
| Type | Year | Title | Cited | Download |
|---|---|---|---|---|
|
Journal
|
2025 | Vehicular communication security standard trend in ITU-T SG17 이상우 정보보호학회지, v.35, no.4, pp.29-34 | ||
|
Conference
|
2025 | Development of a covert channel using monitor brightness changes 전용성 대한전자공학회 학술 대회 (하계) 2025, pp.1-3 | ||
|
Journal
|
2025 | State of the art of autonomous vehicle communication security standardization 이상우 정보와 통신: 한국통신학회지, v.42, no.3, pp.24-30 | ||
|
Conference
|
2024 | Development of wireless covert channel system using magnetic fields 전용성 한국통신학회 종합 학술 발표회 (추계) 2024, pp.799-800 | ||
|
Journal
|
2024 | Trend of vehicular communication standardization in ITU-T SG17 이상우 정보보호학회지, v.34, no.4, pp.29-33 | ||
|
Conference
|
2024 | Design of covert channel using changes in light brightness 전용성 대한전자공학회 학술 대회 (하계) 2024, pp.2526-2529 | ||
|
Journal
|
2023 | Standardization trend for vehicular communication security in ITU-T SG17 이상우 정보보호학회지, v.33, no.4, pp.83-87 | ||
|
Conference
|
2023 | Implementation of covert channel based on adjacent modulation using WiFi beacon interval 전용성 대한전자공학회 학술 대회 (하계) 2023, pp.2119-2121 | ||
|
Journal
|
2023 | Practical covert wireless unidirectional communication in IEEE 802.11 environment Hayoung Seong IEEE Internet of Things Journal, v.10, no.2, pp.1499-1516 | 16 | |
|
Journal
|
2022 | Trend on vehicular communication security standardization in ITU-T SG17 이상우 정보보호학회지, v.32, no.4, pp.93-97 | ||
|
Conference
|
2022 | Design of covert channel using WiFi beacon interval 전용성 대한전자공학회 학술 대회 (하계) 2022, pp.2069-2071 | ||
|
Journal
|
2021 | Standardization Trend for Vehicular Communication Security in ITU-T SG17 이상우 정보보호학회지, v.31, no.4, pp.17-21 | ||
|
Conference
|
2021 | Consideration for the Construction of Practical Wireless Covert Timing Channels Hayoung Seong World Conference on Information Security Applications (WISA) 2021, pp.66-70 | ||
|
Conference
|
2021 | Flash Memory Storage Management Method for Data Protection in Embedded Systems 전용성 대한전자공학회 학술 대회 (하계) 2021, pp.1585-1588 | ||
|
Conference
|
2020 | Implementation of execution code integrity verification function for embedded device using hardware security module 전용성 대한전자공학회 학술 대회 (하계) 2020, pp.1765-1768 | ||
|
Conference
|
2019 | Implementation of a LoRaWAN Protocol Processing Module on an Embedded Device using Secure Element YongSung Jeon International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC) 2019, pp.1-3 | 5 | |
|
Conference
|
2018 | Design of a LPWAN Communication Device based on Hardware Security Module YongSung Jeon International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC) 2018, pp.1-3 | ||
|
Conference
|
2018 | Design of an LPWAN Communication Module Based on Secure Element for Smart Parking Application YongSung Jeon International Conference on Consumer Electronics (ICCE) 2018, pp.1-2 | 15 | |
|
Conference
|
2017 | Security Considerations Based on Classification of IoT Device Capabilities Seungyong Yoon International Conferences on Advanced Service Computing (SERVICE COMPUTATION) 2017, pp.13-15 | ||
|
Conference
|
2016 | On the Feasibility of Remote Attestation for IoT Devices Yong-Hyuk Moon International Conference on Evolving Internet (INTERNET) 2016, pp.12-13 | ||
|
Conference
|
2016 | Analyzing Security Threats of Android-based Mobile Malware Seungyong Yoon International Conference on Security Technology (SecTech) 2016, pp.310-315 | ||
|
Conference
|
2016 | Common Security Requirements for Device Identification System in Internet of Things Daewon Kim International Conference on Security Technology (SecTech) 2016, pp.306-309 | ||
|
Conference
|
2016 | Secure Mobile Device Management Based on Domain Separation GeonLyang Kim International Conference on Information and Communication Technology Convergence (ICTC) 2016, pp.918-920 | 5 | |
|
Conference
|
2016 | Cooperative Remote Attestation for IoT Swarms Yong Hyuk Moon International Conference on Information and Communication Technology Convergence (ICTC) 2016, pp.1233-1235 | 2 | |
|
Conference
|
2016 | On-demand Security Configuration for IoT Devices Boheung Chung International Conference on Information and Communication Technology Convergence (ICTC) 2016, pp.1082-1084 | 20 | |
|
Conference
|
2016 | Consideration of Security Threats for Identification System in Internet of Things Daewon Kim International Conference on Cyber-Technologies and Cyber-Systems (CYBER) 2016, pp.67-68 | ||
|
Journal
|
2016 | Implementation of Domain Separation-based Security Platform for Smart Device Jeong Nyeo Kim International Journal of Applied Engineering Research, v.11, no.10, pp.7017-7019 | 0 | |
|
Conference
|
2016 | A Study on the Security Features of Operating System for Lightweight IoT Devices 임재덕 한국통신학회 종합 학술 발표회 (하계) 2016, pp.1384-1385 | ||
|
Conference
|
2016 | Analysis of Smart Meter Hacking and Countermeasures 이윤경 한국정보보호학회 학술 대회 (하계) 2016, pp.1-4 | ||
|
Journal
|
2016 | Security Core Technology Implementation for Hardware-based Smart Devices JeongNyeo Kim International Journal of Applied Engineering Research, v.11, no.8, pp.5927-5930 | 0 | |
|
Conference
|
2015 | A Functional Relationship Based Attestation Scheme for Detecting Compromised Nodes in Large IoT Networks Yong-Hyuk Moon International Conference on Ubiquitous Information Technologies and Applications (CUTE) 2015 (LNEE 373), pp.713-721 | 6 | |
|
Conference
|
2015 | A Study on the Hardware-based Security Solutions for Smart Devices Hongil Ju International Conference on Computational Science and Computational Intelligence (CSCI) 2015, pp.51-51 | ||
|
Conference
|
2015 | Supporting a Variety of Secure Services Based on MTM Seungyong Yoon International Conference on Systems and Networks Communications (ICSNC) 2015, pp.18-20 | ||
|
Conference
|
2015 | Performance Analysis of Encrypted Code Analyzer for Malicious Code Detection Daewon Kim International Conference on Communications, Computation, Networks and Technologies (INNOV) 2015, pp.1-3 | ||
|
Journal
|
2015 | Implementation of a Hardware Security Chip for Mobile Devices Hongil Ju IEEE Transactions on Consumer Electronics, v.61, no.4, pp.500-506 | 14 | |
|
Conference
|
2015 | Dynamic Permission Re-Enforcement Technique for Protecting Application from Others with Over-Privileged Permission at Run Time Boheung Chung International Conference on Security Technology (SecTech) 2015, pp.13-16 | 1 | |
|
Conference
|
2015 | Smart Meter and Smart Meter Security Yun-kyung Lee International Conference on Computers, Communications and Systems (ICCCS) 2015, pp.1-3 | ||
|
Conference
|
2015 | A Study on the Remote Authentication Method between IoT Devices using a Trusted Security Module 한진희 한국정보처리학회 학술 발표 대회 (추계) 2015, pp.587-590 | ||
|
Conference
|
2015 | A Method Based on Platform Integrity Verification for Activating a Mobile Trusted Module Daewon Kim International Conference on Information and Communication Technology Convergence (ICTC) 2015, pp.1177-1179 | ||
|
Conference
|
2015 | Mobile Security Technology for Smart Devices Seungyong Yoon International Conference on Information and Communication Technology Convergence (ICTC) 2015, pp.1174-1176 | ||
|
Conference
|
2015 | Trusted Military Services Based on the Secure Domain of the Mobile Security Solution GeonLyang Kim International Conference on Information and Communication Technology Convergence (ICTC) 2015, pp.1128-1131 | ||
|
Conference
|
2015 | Technology Trends of Access Control in IoT and Requirements Analysis Yun-kyung Lee International Conference on Information and Communication Technology Convergence (ICTC) 2015, pp.1034-1036 | ||
|
Conference
|
2015 | Network Resilience Estimation to Cascading Failures Yong-Hyuk Moon International Conference on Information and Communication Technology Convergence (ICTC) 2015, pp.965-966 | ||
|
Conference
|
2015 | Security Considerations for Secure and Trustworthy Smart Home System in the IoT Environment Jin-Hee Han International Conference on Information and Communication Technology Convergence (ICTC) 2015, pp.1119-1121 | ||
|
Conference
|
2015 | The Secure Urgent Situation Propagation System Using the Mobile Security Solution GeonLyang Kim International Conference on Computer Science, Computer Engineering, and Social Media (CSCESM) 2015, pp.109-114 | 2 | |
|
Journal
|
2015 | A Multi-Resolution Port Scan Detection Technique for High-Speed Networks Hwashin Moon Journal of Information Science and Engineering, v.31, no.5, pp.1613-1632 | 2 | |
|
Journal
|
2015 | Implementation of a MTM-based secure OTP Generator for IoT Devices 김영세 대한임베디드공학회논문지, v.10, no.4, pp.199-206 | ||
|
Conference
|
2015 | A Methodology for Live Forensic Acquisition in Secure Domain Based on Domain Separation Technology Kyung-Soo Lim International Conference on Communication and Computer Engineering (ICOCOE) 2015 (LNEE 362), v.362, pp.1113-1123 | 3 | |
|
Conference
|
2015 | Improving MTM-Based Session & Key Management Seungyong Yoon International Conference on Green and Human Information Technology (ICGHIT) 2015, pp.333-334 | ||
|
Conference
|
2014 | Application Authentication and Secure Key Management Scheme using MTM Jin-Hee Han International Conference on Computer Science and its Applications (CSA) 2014 (LNEE 330), pp.941-946 | 0 |