|
Journal
|
2025 |
Exploiting Human Visual Limitations for High Capacity Information Hiding in Digital Images Using Alpha Channel
Mohsin Shah
IEEE Access, v.13, pp.162933-162946 |
|
|
|
Conference
|
2024 |
A RF Jamming Detection Technology in Open RAN
권혁찬
전자 정보 통신 학술 대회 (CEIC) 2024, pp.1-3 |
|
|
|
Conference
|
2024 |
Architecture Design of Malicious xAPP Attack Detection Systems in Open RAN Environments
정병호
전자 정보 통신 학술 대회 (CEIC) 2024, pp.1-4 |
|
|
|
Journal
|
2023 |
Technology Trends in Biometric Cryptosystem Based on Electrocardiogram Signals
정병호
전자통신동향분석, v.38, no.5, pp.61-70 |
|
|
|
Conference
|
2022 |
A Behavior-similarity Measurement Scheme for Anomaly Detection in IoT Device Networks
Byungho Chung
International Conference on Internet (ICONI) 2022, pp.295-296 |
|
|
|
Conference
|
2022 |
Non-invasive Intrusion Prevention System against Ransomware in Healthcare
Hyeokchan Kwon
International Conference on Internet (ICONI) 2022, pp.287-288 |
|
|
|
Journal
|
2021 |
ECG Authentication Based on Non-Linear Normalization under Various Physiological Conditions
Ho Bin Hwang
Sensors, v.21, no.21, pp.1-19 |
21 |
|
|
Journal
|
2021 |
Security Technology Trends to Prevent Medical Device Hacking and Ransomware
권혁찬
전자통신동향분석, v.36, no.5, pp.21-31 |
|
|
|
Conference
|
2020 |
Analysis of bio-signal-based bio-crypto technology trends and service scenarios
권혁찬
전자 정보 통신 학술 대회 (CEIC) 2020, pp.1-4 |
|
|
|
Conference
|
2020 |
Anomaly detection of Ransomware behaviors based on Random Forest and LSTM in the medical devices network environment
정병호
전자 정보 통신 학술 대회 (CEIC) 2020, pp.1-3 |
|
|
|
Journal
|
2019 |
Standardization Trend of Autonomous Vehicle Security
권혁찬
TTA Journal, v.186, pp.55-64 |
|
|
|
Journal
|
2019 |
Security trend and issue of connected medical device
권혁찬
주간기술동향, v.1911, pp.14-26 |
|
|
|
Journal
|
2018 |
Standardization trend on ITS security
이상우
정보보호학회지, v.28, no.4, pp.25-28 |
|
|
|
Conference
|
2018 |
Design and Implementation on the Socket-based Access Control Scheme against V2N-connected Vehicle Attacks
정병호
한국통신학회 종합 학술 발표회 (동계) 2018, pp.1124-1125 |
|
|
|
Conference
|
2017 |
In-vehicle Network Access Control Mechanism based on Token
권혁찬
전자 정보 통신 학술 대회 (CEIC) 2017, pp.227-228 |
|
|
|
Conference
|
2017 |
Security Architecture Design for the Safe Vehicle-to-Nomadic Device(V2N) Service
이석준
전자 정보 통신 학술 대회 (CEIC) 2017, pp.223-226 |
|
|
|
Conference
|
2017 |
Security Architecture Design for the Safe Vehicle-to-Nomadic Device(V2N) Service
Sokjoon Lee
The IRES International Conference on Innovative Engineering Technologies (ICIET) 2017, pp.10-13 |
|
|
|
Conference
|
2017 |
Secure Number Theoretic Transform and Speed Record for Ring-LWE Encryption on Embedded Processors
Hwajeong Seo
International Conference on Information Security and Cryptology (ICISC) 2017, pp.37-50 |
5 |
|
|
Journal
|
2017 |
Smart Car Trends and Security Issues from a Connectivity Perspective
권혁찬
정보와 통신 : 한국통신학회지, v.34, no.10, pp.17-23 |
|
|
|
Journal
|
2017 |
ITU-T SG17에서의 ITS 보안 기술 표준화 동향
이상우
정보보호학회지, v.27, no.5, pp.21-25 |
|
|
|
Journal
|
2017 |
Standardization Issues on Secure Vehicular Communication
SANG-WOO LEE
International Journal of Communications, v.2, pp.19-23 |
|
|
|
Conference
|
2016 |
Group Signature-based Vehicular PKI without Thousands of Pseudonym Certificates
Sokjoon Lee
International Conference on Computer Engineering and Information Technology (ICCEIT) 2016, pp.25-28 |
|
|
|
Conference
|
2016 |
Wi-Fi Fingerprint-based Approach to Securing the Connected Vehicle against Wireless Attack
Hyeokchan Kwon
International Conference on Networks and Communications (NETCOM) 2016, pp.1-7 |
|
|
|
Conference
|
2016 |
IEEE 11073-20601 Security Protocol Design Requirements for Smart Healthcare Device
이석준
한국스마트미디어학회/한국전자거래학회 학술 대회 (춘계) 2016, pp.363-366 |
|
|
|
Conference
|
2016 |
The study on structure of Agent for protecting IEEE 11073:20601 Transport Layer
정도영
한국스마트미디어학회/한국전자거래학회 학술 대회 (춘계) 2016, pp.367-370 |
|
|
|
Journal
|
2015 |
클라우드 보안 개요
권혁찬
정보와 통신 : 한국통신학회지, v.32, no.10, pp.71-76 |
|
|
|
Conference
|
2015 |
Detection of Rogue Devices in WLAN by Analyzing RF Features and Indoor Location of the Device
Hyeokchan Kwon
International Workshop on Information Security Applications (WISA) 2015 (LNCS 9503), v.9503, pp.54-61 |
0 |
|
|
Journal
|
2015 |
차세대 IoT 네트워크 보안 현황
권혁찬
정보처리학회지, v.22, no.2, pp.39-46 |
|
|
|
Conference
|
2015 |
A Content Access Control Mechanism Through Indoor Location Estimation Based on WLAN
권혁찬
한국통신학회 종합 학술 발표회 (동계) 2015, pp.1187-1188 |
|
|
|
Conference
|
2014 |
Analysis of EVM and RSS for detecting Rogue AP in WLAN
안개일
한국정보과학회 학술 발표회 (동계) 2014, pp.724-726 |
|
|
|
Conference
|
2014 |
Detecting Cloned Devices in Wireless Network using RSSI and RF Features
Hyeokchan Kwon
International Conference on Internet (ICONI) 2014, pp.1-4 |
|
|
|
Conference
|
2014 |
Location-Based Rogue Device Detection Mechanism
권혁찬
한국정보보호학회 충청 지부 학술 대회 2014, pp.1-3 |
|
|
|
Conference
|
2014 |
Mobile Device Management Scheme using Wireless Intrusion Information
권혁찬
한국정보보호학회 학술 대회 (하계) 2014, pp.1-4 |
|
|
|
Conference
|
2014 |
EVM Analysis for MAC Identification of Wireless Device in WLAN Environment
안개일
통신 정보 합동 학술 대회 (JCCI) 2014, pp.1-2 |
|
|
|
Journal
|
2013 |
Improving Mobile Device Classification Using Security Events for Preventing Wireless Intrusion
Hyeokchan Kwon
International Journal of Security and Its Applications, v.7, no.6, pp.181-190 |
1 |
|
|
Conference
|
2013 |
A Mobile Device Classification Mechanism for Efficient Prevention of Wireless Intrusion
Hyeokchan Kwon
International Conference on Information Science and Industrial Applications (ISI) 2013, pp.317-321 |
|
|
|
Journal
|
2013 |
Technologies for Next Generation Wireless LAN Security
김신효
전자통신동향분석, v.28, no.1, pp.100-109 |
|
|
|
Conference
|
2012 |
Efficient Mobile Device Management Scheme Using Security Events from Wireless Intrusion Prevention System
Hyeokchan Kwon
International Conference on Ubiquitous Information Technologies and Applications (CUTE) 2012 (LNEE 214), v.214, pp.815-822 |
3 |
|
|
Journal
|
2012 |
아동보호를 위한 동영상 콘텐츠 정보보호 경량기법
나재훈
정보보호학회지, v.22, no.3, pp.41-47 |
|
|
|
Journal
|
2012 |
스마트 미디어 시대의 콘텐츠 보호 기술 동향
이승민
주간기술동향, v.1534, pp.11-21 |
|
|
|
Conference
|
2011 |
Privacy-Preserving PKI Design Based on Group Signature
Sokjoon Lee
Australian Information Security Management Conference (AISM) 2011, pp.155-164 |
|
|
|
Conference
|
2011 |
Multi-level Video Protection Scheme with Format Compliance for H.264/SVC
Hyeok Chan Kwon
International Conference on Instrumentation, Measurement, Circuits and Systems (ICIMCS) 2011, pp.1-4 |
|
|
|
Conference
|
2011 |
Security Policy Model for Secure Transcodable Mechanism
문용혁
한국정보처리학회 학술 발표 (추계) 2011, pp.958-959 |
|
|
|
Conference
|
2011 |
Smart Media Service using Secure Virtual Machine
Yong-Hyuk Moon
International Conference on Information and Communication Technology Convergence (ICTC) 2011, pp.742-743 |
0 |
|
|
Journal
|
2011 |
echanism using Hybrid-based Method for SVC Media Transmission
권혁찬
정보보안논문지, v.11, no.3, pp.47-54 |
|
|
|
Conference
|
2011 |
Consideration of Anonymous Certificate based on Group Signature for User Privacy
이석준
한국통신학회 종합 학술 발표회 (하계) 2011, pp.671-672 |
|
|
|
Conference
|
2011 |
A Platform-Independent Smart Content Sharing Model
문용혁
한국정보처리학회 학술 발표 (춘계) 2011, pp.224-225 |
|
|
|
Conference
|
2011 |
Analysis on Size-Interval Based Dispatching System for Multi-Class Job Model
문용혁
한국정보처리학회 학술 발표 (춘계) 2011, pp.163-164 |
|
|
|
Conference
|
2009 |
Protecting IPTV Service Network against Malicious Rendezvous Point
Hyeok Chan Kwon
Information Security Applications (WISA) 2009 (LNCS 5932), v.5932, pp.1-9 |
1 |
|
|
Conference
|
2009 |
Designing Pastry-based Secure IPTV Video Delivery Network
Hyeok Chan Kwon
Joint Workshop on Information Security (JWIS) 2009, pp.1-9 |
|
|
|
Conference
|
2009 |
A Scalable Security Service Model for Reliable End-to-End Media Distribution and Reuse
Yong Hyuk Moon
Joint Workshop on Information Security (JWIS) 2009, pp.1-11 |
|
|
|
Conference
|
2009 |
Postcompression-based Scalable Media Encryption
권혁찬
한국통신학회 통신 소프트웨어 학술 대회 (COMSW) 2009, pp.1-3 |
|
|
|
Conference
|
2009 |
Secure Media Streaming Network based on Pastry
권혁찬
한국정보보호학회 학술 대회 (하계) 2009, pp.1-4 |
|
|
|
Conference
|
2009 |
Secure Overlay Multicast Infrastructure for P2P-based IPTV Service
Hyeok Chan Kwon
International Conference on Advanced Communication Technology (ICACT) 2009, pp.2041-2043 |
|
|
|
Conference
|
2008 |
Security Considerations for P2P-based Media Streaming
권혁찬
한국정보처리학회 학술 발표 대회 (추계) 2008, pp.1441-1443 |
|
|
|
Journal
|
2008 |
Designing Reliable P2P Transmission Mechanism Against MITM Attack
김상춘
정보보호학회논문지, v.18, no.4, pp.103-109 |
|
|
|
Journal
|
2008 |
Random Visitor: Defense against Identity Attacks in P2P Networks
Ja Beom Gu
IEICE Transactions on Information and Systems, v.E91-D, no.4, pp.1058-1073 |
1 |
|
|
Conference
|
2008 |
The Secure Routing Mechanism for DHT-based Overlay Network
Hyeok Chan Kwon
International Conference on Advanced Communication Technology (ICACT) 2008, pp.1300-1303 |
2 |
|
|
Conference
|
2007 |
Designing Reliable P2P File Sharing Application without PKI
Sang Choon Kim
World Conference on Information Security Applications (WISA) 2007, pp.1-9 |
|
|
|
Conference
|
2007 |
Reliable Public Key Distribution Method for Dynamic Peer to Peer Network
Hyeok Chan Kwon
Joint Workshop on Information Security (JWIS) 2007, pp.1-10 |
|
|
|
Journal
|
2007 |
P2P 사용자 인증과 OTP 분석
문용혁
정보보호학회지, v.17, no.3, pp.32-40 |
|
|
|
Conference
|
2007 |
Public Key Management Framework for Two-tier Super Peer Architecture
Hyeok Chan Kwon
International Conference on Distributed Computing Systems Workshops (ICDCSW) 2007, pp.1-6 |
4 |
|
|
Conference
|
2007 |
Performance Prediction in Peer-to-Peer MultiAgent Networks
Ja Beom Gu
International Workshop on Agents and Peer-to-Peer Computing (AP2PC) 2007 (LNCS 5319), v.5319, pp.27-40 |
0 |
|
|
Journal
|
2007 |
Standardization and Technology Trend of Peer-to-Peer Communication
권혁찬
전자통신동향분석, v.22, no.1, pp.11-23 |
|
|
|
Conference
|
2006 |
Secure Message Delivery Mechanism on Structured Overlay Network
Jae Hoon Nah
Joint Workshop on Information Security (JWIS) 2006, pp.1-8 |
|
|
|
Journal
|
2006 |
P2P 관련 국제 표준화 동향
고선기
주간기술동향, v.1241, pp.1-7 |
|
|
|
Conference
|
2006 |
A Protocol Switching Scheme for Developing Network Management Applications
Hyeok Chan Kwon
International Conference on Information Networking (ICOIN) 2006 (LNCS 3961), v.3961, pp.862-872 |
0 |
|
|
Journal
|
2005 |
DHT(Distributed Hash Table) 기반 P2P 오버레이 네트워크 보안 위협 분석
권혁찬
정보보호학회지, v.15, no.6, pp.60-67 |
|
|
|
Journal
|
2005 |
IPv6 환경에서 이동성 보안 프로토콜의 제고
권혁찬
정보보호학회지, v.15, no.3, pp.29-39 |
|
|
|
Conference
|
2004 |
The VPN Gateway Supporting Mobile Device
권혁찬
한국정보과학회 학술 발표 (가을) 2004, pp.364-366 |
|
|
|
Journal
|
2004 |
Mobile IPv6 표준화 및 기술 동향
권혁찬
주간기술동향, v.1146, pp.1-8 |
|
|
|
Conference
|
2003 |
A Security Packet Analyzer in IPv4/IPv6 network
권혁찬
한국정보처리학회 학술 발표 대회 (춘계) 2003, pp.1353-1356 |
|
|
|
Conference
|
2002 |
Design and Implementation of IP Security Packet Analyzer
권혁찬
대한전자공학회 종합 학술 대회 (추계) 2002 : 컴퓨터/반도체 소사이어티, pp.175-178 |
|
|
|
Journal
|
2002 |
A Design and Implementation of A Rule-based Security Evaluation System for W Security Engine
권혁찬
정보처리학회논문지 C, v.9C, no.3, pp.367-374 |
|
|
|
Conference
|
2002 |
A Design and Implementation of Rule Based Security Evaluation System.
권혁찬
통신 정보 합동 학술 대회 (JCCI) 2002, pp.86-86 |
|
|
|
Conference
|
2001 |
Design of the Rule Based Protocol Security Evaluation System for Internet Secure Service
현정식
한국정보처리학회 학술 발표 대회 (추계) 2001, pp.953-956 |
|
|
|
Journal
|
2001 |
정보보호제품의 적합성 시험 평가 현황
김상춘
한국통신학회지, v.11, no.2, pp.7-15 |
|
|
|
Journal
|
2001 |
A Performance Evaluation of Mobile Agent for Network Management
권혁찬
정보처리학회논문지 C, v.8C, no.1, pp.68-74 |
|
|
|
Conference
|
2001 |
A Performance Evaluation of Distributed Paradigms for network Management
Hyeok Chan Kwon
통신 정보 합동 학술 대회 (JCCI) 2001, pp.188-191 |
|
|