ETRI-Knowledge Sharing Plaform

KOREAN

Researchers

연구자 검색
Keyword

Detail

사진

Kwon Hyeok Chan
Department
AI Data Security Research Section
Contact
KSP Keywords
논문 검색결과
Type Year Title Cited Download
Journal
2023 Technology Trends in Biometric Cryptosystem Based on Electrocardiogram Signals   정병호   전자통신동향분석, v.38, no.5, pp.61-70
Conference
2022 Non-invasive Intrusion Prevention System against Ransomware in Healthcare   Hyeokchan Kwon   International Conference on Internet (ICONI) 2022, pp.287-288
Conference
2022 A Behavior-similarity Measurement Scheme for Anomaly Detection in IoT Device Networks   Byungho Chung   International Conference on Internet (ICONI) 2022, pp.295-296
Journal
2021 ECG Authentication Based on Non-Linear Normalization under Various Physiological Conditions   Ho Bin Hwang  Sensors, v.21, no.21, pp.1-19 12
Journal
2021 Security Technology Trends to Prevent Medical Device Hacking and Ransomware   권혁찬   전자통신동향분석, v.36, no.5, pp.21-31
Conference
2020 Analysis of bio-signal-based bio-crypto technology trends and service scenarios   권혁찬   전자 정보 통신 학술 대회 (CEIC) 2020, pp.1-4
Conference
2020 Anomaly detection of Ransomware behaviors based on Random Forest and LSTM in the medical devices network environment   정병호   전자 정보 통신 학술 대회 (CEIC) 2020, pp.1-3
Journal
2019 Standardization Trend of Autonomous Vehicle Security   권혁찬   TTA Journal, v.186, pp.55-64
Journal
2019 Security trend and issue of connected medical device   권혁찬   주간기술동향, v.1911, pp.14-26
Journal
2018 Standardization trend on ITS security   이상우   정보보호학회지, v.28, no.4, pp.25-28
Conference
2018 Design and Implementation on the Socket-based Access Control Scheme against V2N-connected Vehicle Attacks   정병호   한국통신학회 종합 학술 발표회 (동계) 2018, pp.1124-1125
Conference
2017 In-vehicle Network Access Control Mechanism based on Token   권혁찬   전자 정보 통신 학술 대회 (CEIC) 2017, pp.227-228
Conference
2017 Security Architecture Design for the Safe Vehicle-to-Nomadic Device(V2N) Service   이석준   전자 정보 통신 학술 대회 (CEIC) 2017, pp.223-226
Conference
2017 Secure Number Theoretic Transform and Speed Record for Ring-LWE Encryption on Embedded Processors   Hwajeong Seo  International Conference on Information Security and Cryptology (ICISC) 2017, pp.37-50 3
Conference
2017 Security Architecture Design for the Safe Vehicle-to-Nomadic Device(V2N) Service   Sokjoon Lee   The IRES International Conference on Innovative Engineering Technologies (ICIET) 2017, pp.10-13
Journal
2017 Smart Car Trends and Security Issues from a Connectivity Perspective   권혁찬   정보와 통신 : 한국통신학회지, v.34, no.10, pp.17-23
Journal
2017 ITU-T SG17에서의 ITS 보안 기술 표준화 동향   이상우   정보보호학회지, v.27, no.5, pp.21-25
Journal
2017 Standardization Issues on Secure Vehicular Communication   SANG-WOO LEE   International Journal of Communications, v.2, pp.19-23
Conference
2016 Wi-Fi Fingerprint-based Approach to Securing the Connected Vehicle against Wireless Attack   Hyeokchan Kwon   International Conference on Networks and Communications (NETCOM) 2016, pp.1-7
Conference
2016 Group Signature-based Vehicular PKI without Thousands of Pseudonym Certificates   Sokjoon Lee   International Conference on Computer Engineering and Information Technology (ICCEIT) 2016, pp.25-28
Conference
2016 The study on structure of Agent for protecting IEEE 11073:20601 Transport Layer   정도영   한국스마트미디어학회/한국전자거래학회 학술 대회 (춘계) 2016, pp.367-370
Conference
2016 IEEE 11073-20601 Security Protocol Design Requirements for Smart Healthcare Device   이석준   한국스마트미디어학회/한국전자거래학회 학술 대회 (춘계) 2016, pp.363-366
Journal
2015 클라우드 보안 개요   권혁찬   정보와 통신 : 한국통신학회지, v.32, no.10, pp.71-76
Conference
2015 Detection of Rogue Devices in WLAN by Analyzing RF Features and Indoor Location of the Device   Hyeokchan Kwon   International Workshop on Information Security Applications (WISA) 2015 (LNCS 9503), v.9503, pp.54-61 0
Journal
2015 차세대 IoT 네트워크 보안 현황   권혁찬   정보처리학회지, v.22, no.2, pp.39-46
Conference
2015 A Content Access Control Mechanism Through Indoor Location Estimation Based on WLAN   권혁찬   한국통신학회 종합 학술 발표회 (동계) 2015, pp.1187-1188
Conference
2014 Analysis of EVM and RSS for detecting Rogue AP in WLAN   안개일   한국정보과학회 학술 발표회 (동계) 2014, pp.724-726
Conference
2014 Detecting Cloned Devices in Wireless Network using RSSI and RF Features   Hyeokchan Kwon   International Conference on Internet (ICONI) 2014, pp.1-4
Conference
2014 Location-Based Rogue Device Detection Mechanism   권혁찬   한국정보보호학회 충청 지부 학술 대회 2014, pp.1-3
Conference
2014 Mobile Device Management Scheme using Wireless Intrusion Information   권혁찬   한국정보보호학회 학술 대회 (하계) 2014, pp.1-4
Conference
2014 EVM Analysis for MAC Identification of Wireless Device in WLAN Environment   안개일   통신 정보 합동 학술 대회 (JCCI) 2014, pp.1-2
Journal
2013 Improving Mobile Device Classification Using Security Events for Preventing Wireless Intrusion   Hyeokchan Kwon   International Journal of Security and Its Applications, v.7, no.6, pp.181-190 1
Conference
2013 A Mobile Device Classification Mechanism for Efficient Prevention of Wireless Intrusion   Hyeokchan Kwon   International Conference on Information Science and Industrial Applications (ISI) 2013, pp.317-321
Journal
2013 Technologies for Next Generation Wireless LAN Security   김신효   전자통신동향분석, v.28, no.1, pp.100-109
Conference
2012 Efficient Mobile Device Management Scheme Using Security Events from Wireless Intrusion Prevention System   Hyeokchan Kwon   International Conference on Ubiquitous Information Technologies and Applications (CUTE) 2012 (LNEE 214), v.214, pp.815-822 3
Journal
2012 아동 보호를 위한 동영상 콘텐츠 정보 보호 경량 기법   나재훈   정보보호학회지, v.22, no.3, pp.41-47
Journal
2012 스마트 미디어 시대의 콘텐츠 보호 기술 동향   이승민   주간기술동향, pp.11-21
Conference
2011 Privacy-Preserving PKI Design Based on Group Signature   Sokjoon Lee   Australian Information Security Management Conference (AISM) 2011, pp.155-164
Conference
2011 Multi-level Video Protection Scheme with Format Compliance for H.264/SVC   Hyeok Chan Kwon   International Conference on Instrumentation, Measurement, Circuits and Systems (ICIMCS) 2011, pp.1-4
Conference
2011 Security Policy Model for Secure Transcodable Mechanism   문용혁   한국정보처리학회 학술 발표 (추계) 2011, pp.958-959
Conference
2011 Smart Media Service using Secure Virtual Machine   Yong-Hyuk Moon   International Conference on Information and Communication Technology Convergence (ICTC) 2011, pp.742-743 0
Conference
2011 Consideration of Anonymous Certificate based on Group Signature for User Privacy   이석준   한국통신학회 종합 학술 발표회 (하계) 2011, pp.671-672
Journal
2011 echanism using Hybrid-based Method for SVC Media Transmission   권혁찬   정보보안논문지, v.11, no.3, pp.47-54
Conference
2011 A Platform-Independent Smart Content Sharing Model   문용혁   한국정보처리학회 학술 발표 (춘계) 2011, pp.224-225
Conference
2011 Analysis on Size-Interval Based Dispatching System for Multi-Class Job Model   문용혁   한국정보처리학회 학술 발표 (춘계) 2011, pp.163-164
Conference
2009 Protecting IPTV Service Network against Malicious Rendezvous Point   Hyeok Chan Kwon   Information Security Applications (WISA) 2009 (LNCS 5932), v.5932, pp.1-9 1
Conference
2009 A Scalable Security Service Model for Reliable End-to-End Media Distribution and Reuse   Yong Hyuk Moon   Joint Workshop on Information Security (JWIS) 2009, pp.1-11
Conference
2009 Designing Pastry-based Secure IPTV Video Delivery Network   Hyeok Chan Kwon   Joint Workshop on Information Security (JWIS) 2009, pp.1-9
Conference
2009 Protecting IPTV Service Network against Malicious Rendezvous Point   Hyeok Chan Kwon   International Workshop on Information Security Applications (WISA) 2009 (LNCS 5932), v.5932, pp.1-9 1
Conference
2009 Postcompression-based Scalable Media Encryption   권혁찬   한국통신학회 통신 소프트웨어 학술 대회 (COMSW) 2009, pp.1-3
Conference
2009 Secure Media Streaming Network based on Pastry   권혁찬   한국정보보호학회 학술 대회 (하계) 2009, pp.1-4
Conference
2009 Secure Overlay Multicast Infrastructure for P2P-based IPTV Service   Hyeok Chan Kwon   International Conference on Advanced Communication Technology (ICACT) 2009, pp.2041-2043
Conference
2008 Security Considerations for P2P-based Media Streaming   권혁찬   한국정보처리학회 학술 발표 대회 (추계) 2008, pp.1441-1443
Journal
2008 Designing Reliable P2P Transmission Mechanism Against MITM Attack   김상춘  정보보호학회논문지, v.18, no.4, pp.103-109
Journal
2008 Random Visitor: Defense against Identity Attacks in P2P Networks   Ja Beom Gu   IEICE Transactions on Information and Systems, v.E91-D, no.4, pp.1058-1073 1
Conference
2008 The Secure Routing Mechanism for DHT-based Overlay Network   Hyeok Chan Kwon   International Conference on Advanced Communication Technology (ICACT) 2008, pp.1300-1303 2
Conference
2007 Reliable Public Key Distribution Method for Dynamic Peer to Peer Network   Hyeok Chan Kwon   Joint Workshop on Information Security (JWIS) 2007, pp.1-10
Conference
2007 Designing Reliable P2P File Sharing Application without PKI   Sang Choon Kim  World Conference on Information Security Applications (WISA) 2007, pp.1-9
Journal
2007 P2P 사용자 인증과 OTP 분석   문용혁   정보보호학회지, v.17, no.3, pp.32-40
Conference
2007 Public Key Management Framework for Two-tier Super Peer Architecture   Hyeok Chan Kwon   International Conference on Distributed Computing Systems Workshops (ICDCSW) 2007, pp.1-6 4
Conference
2007 Performance Prediction in Peer-to-Peer MultiAgent Networks   Ja Beom Gu   International Workshop on Agents and Peer-to-Peer Computing (AP2PC) 2007 (LNCS 5319), v.5319, pp.27-40 0
Journal
2007 Standardization and Technology Trend of Peer-to-Peer Communication   권혁찬   전자통신동향분석, v.22, no.1, pp.11-23
Conference
2006 Secure Message Delivery Mechanism on Structured Overlay Network   Jae Hoon Nah   Joint Workshop on Information Security (JWIS) 2006, pp.1-8
Journal
2006 P2P 관련 국제 표준화 동향   고선기   주간기술동향, pp.1-7
Conference
2006 A Protocol Switching Scheme for Developing Network Management Applications   Hyeok Chan Kwon   International Conference on Information Networking (ICOIN) 2006 (LNCS 3961), v.3961, pp.862-872 0
Conference
2006 A Protocol Switching Scheme for Developing Network Management Applications   Hyeok Chan Kwon   International Conference on Information Networking (ICOIN) 2006 (LNCS 3961), v.3961, pp.862-872 0
Journal
2005 DHT(Distributed Hash Table) 기반 P2P 오버레이 네트워크 보안 위협 분석   권혁찬   정보보호학회지, v.15, no.6, pp.60-67
Journal
2005 IPv6 환경에서 이동성 보안 프로토콜의 제고   권혁찬   정보보호학회지, v.15, no.3, pp.29-39
Conference
2004 The VPN Gateway Supporting Mobile Device   권혁찬   한국정보과학회 학술 발표 (가을) 2004, pp.364-366
Journal
2004 Mobile IPv6 표준화 및 기술 동향   권혁찬   주간기술동향, pp.1-8
Conference
2003 A Security Packet Analyzer in IPv4/IPv6 network   권혁찬   한국정보처리학회 학술 발표 대회 (춘계) 2003, pp.1353-1356
Conference
2002 Design and Implementation of IP Security Packet Analyzer   권혁찬   대한전자공학회 종합 학술 대회 (추계) 2002 : 컴퓨터/반도체 소사이어티, pp.175-178
Journal
2002 A Design and Implementation of A Rule-based Security Evaluation System for W Security Engine   권혁찬   정보처리학회논문지 C, v.9C, no.3, pp.367-374
Conference
2002 A Design and Implementation of Rule Based Security Evaluation System.   권혁찬   통신 정보 합동 학술 대회 (JCCI) 2002, pp.86-86
Conference
2001 Design of the Rule Based Protocol Security Evaluation System for Internet Secure Service   현정식   한국정보처리학회 학술 발표 대회 (추계) 2001, pp.953-956
Journal
2001 정보 보호 제품의 적합성 시험 평가 현황   김상춘  한국통신학회지, v.11, no.2, pp.7-15
Journal
2001 A Performance Evaluation of Mobile Agent for Network Management   권혁찬   정보처리학회논문지 C, v.8C, no.1, pp.68-74
Conference
2001 A Performance Evaluation of Distributed Paradigms for network Management   Hyeok Chan Kwon   통신 정보 합동 학술 대회 (JCCI) 2001, pp.188-191