Type | Year | Title | Cited | Download |
---|---|---|---|---|
Conference
|
2024 | Development of wireless covert channel system using magnetic fields 전용성 한국통신학회 종합 학술 발표회 (추계) 2024, pp.799-800 | ||
Journal
|
2024 | Trend of vehicular communication standardization in ITU-T SG17 이상우 정보보호학회지, v.34, no.4, pp.29-33 | ||
Conference
|
2024 | Design of covert channel using changes in light brightness 전용성 대한전자공학회 학술 대회 (하계) 2024, pp.2526-2529 | ||
Journal
|
2023 | Standardization trend for vehicular communication security in ITU-T SG17 이상우 정보보호학회지, v.33, no.4, pp.83-87 | ||
Journal
|
2023 | Trend of ITS security standardization 이상우 SEP Inside, v.38, pp.14-23 | ||
Conference
|
2023 | Implementation of covert channel based on adjacent modulation using WiFi beacon interval 전용성 대한전자공학회 학술 대회 (하계) 2023, pp.2119-2121 | ||
Journal
|
2022 | Trend on vehicular communication security standardization in ITU-T SG17 이상우 정보보호학회지, v.32, no.4, pp.93-97 | ||
Conference
|
2022 | Design of covert channel using WiFi beacon interval 전용성 대한전자공학회 학술 대회 (하계) 2022, pp.2069-2071 | ||
Journal
|
2022 | Standardization trend for intelligent autonomous vehicle communication security 이상우 TTA Journal, v.199, pp.42-49 | ||
Journal
|
2021 | Standardization Trend for Vehicular Communication Security in ITU-T SG17 이상우 정보보호학회지, v.31, no.4, pp.17-21 | ||
Conference
|
2021 | Consideration for the Construction of Practical Wireless Covert Timing Channels Hayoung Seong World Conference on Information Security Applications (WISA) 2021, pp.66-70 | ||
Conference
|
2021 | Flash Memory Storage Management Method for Data Protection in Embedded Systems 전용성 대한전자공학회 학술 대회 (하계) 2021, pp.1585-1588 | ||
Journal
|
2020 | Secure Key Agreement and Authentication Protocol for Message Confirmation in Vehicular Cloud Computing JoonYoung Lee Applied Sciences, v.10, no.18, pp.1-20 | 13 | |
Journal
|
2020 | Internation standardization trend on vehicular communication and ITS security in ITU-T SG17 이상우 정보보호학회지, v.30, no.4, pp.23-27 | ||
Journal
|
2020 | A Secure and Efficient Three-Factor Authentication Protocol in Global Mobility Networks SungJin Yu Applied Sciences, v.10, no.10, pp.1-23 | 22 | |
Journal
|
2020 | Privacy-Preserving Lightweight Authentication Protocol for Demand Response Management in Smart Grid Environment SungJin Yu Applied Sciences, v.10, no.5, pp.1-26 | 35 | |
Journal
|
2019 | Standardization Trend of Autonomous Vehicle Security 권혁찬 TTA Journal, v.186, pp.55-64 | ||
Journal
|
2019 | A Secure Charging System for Electric Vehicles Based on Blockchain Myeong Hyun Kim Sensors, v.19, no.13, pp.1-22 | 60 | |
Journal
|
2019 | Trend of international standardization on vehicular commounication and ITS 이상우 정보보호학회지, v.29, no.1, pp.8-12 | ||
Conference
|
2018 | ATHENA: A Pagerank-based Scheme to Solve the Thundering Herd in Authentication Chao Chen Vehicular Networking Conference (VNC) 2018, pp.1-4 | 0 | |
Journal
|
2018 | ITU-T SG17 Question 13: Security Aspects for Intelligent Transport Systems Sang-Woo Lee IEEE Communications Standards Magazine, v.2, no.3, pp.12-12 | ||
Journal
|
2018 | Standardization trend on ITS security 이상우 정보보호학회지, v.28, no.4, pp.25-28 | ||
Conference
|
2017 | CAESAR: A criticality-aware ECDSA signature verification scheme with Markov model Chao Chen Vehicular Networking Conference (VNC) 2017, pp.1-4 | 4 | |
Journal
|
2017 | ITU-T SG17에서의 ITS 보안 기술 표준화 동향 이상우 정보보호학회지, v.27, no.5, pp.21-25 | ||
Journal
|
2017 | Standardization Issues on Secure Vehicular Communication SANG-WOO LEE International Journal of Communications, v.2, pp.19-23 | ||
Conference
|
2017 | A Threat Based Approach to Computational Offloading for Collaborative Cruise Control Al Tariq Sheik International Conference on Internet of Things, Data and Cloud Computing (ICC) 2017, pp.1-9 | 3 | |
Journal
|
2016 | ITS 보안 기술 표준화 동향 이상우 정보보호학회지, v.26, no.4, pp.36-40 | ||
Journal
|
2015 | 차량 통신 보안 기술 표준화 동향 이상우 정보보호학회지, v.25, no.4, pp.38-42 | ||
Journal
|
2015 | 온라인 아동 보호 나재훈 정보보호학회지, v.25, no.4, pp.39-43 | ||
Conference
|
2015 | Functional Requirements for VTS Decision Support System 이상우 한국항해항만학회 학술 대회 (춘계) 2015, pp.338-339 | ||
Journal
|
2013 | 차량통신 보안기술은 지능형 교통시스템 구축 위한 필수요소 이상우 KAMA 저널, v.2013, no.6, pp.1-1 | ||
Journal
|
2013 | File Multi-Analyses for Real-Time Attack Source and Spread Site Trace DaeHee Seo International Journal of Security and Its Applications, v.7, no.3, pp.215-222 | 0 | |
Journal
|
2013 | Robust Video Watermarking Based on Temporal Modulation with Error Correcting Code Sang-Woo Lee International Journal of Security and Its Applications, v.7, no.3, pp.367-376 | 1 | |
Conference
|
2013 | Robust Video Watermarking Scheme Based on Temporal Modulation Sang-Woo Lee International Conference on Information Security and Assurance (ISA) 2013, pp.33-36 | ||
Journal
|
2012 | 차량 통신 보안 기술 동향 이상우 주간기술동향, v.1556, pp.12-23 | ||
Journal
|
2012 | 미래 인터넷 보안 연구 동향 분석 : FIA를 중심으로 전은아 정보보안논문지, v.12, no.1, pp.79-87 | ||
Conference
|
2012 | Novel Robust Video Watermarking Algorithm based on Adaptive Modulation Sang-Woo Lee International Conference on Advanced Communication Technology (ICACT) 2012, pp.225-229 | ||
Journal
|
2011 | Trend on the Future Internet Security Technologies 이상우 전자통신동향분석, v.26, no.5, pp.102-111 | ||
Conference
|
2011 | Analysis on Identifying Botnets for Collaborative Integrated Security Control System 이상우 대한전자공학회 종합 학술 대회 (하계) 2011, pp.224-226 | ||
Conference
|
2010 | A Study on Collusion-Secure Code against Collusion Attacks 사공명 한국통신학회 종합 학술 발표회 (하계) 2010, pp.1183-1184 | ||
Conference
|
2010 | A Study on Forensic Watermarking Technology 이상우 통신 정보 합동 학술 대회 (JCCI) 2010, pp.1-3 | ||
Conference
|
2009 | Implementation of a SW-based Secure Storage for License Protection Sang Woo Lee IASTED International Conference on Internet and Multimedia Systems and Applications (IMSA) 2009, pp.119-123 | ||
Journal
|
2008 | High-Speed Hardware Architectures for ARIA with Composite Field Arithmetic and Area-Throughput Trade-Offs Sang-Woo Lee ETRI Journal, v.30, no.5, pp.707-717 | 5 | |
Conference
|
2008 | Design of Low-area Rijndael Hardware Core Yong-Sung Jeon International Conference on Computer Design (CDES) 2008, pp.1-4 | ||
Conference
|
2007 | Cryptographic Issues in Database Security Yong-Sung Jeon International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC) 2007, pp.384-385 | ||
Conference
|
2007 | Hardware Implementation of Block Cipher ARIA Sang-Woo Lee International Technical Conference on Circuits Systems, Computers and Communications (ITC-CSCC) 2007, pp.406-407 | ||
Conference
|
2007 | Hardware Implementation of Block Cipher ARIA 이상우 통신 정보 합동 학술 대회 (JCCI) 2007, pp.1-5 | ||
Conference
|
2007 | Implementation of 10Gb Ethernet Switch Hardware Platform with a Network Processor and a 10Gb EMAC Sang-Woo Lee International Conference on Advanced Communication Technology (ICACT) 2007, pp.563-566 | 3 | |
Conference
|
2006 | Implementation of IPsec VPN Hardware Platform 이상우 차세대 통신 소프트웨어 학술 대회 (NCS) 2006, pp.1-4 | ||
Conference
|
2006 | Implementation of IPv4 Packet Forwarding Application on Network Processors Sang Woo Lee International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC) 2006, pp.1-3 | ||
Conference
|
2006 | Implementation of VPN Router Hardware Platform using Network Processor Sang Woo Lee International Conference on Advanced Communication Technology (ICACT) 2006, pp.670-674 | 2 | |
Conference
|
2006 | An Efficient Design of High Speed Network Security Platform using Network Processor Yong Sung Jeon International Conference on Embedded Systems and Applications (ESA) 2006, pp.121-123 | ||
Conference
|
2006 | Design of Giga Performance VPN Router Sang Su Lee International Conference on Advanced Communication Technology (ICACT) 2006, pp.1011-1013 | 0 | |
Conference
|
2006 | Implementation of VPN Router Hardware Platform using Netwvor Processor Sang Woo Lee International Conference on Advanced Communication Technology (ICACT) 2006, pp.670-674 | 2 | |
Conference
|
2005 | Design and Implementation of Gigabit Router using Network Processor Sang-Woo Lee Internet and Multimedia Systems and Applications (IMSA) 2005, pp.32-35 | ||
Conference
|
2005 | Implementation of Gigabit Router with Network Porcesskr 이상우 한국통신학회 종합 학술 발표회 (하계) 2005, pp.110-113 | ||
Conference
|
2005 | Design of Access Router Hardware Platform using the IXP2800 Network Processor Yong-Sung Jeon International Technical Conference on Circuits Systems, Computers and Communications (ITC-CSCC) 2005, pp.1439-1440 | ||
Conference
|
2003 | Design and Implementation of an Efficient Divider over GF(2m) for Elliptic Curve Cryptography 이상우 전자 정보 통신 학술 대회 (CEIC) 2003, pp.384-387 | ||
Conference
|
2003 | An efficient inverse multiplier/divider architecture for cryptography systems Junhyung Um International Symposium on Circuits and Systems (ISCAS) 2003, pp.149-152 | ||
Conference
|
2003 | Design and implementation of Elliptic Curve Cryptography Accelerator for Smart Card 이상우 통신 정보 합동 학술 대회 (JCCI) 2003, pp.85-85 | ||
Conference
|
2002 | Implementation of Efficient Inverse Multiplier for Smart Card 엄준형 한국정보처리학회 학술 발표 대회 (추계) 2002, pp.995-998 | ||
Conference
|
2001 | USB Controller FPGA Implementation for Secure Token 이상우 한국통신학회 종합 학술 발표회 (추계) 2001, pp.1106-1109 |