ETRI-Knowledge Sharing Plaform

KOREAN

Researchers

연구자 검색
Keyword

Detail

사진

Jeon Yong-Sung Principal Researcher
Department
System Security Research Section
Contact
KSP Keywords
논문 검색결과
Type Year Title Cited Download
Journal
2025 Vehicular communication security standard trend in ITU-T SG17   이상우   정보보호학회지, v.35, no.4, pp.29-34
Conference
2025 Development of a covert channel using monitor brightness changes   전용성   대한전자공학회 학술 대회 (하계) 2025, pp.1-3
Journal
2025 State of the art of autonomous vehicle communication security standardization   이상우   정보와 통신: 한국통신학회지, v.42, no.3, pp.24-30
Conference
2024 Development of wireless covert channel system using magnetic fields   전용성   한국통신학회 종합 학술 발표회 (추계) 2024, pp.799-800
Journal
2024 Trend of vehicular communication standardization in ITU-T SG17   이상우   정보보호학회지, v.34, no.4, pp.29-33
Conference
2024 Design of covert channel using changes in light brightness   전용성   대한전자공학회 학술 대회 (하계) 2024, pp.2526-2529
Journal
2023 Standardization trend for vehicular communication security in ITU-T SG17   이상우   정보보호학회지, v.33, no.4, pp.83-87
Conference
2023 Implementation of covert channel based on adjacent modulation using WiFi beacon interval   전용성   대한전자공학회 학술 대회 (하계) 2023, pp.2119-2121
Journal
2023 Practical covert wireless unidirectional communication in IEEE 802.11 environment   Hayoung Seong   IEEE Internet of Things Journal, v.10, no.2, pp.1499-1516 16
Journal
2022 Trend on vehicular communication security standardization in ITU-T SG17   이상우   정보보호학회지, v.32, no.4, pp.93-97
Conference
2022 Design of covert channel using WiFi beacon interval   전용성   대한전자공학회 학술 대회 (하계) 2022, pp.2069-2071
Journal
2021 Standardization Trend for Vehicular Communication Security in ITU-T SG17   이상우   정보보호학회지, v.31, no.4, pp.17-21
Conference
2021 Consideration for the Construction of Practical Wireless Covert Timing Channels   Hayoung Seong   World Conference on Information Security Applications (WISA) 2021, pp.66-70
Conference
2021 Flash Memory Storage Management Method for Data Protection in Embedded Systems   전용성   대한전자공학회 학술 대회 (하계) 2021, pp.1585-1588
Conference
2020 Implementation of execution code integrity verification function for embedded device using hardware security module   전용성   대한전자공학회 학술 대회 (하계) 2020, pp.1765-1768
Conference
2019 Implementation of a LoRaWAN Protocol Processing Module on an Embedded Device using Secure Element   YongSung Jeon   International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC) 2019, pp.1-3 5
Conference
2018 Design of a LPWAN Communication Device based on Hardware Security Module   YongSung Jeon   International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC) 2018, pp.1-3
Conference
2018 Design of an LPWAN Communication Module Based on Secure Element for Smart Parking Application   YongSung Jeon   International Conference on Consumer Electronics (ICCE) 2018, pp.1-2 15
Conference
2017 Security Considerations Based on Classification of IoT Device Capabilities   Seungyong Yoon   International Conferences on Advanced Service Computing (SERVICE COMPUTATION) 2017, pp.13-15
Conference
2016 On the Feasibility of Remote Attestation for IoT Devices   Yong-Hyuk Moon   International Conference on Evolving Internet (INTERNET) 2016, pp.12-13
Conference
2016 Analyzing Security Threats of Android-based Mobile Malware   Seungyong Yoon   International Conference on Security Technology (SecTech) 2016, pp.310-315
Conference
2016 Common Security Requirements for Device Identification System in Internet of Things   Daewon Kim   International Conference on Security Technology (SecTech) 2016, pp.306-309
Conference
2016 Secure Mobile Device Management Based on Domain Separation   GeonLyang Kim   International Conference on Information and Communication Technology Convergence (ICTC) 2016, pp.918-920 5
Conference
2016 Cooperative Remote Attestation for IoT Swarms   Yong Hyuk Moon   International Conference on Information and Communication Technology Convergence (ICTC) 2016, pp.1233-1235 2
Conference
2016 On-demand Security Configuration for IoT Devices   Boheung Chung   International Conference on Information and Communication Technology Convergence (ICTC) 2016, pp.1082-1084 20
Conference
2016 Consideration of Security Threats for Identification System in Internet of Things   Daewon Kim   International Conference on Cyber-Technologies and Cyber-Systems (CYBER) 2016, pp.67-68
Journal
2016 Implementation of Domain Separation-based Security Platform for Smart Device   Jeong Nyeo Kim   International Journal of Applied Engineering Research, v.11, no.10, pp.7017-7019 0
Conference
2016 A Study on the Security Features of Operating System for Lightweight IoT Devices   임재덕   한국통신학회 종합 학술 발표회 (하계) 2016, pp.1384-1385
Conference
2016 Analysis of Smart Meter Hacking and Countermeasures   이윤경   한국정보보호학회 학술 대회 (하계) 2016, pp.1-4
Journal
2016 Security Core Technology Implementation for Hardware-based Smart Devices   JeongNyeo Kim   International Journal of Applied Engineering Research, v.11, no.8, pp.5927-5930 0
Conference
2015 A Functional Relationship Based Attestation Scheme for Detecting Compromised Nodes in Large IoT Networks   Yong-Hyuk Moon   International Conference on Ubiquitous Information Technologies and Applications (CUTE) 2015 (LNEE 373), pp.713-721 6
Conference
2015 A Study on the Hardware-based Security Solutions for Smart Devices   Hongil Ju   International Conference on Computational Science and Computational Intelligence (CSCI) 2015, pp.51-51
Conference
2015 Supporting a Variety of Secure Services Based on MTM   Seungyong Yoon   International Conference on Systems and Networks Communications (ICSNC) 2015, pp.18-20
Conference
2015 Performance Analysis of Encrypted Code Analyzer for Malicious Code Detection   Daewon Kim   International Conference on Communications, Computation, Networks and Technologies (INNOV) 2015, pp.1-3
Journal
2015 Implementation of a Hardware Security Chip for Mobile Devices   Hongil Ju   IEEE Transactions on Consumer Electronics, v.61, no.4, pp.500-506 14
Conference
2015 Dynamic Permission Re-Enforcement Technique for Protecting Application from Others with Over-Privileged Permission at Run Time   Boheung Chung   International Conference on Security Technology (SecTech) 2015, pp.13-16 1
Conference
2015 Smart Meter and Smart Meter Security   Yun-kyung Lee   International Conference on Computers, Communications and Systems (ICCCS) 2015, pp.1-3
Conference
2015 A Study on the Remote Authentication Method between IoT Devices using a Trusted Security Module   한진희   한국정보처리학회 학술 발표 대회 (추계) 2015, pp.587-590
Conference
2015 A Method Based on Platform Integrity Verification for Activating a Mobile Trusted Module   Daewon Kim   International Conference on Information and Communication Technology Convergence (ICTC) 2015, pp.1177-1179
Conference
2015 Mobile Security Technology for Smart Devices   Seungyong Yoon   International Conference on Information and Communication Technology Convergence (ICTC) 2015, pp.1174-1176
Conference
2015 Trusted Military Services Based on the Secure Domain of the Mobile Security Solution   GeonLyang Kim   International Conference on Information and Communication Technology Convergence (ICTC) 2015, pp.1128-1131
Conference
2015 Technology Trends of Access Control in IoT and Requirements Analysis   Yun-kyung Lee   International Conference on Information and Communication Technology Convergence (ICTC) 2015, pp.1034-1036
Conference
2015 Network Resilience Estimation to Cascading Failures   Yong-Hyuk Moon   International Conference on Information and Communication Technology Convergence (ICTC) 2015, pp.965-966
Conference
2015 Security Considerations for Secure and Trustworthy Smart Home System in the IoT Environment   Jin-Hee Han   International Conference on Information and Communication Technology Convergence (ICTC) 2015, pp.1119-1121
Conference
2015 The Secure Urgent Situation Propagation System Using the Mobile Security Solution   GeonLyang Kim   International Conference on Computer Science, Computer Engineering, and Social Media (CSCESM) 2015, pp.109-114 2
Journal
2015 A Multi-Resolution Port Scan Detection Technique for High-Speed Networks   Hwashin Moon   Journal of Information Science and Engineering, v.31, no.5, pp.1613-1632 2
Journal
2015 Implementation of a MTM-based secure OTP Generator for IoT Devices   김영세   대한임베디드공학회논문지, v.10, no.4, pp.199-206
Conference
2015 A Methodology for Live Forensic Acquisition in Secure Domain Based on Domain Separation Technology   Kyung-Soo Lim   International Conference on Communication and Computer Engineering (ICOCOE) 2015 (LNEE 362), v.362, pp.1113-1123 3
Conference
2015 Improving MTM-Based Session & Key Management   Seungyong Yoon   International Conference on Green and Human Information Technology (ICGHIT) 2015, pp.333-334
Conference
2014 Application Authentication and Secure Key Management Scheme using MTM   Jin-Hee Han   International Conference on Computer Science and its Applications (CSA) 2014 (LNEE 330), pp.941-946 0