Agreement Scheme for Internet of Drones Sungjin Yu International Conference on Information and Communication Technology Convergence (ICTC) 2023, pp.1419-1422 | 2 | |
Journal
|
2023 | MPMCT gate decomposition method reducing T-depth quickly in proportion to the number of work qubits Jongheon Lee Quantum Information Processing, v.22, pp.1-31 | 3 | |
Conference
|
2023 | Client-centric on-demand remote profile provisioning technique for M2M IoT Devices Boheung Chung International Conference on Information and Communication Technology Convergence (ICTC) 2023, pp.1-3 | 0 | |
Journal
|
2021 | Convolutional Neural Network-based Intrusion Detection System for AVTP Streams in Automotive Ethernet-based Networks Seonghoon Jeong Vehicular Communications, v.29, pp.1-11 | 49 | |
Conference
|
2020 | A study on the Lightweight Intrusion Detection for Automotive Ethernet based Multi-domian In-Vehicle Network 전부선 전자 정보 통신 학술 대회 (CEIC) 2020, pp.1-4 | ||
Conference
|
2020 | Study for Recovering Crypto Key Mismatch of In-Vehicle Network DTLS Daewon Kim International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.992-994 | 1 | |
Conference
|
2020 | Design and Implementation of Packet Filtering Module for Vehicular Multi-domain Network Joongyong Choi International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.1070-1072 | 0 | |
Journal
|
2020 | Secure Key Agreement and Authentication Protocol for Message Confirmation in Vehicular Cloud Computing JoonYoung Lee Applied Sciences, v.10, no.18, pp.1-20 | 13 | |
Conference
|
2020 | Implementation of Secure On-board Communication using an AUTOSAR based Automotive Gateway 주홍일 대한전자공학회 학술 대회 (하계) 2020, pp.1483-1485 | ||
Journal
|
2020 | Internation standardization trend on vehicular communication and ITS security in ITU-T SG17 이상우 정보보호학회지, v.30, no.4, pp.23-27 | ||
Journal
|
2020 | A Secure and Efficient Three-Factor Authentication Protocol in Global Mobility Networks SungJin Yu Applied Sciences, v.10, no.10, pp.1-23 | 22 | |
Journal
|
2020 | Privacy-Preserving Lightweight Authentication Protocol for Demand Response Management in Smart Grid Environment SungJin Yu Applied Sciences, v.10, no.5, pp.1-26 | 35 | |
Conference
|
2019 | Study on Lightweight Control-Mechanism of Message Traffic based on Automotive Ethernet Gateway 최중용 전자 정보 통신 학술 대회 (CEIC) 2019, pp.1-4 | ||
Conference
|
2019 | Study for Securing In-Vehicle Network Communication Based on Hardware Security Module 김대원 한국스마트미디어학회 학술 대회 (추계) 2019, pp.199-202 | ||
Conference
|
2019 | Security Considerations for In-Vehicle Secure Communication Hongil Ju International Conference on Information and Communication Technology Convergence (ICTC) 2019, pp.1404-1406 | 13 | |
Conference
|
2019 | A Study on Traffic Characteristics for Anomaly Detection of Ethernet-based IVN Boosun Jeon International Conference on Information and Communication Technology Convergence (ICTC) 2019, pp.951-953 | 9 | |
Journal
|
2019 | A Secure Charging System for Electric Vehicles Based on Blockchain Myeong Hyun Kim Sensors, v.19, no.13, pp.1-22 | 60 | |
Journal
|
2019 | Trend of international standardization on vehicular commounication and ITS 이상우 정보보호학회지, v.29, no.1, pp.8-12 | ||
Conference
|
2018 | A Study of the Automotive Ethernet and Anomaly Detection System 전부선 전자 정보 통신 학술 대회 (CEIC) 2018, pp.1-3 | ||
Journal
|
2018 | Trends in Automotive Ethernet Security Technology 정보흥 전자통신동향분석, v.33, no.5, pp.76-85 | ||
Conference
|
2018 | An Access Control Method for Vehicle Management System Daewon Kim International Conference on Information and Communication Technology Convergence (ICTC) 2018, pp.949-952 | 5 | |
Conference
|
2016 | On-demand Security Configuration for IoT Devices Boheung Chung International Conference on Information and Communication Technology Convergence (ICTC) 2016, pp.1082-1084 | 18 | |
Conference
|
2015 | Dynamic Permission Re-Enforcement Technique for Protecting Application from Others with Over-Privileged Permission at Run Time Boheung Chung International Conference on Security Technology (SecTech) 2015, pp.13-16 | 1 | |
Conference
|
2014 | User-Defined Privilege Restriction Mechanism for Secure Execution Environments on Android Boheung Chung International Conference on Information and Communication Technology Convergence (ICTC) 2014, pp.815-816 | 1 | |
Journal
|
2013 | A Survey of Mobile Malware Detection Techniques 문화신 전자통신동향분석, v.28, no.3, pp.39-46 | ||
Journal
|
2012 | The Study on the Cyber Security Requirements of Cyber-Physical Systems for Cyber Security Frameworks 박수열 대한임베디드공학회논문지, v.7, no.5, pp.255-265 | ||
Journal
|
2011 | SecurityTechnologyforDDS 정보흥 전자통신동향분석, v.26, no.5, pp.112-122 | ||
Journal
|
2011 | Prohibiting Internal Data Leakage to Mass Storage Device in Mobile Device 정보흥 정보보호학회논문지, v.21, no.1, pp.125-133 | ||
Conference
|
2010 | Sample Bytes to Protect Important Data from Unintentional Transmission in Advanced Embedded Device Bo-Heung Chung International Conferences on Security Technology (SecTech) 2010 / Disaster Recovery and Business Continuity (DRBC) 2010 (CCIS 122), v.122, pp.68-73 | 0 | |
Conference
|
2009 | Hardware Based Data Inspection for USB Data Leakage Prevention Dong Ho Kang Communications in Computer and Information Science (CCIS) 2009, pp.57-63 | 1 | |
Conference
|
2009 | The Design of Signature Selection for Protecting Illegal Outflow of Sensitive Information in Mobile Device Bo Heung Chung Communications in Computer and Information Science (CCIS) 2009, pp.51-56 | 0 | |
Conference
|
2009 | USB Data Leakage Prevention Using Hardware based Data Inspection Technique Dong Ho Kang International Conference on Security and Management (SAM) 2009, pp.1-5 | ||
Conference
|
2008 | Just-on-Time Data Leakage Protection for Mobile Devices Bo-Heung Chung International Conference on Advanced Communication Technology (ICACT) 2008, pp.1914-1915 | 2 | |
Conference
|
2008 | Protection Profile for Security Enhancement of Embedded Operating System for Mobile Terminals Youn Seo Jeong International Conference on Advanced Communication Technology (ICACT) 2008, pp.1908-1911 | 2 | |
Conference
|
2007 | Processing of Multi-pattern Signature in Intrusion Detection System with Content Processor Young-Ho Kim International Conference on Information, Communications and Signal Processing (ICICS) 2007, pp.1-4 | 1 | |
Conference
|
2007 | Implementation of Multi-thread based Intrusion Prevention System for IPv6 Jae-Deok Lim International Conference on Control, Automation and Systems (ICCAS) 2007, pp.404-407 | 5 | |
Journal
|
2007 | An Analysis of Security Threat and Network Attack in IPv6 정보흥 전자통신동향분석, v.22, no.1, pp.37-50 | ||
Conference
|
2006 | Evaluation of Internet Worms Propagation in IPv6 Network Hwan Kuk Kim International Conference on Hybrid Information Technology (ICHIT) 2006 (LNCS 4413), v.4413, pp.1-9 | ||
Journal
|
2006 | IPv6 침입 탐지 및 차단 기술 김기영 정보통신 : 한국통신학회지, v.23, no.9, pp.65-74 | ||
Conference
|
2006 | Incorporating Intrusion Detection Functionality into 1XP2800 Network Processor based Router Seung Ho Ryu International Conference on Advanced Communication Technology (ICACT) 2006, pp.797-800 | 1 | |
Conference
|
2006 | Fragment Packet Partial Re-assembly Method for Intrusion Detection Bo Heung Chung International Conference on Advanced Communication Technology (ICACT) 2006, pp.120-122 | 0 | |
Conference
|
2005 | IXP2800 네트워크 프로세서 기반 침입 탐지 기능 개발 류승호 차세대 통신 소프트웨어 학술 대회 (NCS) 2005, pp.3-6 | ||
Conference
|
2005 | Kernel-level Intrusion Detection Method Using Simplification and Grouping Bo-Heung Chung International Conference on Advanced Communication Technology (ICACT) 2005, pp.251-254 | ||
Journal
|
2004 | 라우터 보안 기술 동향 정보흥 주간기술동향, v.1154, pp.1-12 | ||
Conference
|
2004 | Kernel-level Intrusion Detection System for Minimum Packet Loss Bo Heung Chung International Conference on Advanced Communication Technology (ICACT) 2004, pp.207-212 | ||
Conference
|
2002 | Design of Dynamic Intrusion Detection Rule Modification Technique for Kernel Level Intrusion Detection 정보흥 한국정보처리학회 학술 발표 대회 (추계) 2002, pp.1031-1034 |