À±ÀºÁØ ±³¼ö

Á÷À§ : ±³¼ö

ÇзÂ

2007 °æºÏ´ëÇб³ Á¤º¸º¸È£ ¹Ú»çÁ¹¾÷
2003 °æÀÏ´ëÇб³ ³×Æ®¿öÅ©º¸¾È ¼®»çÁ¹¾÷
1995 °æÀÏ´ëÇб³ ¼¶À¯°øÇÐ ÇлçÁ¹¾÷
 

°æ·Â

2011.09.01~ °æÀÏ´ëÇб³ »çÀ̹öº¸¾ÈÇаú ±³¼ö
2009.03.01~2011.08.31 °æºÏ´ëÇб³ ´ëÇпø BK21°è¾à±³¼ö
2008.04.14~2011.08.31 °æºÏ´ëÇб³ 2´Ü°è BK21»ç¾÷´Ü ¹Ú»ç±Þ¿¬±¸¿ø/ÀüÀÓ¿¬±¸¿ø
2007.03.01~2008.02.29 ´ë±¸»ê¾÷Á¤º¸´ëÇÐ »êÇÐÇù·Â´Ü ¿¬±¸¿ø
2007.03.01~2008.02.29 ´ë±¸»ê¾÷Á¤º¸´ëÇÐ ÀüÀÓ°­»ç
2004.03.01~2007.02.28 °æºÏ´ë À̵¿³×Æ®¿öÅ©Á¤º¸º¸È£±â¼ú¿¬±¸¼¾ÅÍ ¿¬±¸º¸Á¶¿ø
2003.03.01~2007.02.28 °è¸í¹®È­´ëÇÐ, ¿µÁøÀü¹®´ë µî ½Ã°£°­»ç
 

¿¬±¸½ÇÀû

2011 ³í¹® A secure broadcasting cryptosystem and its application to grid computing FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF GRID COMPUTING-THEORY METHODS AND APPLICATIONS
2011 ³í¹® Cryptanalysis of a simple three-party password-based key exchange protocol INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS
2011 ³í¹® Remote mutual authentication and key agreement scheme based on elliptic curve cryptosystem TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES
2011 ³í¹® An efficient and secure Diffie-Hellman key agreement protocol based on Chebyshev chaotic map COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION
2011 ³í¹® Robust biometric-based three-party authenticated key establishment protocols INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS
2010 ³í¹® A Robust Security Mechanism for Mobile Commerce Transactions IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS
2010 ³í¹® An Optimized Gateway-oriented Password-based Authenticated Key Exchange Protocol IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS
2010 ³í¹® Off-Line Keyword Guessing Attacks on Searchable Encryption with Keyword-Recoverability IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS
2010 ³í¹® A Biometric Authenticated Key Agreement Protocol for Secure Token IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS
2010 ³í¹® A New Fingerprint Biometric Remote User Authentication Scheme using Chaotic Hash Function on Mobile Devices INTELLIGENT AUTOMATION AND SOFT COMPUTING
2010 ³í¹® An Entire Chaos-based Biometric Remote User Authentication Scheme on Tokens without using Password INFORMATICA
2010 ³í¹® ÀÇ·áÁ¤º¸º¸È£¸¦ À§ÇÑ RFID¸¦ ÀÌ¿ëÇÑ È¯ÀÚ ÀÎÁõ ½Ã½ºÅÛ Çѱ¹Åë½ÅÇÐȸ³í¹®Áö
2010 Çмú¹ßÇ¥ A Three-Factor Authenticated Key Agreement Scheme for SIP on Elliptic Curves 4th International Conference on Network and System Security (NSS 2010)
2009 ³í¹® Robust Key Exchange Protocol between Set-Top Box and Smart Card in DTV Broadcasting INFORMATICA
2009 ³í¹® °³¼±ÇÑ ÀÏȸ¼º ³­¼ö¸¦ ÀÌ¿ëÇÑ RFID »óÈ£ÀÎÁõ ÇÁ·ÎÅäÄÝ Á¤º¸°úÇÐȸ³í¹®Áö : Á¤º¸Åë½Å
2009 ³í¹® °ø°³ ä³Î ±â¹ÝÀÇ RFID »óÈ£ÀÎÁõ ½Ã½ºÅÛ ¼³°è Çѱ¹Åë½ÅÇÐȸ³í¹®Áö
2009 Çмú¹ßÇ¥ A New Authentication Scheme for Session Initiation Protocol 2009 International Conference on Complex, Intelligent and Software Intensive Systems, CISIS 2009
2009 Çмú¹ßÇ¥ Robust ID-Based Remote Mutual Authentication with Key Agreement Scheme for Mobile Devices on ECC The 7th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC 2009)
2009 Çмú¹ßÇ¥ Robust Multi-Server Authentication Scheme NPC 2009, Sixth IFIP International Conference on Network and Parallel Computing
2009 ¼ö»ó 2009 Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÏ°èÇмú´ëȸ ¿ì¼ö³í¹®»ó Çѱ¹Á¤º¸º¸È£ÇÐȸ
2008 ³í¹® Improving the novel three-party encrypted key exchange protocol COMPUTER STANDARDS & INTERFACES
2008 ³í¹® Robust User Password Change Scheme based on the Elliptic Curve Cryptosystem FUNDAMENTA INFORMATICAE
2008 Çмú¹ßÇ¥ An Efficient Authentication and Key Agreement Protocol in RFID System NPC 2008, IFIP International Conference on Network and Parallel Computing