15 |
Private Key Recovery on Bitcoin with Duplicated Signatures ★
- Ju-Seong Ko, Jin Kwak
- KSII Transactions on Internet and Information Systems, KSII
- 2020-03-31 / Volume : 14 / No : 3 / Page : 1280-1300
- ISSN : 1976-7277 / DOI : 10.3837/tiis.2020.03.020
- Impact Factor : 0.648
|
|
14 |
Characteristics Analysis of Sodinokibi and GANDCRAB ★
- Young-Woong You, Ju-Seong Ko, Jin Kwak
- The 11th International Conference on Internet (ICONI 2019)
- 2019-12-15 ~ 2019-12-18
|
|
13 |
EC-KCDSA에서 보수 관계의 난수를 사용하는 개인키 복구 ★
- 고주성, 곽진
- 2019년도 한국정보보호학회 충청지부 학술논문발표회 / 2019-10-18 ~ 2019-10-19
|
|
12 |
Home IoT Devices and Network Domination with AI Speaker Vulnerabilities ★
- Ju-Seong Ko, Jin Kwak
- The 15th International Conference on Multimedia Information Technology and Applications (MITA2019)
- 2019-06-27 ~ 2019-07-01
|
|
11 |
ICS 환경에서의 Air-gap 공격 분석 ★
- 고영민, 고주성, 곽진
- 2019 한국정보보호학회 하계학술대회 / 2019-06-20 ~ 2019-06-22
|
|
10 |
최신 핀테크 서비스 현황 및 보안 동향 분석 ★
- 고주성, 곽진
- 2019년도 한국인터넷정보학회 춘계학술발표대회 / 2019-04-26 ~ 2019-04-27
|
|
9 |
A Study on IoT Device Authentication Protocol for High Speed and Lightweight ★
- Seul-Ki Choi, Ju-Seong Ko, Jin Kwak
- 2019 International Conference on Platform Technology and Service (PlatCon)
- 2019-01-28~2019-01-30
|
|
8 |
Real Time Android Ransomware Detection by Analyzed Android Applications ★
- Ju-Seong Ko, Jeong-Seok Jo, Deuk-Hun Kim, Seul-Ki Choi, Jin Kwak
- International Conference on Electronics, Information, and Communication (ICEIC) 2019
- 2019-01-22~2019-01-25
|
|
7 |
Analysis of sensitive data flow vulnerabilities for secure precision medicine ★
- Deuk-Hun Kim, Ju-Seong Ko, Jin Kwak
- The 10th International Conference on Internet(ICONI 2018)
- 2018-12-16~2018-12-19
|
|
6 |
중복된 난수 사용을 통한 EC-KCDSA 알고리즘 개인키 추출 방안 ★
- 고주성, 곽진
- 2018 한국정보보호학회 동계학술대회 / 2018-12-08
|
|