ETRI-Knowledge Sharing Plaform

KOREAN

Researchers

연구자 검색
Keyword

Detail

사진

Jeon Yong-Sung
Department
System Security Research Section
Contact
KSP Keywords
논문 검색결과
Type Year Title Cited Download
Conference
2025 Development of a covert channel using monitor brightness changes   전용성   대한전자공학회 학술 대회 (하계) 2025, pp.1-3
Conference
2024 Development of wireless covert channel system using magnetic fields   전용성   한국통신학회 종합 학술 발표회 (추계) 2024, pp.799-800
Journal
2024 Trend of vehicular communication standardization in ITU-T SG17   이상우   정보보호학회지, v.34, no.4, pp.29-33
Conference
2024 Design of covert channel using changes in light brightness   전용성   대한전자공학회 학술 대회 (하계) 2024, pp.2526-2529
Journal
2023 Standardization trend for vehicular communication security in ITU-T SG17   이상우   정보보호학회지, v.33, no.4, pp.83-87
Conference
2023 Implementation of covert channel based on adjacent modulation using WiFi beacon interval   전용성   대한전자공학회 학술 대회 (하계) 2023, pp.2119-2121
Journal
2023 Practical covert wireless unidirectional communication in IEEE 802.11 environment   Hayoung Seong   IEEE Internet of Things Journal, v.10, no.2, pp.1499-1516 12
Journal
2022 Trend on vehicular communication security standardization in ITU-T SG17   이상우   정보보호학회지, v.32, no.4, pp.93-97
Conference
2022 Design of covert channel using WiFi beacon interval   전용성   대한전자공학회 학술 대회 (하계) 2022, pp.2069-2071
Conference
2021 Consideration for the Construction of Practical Wireless Covert Timing Channels   Hayoung Seong   World Conference on Information Security Applications (WISA) 2021, pp.66-70
Journal
2021 Standardization Trend for Vehicular Communication Security in ITU-T SG17   이상우   정보보호학회지, v.31, no.4, pp.17-21
Conference
2021 Flash Memory Storage Management Method for Data Protection in Embedded Systems   전용성   대한전자공학회 학술 대회 (하계) 2021, pp.1585-1588
Conference
2020 Implementation of execution code integrity verification function for embedded device using hardware security module   전용성   대한전자공학회 학술 대회 (하계) 2020, pp.1765-1768
Conference
2019 Implementation of a LoRaWAN Protocol Processing Module on an Embedded Device using Secure Element   YongSung Jeon   International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC) 2019, pp.1-3 5
Conference
2018 Design of a LPWAN Communication Device based on Hardware Security Module   YongSung Jeon   International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC) 2018, pp.1-3
Conference
2018 Design of an LPWAN Communication Module Based on Secure Element for Smart Parking Application   YongSung Jeon   International Conference on Consumer Electronics (ICCE) 2018, pp.1-2 14
Conference
2017 Security Considerations Based on Classification of IoT Device Capabilities   Seungyong Yoon   International Conferences on Advanced Service Computing (SERVICE COMPUTATION) 2017, pp.13-15
Conference
2016 Analyzing Security Threats of Android-based Mobile Malware   Seungyong Yoon   International Conference on Security Technology (SecTech) 2016, pp.310-315
Conference
2016 On the Feasibility of Remote Attestation for IoT Devices   Yong-Hyuk Moon   International Conference on Evolving Internet (INTERNET) 2016, pp.12-13
Conference
2016 Common Security Requirements for Device Identification System in Internet of Things   Daewon Kim   International Conference on Security Technology (SecTech) 2016, pp.306-309
Conference
2016 Cooperative Remote Attestation for IoT Swarms   Yong Hyuk Moon   International Conference on Information and Communication Technology Convergence (ICTC) 2016, pp.1233-1235 2
Conference
2016 Secure Mobile Device Management Based on Domain Separation   GeonLyang Kim   International Conference on Information and Communication Technology Convergence (ICTC) 2016, pp.918-920 5
Conference
2016 Consideration of Security Threats for Identification System in Internet of Things   Daewon Kim   International Conference on Cyber-Technologies and Cyber-Systems (CYBER) 2016, pp.67-68
Conference
2016 On-demand Security Configuration for IoT Devices   Boheung Chung   International Conference on Information and Communication Technology Convergence (ICTC) 2016, pp.1082-1084 19
Conference
2016 Analysis of Smart Meter Hacking and Countermeasures   이윤경   한국정보보호학회 학술 대회 (하계) 2016, pp.1-4
Conference
2016 A Study on the Security Features of Operating System for Lightweight IoT Devices   임재덕   한국통신학회 종합 학술 발표회 (하계) 2016, pp.1384-1385
Journal
2016 Implementation of Domain Separation-based Security Platform for Smart Device   Jeong Nyeo Kim   International Journal of Applied Engineering Research, v.11, no.10, pp.7017-7019 0
Journal
2016 Security Core Technology Implementation for Hardware-based Smart Devices   JeongNyeo Kim   International Journal of Applied Engineering Research, v.11, no.8, pp.5927-5930 0
Conference
2015 A Functional Relationship Based Attestation Scheme for Detecting Compromised Nodes in Large IoT Networks   Yong-Hyuk Moon   International Conference on Ubiquitous Information Technologies and Applications (CUTE) 2015 (LNEE 373), pp.713-721 5
Conference
2015 A Study on the Hardware-based Security Solutions for Smart Devices   Hongil Ju   International Conference on Computational Science and Computational Intelligence (CSCI) 2015, pp.51-51
Conference
2015 Performance Analysis of Encrypted Code Analyzer for Malicious Code Detection   Daewon Kim   International Conference on Communications, Computation, Networks and Technologies (INNOV) 2015, pp.1-3
Conference
2015 Smart Meter and Smart Meter Security   Yun-kyung Lee   International Conference on Computers, Communications and Systems (ICCCS) 2015, pp.1-3
Conference
2015 Supporting a Variety of Secure Services Based on MTM   Seungyong Yoon   International Conference on Systems and Networks Communications (ICSNC) 2015, pp.18-20
Journal
2015 Implementation of a Hardware Security Chip for Mobile Devices   Hongil Ju   IEEE Transactions on Consumer Electronics, v.61, no.4, pp.500-506 13
Conference
2015 Dynamic Permission Re-Enforcement Technique for Protecting Application from Others with Over-Privileged Permission at Run Time   Boheung Chung   International Conference on Security Technology (SecTech) 2015, pp.13-16 1
Conference
2015 A Method Based on Platform Integrity Verification for Activating a Mobile Trusted Module   Daewon Kim   International Conference on Information and Communication Technology Convergence (ICTC) 2015, pp.1177-1179
Conference
2015 Trusted Military Services Based on the Secure Domain of the Mobile Security Solution   GeonLyang Kim   International Conference on Information and Communication Technology Convergence (ICTC) 2015, pp.1128-1131
Conference
2015 Mobile Security Technology for Smart Devices   Seungyong Yoon   International Conference on Information and Communication Technology Convergence (ICTC) 2015, pp.1174-1176
Conference
2015 A Study on the Remote Authentication Method between IoT Devices using a Trusted Security Module   한진희   한국정보처리학회 학술 발표 대회 (추계) 2015, pp.587-590
Conference
2015 Network Resilience Estimation to Cascading Failures   Yong-Hyuk Moon   International Conference on Information and Communication Technology Convergence (ICTC) 2015, pp.965-966
Conference
2015 Security Considerations for Secure and Trustworthy Smart Home System in the IoT Environment   Jin-Hee Han   International Conference on Information and Communication Technology Convergence (ICTC) 2015, pp.1119-1121
Conference
2015 Technology Trends of Access Control in IoT and Requirements Analysis   Yun-kyung Lee   International Conference on Information and Communication Technology Convergence (ICTC) 2015, pp.1034-1036
Journal
2015 A Multi-Resolution Port Scan Detection Technique for High-Speed Networks   Hwashin Moon   Journal of Information Science and Engineering, v.31, no.5, pp.1613-1632 2
Conference
2015 The Secure Urgent Situation Propagation System Using the Mobile Security Solution   GeonLyang Kim   International Conference on Computer Science, Computer Engineering, and Social Media (CSCESM) 2015, pp.109-114 2
Journal
2015 Implementation of a MTM-based secure OTP Generator for IoT Devices   김영세   대한임베디드공학회논문지, v.10, no.4, pp.199-206
Conference
2015 A Methodology for Live Forensic Acquisition in Secure Domain Based on Domain Separation Technology   Kyung-Soo Lim   International Conference on Communication and Computer Engineering (ICOCOE) 2015 (LNEE 362), v.362, pp.1113-1123 3
Conference
2015 Improving MTM-Based Session & Key Management   Seungyong Yoon   International Conference on Green and Human Information Technology (ICGHIT) 2015, pp.333-334
Conference
2014 Mobile Device Security Framework Based on Domain Separation and Use Case   Yun-kyung Lee   Korea-Vietnam International Workshop on Information and Communications 2014, pp.1-4
Conference
2014 The Issue of Data Transfer for the Embedded SE on Mobile Devices   HongIl Ju   International Conference on Computer Science and its Applications (CSA) 2014 (LNEE 330), v.330, pp.317-322 0
Conference
2014 Application Authentication and Secure Key Management Scheme using MTM   Jin-Hee Han   International Conference on Computer Science and its Applications (CSA) 2014 (LNEE 330), pp.941-946 0
Conference
2014 A Study on Trends in SIM Card Design   Young-Sae Kim   대한임베디드공학회 학술 대회 (추계) 2014, pp.445-448
Conference
2014 A Method for Safe and Efficient Integrity Verification of Smartphones   한진희   한국정보처리학회 학술 발표 대회 (추계) 2014, pp.423-426
Conference
2014 Reducing the Impact of Repackaged App on Android   Hwashin Moon   International Conference on Information and Communication Technology Convergence (ICTC) 2014, pp.800-801 3
Conference
2014 Protection Method from APP Repackaging Attack on Mobile Device with Separated Domain   Yun-kyung Lee   International Conference on Information and Communication Technology Convergence (ICTC) 2014, pp.667-668 3
Conference
2014 User-Defined Privilege Restriction Mechanism for Secure Execution Environments on Android   Boheung Chung   International Conference on Information and Communication Technology Convergence (ICTC) 2014, pp.815-816 1
Conference
2014 A Secure Channel Establishment Method on a Hardware Security Module   Daewon Kim   International Conference on Information and Communication Technology Convergence (ICTC) 2014, pp.555-556 4
Conference
2014 A Secure Message Service Using the Secure Domain of a Mobile Security Solution   GeonLyang Kim   International Conference on Information and Communication Technology Convergence (ICTC) 2014, pp.619-620 1
Conference
2014 Security Threats Analysis for Android based Mobile Device   Seungyong Yoon   International Conference on Information and Communication Technology Convergence (ICTC) 2014, pp.775-776 6
Conference
2014 Design and Requirements for Video Encryption in Intelligent Surveillance System   YoungSae Kim   International Conference on Information and Communication Technology Convergence (ICTC) 2014, pp.763-764 0
Conference
2014 An Energy and QoS Aware Peer Selection Scheme   Yong-Hyuk Moon   International Conference on Information and Communication Technology Convergence (ICTC) 2014, pp.659-660 0
Conference
2014 도메인 분리 기반 모바일 단말에서의 앱 리패키징 공격 방어 기법   이윤경   한국정보보호학회 충청 지부 학술 대회 2014, pp.1-3
Conference
2014 A Design of Mobile Trusted Module for Application Dedicated Cryptographic Keys   Daewon Kim   International Conference on Mobile Services, Resources, and Users (MOBILITY) 2014, pp.1-5
Conference
2014 Detection and Response against Mobile Attack using SMS   윤승용   통신 정보 합동 학술 대회 (JCCI) 2014, pp.1-2
Conference
2014 Implementation of a Video Streaming Security System for Smart Device   Yongsung Jeon   International Conference on Consumer Electronics (ICCE) 2014, pp.97-100 5
Conference
2013 A Study on the Embedded SE Interface for Mobile Devices   HongIl Ju   International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC) 2013, pp.881-882
Journal
2013 A Survey of Mobile Malware Detection Techniques   문화신   전자통신동향분석, v.28, no.3, pp.39-46
Conference
2012 System Requirements of Mobile device for Security Service   Yong-Sung Jeon   International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC) 2012, pp.1-3
Conference
2011 Security Issue of Mobile Terminal for Smart Work   전용성   차세대 통신 소프트웨어 학술 대회 (NCS) 2011, pp.1-4
Conference
2011 A Study on the Mobile Platform Security based on Virtualization Technology   주홍일   대한임베디드공학회 학술 대회 (추계) 2011, pp.399-402
Conference
2010 Design of Smart Camera for Video Encryption   전용성   차세대 통신 소프트웨어 학술 대회 (NCS) 2010, pp.1-3
Conference
2010 Analyses of Research Trends on Networked-Camera   이기정  한국멀티미디어학회 학술 발표 대회 (추계) 2010, pp.424-426
Journal
2010 A compact memory-free architecture for the AES algorithm using resource sharing methods   Yong-Sung Jeon   Journal of Circuits, Systems and Computers, v.19, no.5, pp.1109-1130 27
Journal
2010 차세대 영상보안 기술 동향   전용성   정보보호학회지, v.20, no.3, pp.9-17
Conference
2010 Design and Implementation of Modular Multiplier for Embedded System   김영세   한국통신학회 종합 학술 발표회 (하계) 2010, pp.1165-1166
Conference
2009 Design Issue of Smart Camera Hardware Design   전용성   차세대 통신 소프트웨어 학술 대회 (NCS) 2009, pp.1-3
Conference
2009 Compact Design of a Combined MixColumn/InvMixColumn Transformation Module for AES   Yong Sung Jeon   International Conference on Computer Design (CDES) 2009, pp.38-41
Conference
2009 Smart Camera Hardware Design based on the TI DaVinci Processor   Yong Sung Jeon   International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC) 2009, pp.622-624
Conference
2008 Design of Low-area Rijndael Hardware Core   Yong-Sung Jeon   International Conference on Computer Design (CDES) 2008, pp.1-4
Conference
2007 Cryptographic Issues in Database Security   Yong-Sung Jeon   International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC) 2007, pp.384-385
Conference
2007 Hardware Implementation of Block Cipher ARIA   Sang-Woo Lee   International Technical Conference on Circuits Systems, Computers and Communications (ITC-CSCC) 2007, pp.406-407
Conference
2007 Hardware Implementation of Block Cipher ARIA   이상우   통신 정보 합동 학술 대회 (JCCI) 2007, pp.1-5
Conference
2007 Implementation of 10Gb Ethernet Switch Hardware Platform with a Network Processor and a 10Gb EMAC   Sang-Woo Lee   International Conference on Advanced Communication Technology (ICACT) 2007, pp.563-566 3
Conference
2006 Implementation of IPsec VPN Hardware Platform   이상우   차세대 통신 소프트웨어 학술 대회 (NCS) 2006, pp.1-4
Conference
2006 Implementation of VPN Router Hardware Platform using Network Processor   Sang Woo Lee   International Conference on Advanced Communication Technology (ICACT) 2006, pp.670-674 2
Conference
2006 Implementation of IPv4 Packet Forwarding Application on Network Processors   Sang Woo Lee   International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC) 2006, pp.1-3
Conference
2006 An Efficient Design of High Speed Network Security Platform using Network Processor   Yong Sung Jeon   International Conference on Embedded Systems and Applications (ESA) 2006, pp.121-123
Conference
2006 Design of Giga Performance VPN Router   Sang Su Lee   International Conference on Advanced Communication Technology (ICACT) 2006, pp.1011-1013 0
Conference
2006 Implementation of VPN Router Hardware Platform using Netwvor Processor   Sang Woo Lee   International Conference on Advanced Communication Technology (ICACT) 2006, pp.670-674 2
Conference
2005 Design and Implementation of Gigabit Router using Network Processor   Sang-Woo Lee   Internet and Multimedia Systems and Applications (IMSA) 2005, pp.32-35
Conference
2005 Design of Access Router Hardware Platform using the IXP2800 Network Processor   Yong-Sung Jeon   International Technical Conference on Circuits Systems, Computers and Communications (ITC-CSCC) 2005, pp.1439-1440
Conference
2005 Implementation of Gigabit Router with Network Porcesskr   이상우   한국통신학회 종합 학술 발표회 (하계) 2005, pp.110-113
Conference
2004 A CMOS Design of the Contactless I/O Interface for Combi USIM   Ji-Mann Park   International Technical Conference on Circuits Systems, Computers and Communications (ITC-CSCC) 2004, pp.615-618
Conference
2004 Efficient design of contactless protocol processing module for RFID   Yong-Sung Jeon   International Technical Conference on Circuits Systems, Computers and Communications (ITC-CSCC) 2004, pp.784-786
Conference
2003 Design of hardware module to process contactless protocol for IC card system   전용성   정보 및 제어 학술 대회 (CICS) 2003, pp.713-716
Journal
2003 Design and Implementation of Embedded Contactless (Type-B) Protocol Module for RFID   전용성   정보처리학회논문지 A, v.10A, no.3, pp.255-260
Conference
2003 A Design and Implementation of the Emulator for combi IC card   박지만   통신 정보 합동 학술 대회 (JCCI) 2003, pp.233-233
Conference
2002 Design and Implementation of Hardware Module to Process Contactless Protocol(Type-B) for IC Card   전용성   대한전자공학회/대한전기학회 시스템 및 제어 분야 합동 학술 대회 (추계) 2002, pp.481-484
Conference
2002 Design and Implementation of Soft Masking Method for IC Card   전용성   대한전자공학회 종합 학술 대회 (하계) 2002 : 시스템 및 제어 소사이어티, pp.107-110
Conference
2002 Implementation of the contact and contactless IC Card OS for Java Card   주홍일   대한전자공학회 종합 학술 대회 (하계) 2002 : 통신 소사이어티, pp.375-378
Conference
2002 A Transaction Implementation for the devices with restricted resources   정임영   통신 정보 합동 학술 대회 (JCCI) 2002, pp.325-325
Journal
2001 Java Card Platform을 내장한 Smart Card의 구현   김영진   정보과학회지, v.19, no.8, pp.33-43
Conference
2001 A Design of Type-B RF circuit for the contace/contactless combi IC card   박지만   한국통신학회 종합 학술 발표회 (하계) 2001, pp.2123-2126