[2017]

No. Subject File
9 In-Kyu Park, Jin Kwak
“Consideration Analysis of Cache-Based Timing Attack in Multiprocessor-Based Cloud Environment”
The 9th International Conference on Internet (ICONI) 2017 Symposium, 17-20 Dec, 2017
 
8 Eun-Ji Lee, Deuk-Hun Kim, Tae-Jin Lee, Jin Kwak
“Symbol-based Advanced Static Malware Analysis Model”
The 9th International Conference on Internet (ICONI) 2017 Symposium, 17-20 Dec, 2017
 
7 Won-Il Bae, Seul-Ki Choi Jin Kwak
“Secure Authentication Framework for Inter-cloud Service”
The 9th International Conference on Internet (ICONI) 2017 Symposium, 17-20 Dec, 2017
 
6 Suk-June Choi, Jin Kwak
“A Study on Reduction of DDoS Amplification Attacks in the UDP-based CLDAP Protocol”
The 4th International Conference CAIPT 2017, 08-10 Aug, 2017
 
5 Si-Jae Woo, Jin Kwak
“Secure Multicast Authentication Scheme using DTLS”
The 4th International Conference CAIPT 2017, 08-10 Aug, 2017
 
4 Seul-Ki Choi, Jin Kwak
“System Hardening, Security Monitoring, and Remote Attestation for Trusted OS-embedded IoT Devices”
The 12th Asia Pacific International Conference on Information Science and Technology(APIC-IST 2017), 25-28 June, 2017
 
3 Deuk-Hun Kim, Jin Kwak
“A Study on Secure Information Flow Control in Centralized eHealth-Information System”
The 12th Asia Pacific International Conference on Information Science and Technology(APIC-IST 2017), 25-28 June, 2017
 
2 Byeong-Ju Park, Jin Kwak
“A Study on Mining and Consensus Method of Blockchain for Mobile Payment Environment”
The 12th Asia Pacific International Conference on Information Science and Technology(APIC-IST 2017), 25-28 June, 2017
 
1 Deuk-Hun Kim, Jin Kwak
“A Framework for Preventing Illegitimate e-Prescribing Practices”
The 12th International Conference on Future Information Technology(FutureTech2017), 22-24 May, 2017
 

[2016]

No. Subject File
1 Dae-Hyun Kim, Su-Min Park, Jin Kwak
“Data Management Procedure and Data Classification Method for Digital Forensic in Connected Car Environment”
APIC-IST 2016, Korean Society for Internet Information, June 26-29, 2016, pp.17-19
 

[2015]

No. Subject File
8 Ho-Seok Ryu, Seul-Ki Choi, Jin Kwak
“Secure Data Access Control Scheme for Smart Homes”
The 10th KIPS International Conference on Ubiquitous Information Technologies and Application (CUTE 2015), 15-17 December, 2015, pp. 483-488
 
7 SeongHo Choi, Jin Kwak
“Secure Frmaework for Software Defined based Internet of Things”
The 10th KIPS International Conference on Ubiquitous Information Technologies and Application (CUTE 2015), 15-17 December, 2015, pp. 477-482
 
6 Taekyun Doo, Taehyun Ko, Jin Kwak, Manpyo Hong
“Countermeaure of NFC Relay attack with Jamming”
CEWIT 2015, 2015. 10. 20
 
5 Seong-Ho Choi, Jun-Sub Kim, Jin Kwak
“A Study of Basic Architecture for Big-Data Security Analysis in SDN Environment”
Proceedings of the 2015 international conference on security, 27-30 July, 2015, p.137-141.
 
4 Ho-Seok Ryu, Jin Kwak
“Device-based Secure Data Management Scheme in a Smart Home”
Proceedings of the 2015 international conference on security, 27-30 July, 2015, p.231-235.
 
3 Dae-Hyun Kim, Jin Kwak
“Analysis of Security Threats and Requirements in Vehicle to Nomadic Device Communication&quot”
The 3rd International Conference on Computer Applications and Information Processing Technology 2015, 23-24 June, 2015
 
2 Su-In Lee, Jin Kwak
“Capability-based Access Control Model for Efficient Service in Smart Grid Environment”
The 3rd International Conference on Computer Applications and Information Processing Technology 2015, 23-24 June, 2015
 
1 Deuk-Hun Kim, Jun-Sub Kim, Jin Kwak
“Design of Authentication Protocol for Privacy Protection in the Internet of Things Environment”
The 3rd International Conference on Computer Applications and Information Processing Technology 2015, 23-24 June, 2015
 

[2014]

No. Subject File
4 Su-In Lee, Jin Kwak
“Analysis of Access Control Methods for Mobile Cloud Environment”
The 2nd International Conference on Computer Applications and Information Processing Technology 2014, 27-28 June, 2014, pp.43-45
 
3 Deuk-Hun Kim, Jin Kwak
“Analysis of Security Requirements for Cooperative Data Management in Multi-Cloud System”
The 2nd International Conference on Computer Applications and Information Processing Technology 2014, 27-28 June, 2014, pp.40-42
 
2 Ho-Seok Ryu, Jin Kwak
“Analysis of Security Threats and Requirements in IoT Network Communication”
The 2nd International Conference on Computer Applications and Information Processing Technology 2014, 27-28 June, 2014, pp.37-39
 
1 Seong-Ho Choi, Hyo-Beom Ahn, Jin Kwak
“Performance Analysis of SDN Environment”
The 2nd International Conference on Computer Applications and Information Processing Technology 2014, 27-28 June, 2014, pp.32-34
 

[2013]

No. Subject File
2 Jun-Sub Kim, Seul-Ki Choi, Kwak Jin
“Security Vulnerability Analysis for Dynamic ID Based Remote User Authentication Scheme”
The International Conference on Computer Applications and Information Processing Technology 2013,
June 27-29, 2013, pp.235-238.
 
1 Seul-Ki Choi, Jun-Sub Kim, Kwak Jin
“Security Requirements for Cloud Data Management”
The International Conference on Computer Applications and Information Processing Technology 2013,
June 27-29, 2013, pp.231-234.
 

[2012]

No. Subject File
10 Yukyeong Wi, Jin Kwak
“Watermarking-Based Content Copyright Protection Scheme for Secure Social Network Service”
The 4th International Conference on Internet 2012, KOREAN SOCIETY FOR INTERNET INFORMATION,
Hilton Hawaiian village, Hawaii, USA, December 13-17, 2012, pp.95-98.
 
9 Jun-Sub Kim, Jin Kwak
“Secure Data Management Scheme for Cloud Data Center”
The 4th International Conference on Internet 2012, KOREAN SOCIETY FOR INTERNET INFORMATION,
Hilton Hawaiian village, Hawaii, USA, December 13-17, 2012, pp.87-90.
 
8 Su-Young Jung, Yukyeong Wi, Jun-Sub Kim, Jin Kwak
“Privacy Leakage Prevention Scheme for Social Networking Services”
The 4th International Conference on Internet 2012, KOREAN SOCIETY FOR INTERNET INFORMATION,
Hilton Hawaiian village, Hawaii, USA, December 13-17, 2012, pp.79-82.
 
7 Hee-suk Seo, Seung-jae Lee, Jin Kwak
“Connectivity Maintenance Scheme for Wireless Smartwork Networks”
International Workshop on Information and Security 2012, August 30-31, 2012, pp.7-8.
 
6 Jun-Sub Kim, Jin Kwak
“Data Management Scheme for Secure Data Storage in a Cloud Data Center”
International Workshop on Information and Security 2012, August 30-31, 2012, pp.3-4.
 
5 Yun-Sang Byun, SungYong Ryu, Jin Kwak
“A Facial Recognition System based on User Authentication for Mobile Office Environments”
International Conference on Security and Management 2012,
Las Vegas Nevada, USA, July 16-19, 2012, pp.569-570.
 
4 Yu-jong Jang, Jin Kwak
“A Study on Secure User Authentication Protocols in Smartwork Systems”
International Conference on Security and Management 2012,
Las Vegas Nevada, USA, July 16-19, 2012, pp.567-568.
 
3 Hee-suk Seo, Jin Kwak, Seung-hwan Ju
“A study on password-based user authentication technology using pattern”
The 2012 Future Technology Research Association International Conference on Advanced IT,
engineering Management(FTRA AIM Summer 2012), Jeju, Korea, July 10-12, 2012, pp.58-64.
 
2 Sung-Min Jung, Tae-Kyung Kim, Hee-Suk Seo, Seung-jae Lee, Jin Kwak
“A Study on the job Execution Time in the Smart Grid Network”
The 2012 Future Technology Research Association International Conference on Advanced IT,
engineering Management(FTRA AIM Summer 2012), Jeju, Korea, July 10-12, 2012, pp.56-57.
 
1 Woong Go, Jin Kwak
“Data Transaction Protocol for Privacy Protection in Smart Grid”
International Conference of the Korea Institute of Information & Communication Engineering 2012,
Silverside Hotel, Havaalani Karsisi Corlu, Turkey, Vol.5, No.1, June 28-30, 2012, pp.5-8.
 

[2011]

No. Subject File
5 Hanjae Jeong JEONG, Changbin Lee, Jin Kwak, Dongho Won, Changyoung Kwon and Seungjoo Kim
“Privacy-enhanced social network service(SNS)”
The 2011 Future Technology Research Association World Convergence Conference,
Jeju, Koera, December 12-15, 2011
 
4 Woong Go, You-jong Jang, Jin Kwak
“Construction of a Secure Two-Factor User Authentication System using Fingerprint Information and Password”
The 2011 Future Technology Research Association World Convergence Conference,
Jeju, Koera, December 12-15, 2011
 
3 Hyunsik Yang, Kwangwoo Lee, Changbin Lee, Jin Kwak, Dongho Won
“A Security Weakness in H.Tseng et al.’s Key Agreement Protocol”
The 6th Joint Workshop on Information Security 2011, Ambassador Hotel Kaohsiung, Kaohsiung, Taiwan, October 5-6, 2011, pp.32.
 
2 Jun-Sub Kim, Jin Kwak
“Analyses of Security Vulnerabilities and Requirements for Wireless Security Monitoring in the Smartwork Environment”
The 7th International Conference on Multimedia Information Technology and Applications 2011,
Ulaanbaatar, Mongolia, July 6-9, 2011, pp.1-2.
 
1 Dae-Sik Park, Jin Kwak
“A Study on Software Development Kit Management Method for Smart Phone”
International Conference of Korea Institute of Maritime Information and Communication Sciences 2011,
June 28, 2011, pp.4-5.
 

[2010]

No. Subject File
6 Hee Suk Seo, Jin Kwak
“Fuzzy Logic based Path Establishment in Heterogeneous Wireless Multimedia Sensor Networks”
The 5th International Conference on Ubiquious Information TEchnologies and Applications,
December 16-18, 2010
 
5 Hyeong-Ju Kang, Jin Kwak, Hee Suk Seo
“Area-Efficient Convolutional Deinterleaver for Mobile-TV Receiver”
The 2010 Future Technology Research Association International World Convergence Conference, Volume 2,
December 10-11, 2010, pp.496-506.
 
4 Jin Myoung Kim, Hee Suk Seo, Jin Kwak
“Routing Protocol for Heterogeneous Hierarchical Wireless Multimedia Sensor Networks”
The 2010 Future Technology Research Association International World Convergence Conference, Volume 2,
December 10-11, 2010, pp.207-216.
 
3 Moonyoung Hwang, Jin Kwak
“User-Centric ID Management Model for Privacy Protection in Cloud Computing”
The 6th International Conference on Multimedia Information Technology and Applications 2010,
Kathmandu, Nepal, August 23-25, 2010, pp.40-41.
 
2 Moonyoung Hwang, Jin Kwak
“Improve User-Centric ID Management Model for privacy Protection in Cloud Computing”
International Journal of Computer and Network Security 2010, Vol.2, No. 8,
Austria, Vienna, August, 2010, pp.45-49.
 
1 Dongbum Lee, Kwangwoo Lee, Seungjoo Kim, Woong Go, Dongho Won, Jin Kwak
“A Secure Key Management Scheme for Multi-Agent base Sensor Cloud Computing in Wireless Network”
The 5th Joint Workshop on Information Security 2010, South China Agricultural,
University, Guangzhou, P.R. China, August 5-6, 2010, pp.272-286.
 

[2009]

No. Subject File
5 Sun-Ho Lee, Jin Kwak, Im-Yeong Lee
“The Study on The Security Solution of USB Memory”
The 4th International Conference on Ubiquitous Information Technologies & Applications 2009, Kyushu Sangyo University,
Japan, December 20-22, 2009
 
4 Hee-Suk Seo, Jin Kwak
“Recursive Selection Method for False Report Filtering”
Journal of Internet Technology, Natl Ilan Univ, Vol.10, No.5,
October, 2009, pp.583-590.
 
3 Wan S. Yi, Dongbum Lee, Jin Kwak, Dongho Won
“Government Information Security System with ITS Product Pre-qualification”
The 4th Joint Workshop on Information Security 2009, International Conference Center National Sun Yat-sen University,
Kaohsiung, Taiwan, August 6-7, 2009, pp.56.
 
2 Wan S. Yi, Woong Go, Dongho Won, Jin Kwak
“Secure Authentication Protocol with Biometrics in an M-Commerce Environment”
The 4th Joint Workshop on Information Security 2009, International Conference Center National Sun Yat-sen University,
Kaohsiung, Taiwan, August 6-7, 2009, pp.37.
 
1 Wan S. Yi, Woong Go, Soo-kyun Kim, Dongho Won, Jin Kwak
“Fingerprint Based Secure Authentication Protocol using OTP in e-Banking”
Proceeding of International Conference on Security and Management 2009,
Las Vegas Nevada, USA, July 16, 2009, pp.541-546.
 

[2008]

No. Subject File
3 이윤호, 곽진
“E-QIM 워터마킹 방식의 파라미터 최적화 분석”
Journal of The Korean Data Analysis Society, 제10권 6호, 2008.12.31, pp.3475-3485.
 
2 Dongbum Lee, Kyungho Kang, Woong Go, Min Hong, Jin Kwak
“Security Analysis of Authentication Mechanisms in e-Passport”
APIC-IST 2008, International Conference on Information Science and Technology, Cavite State University,
Indang, Philippines, December 18-19, 2008, pp.65-69.
 
1 Woong Go, Kyungho Kang, Dongbum Lee, Min Hong, Jin Kwak
“Security Enhanced OTP Card Authentication Method with Fingerprint”
APIC-IST 2008, International Conference on Information Science and Technology, Cavite State University,
Indang, Philippines, December 18-19, 2008, pp.373-377
 

[2007]

No. Subject File
4 Junghyun Nam, Juryon Park, Youngsook Lee, Jin Kwak, Ung mo Kim, and Dongho Won
“Infringing Key Authentication of an ID-Based Group Key Exchange Protocol Using Binary Key Trees”
IJCSNS International Journal of Computer Science and Network Security,
Springer, LNAI 4692, Vietri sul mare, Italy, September 12-14, 2007, pp.672-679.
 
3 Sangsoo Yeo, Jin Kwak
“Privacy Enhanced Authentication Protocol for RFID Tag System Security”
IJCSNS International Journal of Computer Science and Network Security,
Vol 7, Number 9, September, 2007, pp.1-6.
 
2 Sangsoo Yeo, Kouichi Sakurai, Jin Kwak
“A Practical Proxy Device for Protecting RFID Tag’s Identifier”
IEEE CS Bio-pired, learning, and Intelligent Systems for Security,
August 09-10, 2007, pp.55-58.
 
1 Youngsook Lee, Jin Kwak, Junghyun Nam, and Dongho Won
“Password-Only Authenticated Key Exchange Between Two gents in the Four-Party Setting”
Proc. of KES AMSTA 2007, KES Symposium on Agent and Multi-Agent Systems, Springer-Verlag,
Wroclaw, Poland, May 31 – June01, 2007, pp.616-625.
 

[2006]

No. Subject File
1 Namje Park, Jin Kwak, Seungjoo Kim, Dongho Won, and Howon Kim
“Security Techniques based on EPC Gen2 Tag for Secure Mobile RFID Network Services”
Proc. of KES 2006, 10th International Conference on Knowledge-Based Intelligent Information and Engineering Systems, Springer-Verlag,
LNAI 4251, Bournemouth, UK, October 09-11, 2006, pp.924-934.
 

[2005]

No. Subject File
2 Jin Kwak, Keunwoo Rhee, Seungjoo Kim, and Dongho Won
“Unlinkable and Traceable EPC System for Consumer Privacy”
IJCSNS International Journal of Computer Science and Network Security, Vol.5/No.12,
December 30, 2005, pp.75-81.
 
1 Soohyun Oh, Jin Kwak
“One-way Hash-function based RFID system for User’s Privacy protection”
Proc. of APIS’05, The 4th Asia Pacific International Symposium on Information Technology,
January 26, 2005, pp.125-128.
 

[2004]

No. Subject File
2 Jinwoo Lee, Kieon Song, Jin Kwak, Hyunkyu Yang, and Dongho Won
“Enhanced Privacy Authentication Combining Authentication Approaches in Wireless Environments”
Proc. of SCI’04, The 2004 Symposium on Cryptography and Information Security, Vol.2,
January 29, 2004, pp.921-926.
 
1 Dongkyu Won, Jin Kwak, Hyunkyu Yang, and Dongho Won
“A Study on a New Password based Key Distribution Protocol using The Server’s Master Key”
Proc. of SCIS`04, The 2004 Symposium on Cryptography and Information Security, Vol.1,
January 28, 2004, pp.429-433.
 

[2003]

No. Subject File
1 Jin Kwak, Seungwoo Lee, Soohyun Oh, and Dongho Won
“Real-time Certificate Validation Service by client’s Selective Request”
Proc. of ISDA 2003, International Conference on Intelligent Systems Design and Applications, Springer-Verlag,
USA, August 10, 2003, pp.207-218.
 

[2002]

No. Subject File
5 Jin Kwak, Seungwoo Lee, Kyungjin Kim, Soohyun Oh, and Dongho Won
“Delegated certificate validation model applicable to the wireless PKI”
Proc. of WSEAS ICIS`02, International Conference on Information Security, Barcelona Spain, August, 2002.
 
4 Soohyun Oh, Jin Kwak, Sangman Ahn, and Dongho Won
“Efficient Key Agreement protocol using Proxy server for Wireless communication”
Proc. of WSEAS ICIS`02, International Conference on Information Security, Barcelona Spain, August, 2002.
 
3 Jin Kwak, Kyungjin Kim, Soohyun Oh, Dongho Won, and Hyungkyu Yang
“Real-time Certificate Status Validation Model With CSIProvider”
Proc. of WSEAS Transactions on Communications 02, Issue 1, Vol.1, Athene, Greece,
July 7, 2002, pp.203-210.
 
2 Kyungjin Kim, Jin Kwak, and Dongho Won
“Practical Use of Key Agreement Protocols”
Proc. of SAM’02, International Conference on Security and Management, Las Vegas, Nevada, USA,
June 24, 2002, pp.120-126.
 
1 Jin Kwak, Seungwoo Lee, Kyungjin Kim, Sungduk Kim, and Dongho Won
“Certificate Validation Service Providing Selective Request Information”
Proc. of SAM’02, International Conference on Security and Management, Las Vegas, Nevada, USA,
June 24, 2002, pp.465-470.