Á¤º¸Åë½Å°øÇÐÀü°ø 4ÇгâCNSL member Profile Publication Family Link Lecture Guestbook
¿¬ ±¸ ¹ß Ç¥ ½Ç Àû : ÀÌ ÈÆ Àç ('2008. 03. 31 ÇöÀç)
0. °Ë»ö½Ã½ºÅÛ
- ³í¹®°Ë»ö : ±¸±Û °Ë»ö http://www.google.co.kr/
Citeseer http://citeseer.ist.psu.edu/cs
- ƯÇã°Ë»ö : http://www.kipris.or.kr/kor/main/main.jsp
Springer LNCS series is Jame's Muir's LNCS
Cryptography Volumes available via SpringerLINK page.
Thomson's SCI lists ==> http://ip-science.thomsonreuters.com/cgi-bin/jrnlst/jloptions.cgi?PC=K
Thomson's SCI-E lists ==> http://ip-science.thomsonreuters.com/cgi-bin/jrnlst/jloptions.cgi?PC=D
Elsevier SCOPUS ==> http://www.kri.go.kr/kri/rp/main.jsp
o. ±¸±Û ½ºÄÝ·¯ ÀοëÁö¼ö(Google Scholar Citations for HoonJae Lee)
==> http://scholar.google.com/citations?hl=en&user=6kQr-ScAAAAJ
I. Á¤±Ô ³í¹®Áö
¡á International Journals
1. Hoonjae Lee, Bongjoo Park, Byunghwa Chang and Sangjae Moon,
"A Zero Suppression Algorithm for Synchronous Stream Cipher,"
Applied Signal Processing(London) Vol. 5, No.4, pp. 240-243, Dec. 1998.
2. Hoonjae Lee, Sangjae Moon, "On An Improved Summation Generator with 2-Bit Memory,"
Signal Processing(Switzerland), Vol. 80, No.1. pp.211-217, Jan. 2000.
3. Hoonjae Lee, Sangjae Moon, "A New ZS Algorithm for a Synchronous Stream Cipher"
Applied Signal Processing (Splinger, London), Vol. 6, No.4, pp. 177-181, Dec. 1999.
4. Hoonjae Lee, Sangjae Moon, "Parallel Stream Cipher for Secure High-Speed Communications,"
Signal Processing, Vol. 82, No.2, pp.259-265, Feb. 2002.
5. A. Clark, E. Dawson, J. Fuller, J. Golic, Hoon-Jae Lee, W. Millan, Sang-Jae Moon, L. Simpson,
"The LILI-II Keystream Generator," LNCS 2384, pp.25-39, Jul. 2002 (ACISP'2002)
6. DongJin Kwak, JaeCheol Ha, HoonJae Lee, HwanKoo Kim, SangJae Moon,
"A WTLS handshake protocol with user anonymity and forward secrecy,"
LNCS
2524 (CIC'2002), pp.219-230, Nov. 2002.
7. MhanKi Ahn, JaeCheol Ha, HoonJae Lee, SangJae Moon,
"A Random M-ary Method based Countermeasure against Power Analysis Attacks on ECC ,"
LNCS 2668, pp338-347, 2003.5.18-21(ICCSA2003).
8. HoonJae Lee, MhanKi Ahn, Seon-Gan Lim, SangJae Moon, "A Study on Smartcard Security Evaluation Criteria
for Side-Channel Attacks," LNCS, ICCSA2004, 2004.5.14-17
9. Kevin Chen, M. Henrickson, W.Millan, J. Fuller, A. Simpson, Ed Dawson, Hoonjae Lee, Sangjae Moon,
¡°Dragon: A Fast Word Based Stream Cipher,¡± LNCS (ICISC'2004) 2004.12.2-12.3
10. Hoonjae Lee, "Highly Reliable Synchronous Stream Cipher System for Link Encryption,"
LNCS 3982 (ICCSA2006), pp.269-278, Glasgow, UK, May 8-11, 2006.
11. MhanKi Ahn, HoonJae Lee, "Experiments and Hardware Countermeasures on Power Analysis Attacks,"
LNCS 3982 (ICCSA2006), pp.48-53, Glasgow, UK, May 8-11, 2006.
12. Cheol-Su Kim, Young-Ho Park, Hoon-Jae Lee, Soo-Joong Kim,
"Optical information security system using an interference-based computer-generated hologram
and BaTiO3," Optical Engineering 454, 045801, April 2006.
13. JeaHoon Park, HoonJae Lee, JaeCheol Ha, YongJea Choi, HoWon Kim, SangJae Moon,
"A Differential Power Analysis Attack of Block Cipher based on the Hamming Weight of Internal Operation Unit,"
LNAI (CIS2006 - International conference on Computational Intelligence and Security), pp.1375-1380,
Ramada Pearl Hotel, Guangzhou, China.
14. Heung-Kuk Jo, Hoon-Jae Lee, "An Implementation of a RFID Tag ID Relay-Transmission over the Wireless and TCP/IP,"
Journal of Convergence Information Technology, Vol. 1, No. 1, pp.98-104, Dec. 2006, (ISSN 1975 - 9320).
15. Heung-Kuk Jo, Hoon-Jae Lee, "A Relay-Transmission of the RFID Tag ID over the Wireless and TCP/IP with a Security Agent,"
LNAI 4496 (KES-AMSTA2007), pp918-927, Wroclaw, Poland, 5.31-6.1, 2007.
16. Menghui Lim, Sanggon Lee, Youngho Park, Hoonjae Lee,
"An Enhance ID-based Deniable Authentication Protocol on Pairings,"
LNCS 4706, pp1008-1017, ICCSA2007, Kuala Lumpur, Malaysia, Aug 26-29, 2007
17. Menghui Lim, Sanggon Lee, Youngho Park, Hoonjae Lee,
"An Enhanced One-round Pairing-based Tripartite Authenticated Key Agreement Protocol,"
LNCS 4706, pp503-513, ICCSA2007, Kuala Lumpur, Malaysia, Aug 26-29, 2007.
18. HyeongRag Kim, HoonJae Lee, SangJae Moon, "A Security enhancement of the E0 cipher in Bluetooth System,"
LNAI Vol. 4953 (KES AMSTA2008), pp.858-867, Inchon, Korea, Mar. 27-28, 2008.
19. Menghui Lim, Chee-Min Yeoh, Sanggon Lee, Hyotaek Lim, Hoonjae Lee,
"A Secure and Efficient Three-Pass Authenticated Key Agreement Protocol Based on Elliptic Curves,"
LNCS 4982 (NETWORKING 2008), pp.170-182, Singapore, May 5-9, 2008.
20. Meng Hui Lim, Sanggon Lee and Hoonjae Lee, "Cryptanalytic Flaws in Oh et al.'s ID-Based Authenticated Key Agreement Protocol," LNCS 5073 (ICCSA2008, pp458-467, Italy, Jun. 30- Jul. 3, 2008. ISBN 978-3-540-69840-1
21. HoonJae Lee, Il Seok Ko (Franz Ko), "An Intelligent Security Agent for Reliable Cipher System using PingPong," Cybernetics and Systems Journal, Vol. 39, No. 7, pp.705-718, Oct.-Nov., 2008. ISSN 0196-9722 (SCIE)
21. Mangal Sain, Sachin Bhardwaj, HoonJae Lee and Wan-Young Chung, ¡°Architecture of Personal Healthcare Information System in Ubiquitous Healthcare,¡± LNCS (FGIT2009/FGCN2009) Jeju, Dec. 10-12, 2009.
22. Mangal Sain, HoonJae Lee and Wan-Young Chung, ¡°User Interface for Personal Healthcare Information System in Ubiquitous Healthcare,¡±
IEEE/LNCS (IHCI2010), IIIT, Allahabad, India, Jan. 16-18, 2010
23. Dhananjay Singh, Hakimjon Zaynidinov, HoonJae Lee, "Piecewise -Quadratic Harmut¡¯s Bases Functions and its Application Problems in Digital Signal Processing," International Journal of Communication Systems(IJCS), Wiley-Blackwell (SCIE)
24. Alka Gautam, Hoon-Jae Lee, Wan-Young Chung, ¡°ECG Signal De-noising with Asynchronous Averaging And Filtering algorithm,¡± International Journal of Healthcare Information Systems and Informatics (IJHISI), Vol.5, No. 2, pp.30-36, April 2010.
25. Pardeep Kumar, Amlan Choudhury, Mangal Sain, Sang Gon Lee, HoonJae Lee, "RUASN: A Robust User Authentication framework for Wireless Sensor Networks," Sensors, Vol. 11, pp.5020-5046, May 2011, ISSN 1424-8220, MDPI, Basel, Switzerland. (SCIE)
28. SohYee Lee, HoonJae Lee, "Hardware Implementation and Performance Analysis of NLM-128 stream cipher," CCIS 206 (ICHIT2011), pp.446-453, September 23rd ¢¦ 25th, 2011 Daejeon, Korea, ISBN 978-3-642-24105-5
29. Amlan Jyoti Choudhury, Beum Su Park, Ndibanje Bruce, Young Sil Lee, Hyotaek Lim, Hoon Jae Lee, "An Efficient Hardware Countermeasure against Differential Power Analysis Attack," CCIS 206 (ICHIT2011), pp. 153-159, Sep. 23rd ¢¦ 25th, 2011 Daejeon, Korea, ISBN 978-3-642-24105-5
30. Beum Su Park, Amlan Jyoti Choudhury, Young Sil Lee, TaeYong Kim, HoonJae Lee, "An efficient Password Authentication Method using CAPTCHA," LNCS 6935 (ICHIT2011), pp.456-463, Sep. 23rd ¢¦ 25th, 2011 Daejeon, Korea, ISBN 978-3-642-24081-2
31. YoungDong Lee, DoUn Jeong, HoonJae Lee, ¡°Empirical Analysis of Reliability of Low-Rate Wireless u-Healthcare Monitoring Applications,¡± International Journal of Communication Systems(IJCS), JohnWiley & Sons Ltd., on-line published, Oct. 26, 2011.(USA),Online ISSN: 1099-1131 (SCIE)
32. Pardeep Kumar, HoonJae Lee, "Security Issues in Healthcare Applications using Wireless Medical," Sensors 2012, Vol. 12, No. 1, pp.55-91, Jan. 2012, MDPI, Basel, Switzerland, ISSN 1424-8220 (SCIE)
33. Pardeep Kumar, SangGon Lee, HoonJae Lee, "E-SAP: Efficient-Strong Authentication Protocol for Healthcare Application using Wireless Medical Sensor Networks," Sensors, Vol.12, No.2, pp.1625-1647, Feb. 2012, MDPI, Basel, Switzerland, ISSN: 1424-8220 (SCIE)
¡á International Conferences : A À¯Çü (IEEE/ ACM / USENIX)
1. JaeHwa Shin, KyungKeun Lee, HoonJae Lee, "A Distributed Implicit Certification Scheme with Password Authentication,
ICCSA2005 (POSTER), 2005.5.9-5.12 , ISBN 981-05-3498-1 (2005.5), Springer
2. Hoonjae Lee, HyungRak Kim, "High-Speed Implementation of Ubiquitous Stream Cipher," ICSC2005
, pp.1624-1631, 2005. 10.24-28, Beijing, ISBN 7-5062-7841-3(2005.10), Int'l Academic Pub, World Pub. Co.
3. HoonJae Lee, TaeHoon Kim, "On the Security Enhancement of the OTAR Protocol and Cryptosystems," ICSC'2005,
pp.1617-1623, 2005. 10.24-28, Beijing, ISBN 7-5062-7841-3(2005.10), Int'l Academic Pub, World Pub. Co.
4. SangIl Cho, ErnYu Lee, TaeYong Kim, HoonJae Lee, "A Threshold Clock-Control Summation Sequence Generator," LSCS vol. 7 (ICCMSE2006), pp94-97, Crete, Greece, Oct. 27 - Nov. 2, 2006.
5. Tae Yong Kim, HoonJae Lee, "TM Wave Propagation Simulation using Java Multithreading for Domain Decomposition Approach," LSCS vol. 7 (ICCMSE2006), pp256-259, Crete, Greece, Oct. 27 - Nov. 2, 2006.
6. Heung-Kuk Jo, Hoon-Jae Lee, "An Implementation of a RFID Tag ID Relay-Transmission over the Wireless and TCP/IP," Journal of Convergence Information Technology, Vol. 1, No. 1, pp.98-104, Dec. 2006, (ISSN 1975 - 9320).
7. Hoonjae Lee, SangGon Lee, YoungHo Park, TaeYong Kim, "On the m-parallel Nonlinear Combine Functions
for the Parallel Stream Cipher," IEEE CS Press (ICHIT2006), pp. 636-641, Nov. 9-11, 2006,
8. Hun-Wook Kim, Shu-Yun Lim, HoonJae Lee, "Symmetric Encryption in RFID Authentication Pritocol for Strong
Location Privacy and Forward-Security," IEEE CS Press(ICHIT2006), pp. 636-641, Nov. 9-11, 2006
9. Hoonjae Lee, Kevin Chen, "PingPong-128, A New Stream Cipher for Ubiquitous Application,"
IEEE CS (ICCIT2007), ISBN: 0-7695-3038-9, pp.1893-1899, Kyungju, Nov. 21-23, 2007.
10. Hoonjae Lee, SangGon Lee, Heung-Kuk Jo, "The Parallel High-speed Word-based Nonlinear Functions,"
IEEE CS (ICCIT2007), ISBN: 0-7695-3038-9, pp.2306-2311, Kyungju, Nov. 21-23, 2007.
11. JeaHoon Park, HoonJae Lee, Man-Ki Ahn, "Side-Channel Attacks against ARIA on Active RFID Device,"
IEEE CS (ICCIT2007), ISBN: 0-7695-3038-9, pp.2163-2168, Kyungju, Nov. 21-23, 2007.
12. ErnYu Lee, YuShu They, SeongYee Phang, Hyotaek Lim, HoonJae Lee, "Mutual Autonomy LFSR
Output-based Cellular Automata (MALO-CA)," IEEE CS (ICCIT2007), ISBN: 0-7695-3038-9, pp1742-1745,
Kyungju, Nov. 21-23, 2007.
13. Lim Meng Hui, Bok Min Goi, SangGon Lee, HoonJae Lee, "Hierarchical Dawson¡¯s Summation Generator,"
IEEE CS (ICCIT2007), ISBN: 0-7695-3038-9, pp.1395-1401, Kyungju, Nov. 21-23, 2007.
14. SeongYee Phang, HoonJae Lee, HyoTaek Lim, "A Secure Deployment Framework of NEMO (Network Mobility)
with Firewall Traversal and AAA Server," IEEE CS (ICCIT2007), ISBN: 0-7695-3038-9, pp352-357, Kyungju, Nov. 21-23, 2007.
15. Meng Hui Lim, SangGon Lee, HoonJae Lee, "Cryptanalysis on Improved Chou et al.'s ID-Based Deniable
Authentication Protocol," IEEE CS (ICISS2008), Seoul, Jan.10-11, 2008
16. Meng-Hui Lim, Sanggon Lee, Hoonjae Lee, "Cryptanalysis of Improved One-round Lin-Li's Tripartite
Key Agreement Protocol," IEEE ICACT2008 Proceeding, pp.1916-1921, Phoenix Park, Korea, Feb. 17-21, 2008.
ISSN 1738-9445, ISBN 978-89-5519-136-3.
17. Meng-Hui Lim, Sanggon Lee, Hoonjae Lee, ¡°Secure Deniable Authenticated Key Establishment
for Internet Protocols,¡± IEEE CS (ISA2008), pp.1-6, Busan, Apr. 21-24, 2008, ISBN 978-0-7695-3126-7
18. Yu-Shu They, Seong-Yee Phang, Sanggon Lee, HoonJae Lee, Hyotaek Lim, ¡°CPOP: Cryptography Process
Offloading Proxy for Resource Constrained Devices,¡± IEEE CS (ISA2008), pp.289-294, Busan, Apr.24-28, 2008,
ISBN 978-0-7695-3126-7
19. Yu-Shu They, Chee-Min Yeoh, Hoon-Jae Lee, Hyotaek Lim, ¡°Design and Implementation of
ATA-based Virtual Storage System for Mobile Device,¡± IEEE CS (MUE2008), pp. 490-495, Busan, Apr.24-28, 2008,
ISBN 978-0-7695-3134-2.
20. Meng-Hui Lim, Sanggon Lee, Hoonjae Lee, "Cryptanalysis on an Enhanced Identity-based Deniable Authentication
Protocol," IEEE (INDIN2008), pp.581-585, KAIST, Daejeon, July 13-16, 2008. ISBN 978-1-4244-2171-8
21. Meng-Hui Lim, Sanggon Lee, Hoonjae Lee, "Cryptanalysis on an Enhanced Identity-based Deniable Authentication Protocol," IEEE (INDIN2008), pp.581-585, KAIST, Daejeon, July 13-16, 2008. ISBN 978-1-4244-2171-8.
22. Heung-Kuk Jo, Hoon-Jae Lee, "A RFID Transmission system with Security Agent,"
IEEE CS(ICHIT2008), , pp.110-114, Daejeon, Korea, Aug. 28-29, 2008. ISBN 978-0-7695-3328-5.
23. Meng Hui Lim, Sanggon Lee and Hoonjae Lee, "An Improved Variant of Wang-Cao,"
IEEE CS(NCM2008),pp.108-201, Kyungju, Sep. 2-4, 2008, ISBN 978-0-7695-3322-3
24. Shuyun Lim, Lim Meng Hui, SangGon Lee, Hoonjae Lee, "Secure Hybrid Group Key Management for Hierarchical Self-Organizing Sensor Network," IEEE CS(IAS2008), pp.43-49, Naples, Italy, Sep. 8-10, 2008, ISBN 978-0-7695-3324-7.
25. Meng Hui Lim, Sanggon Lee and Hoonjae Lee, "On The Deniability of Some Deniable Authentication Protocols," IEEE CS(UBICOMM2008), Valencia, Spain, 29 Sep. - 4 Oct., 2008
ISBN 978-0-7695-3367-4.
26. Meng Hui Lim, Sanggon Lee and Hoonjae Lee, "Insider Impersonation Attack on a Tripartite ID-Based Authenticated Key Agreement Protocol with Bilinear Pairings," IEEE CS (NWeSP2008) pp.123-128, Seoul Oct., 2008. ISBN 978-0-7695-3455-8
27. HoonJae Lee, SangGon Lee, HyoTaek Lim, HeungKuk Jo, "GMEM-BSG: An ImprovedLarge-Scale Memory Sequence Generator for Ubiquitous Applications," IEEE CS(ICCIT2008), Vol. II, pp.440-445, Novotel Ambasador, Busan, Nov.11-13, 2008, ISBN 978-0-7695-3407-7
28. Meng Hui Lim, Sanggon Lee and Hoonjae Lee, "An Efficient Multi-server Password Authentication Key Agreement Scheme Revisited," IEEE CS(ICCIT2008), Vol. II, pp.396-400, Novotel Ambasador, Busan, Nov.11-13, 2008, ISBN 978-0-7695-3407-7
29. Seong-Yee Phang, HoonJae Lee, Hyotaek Lim, "Design and Implementation of V6SNIFF: an Efficient IPv6 Packet Sniffer," IEEE CS(ICCIT2008), Vol. II, pp.44-49, Novotel Ambasador, Busan, Nov.11-13, 2008, ISBN 978-0-7695-3407-7
30. Seong-Yee Phang, HoonJae Lee, Hyotaek Lim, "Design and Implementation of V6GEN and V6PCF: A Compact IPv6 Packet Generator and A New Packet Classification Framework for IPv6," IEEE CS(ICCIT2008), Vol. II, pp. 38-43 , Novotel Ambasador, Busan, Nov.11-13, 2008,
ISBN 978-0-7695-3407-7
31. Chee-Min Yeoh, Hee-Yuan Tan, Choon-Keat Kok, Hoon-Jae Lee, Hyotaek Lim, "e2Home: A Lightweight Smart Home Management System," IEEE CS(ICCIT2008), Vol. II, pp. 82-87, Novotel Ambasador, Busan, Nov.11-13, 2008, ISBN 978-0-7695-3407-7
32. alka gautam, youngdong Lee, Dhananjay Singh, shirshu varma, HoonJae Lee, Wanyoung Chung, ¡°Comparative Analysis of Error and Weight Adaptive Motion Artifact Cancellation,¡± IEEE (WCSN2008), pp.302-305, IIIT, India, Dec. 27-29, 2008, ISBN 978-1-4244-3326-1
33. Dhananjay Singh, Hsein-Ping Kew, Madhusudan Singh, U.S.Tiwary, HoonJae Lee, ¡°IP-enebled Sensor Networks for Global Patient Monitoring,¡± IEEE (WCSN2008), pp.127-130, IIIT, India, Dec. 27-29, 2008, ISBN 978-1-4244-3326-1
34. Chee-Min Yeoh, They Yu Shu, HoonJae Lee , Hyotaek Lim, ¡°Design and Implementation of iATA on Windows CE Platform: An ATA-based Virtual Storage System,¡± IEEE CS (CMC 2009),pp.85-89, Kunming, China, Jan. 6 - 8, 2009, ISBN 978-0-7695-3501-2.
35. Mangal sain, WanYoung Chung, HoonJae Lee, "Middleware for Ubiquitous Healthcare Information System," IEEE CS (ICACT2009), pp.2325-2328, Phoenix Park, Korea, Feb. 15-18, 2009. ISBN 978-89-5519-139-4
36. Alka Gautam, Hoon Jae Lee and Wan-Young Chung, "Adaptive Neuro-Fuzzy Artifacts Cancellation for Ubiquitous Wearable ECG Sensor Node," IEEE CS (ICACT2009), pp.2321-2324, Phoenix Park, Korea, Feb. 15-18, 2009. ISBN 978-89-5519-139-4
37. YoungSook Lee, HoonJae Lee, "Multiple Object Tracking for Fall Detection in Real-Time Surveillance System," IEEE CS (ICACT2009), pp.2308-2312, Phoenix Park, Korea, Feb. 15-18, 2009. ISBN 978-89-5519-139-4
38. Dhananjay Singh, U.S. Tiwary, Hoon-Jae Lee and Wan-Young Chung, "Global Patient Monitoring System using 6lowpan Networks," IEEE CS (ICACT2009), pp.113-117, Phoenix Park, Korea, Feb. 15-18, 2009. ISBN 978-89-5519-139-4
39. Sing-Hui Toh, HoonJae Lee, Kyeong-Hoon Do, "Basic Sequence Serch by Hashing Algorithm in DNA Sequence Database," IEEE CS (ICACT2009), pp.2317-2320, Phoenix Park, Korea, Feb. 15-18, 2009. ISBN 978-89-5519-139-4
40. Annapurna Sharma, Hakim Zaynidinov, HoonJae Lee, ¡°Development and Modeling of High-Efficiency Computing Structure for Digital Signal Processing, ¡±IEEE (IMPACT2009), pp.190-193, A.M.U., Aligoch, India, Mar.14-16, 2009. ISBN 978-1-4244-3604-1.
41. Mangal Sain, HoonJae Lee and Wan-Young Chung, ¡°MUHIS : A Middleware approach Using LiveGraph, ¡±IEEE (IMPACT2009), pp.198-201, A.M.U., Aligoch, India, Mar.14-16, 2009.
ISBN 978-1-4244-3604-1.
42. Dhananjay Singh, Madhusudan Singh, Hsein-PingKew, U. S. Tiwary, Hoon-Jae Lee, ¡°IP- based Ubiquitous Sensor Network for In-Home Healthcare Monitoring,¡± IEEE (IMPACT2009), pp.202-205, A.M.U., Aligoch, India, Mar.14-16, 2009. ISBN 978-1-4244-3604-1.
43. Dhananjay Singh, Hsein-Ping Kew, U.S. Tiwary, Hoon-Jae Lee and Wan-Young Chung, "Global Patient Monitoring System using IP-enabled Ubiquitous Sensor Network," IEEE CS (CSIE2009), pp.524-528, Los Angeles/ Anaheim, USA, March 31 - April 2, 2009. ISBN 978-0-7695-3507-4
44. Dhananjay Singh, HoonJae Lee, Wan-young Chung, "Secure IP-Ubiquitous Sensor Network for Healthcare Applications Monitoring In-Home Area," IEEE (ICADIWT2009), pp.862-864, London Metropolitan Univ., London, England, Aug.4-6, 2009, ISBN 978-1-4244-4457-1
45. ALKA GAUTAM, HOON-JAE LEE, WAN-YOUNG CHUNG, "ECG Signal De-noising with Asynchronous Averaging And Filtering algorithm," IEEE (ICOBIAHC2009),pp.125-128, Chennai, India, Aug 6-8. 2009
46. Bayalagmaa Davaanaym, YoungSil Lee, HoonJae Lee, SangGon Lee, Hyotaek Lim, "A PingPong-based One -Time-Passwords Authentication System," IEEE CS (NCM2009), pp.574-579, Seoul, Aug. 25-27, 2009, ISBN 978-0-7695-3769-6
47. Pardeep kumar, HoonJae Lee, "A Secure Data Mechanism for Ubiquitous Sensor Network with Dragon Cipher," IEEE CS (NCM2009), pp.1695-1680, Aug. 25-27, Seoul, Korea, ISBN 978-0-7695-3769-6
48. Mangal Sain, HoonJae Lee, WanYoung Chung, "Personal Healthcare Information System," IEEE CS (NCM2009), pp.1540-1545, Aug. 25-27, Seoul, Korea, ISBN 978-0-7695-3769-6.
49. Pardeep Kumar, HoonJae Lee, Wan-Young Chung, "A Secure Ubiquitous Sensor Network with Dragon," ACM(ICHIT2009), pp.71-74, Aug. 27-29, DaeJeon, ISBN: 978-1-60558-662-5.
50. HoonJae Lee, SangMin Sung, HyungRag Kim, "NLM-128, An Improved LM-type Summation Generator with 2-bit memories," IEEE CS (ICCIT2009), pp.577-582, Seoul, Korea, Nov. 24-26. ISBN:978-0-7695-3896-9
51. Jiun-Hau Liew, Hee-Yuan Tan, HoonJae Lee, Hyotaek Lim, SangGon Lee, "Block Cipher Enhancement using Pseudo-Random Block Shuffling," IEEE CS (ICCIT2009), pp.1030-1035, Seoul, Korea, Nov. 24-26. ISBN:978-0-7695-3896-9
52. Madhusudan Singh, Sang-Gon Lee, Dhananjay Singh, Hoon Jae Lee, "Impact and Performance of Mobility Models in Wireless Ad-hoc Networks," IEEE CS (ICCIT2009), pp.139-143, Seoul, Korea, Nov. 24-26. ISBN:978-0-7695-3896-9
53. Pardeep Kumar, SangIl Cho, HoonJae Lee, "PingPong-MAC: A Secure Ubiquitous Sensor Network with Authenticated Encryption," ACM(ICCIT2009), pp.256-260, 24-26 November, 2009, ISBN: 978-1-60558-710-3
54. Dhananjay Singh, HoonJae Lee, WanYoung Chung, "An Energy Consumption Technique for Global Health Monitoring Applications," ACM(ICCIT2009), pp.539-542, 24-26 November, 2009, ISBN: 978-1-60558-710-3
55. Dhananjay Singh, HoonJae Lee, "Database Design for Global Patient Monitoring Applications using WAP," ACM(ICCIT2009), pp.25-31, 24-26 November, 2009, ISBN: 978-1-60558-710-3
56. Magal Sain, HoonJae Lee, WanYoung Chung, "Middleware in Ubiquitous Computing System with MedRec Architecture," ACM(ICCIT2009), pp.149-154, 24-26 November, 2009, ISBN: 978-1-60558-710-3
57. Mangal Sain, HoonJae Lee, WanYoung Chung, "Designing Context Awareness Middleware Architecture for Personal Healthcare Information System," IEEE CS(ICACT2010), pp.1650-1654, in Phoenix Park, Korea, Feb. 7~10, 2010. ISBN: 978-89-5519-146-2
58. YoungSil Lee, HyoTaek Lim, HoonJae Lee, "A Study on Efficient OTP Generation using Stream Cipher with Random Digit," IEEE CS(ICACT2010), pp.1670-1675, in Phoenix Park, Korea, Feb. 7~10, 2010. ISBN: 978-89-5519-146-2
59. Hee-Yuan Tan, Bee-Lie chai, Hyotaek Lim, Hoon-Jae Lee, "Mobile Virtual Storage using iATA Protocol with Disk Image Based Loop Device," IEEE CS(ICACT2010), pp.997-1002, in Phoenix Park, Korea, Feb. 7~10, 2010. ISBN: 978-89-5519-146-2
60. Jiun-Hau Liew, Shirly Lee, Ivy Ong, HoonJae Lee, HyoTaek Lim, "One-Time Knocking Framework with SPA and IPSec," IEEE (ICINT2010), pp. v5-209~213, Shanghai, China, June 22-24, 2010.
ISBN: 978-1-4244-6369-5
61. Pardeep Kumar, Iftekhar Salam, SangGon Lee, HoonJae Lee, "Addressing Secure Data Routing Scheme for Heterogeneous Sensor Network," IEEE (NCM2010), Pp.86-90, Seoul, Korea, Aug. 16-18, 2010. ISBN 978-89-88678-25-1 (SCOPUS±Þ)
63. Pardeep Kumar, YoungDong Lee, HoonJae Lee, ¡°Secure Health Monitoring using Medical Wireless Sensor Networks,¡± IEEE (NCM2010), Pp.491-494, Seoul, Korea, Aug. 16-18, 2010.
ISBN 978-89-88678-25-1 (SCOPUS±Þ)
62. Iftekhar Salam, Pardeep Kumar, HoonJae Lee, ¡°An Efficient Key Pre-distribution Scheme for Wireless Sensor Networks Using Public Key Cryptography,¡± IEEE (NCM2010), Pp.402-407, Seoul, Korea, Aug. 16-18, 2010, ISBN 978-89-88678-25-1 (SCOPUS±Þ)
63. Young Sil Lee, Nack Hyun Kim, Hyotaek Lim, HeungKuk Jo, Hoon Jae Lee, ¡°Online Banking Authentication System using Mobile-OTP with QR-code,¡± IEEE CS (ICCIT2010), pp, 644-648, Seoul, Korea, Nov.30-Dec.2, 2010 (SCOPUS, /NRF2010 & Dongseo Frontier2009)
64. Nack Hyun Kim, YongSoo Nam, TaeYong Kim, HyeongGuk Jo, HoonJae Lee, ¡°Study of Certificates Management by Mobile Device with Bluetooth,¡± IEEE CS (ICCIT2010), pp, 1064-1067, Seoul, Korea, Nov.30-Dec.2, 2010. (SCOPUS, /NRF2010 & Dongseo Frontier2009)
65. Pardeep Kumar, Md. Iftekhar Salam, Ahmed Galib Reza, Hyo Taek Lim, Hoon Jae Lee, ¡°Performance Analysis of PingPong-128 Keystream Generator for Wireless Sensor Network,¡± IEEE CS (ICCIT2010), pp, 653-658, Seoul, Korea, Nov.30-Dec.2, 2010 (SCOPUS, /NRF2010 & Dongseo Frontier2009)
66. Shirly Lee, HyoTaek Lim, HoonJae Lee, ¡°Secure Data Mechanism for iATA Protocol,¡± IEEE CS (ICCIT2010), pp, 1068-1071, Seoul, Korea, Nov.30-Dec.2, 2010 (SCOPUS,
/NRF2010 & Dongseo Frontier2009)
67. Beum-Su Park, Shiry Lee, HoonJae Lee, ¡°On a Digital-Right-Management System using One-Time-Password,¡± IEEE CS (ICCIT2010), pp, 1032-1035, Seoul, Korea, Nov.30-Dec.2, 2010 (SCOPUS, /NRF2010 & Dongseo Frontier2009)
68. Iftekhar Salam, HoonJae Lee, ¡°A Review on the PKC-Based Security Architecture for Wireless Sensor Networks,¡± IEEE CS (ICCIT2010), pp, 649-652, Seoul, Korea, Nov.30-Dec.2, 2010 (SCOPUS, /NRF2010 & Dongseo Frontier2009)
69. Mangal Sain, Pardeep Kumar, YoungDong Lee, HoonJae Lee, ¡°Secure middleware in ubiquitous healthcare,¡± IEEE CS (ICCIT2010), pp, 1072-1077, Seoul, Korea, Nov.30-Dec.2, 2010 (SCOPUS, /NRF2010 & Dongseo Frontier2009)
70. YoungDong Lee, DoUn Jeong, HoonJae Lee, ¡°Performance Analysis of Wireless Link Quality in
Wireless Sensor Networks,¡° IEEE CS (ICCIT2010), pp, 1006-1010, Seoul, Korea, Nov.30-Dec.2, 2010 (SCOPUS)
71. Pardeep Kumar, Mangal Sain, HoonJae Lee, "An Efficient Two-Factor User Authentication Framework for Wireless Sensor Networks," IEEE (ICACT2011), pp.574-578, Phoenix Park, Korea, Feb. 13-16, 2011, ISBN 978-89-5519-154-7, SCOPUS.
72. Mangal Sain, Pardeep Kumar, HoonJae Lee, "Secure Authentication and Communication in Ubiquitous Healthcare Middleware," IEEE (ICACT2011), pp.163-178, Phoenix Park, Korea, Feb. 13-16, 2011, ISBN 978-89-5519-154-7, SCOPUS.
73. Kiseok Bae, Mahnki Ahn, Hoonjae Lee, Jaecheol Ha and Sangjae Moon, ¡°Power Analysis Attack and Countermeasure on the Rabbit Stream Cipher,¡± ACM (ICSE 2011) Workshops, Hawaii, May 22
2011, SCOPUS
74. Lee Shirly and Lee Hoon-Jae, ¡°Secure Mutual Authentication For Cloud Computing,¡± IEEE(ICCDA 2011), pp v5-33¢¦v5-37, Xi'an, Shaanxi, China. May 27-29, 2011, ISBN 978-1-4244-9489-7, SCOPUS
75. Iftekhar Salam and HoonJae Lee, ¡°An Algebraic Attack against Geffe¡¯s Generator,¡± IEEE(ICCDA 2011),pp v3-37¢¦v3-40, Xi'an, Shaanxi, China. May 27-29, 2011, ISBN 978-1-4244-9489-7, SCOPUS
76. Kiseok Bae, Mahnki Ahn, Hoonjae Lee, Jaecheol Ha and Sangjae Moon, ¡°Practical Side Channel Analysis Attacks on the Stream Cipher Salsa20/12,¡± ITC-CSCC2011, pp.835-838, Gyungju, Korea, June 19-22, 2011,
77. Pardeep Kumar, HoonJae Lee, ¡°Cryptanalysis on two User Authentication Protocols using Smart Card for Wireless Sensor Networks,¡± IEEE(WiAd2011-7th International Conference on Wireless Advanced 2011), June 20-22, 2011, London, UK, SCOPUS
78. Pardeep Kumar, SangGon Lee, HoonJae Lee, "A User Authentication for Healthcare Application using Wireless Medical Sensor Networks," IEEE CS HPCC2011, pp. 647-651, Sep. 2-3, 2011, Canada, ISBN 978-0-7695-4538-7/11, SCOPUS
79. YoungSil Lee, YoungMi Park, SangHan Lee, TaeYong Kim, HoonJae Lee, "RFID Mutual Authentication Protocol with Unclonable RFID-tag," IEEE (ICMIC2011), Pp.74¢¦78, Sep. 26-28, 2011, Kumi, Korea, ISBN 978-89-88678-60-2/SCOPUS/
80. Saber Salah, Sami Abduljalil Abdulhak, Hyontai Sug, Dae-ki kang, HoonJae Lee, "Study and Analyze the Performance of the Intrusion Detection Systems for Smartphone Security Enhancement," IEEE (ICMIC2011), Pp. 15¢¦19, Sep. 26-28, 2011, Kumi, Korea, ISBN 978-89-88678-60-2/SCOPUS/
81. Ndibanje Bruce, HoonJae Lee ,"A Passivation Layer Built-up Multilayer on Crypto-processors Against Mechanical Damages," IEEE (ICCIT2011), Pp.631¢¦635, Jeju, Korea, Nov. 29 - Dec. 1, 2011/SCOPUS
82. Amlan Choudhury, Hyo-taek Lim, Hoon Jae Lee, "FPGA Implementation of PingPong-128 Stream Cipher for Ubiquitous Application," IEEE (ICCIT2011), Pp.627¢¦630, Jeju, Korea, Nov. 29 - Dec. 1, 2011/SCOPUS
83. BumSu Park, Amlan Choudhury, TaeYong Kim, HoonJae Lee, "A study on Password Input method using authentication Pattern and Puzzle," IEEE (ICCIT2011), Pp.698¢¦701, Jeju, Korea, Nov. 29 - Dec. 1, 2011/SCOPUS
84. YoungSil Lee, TaeYong Kim, HoonJae Lee, "Security Enhancement on the Efficient and Complete Remote User Authentication Scheme using Smart Cards," IEEE (ICCIT2011), Pp.702¢¦706, Jeju, Korea, Nov. 29 - Dec. 1, 2011/SCOPUS
85. YoungSil Lee, WonTae Jang, HoonJae Lee, "Double stack passivation layer with effective lifetime for crypto-process," IEEE (ICCIT2011), Pp.707¢¦710, Jeju, Korea, Nov. 29 - Dec. 1, 2011/SCOPUS
86. Mangal Sain, HoonJae Lee, "A Survey of Middleware and Security approaches for Wireless Sensor Networks," IEEE (ICCIT2011), Pp.64¢¦69, Jeju, Korea, Nov. 29 - Dec. 1, 2011/SCOPUS
87. YoungDong Lee, Do-Un Jung, Gi-Hyun Hwang, HoonJae Lee, "Wireless Link Quality Based Measurement for Wireless Sensor Networks," IEEE (ICCIT2011), Pp.558¢¦561, Jeju, Korea, Nov. 29 - Dec. 1, 2011/SCOPUS
88. Amlan Choudhury, Pardeep Kumar, Mangal Sain, Hyo-taek Lim, Hoon Jae Lee, "A Strong User Authentication Framework for Cloud Computing," IEEE CS(APSCC2011), pp.110-115, Jeju, Korea, Dec. 12-15, 2011, ISBN: 978-0-7695-4624-7/11, /SCOPUS
88. Ndibanje Bruce, Amlan Jyoti Choudhury, Hoon Jae Lee, "A Robust Passivation Layer for Crypto-processor Against Physical Attacks," CUTE2011, pp.156-161, Dec. 15-16, 2011, Seoul, Korea, ISSN: 1976-0035 /SCOPUS
89. Jhonathan Marpaung, Mangal Sain, HoonJae Lee, "Survey on malware evasion techniques:
state of the art and challenges," IEEE(ICACT2012), Phoenix Park, Korea, Feb. 19-22, 2012 /SCOPUS
90. Amlan Choudhury, Hyotaek Lim, Hoon-Jae Lee, "An Efficient FPGA Design of PingPong-128 Stream Cipher for Secure Computing," IEEE CS(AINA2012), pp. 695-700, Mar.26-29, 2012, Fukuoka, Japan, ISBN: 978-0-7695-4651-3/12, ISSN: 1550-445X/12 /SCOPUS
91. YoungSil Lee, TaeYong Kim, HoonJae Lee, "Mutual Authentication Protocol for Enhanced RFID Security and Anti-Counterfeiting," IEEE CS(AINA2012), pp. 558-563, Mar.26-29, 2012, Fukuoka, Japan, ISBN: 978-0-7695-4652-0/12 /SCOPUS
¡á International Conferences : B À¯Çü (Etc.)
1. DongJin Kwak, JaeCheol Ha, Hoonjae Lee, ChangRim Koh, Hwankoo Kim, and SangJae Moon,
"LM signcryption and its application in WTLS handshake protocol for user anonymity,"
Joint Workshop on Modern Electronic Technologies and Applications, 2001. 11. 9-10, Beijing.
2. Hee-Bong Choi*, Hoon-Jae Lee, Choon-Soo Kim, Bung-Hya Chang and Dong-Ho Won,
¡°On Differential Power Analysis on the Addition Modular 2**N Operation of Smartcards,¡±
The 2003 International Conference on Security and Management (SAM'03), pp.260-263,
June 23 - 26, 2003, Monte Carlo Resort, Las Vegas, Nevada, USA.
3. Chang-Gyun Kim, Jae-Chol Ha, Hoon-Jae Lee, SangJae Moon, "Power Attack Resistant Countermeasure
using Random Separation of Scalar Multiplication Method for ECC," Joint Workshop on Modern Electronic Technologies and Applications(JW-META2003), 2003. 10., Beijing.
4. Hee-Bong Choi, Jong-Gil Kim, Sang-Yun Han, Mung-Gil Choi, Chun-Soo Kim, HoonJae Lee,
"DPA Methods of Smart Cards, "The 2003 International Conference on Security and Management(SAM'04),
2004. 6. 21-24, Las Vegas.
5. Sanggon Lee, Hoon-Jae Lee, and Yong-Soo Seo, "ID-based Tripartite Multiple Key Agreement Protocol
Combined with a Key Derivation Function," ICEIC2006 - INTERNATIONAL CONFERENCE ON ELECTRONICS,
INFORMATION, AND COMMUNICATION (ICEIC 2006), June 27-28, 2006, Ulaanbaatar, Mongolia.
6. HunWook Kim, ShuYun Lim, HoonJae Lee, "On a Strong Location Privacy and Forward-Secrecy
RFID Challenge-Response Authentication Protocol," The Preceeding of the M2USIC2006 conference,
pp.420-424, MMU, Malaysia Nov.16-17, 2006.
7. ErnYu Lee, HoonJae Lee, "A Secure Approach for Data Hiding in Internet Control Message Protocol (ICMP),"
The Preceeding of the M2USIC2006 conference, pp.454-459, MMU, Malaysia Nov.16-17, 2006.
8. HunWook Kim, ShuYun Lim, HoonJae Lee, "RFID Challenge-Response Authentication Protocol
for Strong Location Privacy and Forward-Security," The Preceeding of the Inscrypt2006, pp145-152,
Beijing, China, Nov. 29-Dec.1, 2006.
9. Heung-Kuk Jo, Hoon-Jae Lee, "Data Format Relay on Transmission of RFID Tag ID over Wireless and TCP/IP,"
Proceeding of the ICUT2007, pp. 1184-1191, Dubai, UAE, 2007. 2.12-2.14
10. Shuyun Lim, Lim Meng Hui, SangGon Lee, Hoonjae Lee, "Lightweight Group Key Management
for Clustered Sensors in Self Organizing Sensor Network," JWIS2007 Proceeding, pp.371-381, Aug. 6- 7,
Waseda Univ., Tokyo, Japan.
11. Shuyun Lim, ChuanChin Pu, HyoTaek Lim, Hoonjae Lee, "Dragon-MAC: Securing Wireless Sensor Networks
with Authenticated Encryption," JWIS2007 Proceeding, pp.253-264, Aug. 6- 7, Waseda Univ., Tokyo, Japan.
12. ErnYu Lee, YuShu They, HyoTaek Lim, HoonJae Lee, "A Lightweight Secure iSCSI-based
Remote Storage Service for Mobile Devices," CHINACOM2007, 8.22-8.24, Shanghai, China, 2007.
13. Yu-Shu They, Chee-Min Yeoh, HoonJae Lee, HyoTaek Lim, "A New Security Scheme for ATA-over-Ethernet Protocol,"
APIS2008, pp.605-608, Auckland, Newzealand, Jan. 28-29, 2008.
14. Meng Hui Lim, Sanggon Lee and Hoonjae Lee, "Cryptanalysis on some Deniable Authentication Protocols based on ElGamal Cryptography," JWIS2008, pp.282-289, HanYang Univ., Seoul, July 10-11, 2008
15. Bayalagmaa Davanaym, HoonJae Lee, "Secure Data Transmission using Rabin encryption and Java API," FITAT'2008, Univ. National Mogolia, Ulaanbaatar Mongolia, Aug. 14-15, 2008
16. Meng Hui Lim, Sanggon Lee, HoonJae Lee, "Provably Secure Authenticated Key Agreement with Key Confirmation," Pre-proceeding on WISA2008, Jeju, Sep.23-25, 2008.
17. Bayalagmaa Davaanaym, YoungSil Lee, HoonJae Lee, SangGon Lee, Hyotaek Lim, "Web based One-Time -Passwords authentication using Stream Cipher," ITC-CSCC2009 (KICS), pp.1327-1330, Jeju, Jul 5~8, . 2009
18. Chee-Min Yeoh, Bee-Lie Chai, HoonJae Lee, Hyotaek Lim, "Secure Data Transmission for ATA-based Mobile Virtual Storage System," IACSIT proceeding (ICMLC 2009), pp. 273-278, Perth, Australia. July 10 - 12, 2009, ISBN 978-1-84626-018-6
19. Chuan-Chin Pu and Hoon-Jae Lee, "State and Path Analysis of RSSI in Indoor Environment," IACSIT proceeding (ICMLC 2009), pp. 289-293, Perth, Australia. July 10 - 12, 2009, ISBN 978-1-84626-018-6
20. Sing-Hui Toh, Hoon-Jae Lee and Kyeong-Hoon Do, "Development of Efficient Query Processor in Cell Phone for Sensor Data Processing Over a WSN," IACSIT proceeding (ICMLC 2009), pp. 284-288, Perth, Australia. July 10 - 12, 2009, ISBN 978-1-84626-018-6
21. BoonGiin Lee, Kyeong-Hoon Do and Hoon-Jae Lee, "Indoor 3D Virtual World Representation for Multi-user Tracking System on Mobile Device IACSIT proceeding (ICMLC 2009), pp. 279-283, Perth, Australia. July 10 - 12, 2009, ISBN 978-1-84626-018-6
22. Bayalagmaa Davaanaym, YoungSil Lee, HoonJae Lee, SangGon Lee, Hyotaek Lim, ¡°A PingPong One-Time-Password System in Java application,¡± Proceeding of JWIS2009, National Sun Yat-sen Univ., Kaohsiung, Taiwan, Aug. 6-7, 2009.
23. Mangal Sain, HoonJae Lee and Wan-Young Chung, "User Interface for Personal Healthcare Information System in Ubiquitous Healthcare," Proceeding of IHCI2010, pp.366-371, IIIT, Allahabad, India, Jan. 16-18, 2010. ISBN 978-81-8489-540-7
¡á Domestic Journals : "100¿©Æí »ý·«"
¡á ±¹Á¦ÃâÆÇ (International Text Books)
1. IGI 2010.2¿ù ºÏéÅÍ
- Dhananjay Singh, HoonJae Lee, ¡°Design and Performance Evaluation of Proactive Micro Mobility Protocol for Mobile Network¡° in Book: Handheld Computing for Mobile Commerce: Applications, Concepts and Technologies (Ch17. ) pp. 328-342
IGI Global Publication, USA, March. 2010, edited by Dr. Wen-Chen Hu and Dr. Yanjun Zuo, (ISBN 978-1-61520-761-9)
2. InTech 2011.2¿ù ºÏéÅÍ
- Chuan-Chin Pu, Chuan-Hsian Pu and Hoon-Jae Lee, "Indoor Location Tracking using Received Signal Strength Indicator¡± in Book: Emerging Communications for Wireless Sensor Networks" (Book Chapter) In-Tech, ISBN978-3-902613-49-3, 2011.2¿ù
(intechweb.org), Vienna, Austria
3. InTech 2012.3¿ù ºÏéÅÍ
- Pardeep Kumar, HoonJae Lee ,"NLM-MAC: Lightweight Secure Data Communication framework using Authenticated Encryption in Wireless Sensor Networks" in Book: Applied Cryptography and Network Security, In-Tech, ISBN978-953-51-0218-2, 2012.3¿ù
(intechweb.org), Vienna, Austria
¡á ±¹³» ÃâÆÇ (Domestic Text Books)
1. ÀÌÈÆÀç, ÀÌ»ó°ï, ±è±âÇö, ¡°ÇØÅ·°ú ´ëÀÀ ½Ç½À,¡±
ISBN: 89-91337-29-6 93000
(2004.12.25, µµ¼ÃâÆÇ ¿¡ÀÌÆ÷¹Ìµð¾î) 258ÂÊ
IT ±³°ú°úÁ¤°³ÆíÁö¿ø »ç¾÷.
2. ÀÌÈÆÀç,±èÅ¿ë,Àå¿øÅÂ, ¡°À¯.¹«¼± ÅëÇÕ ³×Æ®¿öÅ© ¹× º¸¾È½Ç¹«,¡±
ISBN: 9-91337-20-193560(2004.11.19, µµ¼ÃâÆÇ ¿¡ÀÌÆ÷¹Ìµð¾î) 265ÂÊ,
ICUºÎ¼³ Çѱ¹Á¤º¸Åë½Å±³À°¿ø ¹«¼±ÀÎÅͳÝÀü¹®Àη¾缺»ç¾÷
3. ÀÌÈÆÀç, ÀÌ»ó°ï, ±èÅ¿ë, À̰æ°ü, ¡°³×Æ®¿öÅ© º¸¾È ±âÃÊ: FNS ÀÌ·Ð ¹× ½Ç½À,¡± ÄÄ¿ø ÃâÆÇ»ç,
2007.8¿ù ÃâÆÇ, NURI »ç¾÷´Ü
4. ±èÅ¿ë, ÀÌ»ó°ï, ÀÌÈÆÀç, ¡°¾Ë±â ½¬¿î ¾ÏÈ£ÀÌ·Ð,¡± µ¿¼´ëÇб³ ÃâÆÇ»ç, 93ÂÊ,2006. 4. 1
NURI »ç¾÷´Ü
5. ÀÌ»ó°ï, ÀÌÈÆÀç, ¡°¿Ïº® ¹«¼± º¸¾È(GSM, UMTS, IEEE 802.11, ad Hoc Security)
2007.2¿ù µµ¼ÃâÆÇ¾ÆÁø, ISBN 978-89-5761-207-1, NEXT »ç¾÷´Ü
6. Á¶Çü±¹,ÀÌÈÆÀç, ¡°RFID ½Ã½ºÅÛ ¹× º¸¾È,¡± ÄÄ¿ø ÃâÆÇ»ç,ISBN 978-89-92475-21-1, 2009.2¿ù ÃâÆÇ
"2010 ´ëÇѹα¹Çмú¿ø ¿ì¼öµµ¼ ¼±Á¤" --> click
II. ƯÇã µî·Ï ¹× Ãâ¿ø
¡á ±¹Á¦Æ¯Çãµî·Ï
1. Hoonjae Lee, Sangjae Moon, SangJun Park, "RANDOM KEYSTREAM GENERATION APPARATUS AND METHOD FOR USE IN A CRYPTOSYSTEM," ¹Ì±¹Æ¯Çãµî·Ï: US00 7046803B2(2006.5.16)
2. Dhananjay Singh, Zaynidinov H.N. Hoon-Jae Lee, Mirzaev A.E., ¡°Walsh-wavelet method for signal processing,¡± ±¹Á¦Æ¯ÇãÃâ¿ø DGU 20090057 (2009.4.13,¿ìÁŰ½ºÅº), * ¿ìÁ ƯÇãµî·Ï DGU01746(2009.6.5)
3. Dhananjay Singh, Zaynidinov H.N., Uma Shankar Tiwary, Hoon-Jae Lee, Mirzaev A.E, ¡°Piecewise method for signal processing,¡± DGU 20090058 (2009.4.13, ¿ìÁŰ½ºÅº), * ¿ìÁ ƯÇãµî·Ï DGU01747(2009.6.5)
4. Dhananjay Singh, Madhusudan Singh, Zaynidinov H.N., Wan-Young Chung, Hoon-Jae Lee,
¡°Walsh-Inverse Piecewise Method for Signal Processing,¡± ¿ìÁ ƯÇãÃâ¿ø DGU 20090145 (2009.08.29), * ¿ìÁ ƯÇãµî·Ï DGU01832(2009.9.30)
5. Madhusudan Singh, Dhananjay Singh, Zaynidinov H.N., Hoon-Jae Lee, ¡°Spline Method for Multidimensional Signal Processing,¡± ¿ìÁ ƯÇãÃâ¿ø DGU 20090146 (2009.08.29), * ¿ìÁ ƯÇãµî·Ï DGU01833(2009.9.30)
¡á ±¹³»Æ¯Çãµî·Ï
6. ÀÌÈÆÀç, ¹ÚºÀÁÖ, À庴È, ¡°µ¿±â½Ä ½ºÆ®¸²¾ÏÈ£ÀÇ µ¿±â¹æ¹ý ¹× ±× ÀåÄ¡(1)¡±,
ƯÇã Á¦ 0209314È£ (¡®99. 4. 20), ±¹¹æ°úÇבּ¸¼Ò
7. ÀÌÈÆÀç, ¹ÚºÀÁÖ, À庴È, ¡°µ¿±â½Ä ½ºÆ®¸²¾ÏÈ£ÀÇ µ¿±â¹æ¹ý ¹× ±× ÀåÄ¡(2)¡°,
ƯÇã Á¦ 0255357È£(¡®2000. 2. 12), ±¹¹æ°úÇבּ¸¼Ò
8. ÀÌÈÆÀç, ¹®»óÀç "¾ÏÈ£½Ã½ºÅÛ¿¡ »ç¿ëÇϱâ À§ÇÑ ·£´ý Ű½ºÆ®¸² »ý¼º ÀåÄ¡ ¹× ¹æ¹ý," ±¹³»Æ¯Çã µî·Ï: 10-0416971(2004/1/17), »ï¼ºÀüÀÚÁÖ½Äȸ»ç
9. ±è¿ù¿µ, ÀÌÈÆÀç, ¡°½Ç½Ã°£ ¾ÏÈ£¹ß»ý±â(RTP)¸¦ ÀÌ¿ëÇÑ µµ¾î¶ô º¸¾ÈÀåÄ¡,¡±
ƯÇãµî·Ï: 0445368(2004.8.12), (ÁÖ) ¿£¶óÀÎ ½Ã½ºÅÛ.
10. ±è¿ù¿µ, ÀÌÈÆÀç, ¡°À©µµ¿ì ¿î¿µÃ¼Á¦¿¡ ÀÚµ¿ ÀνĵǴ £ÕS£ÂÅäÅ«,¡± ½Ç¿ë½Å¾Èµî·Ï20-0317409-0000,(2003.6.11), µ¿¼´ëÇб³ »êÇÐÇù·Â´Ü & (ÁÖ)¿£¶óÀνýºÅÛ
11. ±è¿ù¿µ, ÀÌÈÆÀç, ¡°À©µµ¿ì ¿î¿µÃ¼Á¦¿¡ ÀÚµ¿ ÀνĵǴ £Õ£Ó£ÂÅäÅ« ¹× ÀÌÀDZ¸Çö¹æ¹ý,¡±
ƯÇãµî·Ï10-0504330 (2005.07.20),µ¿¼´ëÇб³ »êÇÐÇù·Â´Ü,(ÁÖ)¿£¿¤¿¡½º
12. ±è¿ù¿µ, ÀÌÈÆÀç, ¡°¾ÆÀ̾¾(IC)Ä«µå ÄÁ¹öÅÍ,¡± ÀÇÀåµî·Ï¹øÈ£3003118680000,(2002.11.1), (ÁÖ)¿£¶óÀνýºÅÛ
13. ±è¿ù¿µ, ÀÌÈÆÀç, ¡°°øÀÎÀÎÁõ¼¸¦ žÀçÇÑ À¯¿¡½ººñ ÅäÅ«,¡± ÀÇÀåµî·Ï¹øÈ£:3003424280000, (2003.12.30), (ÁÖ)¿£¶óÀνýºÅÛ
14. ÀÌÈÆÀç, ±è¿ù¿µ, ¡°¾ÏÈ£ ¾Ë°í¸®ÁòÀ» ÀÌ¿ëÇÑ Àá±Ý ÀåÄ¡(LOCKING APPARATUS FOR USING CIPHER ALGORITHM),¡± ƯÇãµî·Ï10-0839177(2008.6.11), ±è¿ù¿µ & µ¿¼´ëÇб³»êÇÐÇù·Â´Ü
15. ±èÇå¿í, ÀÌÈÆÀç, ±è¿ù¿µ, ¡°Á¤º¸ ÀúÀå ÀåÄ¡ÀÇ Àá±Ý ¹× ÇØÁ¦ ½Ã½ºÅÛ°ú ±× ¹æ¹ý{LOCKING AND UNLOCKING SYSTEM OF INFORMATION STORAGE APPARATUS AND METHOD THEREOF),¡± ƯÇãµî·Ï 10-0743981(2007.7.24), ±è¿ù¿µ & µ¿¼´ëÇб³»êÇÐÇù·Â´Ü
16. ±è¿ù¿µ, ÀÌÈÆÀç, "Ä« PC(Car Personal Computer)," ½Ç¿ë½Å¾Èµî·Ï¹øÈ£20-0385229-0000(2005.5.18), ±è¿ù¿µ
17. ÀÌÈÆÀç, ¹®»óÀç, ±è¿ù¿µ, "ÀÏȸ¿ë ¾ÏÈ£ ¹ß»ý±â ¹× ÀÏȸ¿ë ¾ÏÈ£ ¹ß»ý±â¸¦ ÀÌ¿ëÇÑ ÀÎÁõ ÀåÄ¡(One time password generator and the authentication apparatus using said one time password generator," ƯÇãµî·Ï 10-0737173(2007.7.3), °æºÏ´ëÇб³ »êÇÐÇù·Â´Ü
18. ±èÇå¿í,ÀÌÈÆÀç,¹®»óÀç,Á¤±¤¿í, ¡°¾Ë¿¡ÇÁ¾ÆÀ̵ð ÀÎÁõ ÀåÄ¡ ¹× ±× ¹æ¹ý(Apparatus and method for RFID Authentication Protocol),¡± ƯÇãµî·Ï 10-0796438(2008.1.14), °æºÏ´ëÇб³ »êÇÐÇù·Â´Ü
19. ÀÌÈÆÀç, ±è¿ù¿µ, ¡°£ÕS£Â ÅäÅ«À» ÀÌ¿ëÇÑ O£Ô£Ð£¨ÀÏȸ¿ë ¾ÏÈ££©¹ß»ý ¹æ¹ý ¹× ÀÎÁõ¹æ¹ý£¬½Ã½ºÅÛ£¬£ÕS£Â ÅäÅ«(OTP GENERATING METHOD USING USB TOKEN, AUTHENTICATION SYSTEM AND METHOD, USB TOKEN THEREOF),¡± ƯÇãµî·Ï 10-0807185-000(2008.02.19), ±è¿ù¿µ & µ¿¼´ëÇб³»êÇÐÇù·Â´Ü
20. Á¶Çü±¹,ÀÌÈÆÀç,¹Ú¼ºÁø, ¡°RFID ű׸¦ ÀÌ¿ëÇÑ ÀÎÁõ¹æ¹ý ¹× ÀåÄ¡,¡±
ƯÇãµî·Ï10-0854289(2008.8.20), µ¿¼´ëÇб³ »êÇÐÇù·Â´Ü & (ÁÖ)¿ì¿øÁ¤º¸±â¼ú
21~25. ±ÇÈ¿Á¤, ÀÌÈÆÀç, ±èÅ¿ë, Ȳ±âÇö, Àå¿øÅÂ, ¹Ú¼ºÁø, ¡°ÈÞ´ë¿ë À¯¿¡½ººñ(USB) ÀúÀåÀåÄ¡(1), (2), (3), (4), (5),¡± µðÀÚÀεî·Ï 30-0481553, 30-0481554, 30-0481555, 30-0481556, 30-0481557(2008.02.25) , µ¿¼´ëÇб³ »êÇÐÇù·Â´Ü & (ÁÖ)¿ì¿øÁ¤º¸±â¼ú
26. Á¶Çü±¹, ÀÌÈÆÀç, ±è±âÇö, ¡°º¹ÇÕ ±â´ÉÀÇ ÅÂ±× ¹× ¸®´õ±â,¡± ƯÇãµî·Ï 10-0861999(2008.9.30), µ¿¼´ëÇб³ »êÇÐÇù·Â´Ü & (ÁÖ)·¹µå°ÔÀÌÆ®
27. ÀÌÈÆÀç,¹®»óÀç, ±è¼ºÇö,À±Áßö, ¡°º´·Ä ±¸Á¶ÀÇ ¿öµå±â¹Ý £Æ£Ó£Ò ±¸Á¶ ¹× ±× µ¿ÀÛ ¹æ¹ý (parallel-structured word-based FSR and operating method thereof),¡± *ƯÇãµî·Ï Á¦10-0936374È£(2010.1.4), °æºÏ´ëÇб³ »êÇÐÇù·Â´Ü
28. ÀÓÈ¿ÅÃ, ÀÌÈÆÀç, ¡°¿¡Æ¼¿¡ÀÌ ±â¹Ý ¿ø°Ý ½ºÅ丮Áö ¼ºñ½º ½Ã½ºÅÛ ¹× ¹æ¹ý (Secure Data Transmission for ATA-based Virtual Storage System),¡± ƯÇãµî·Ï Á¦10-0942732È£(2010.2.9), µ¿¼´ëÇб³ »êÇÐÇù·Â´Ü
29. Á¶Çü±¹,ÀÌÈÆÀç,ÀÓÈ¿ÅÃ, ¡°¹°°Ç ¿î¹Ý ÀåÄ¡ ¹× ¹æ¹ý (2),¡± ƯÇãµî·Ï10-0944785 (2010.2.22), µ¿¼´ëÇб³ »êÇÐÇù·Â´Ü
30. Á¶Çü±¹, ÀÌÈÆÀç, ¡°¾È°æÇü RFID ¸®´õ ½Ã½ºÅÛ (RFID READER SYSTEM TYPED EYEGLASSES),¡± ƯÇãµî·Ï 10-1082503 (2011.11.4), µ¿¼´ëÇб³ »êÇÐÇù·Â´Ü
31. ÀÓÈ¿ÅÃ, ÀÌÈÆÀç, ¡°¿¡ÀÌÆ¼¿¡ÀÌ ±â¹Ý °¡»ó ÀúÀå ½Ã½ºÅÛÀ» À§ÇÑ ¾ÈÀüÇÑ µ¥ÀÌÅÍ Àü¼Û ¹æ¹ý,¡±Æ¯Çãµî·Ï10-10088960000 (2011.1.11), µ¿¼´ëÇб³ »êÇÐÇù·Â´Ü
32. ÀÌ¿µ¼÷, ÀÌÈÆÀç, ¡°½Ç½Ã°£ ´ÙÁß¹°Ã¼ ÃßÀû ¹æ¹ý{METHOD OF REAL-TIME TRACKING BODYS},¡± ƯÇãµî·Ï 10-1046163(2011.6.28), µ¿¼´ëÇб³ »êÇÐÇù·Â´Ü
33. ÀÌ¿µµ¿,ÀÌÈÆÀç, Á¤µµ¿î,ÀÓÈ¿ÅÃ, ¡°¹«¼± ¸ÖƼ È© ¶ó¿ìÆÃ ±â¹ÝÀÇ »ýü½ÅÈ£ ¸ð´ÏÅ͸µ ½Ã½ºÅÛ{Vital Sign Monitoring System based on wireless multi-hop routing},¡± ƯÇãµî·Ï 10-1066535 (2011.9.15), µ¿¼´ëÇб³ »êÇÐÇù·Â´Ü
34. Á¤µµ¿î,ÀÌ´ë¼®, ÀÌÈÆÀç, µµ°æÈÆ, ¡°¸ÖƼȩ ±â¹ÝÀÇ ³×Æ®¿öÅ© µ¥ÀÌÅÍ Àü´Þ¹æ¹ý,¡± ƯÇãµî·Ï10-1032703 (2011.4.26), µ¿¼´ëÇб³ »êÇÐÇù·Â´Ü
35. Àå¿øÅÂ, ÀÌÈÆÀç, ¡°ºñÈ Åë½ÅÀ» Á¦°øÇÏ´Â ÀåÄ¡ ¹× ¹æ¹ý {Apparatus and method of providing speech secure communication},¡± ƯÇãµî·Ï 10-1107241 (2012.1.11), µ¿¼´ëÇб³ »êÇÐÇù·Â´Ü
36. ÀÌÈÆÀç, ÀÌ¿µµ¿, ÀÓÈ¿ÅÃ, ¹Ú¼ºÁø, ¡°ÇコÄɾî¿ë ÀÇ·á¼¾¼¸¦ À§ÇÑ ¾ÏÈ£È ¹æ¹ý ¹× ÀåÄ¡
ƯÇãÃâ¿ø:10-2010-0035298(2010.4.16),¡° ƯÇãµî·Ï 10-1082503 (2011.11.4), µ¿¼´ëÇб³ »êÇÐÇù·Â´Ü & (ÁÖ)¿ì¿øÁ¤º¸±â¼ú
37. ±âŸ µî·Ï 3°Ç ¡°»ý·«¡±
40. ±âŸ Ãâ¿ø 30¿©°Ç ¡°»ý·«¡±
III. ¿¬±¸°úÁ¦
1. ÀÌÈÆÀç, "Àü»ê¸Á Á¤º¸º¸È£±â¼ú ¹× ÀÎÅÍ³Ý ÇØÅ·¹æÁö", °æ»óºÏµµÃ» º¥Ã³Ã¢¾÷Áö¿ø»ç¾÷, 1999³â 5¿ù.
2. ¹Î°æÁø, Çѽ¿ì, ÀÓ´ëÁø,±èÇöÁø, ÀÌÈÆÀç, "¾ç¹æÇâ Åë½ÅÀÌ °¡´ÉÇÑ ÇìµåÆùÇü ¹«¼±Åë½ÅÀåÄ¡ (µ¿¾Æ¸®:'99 ¿ì¼ö ¾ÆÀÌÅÛ)",
Áß¼Ò±â¾÷û, 1999. 9¿ù.
3. ¹®Ãß¿¬, ±èÈ¿Áø,ÀÌÈÆÀç, ÃÖº´Áø,À±Á¤¿À, ±èµ¿ÀÏ,ÀÌä¼ö, "±¸¹Ì½Ã Áö¿ªÁ¤º¸È ±âº» °èȹ," 1999³â 12¿ù
4. ÀÌÈÆÀç, "ÀüÀÚ»ó°Å·¡ º¸¾È ¹× ÀÎÁõ ±â¼ú¿¡ °üÇÑ ¿¬±¸," °æ»óºÏµµÃ» º¥Ã³Ã¢¾÷Áö¿ø»ç¾÷
ÃÖÁ¾¿¬±¸º¸°í¼, 2000³â 5¿ù.
4-1. ÀÌÈÆÀç, "ÀüÀÚ»ó°Å·¡ º¸¾È¼Ö·ç¼Ç ¸ðµ¨ °³¹ß¿¡ °üÇÑ ¿¬±¸," °æ»óºÏµµÃ» º¥Ã³Ã¢¾÷Áö¿ø»ç¾÷
ÃÖÁ¾¿¬±¸º¸°í¼ '2001. 5.
5. ÀÌÈÆÀç, "Çϵå¿þ¾î ÇüÅÂÀÇ Å°¶ôÀåÄ¡¸¦ ÀÌ¿ëÇÑ ÀÎÁõ½Ã½ºÅÛ °³¹ß", (ÁÖ) ¿£¶óÀÎ ½Ã½ºÅÛ, 2001³â 3¿ù.
6. ÀÌÈÆÀç, ÀåÀÍÈÆ, "DPA ºÐ¼® ±â¼ú ¿¬±¸", Çѱ¹ÀüÀÚÅë½Å¿¬±¸¼Ò-¿¬±¸¼Ò, 2001.5.1-11.30.
7. ¹®»óÀç, ÀÌÈÆÀç ¿Ü11¸í, "Fault Analysis °ø°ÝÀ» °ßµð´Â °ø°³Å° °í¼ÓÈ ±â¹ý ¿¬±¸,"
Çѱ¹Á¤º¸º¸È£¼¾ÅÍ, 2001. 6.11-2002.1.31.
8. ¹®»óÀç, ÀÌÈÆÀç ¿Ü10¸í, "À̵¿³×Æ®¿öÅ© Á¤º¸º¸È£±â¼ú¿¬±¸¼¾ÅÍ Á¦1°úÁ¦ (2Â÷³âµµ),"
Á¤º¸Åë½ÅºÎ ITRC (¼ÒÇÁÆ®¿þ¾îÁøÈï¿ø), 2001. 8 - 2002. 7,
9. ÀÌÈÆÀç, "IMT-2000 Á¤º¸º¸È£¿¡ ÀûÇÕÇÑ º´·ÄÇü ½ºÆ®¸²¾ÏÈ£ ¾Ë°í¸®Áò °³¹ß¿¡ °üÇÑ ¿¬±¸,"
Çѱ¹ÇмúÁøÈïÀç´Ü ½ÅÁø±³¼ö°úÁ¦, 2001. 10 - 2002. 9.
10. Dawson, Simpson, Sangjae Moon, Hoonjae Lee, "Analysis and Design of Word Based Stream Cipher,"
±¹Á¦°øµ¿¿¬±¸°úÁ¦(°æºÏ´ë MSRC - È£ÁÖ QUT ISRC), 2001.6.26-2002.6.25, (20,000$AU)
11. ÀÌÈÆÀç,ÀÌ»ó°ï, "½º¸¶Æ®Ä«µå ºñ¹Ðä³Î ºÐ¼®/Æò°¡±â¼ú ¿¬±¸," Çѱ¹ÀüÀÚÅë½Å¿¬±¸¼Ò
- ¿¬±¸¼Ò 2002.5.1 - 11.30
12. ¹®»óÀç, ÀÌÈÆÀç ¿Ü10¸í, "À̵¿³×Æ®¿öÅ© Á¤º¸º¸È£±â¼ú¿¬±¸¼¾ÅÍ Á¦1°úÁ¦ (3Â÷³âµµ),"
Á¤º¸Åë½ÅºÎ ITRC (¼ÒÇÁÆ®¿þ¾îÁøÈï¿ø), 2002. 8 - 2003. 7, (620,000õ¿ø).
13. Dawson, Simpson, Sangjae Moon, Hoonjae Lee, "Analysis and Design of Word Based Stream Cipher (2),"
±¹Á¦°øµ¿¿¬±¸°úÁ¦(°æºÏ´ë MSRC - È£ÁÖ QUT ISRC), 2002.9.15-2003.6.14, (20,000$AU)
14. ¹®»óÀç, ÀÌÈÆÀç ¿Ü 11¸í, "DPA °ø°Ý¿¡ ´ëÇÑ ¾ÈÀü¼º Æò°¡ ±âÁØ °³¹ß," Çѱ¹Á¤º¸º¸È£ÁøÈï¿ø(KISA),
2002. 6. 15 - 2003. 1.30.
15. ÀÌÈÆÀç, "ÀüÀÚ»ó°Å·¡·ÀüÀÚÈÆó¸¦ À§ÇÑ ½º¸¶Æ®Ä«µåÀÇ ¾ÈÀü¼º Æò°¡ ¹æ¹ý·Ð ¿¬±¸,"
µ¿¼´ëÇб³ ½ÅÀÓ±³¼ö°úÁ¦, 2002. 4. 1-2003. 3. 31.
16. Á¤¿Ï¿µ,ÀÌÈÆÀç,À±Å¼ö, "Ȩ µðÁöÅÐ ¼ºñ½º¸¦ À§ÇÑ ³×Æ®¿öÅ© Ĩ ¼³°è ±â¼úÆÀ,"
BB21(ºÎ»ê±¤¿ª½Ã ºê·¹Àκλê21) 2002. 11. 1- 2003. 10. 30
17. ÀÌÈÆÀç, "¹«¼± ³×Æ®¿öÅ©¿¡ ÀûÇÕÇÑ ¾ÏÈ£ ¾Ë°í¸®Áò ¼³°è ¹× ÇØµ¶±â¼ú °³¹ß,"
µ¿¼´ëÇб³ ÇÁ·ÐƼ¾î°úÁ¦ 2002.11.1-2003.10.30
18. ÀÌÈÆÀç, "½ºÆ®¸² ¾ÏÈ£ ¾Ë°í¸®Áò °³¼±¿¡ °üÇÑ ¿¬±¸," µ¿¼´ëÇб³ Ưº°¿¬±¸°úÁ¦
2003.3.1-2004.2.28
20. ¹®»óÀç, ÇÏÀçö, ÀÌÈÆÀç, ±èâ±Õ, Á¤ÁöÀº, "¿À·ù ºÐ¼® ±â¼ú¿¡ °üÇÑ ¿¬±¸," Çѱ¹ÀüÀÚÅë½Å¿¬±¸¿ø
- ¿¬±¸¼Ò °ø¸ð°úÁ¦, 2003.3.1 - 11.30
21. ÀÌ»ó°ï, ÀÌÈÆÀç, ¡°ÇØÅ· ¹× ¹æ¾î,¡± Á¤º¸Åë½ÅºÎ ±³°ú°úÁ¤°³ÆíÁö¿ø»ç¾÷ ±³Àç°³¹ß°úÁ¦
2003.3.1-2003.8.30
22. ÀÌÈÆÀç(Â÷°æÈ¯), ¡°EMI ³ëÀÌÁî¿¡ °ÀÎÇÑ ÀúÀü·Â SMPS °³¹ß,¡± »êÇÐÇùµ¿°úÁ¦(¼º¸²ÀüÀÚ),
2003.5.1-2004.2.28
23. Á¤¿Ï¿µ,ÀÌÈÆÀç,À±Å¼ö, ¡°È¨ µðÁöÅÐ ¼ºñ½º¸¦ À§ÇÑ ³×Æ®¿öÅ© Ĩ ¼³°è ±â¼úÆÀ(2Â÷³âµµ),¡±
BB21(ºÎ»ê±¤¿ª½Ã ºê·¹Àκλê21) 2003. 11. 1- 2004. 10. 30
24. ÀÌÈÆÀç,±èÅ¿ë(Á¶»óÀÏ,±èÁ¤ÁÖ,±èÅÂÈÆ,Çкλý0¸í), ¡°e-Learning ±â¼úÇ¥ÁØÈ¿¡ µû¸¥
¹«¼±³×Æ®¿öÅ© ÀüÀÚ°è ½Ã¹Ä·¹ÀÌÅÍ °³¹ß ¹× ÀúÀü·ÂÇü °í¼Ó ¾ÏÈ£ ¾Ë°í¸®Áò ¿¬±¸, ¡±
µ¿¼´ëÇб³ UCGA-TIC °øµ¿¿¬±¸°úÁ¦, 2003.12.16 - 2004.6.15
26. ÀÌÈÆÀç, ¡°WBSC ½ºÆ®¸² ¾ÏÈ£ ¾Ë°í¸®Áò °³¼±¿¡ °üÇÑ ¿¬±¸,¡±µ¿¼´ëÇб³ Ưº°¿¬±¸°úÁ¦
2004.3.1-2005.2.28
27. ¹®»óÀç, ÀÌÈÆÀç ¿Ü 11¸í, ¡°À̵¿³×Æ®¿öÅ© Á¤º¸º¸È£±â¼ú¿¬±¸¼¾ÅÍ Á¦1°úÁ¦ (4Â÷³âµµ),¡±
Á¤º¸Åë½ÅºÎ (Çѱ¹Á¤º¸Åë½ÅÁøÈï¿ø), 2003. 8 - 2004. 7
28. ¹®»óÀç, ÀÌÈÆÀç ¿Ü 11¸í, ¡°À̵¿³×Æ®¿öÅ© Á¤º¸º¸È£±â¼ú¿¬±¸¼¾ÅÍ 2´Ü°è Á¦1°úÁ¦ (5Â÷³âµµ),¡±
Á¤º¸Åë½ÅºÎ (Çѱ¹Á¤º¸Åë½ÅÁøÈï¿ø), 2004. 9 - 2005.
29. ÀÌÈÆÀç, ÀÌ»ó°ï, ±èÅ¿ë, ¡°USB ÇüÅÂÀÇ Á¤º¸º¸È£ÀåÄ¡ ¹× º¸¾È ½Ã¹Ä·¹ÀÌÅÍ °³¹ß,¡±
±³À°ÀÎÀûÀÚ¿øºÎÁö¿ø µ¿¼´ëÇб³ ´©¸®»ç¾÷(ÁßÇü) - »êÇÐ ¿¬±¸°úÁ¦, 2004.7.16-2005.6.30
30. ÀÌÈÆÀç, ¡°À¯ºñÄõÅͽº ȯ°æ¿¡ ÀûÇÕÇÑ ¾ÏÈ£ÀÇ ¼³°è ±¸Çö¿¡ °üÇÑ ¿¬±¸,¡± 2005³âµµ µ¿¼´ëÇб³
Ưº°¿¬±¸°úÁ¦, 2005.3.1-2006.2.28
31. ÇÏÀçö,¹®»óÀç,ÀÌÈÆÀç, ¡°½º¸¶Æ®Ä«µå »çÀ̵å ä³Î °ø°Ý ºÐ¼® µµ±¸ °³¹ß,¡± Çѱ¹Á¤º¸º¸È£ÁøÈï¿ø,
2005.3.1-10.30(8°³¿ù)
33. ÀÌÈÆÀç,¹®»óÀç,ÇÏÀçö,ÀÌ»ó°ï,¾È¸¸±â, ¡°RFID/USN ȯ°æ¿¡¼ Side Channel Attack ±â¼ú ¿¬±¸,¡±
Çѱ¹ÀüÀÚÅë½Å¿¬±¸¿ø, (2005.5.1-2.28(10°³¿ù)
34. ±è±¤Çö,Á¶¼º°Ç,ÀÌÈÆÀç¿Ü4¸í, ¡°NURI - 4³âÁ¦ ¿¬°è ±³À°°úÁ¤ °³¹ß,¡± ±³À°ÀÎÀûÀÚ¿øºÎÁö¿ø
NURI »ç¾÷, 2004.7.1-2005.2.28
35. ÀÌÈÆÀç,ÀÌ»ó°ï,±èÅ¿ë, ¡°NURI ±³Àç°³¹ß°úÁ¦ - ³×Æ®¿öÅ© º¸¾È ±âÃÊ ½Ç½À¡±, NURI »ç¾÷´Ü
2005.10.1-2006.5.30
36. ±èÅ¿ë,ÀÌ»ó°ï,ÀÌÈÆÀç, ¡°NURI ±³Àç°³¹ß°úÁ¦ - ÀÚ¹Ù¸¦ ÀÌ¿ëÇÑ ¾ÏÈ£ÀÌ·Ð ÇнÀ »çÀ̹ö ±³À硱
NURI »ç¾÷´Ü, 2005.10.1-2006.5.30
37. ÀÌÈÆÀç,¹®»óÀç,ÇÏÀçö,¾È¸¸±â,¹ÚÁ¦ÈÆ,Çѵ¿È£,¹Ú¿äÇÑ,Á¶»óÀÏ,Á¶Á¾±Ù,ÀÌÀåÃá,
¡°ÀüÀڱ⠽ÅÈ£ ºÐ¼® ±â¼ú ¹× ´ëÀÀ±â¼ú µ¿Çâ,¡±
Çѱ¹ÀüÀÚÅë½Å¿¬±¸¿ø-¿¬±¸¼Ò, 2006.3.1-10.30(8°³¿ù)
38. ÀÌÈÆÀç,¹®»óÀç,ÇÏÀçö,¹ÚÁ¦ÈÆ,Çѵ¿È£,ÀÌ·±À¯,ÀÓ½´À±,
¡°ÀÓº£µðµå S/W º¸¾È±â´É ¹× Ãë¾à¼º ºÐ¼® Ç׸ñ °³¹ß,¡± Çѱ¹Á¤º¸º¸È£ÁøÈï¿ø,
2006.4.1-11.31(8°³¿ù)
39. ´©¸®-CNSL ¿¬±¸È¸ ½ÇÀû - ´©¸®»ç¾÷´Ü 2005³âµµ 2Â÷³âµµ °úÁ¦, 2005.12.1-2006.4.30
1) ¿¬±¸È¸, µ¿¾Æ¸® Áö¿ø°úÁ¦
2) º¥Ã³Ã¢¾÷ Áö¿ø°úÁ¦(RUID)
3) º¥Ã³Ã¢¾÷ Áö¿ø°úÁ¦(DICS)
40. ÀÌ»ó°ï,ÀÌÈÆÀç,Àå¿øÅ ¿Ü 6¸í, ¡°2006Çг⵵ Á¤º¸³×Æ®¿öÅ©°øÇÐÀü°ø ±³°ú°úÁ¤ °³¹ß °úÁ¦,¡±
NURI »ç¾÷´Ü, 2005.12.1-2006.4.30
41. ±èÁ¾¼ö,°ø¹ÎÇ¥,±Ç°æ°ï,°Á¤ÀÌ¿Ü µ¿¾Æ¸®, ¡°2006³âµµ Á¤º¸º¸È£µ¿¾Æ¸® Áö¿ø»ç¾÷,¡±
KISA Çѱ¹Á¤º¸º¸È£ÁøÈï¿ø 2006. 4. 1- 12.31
42. (ÁÖ)¿ì¿øÁ¤º¸±â¼ú-¹Ú¼ºÁø, ÀÌÈÆÀç, Àå¿øÅÂ, Ȳ±âÇö, ±èÅ¿ë, ¡°¾ÏÈ£/ÀÎÁõ ¸ðµâÀ» ³»ÀåÇÑ °í¼º´É
RFID R/W´Ü¸»±â °³¹ß,¡° Áö¿ªÇõ½ÅÀη¾缺»ç¾÷, 2006.5.1-2009.4.31,
Çѱ¹»ê¾÷±â¼úÀç´Ü(»ê¾÷ÀÚ¿øºÎ)
43. Á¤¿Ï¿µ,ÀÌÈÆÀç,ÀÓÈ¿ÅÃ, ¡°¹«¼±¼¾ÅÍ³×Æ®¿öÅ© ÀÀ¿ë u-ÇコÄÉ¾î ±â¼ú°³¹ß »ç¾÷ÆÀ,¡± BK21
2006.5.1 - 2013.4.31, ±³À°ÀÎÀûÀÚ¿øºÎ
44. (ÀÌÇÏ »ý·«)
¡Ø ±âŸ Á¤ºÎÁö¿ø»ç¾÷ ÇкΰúÁ¦
1. Á¤¿Ï¿µ,¾çȲ±Ô,À±Å¼ö,ÀÌÈÆÀç, ¡°2002³âµµ ITÇаú ÀåºñÁö¿ø»ç¾÷,¡± Á¤º¸Åë½ÅºÎ°úÁ¦,
Çѱ¹¼ÒÇÁÆ®¿þ¾îÁøÈï¿ø, (2Â÷³âµµ Âü¿©±³¼ö).
2. Á¤¿Ï¿µ,ÀÌÈÆÀç,ÀÌ»ó°ï,Â÷°æÈ¯,Àå¿øÅÂ,ÀÓÈ¿ÅÃ, ¡°2003³âµµ ITÇаú ±³°ú°úÁ¤°³ÆíÁö¿ø»ç¾÷,¡±
Á¤º¸Åë½ÅºÎ°úÁ¦, Çѱ¹¼ÒÇÁÆ®¿þ¾îÁøÈï¿ø, 2003.3.1-2003.12.31
3. Á¤¿Ï¿µ,±èÁ¤±¹,¼Õ¿µ´ë,ÀÌäºÀ,ÀÌÈÆÀç, 2´Ü°è 4Â÷³âµµ IDEC Working Group
KAIST IDEC ¼¾ÅÍ, 2002. 11 - 2003. 10.
4. Á¤¿Ï¿µ,ÀÌÈÆÀç,À±Å¼ö, 2002³âµµ BB21 Áö¿ø»ç¾÷(1Â÷³âµµ), ºÎ»ê±¤¿ª½Ã°úÁ¦,
2002.11.1 - 2003.10.30,
5. Á¤¿Ï¿µ, À±Å¼ö, Àå¿øÅÂ, ÀÓÃæÀç ¿Ü, 2003³âµµ »ê¾÷ÀÚ¿øºÎ TIC »ç¾÷, »ê¾÷ÀÚ¿øºÎ °úÁ¦,
2003.9.1 - 2007.8.31
6. Á¤¿Ï¿µ,ÀÌÈÆÀç,À±Å¼ö, 2003³âµµ BB21 Áö¿ø»ç¾÷(2Â÷³âµµ), ºÎ»ê±¤¿ª½Ã°úÁ¦,
2003.11.1 - 2004.10.30
7. ÀÌÈÆÀç ¿Ü 16¸í, "2004³âµµ ¹«¼±ÀÎÅÍ³Ý Àü¹®Àη¾缺»ç¾÷," ICUºÎ¼³ Çѱ¹Á¤º¸Åë½Å±³À°¿¬±¸¿ø,
2004.6.1-2005.2.28
8. Á¤¿Ï¿µ,ÀÌÈÆÀç,À±Å¼ö, 2004³âµµ BB21 Áö¿ø»ç¾÷(3Â÷³âµµ), ºÎ»ê±¤¿ª½Ã°úÁ¦,
2004.11.1 - 2005.10.30
(2006. 11. 15ÀÏ ¾÷µ¥ÀÌÆ®)