|
Journal
|
2025 |
Vehicular communication security standard trend in ITU-T SG17
이상우
정보보호학회지, v.35, no.4, pp.29-34 |
|
|
|
Conference
|
2025 |
Development of a covert channel using monitor brightness changes
전용성
대한전자공학회 학술 대회 (하계) 2025, pp.1-3 |
|
|
|
Journal
|
2025 |
State of the art of autonomous vehicle communication security standardization
이상우
정보와 통신: 한국통신학회지, v.42, no.3, pp.24-30 |
|
|
|
Conference
|
2024 |
Development of wireless covert channel system using magnetic fields
전용성
한국통신학회 종합 학술 발표회 (추계) 2024, pp.799-800 |
|
|
|
Journal
|
2024 |
Trend of vehicular communication standardization in ITU-T SG17
이상우
정보보호학회지, v.34, no.4, pp.29-33 |
|
|
|
Conference
|
2024 |
Design of covert channel using changes in light brightness
전용성
대한전자공학회 학술 대회 (하계) 2024, pp.2526-2529 |
|
|
|
Journal
|
2023 |
Standardization trend for vehicular communication security in ITU-T SG17
이상우
정보보호학회지, v.33, no.4, pp.83-87 |
|
|
|
Conference
|
2023 |
Implementation of covert channel based on adjacent modulation using WiFi beacon interval
전용성
대한전자공학회 학술 대회 (하계) 2023, pp.2119-2121 |
|
|
|
Journal
|
2023 |
Trend of ITS security standardization
이상우
SEP Inside, v.38, pp.14-23 |
|
|
|
Journal
|
2022 |
Trend on vehicular communication security standardization in ITU-T SG17
이상우
정보보호학회지, v.32, no.4, pp.93-97 |
|
|
|
Conference
|
2022 |
Design of covert channel using WiFi beacon interval
전용성
대한전자공학회 학술 대회 (하계) 2022, pp.2069-2071 |
|
|
|
Journal
|
2022 |
Standardization trend for intelligent autonomous vehicle communication security
이상우
TTA Journal, v.199, pp.42-49 |
|
|
|
Journal
|
2021 |
Standardization Trend for Vehicular Communication Security in ITU-T SG17
이상우
정보보호학회지, v.31, no.4, pp.17-21 |
|
|
|
Conference
|
2021 |
Consideration for the Construction of Practical Wireless Covert Timing Channels
Hayoung Seong
World Conference on Information Security Applications (WISA) 2021, pp.66-70 |
|
|
|
Conference
|
2021 |
Flash Memory Storage Management Method for Data Protection in Embedded Systems
전용성
대한전자공학회 학술 대회 (하계) 2021, pp.1585-1588 |
|
|
|
Journal
|
2020 |
Secure Key Agreement and Authentication Protocol for Message Confirmation in Vehicular Cloud Computing
JoonYoung Lee
Applied Sciences, v.10, no.18, pp.1-20 |
16 |
|
|
Journal
|
2020 |
Internation standardization trend on vehicular communication and ITS security in ITU-T SG17
이상우
정보보호학회지, v.30, no.4, pp.23-27 |
|
|
|
Journal
|
2020 |
A Secure and Efficient Three-Factor Authentication Protocol in Global Mobility Networks
SungJin Yu
Applied Sciences, v.10, no.10, pp.1-23 |
25 |
|
|
Journal
|
2020 |
Privacy-Preserving Lightweight Authentication Protocol for Demand Response Management in Smart Grid Environment
SungJin Yu
Applied Sciences, v.10, no.5, pp.1-26 |
42 |
|
|
Journal
|
2019 |
Standardization Trend of Autonomous Vehicle Security
권혁찬
TTA Journal, v.186, pp.55-64 |
|
|
|
Journal
|
2019 |
A Secure Charging System for Electric Vehicles Based on Blockchain
Myeong Hyun Kim
Sensors, v.19, no.13, pp.1-22 |
74 |
|
|
Journal
|
2019 |
Trend of international standardization on vehicular commounication and ITS
이상우
정보보호학회지, v.29, no.1, pp.8-12 |
|
|
|
Conference
|
2018 |
ATHENA: A Pagerank-based Scheme to Solve the Thundering Herd in Authentication
Chao Chen
Vehicular Networking Conference (VNC) 2018, pp.1-4 |
0 |
|
|
Journal
|
2018 |
ITU-T SG17 Question 13: Security Aspects for Intelligent Transport Systems
Sang-Woo Lee
IEEE Communications Standards Magazine, v.2, no.3, pp.12-12 |
|
|
|
Journal
|
2018 |
Standardization trend on ITS security
이상우
정보보호학회지, v.28, no.4, pp.25-28 |
|
|
|
Conference
|
2017 |
CAESAR: A criticality-aware ECDSA signature verification scheme with Markov model
Chao Chen
Vehicular Networking Conference (VNC) 2017, pp.1-4 |
5 |
|
|
Journal
|
2017 |
ITU-T SG17에서의 ITS 보안 기술 표준화 동향
이상우
정보보호학회지, v.27, no.5, pp.21-25 |
|
|
|
Conference
|
2017 |
A Threat Based Approach to Computational Offloading for Collaborative Cruise Control
Al Tariq Sheik
International Conference on Internet of Things, Data and Cloud Computing (ICC) 2017, pp.1-9 |
3 |
|
|
Journal
|
2017 |
Standardization Issues on Secure Vehicular Communication
SANG-WOO LEE
International Journal of Communications, v.2, pp.19-23 |
|
|
|
Journal
|
2016 |
ITS 보안 기술 표준화 동향
이상우
정보보호학회지, v.26, no.4, pp.36-40 |
|
|
|
Journal
|
2015 |
온라인 아동 보호
나재훈
정보보호학회지, v.25, no.4, pp.39-43 |
|
|
|
Journal
|
2015 |
차량 통신 보안 기술 표준화 동향
이상우
정보보호학회지, v.25, no.4, pp.38-42 |
|
|
|
Conference
|
2015 |
Functional Requirements for VTS Decision Support System
이상우
한국항해항만학회 학술 대회 (춘계) 2015, pp.338-339 |
|
|
|
Journal
|
2013 |
차량통신 보안기술은 지능형 교통시스템 구축 위한 필수요소
이상우
KAMA 저널, v.2013, no.6, pp.1-1 |
|
|
|
Journal
|
2013 |
File Multi-Analyses for Real-Time Attack Source and Spread Site Trace
DaeHee Seo
International Journal of Security and Its Applications, v.7, no.3, pp.215-222 |
0 |
|
|
Journal
|
2013 |
Robust Video Watermarking Based on Temporal Modulation with Error Correcting Code
Sang-Woo Lee
International Journal of Security and Its Applications, v.7, no.3, pp.367-376 |
1 |
|
|
Conference
|
2013 |
Robust Video Watermarking Scheme Based on Temporal Modulation
Sang-Woo Lee
International Conference on Information Security and Assurance (ISA) 2013, pp.33-36 |
|
|
|
Journal
|
2012 |
차량 통신 보안 기술 동향
이상우
주간기술동향, v.1556, pp.12-23 |
|
|
|
Journal
|
2012 |
미래 인터넷 보안 연구 동향 분석 : FIA를 중심으로
전은아
정보보안논문지, v.12, no.1, pp.79-87 |
|
|
|
Conference
|
2012 |
Novel Robust Video Watermarking Algorithm based on Adaptive Modulation
Sang-Woo Lee
International Conference on Advanced Communication Technology (ICACT) 2012, pp.225-229 |
|
|
|
Journal
|
2011 |
Trend on the Future Internet Security Technologies
이상우
전자통신동향분석, v.26, no.5, pp.102-111 |
|
|
|
Conference
|
2011 |
Analysis on Identifying Botnets for Collaborative Integrated Security Control System
이상우
대한전자공학회 종합 학술 대회 (하계) 2011, pp.224-226 |
|
|
|
Conference
|
2010 |
A Study on Collusion-Secure Code against Collusion Attacks
사공명
한국통신학회 종합 학술 발표회 (하계) 2010, pp.1183-1184 |
|
|
|
Conference
|
2010 |
A Study on Forensic Watermarking Technology
이상우
통신 정보 합동 학술 대회 (JCCI) 2010, pp.1-3 |
|
|
|
Conference
|
2009 |
Implementation of a SW-based Secure Storage for License Protection
Sang Woo Lee
IASTED International Conference on Internet and Multimedia Systems and Applications (IMSA) 2009, pp.119-123 |
|
|
|
Journal
|
2008 |
High-Speed Hardware Architectures for ARIA with Composite Field Arithmetic and Area-Throughput Trade-Offs
Sang-Woo Lee
ETRI Journal, v.30, no.5, pp.707-717 |
5 |
|
|
Conference
|
2008 |
Design of Low-area Rijndael Hardware Core
Yong-Sung Jeon
International Conference on Computer Design (CDES) 2008, pp.1-4 |
|
|
|
Conference
|
2007 |
Cryptographic Issues in Database Security
Yong-Sung Jeon
International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC) 2007, pp.384-385 |
|
|
|
Conference
|
2007 |
Hardware Implementation of Block Cipher ARIA
Sang-Woo Lee
International Technical Conference on Circuits Systems, Computers and Communications (ITC-CSCC) 2007, pp.406-407 |
|
|
|
Conference
|
2007 |
Hardware Implementation of Block Cipher ARIA
이상우
통신 정보 합동 학술 대회 (JCCI) 2007, pp.1-5 |
|
|