Researcher Page

사진
Kim, Kwangjo (김광조)
교수, School of Computing(전산학부)
Research Area
Authentication, Network Security, Industrial Security, SCADA security
Co-researchers
    Similar researchers

    Keyword Cloud

    Reload 더보기
    NO Title, Author(s) (Publication Title, Volume Issue, Page, Issue Date)
    1
    Privacy-Preserving Deep Learning on Machine Learning as a Service-a Comprehensive Survey

    Tanuwidjaja, Harry Chandra; Choi, Rakyong; Baek, Seunggeun; et al, IEEE ACCESS, v.8, pp.167425 - 167447, 2020-09

    2
    Intrusion Detection System Using Deep Learning and Its Application to Wi-Fi Network

    Kim, Kwangjoresearcher, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E103D, no.7, pp.1433 - 1447, 2020-07

    3
    A Compendium of Practices for Central Bank Digital Currencies for Multinational Financial Infrastructures

    Opare, Edwin Ayisi; Kim, Kwangjoresearcher, IEEE ACCESS, v.8, pp.110810 - 110847, 2020-06

    4
    Advances in Security Research in the Asiacrypt Region

    Phan, Raphael C. W.; Abe, Masayuki; Batten, Lynn; et al, COMMUNICATIONS OF THE ACM, v.64, no.4, pp.78 - 81, 2020-03

    5
    애플리케이션 로그를 이용한 공유 자전거 시스템의 잠금장치 해제 방법

    조준완; 이지은; 김광조researcher, 정보보호학회논문지, v.29, no.4, pp.719 - 728, 2019-08

    6
    Post-quantum security of IGE mode encryption in Telegram

    Lee, Jeeun; Kim, Sungsook; Lee, Seunghyun; et al, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS, COMMUNICATIONS AND COMPUTER SCIENCES, v.E102-A, no.1, pp.148 - 151, 2019-01

    7
    eMotion: An SGX extension for migrating enclaves

    Park, Jaemin; Park, Sungjin; Kang, Brent Byunghoonresearcher; et al, COMPUTERS & SECURITY, v.80, pp.173 - 185, 2019-01

    8
    Deep Abstraction and Weighted Feature Selection for Wi-Fi Impersonation Detection

    Aminanto, Muhamad Erza; Choi, Rakyong; Tanuwidjaja, Harry Chandra; et al, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, v.13, no.3, pp.621 - 636, 2018-03

    9
    암호와 정보보호

    김광조researcher, 학문연구의 동향과 쟁점 - 전기공학, 전자공학, 정보통신공학, v.7, 2018-01

    10
    Provably Secure Gateway Threshold Password-Based Authenticated Key Exchange Secure against Undetectable On-Line Dictionary Attack

    Kobayashi, Yukou; Yanai, Naoto; Yoneyama, Kazuki; et al, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E100A, no.12, pp.2991 - 3006, 2017-12

    11
    양자 컴퓨터 공격에 안전한 격자 기반키 교환 방식의 비교

    최락용; 안형철; 이지은; et al, 한국통신학회논문지, v.42, no.11, pp.2200 - 2207, 2017-11

    12
    Another Fuzzy Anomaly Detection System Based on Ant Clustering Algorithm

    Aminanto, Muhamad Erza; Kim, Hakju; Kim, Kyung-Min; et al, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E100A, no.1, pp.176 - 183, 2017-01

    13
    Data Randomization and Cluster-Based Partitioning for Botnet Intrusion Detection

    Omar Y. Al-Jarrah; Omar Alhussein; Paul D. Yoo; et al, IEEE TRANSACTIONS ON CYBERNETICS, v.46, no.8, pp.1796 - 1806, 2016-08

    14
    Scalable P2P Botnet Detection with Threshold Setting in Hadoop Framework

    Huseynov, Khalid; Yoo, Paul D.; 김광조researcher, 정보보호학회논문지, v.25, no.4, pp.807 - 816, 2015-08

    15
    Differentially private client-side data deduplication protocol for cloud storage services

    Shin, Youngjoo; Kim, Kwangjoresearcher, SECURITY AND COMMUNICATION NETWORKS, v.8, no.12, pp.2114 - 2123, 2015-08

    16
    조직의 실시간 보안관리 체계 확립을 위한 ‘인터페이스 보안’ 강화에 대한 연구

    박준정; 김소라; 안수현; et al, 정보처리학회논문지. 컴퓨터 및 통신시스템, v.4, no.5, pp.171 - 176, 2015-05

    17
    Identity-based chameleon hashing and signatures without key exposure

    Chen, Xiaofeng; Zhang, Fangguo; Susilo, Willy; et al, INFORMATION SCIENCES, v.265, pp.198 - 210, 2014-05

    18
    escar 회의 등을 통한 각국의 자동차 보안 기술 동향 연구

    김광조researcher; 이동수, 한국정보보호학회지, v.24, no.2, pp.7 - 20, 2014-04

    19
    Efficient and Secure File Deduplication in Cloud Storage

    Shin, Youngjoo; Kim, Kwangjoresearcher, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E97D, no.2, pp.184 - 197, 2014-02

    20
    A scalable and robust hierarchical key establishment for mission-critical applications over sensor networks

    Kim, Jang-Seong; Kim, Kwang-Joresearcher, TELECOMMUNICATION SYSTEMS, v.52, no.2, pp.1377 - 1388, 2013-02

    Load more items
    Loading...

    rss_1.0 rss_2.0 atom_1.0