
{"id":8392,"date":"2022-11-28T10:44:01","date_gmt":"2022-11-28T01:44:01","guid":{"rendered":"http:\/\/infosec.pusan.ac.kr\/?page_id=8392"},"modified":"2024-08-27T21:23:02","modified_gmt":"2024-08-27T12:23:02","slug":"sub45","status":"publish","type":"page","link":"https:\/\/infosec.pusan.ac.kr\/index.php\/sub45\/","title":{"rendered":"\uad6d\ub0b4\ub17c\ubb38 \ubc0f \uad6d\ub0b4\ud559\uc220\ub300\ud68c"},"content":{"rendered":"<p><!-- research count --><\/p>\n<div class=\"research_count\">\n<ul>\n<li>\n<div>\n<ol>\n<li><img decoding=\"async\" src=\"https:\/\/infosec.pusan.ac.kr\/wp-content\/uploads\/2020\/03\/sub41_1.gif\" \/><\/li>\n<li>SCI\n<p class=\"count\">60<\/p>\n<\/li>\n<\/ol>\n<\/div>\n<\/li>\n<li>\n<div>\n<ol>\n<li><img decoding=\"async\" src=\"https:\/\/infosec.pusan.ac.kr\/wp-content\/uploads\/2020\/03\/sub41_2.gif\" \/><\/li>\n<li>\ud2b9\ud5c8\n<p class=\"count\">66<\/p>\n<\/li>\n<\/ol>\n<\/div>\n<\/li>\n<li>\n<div>\n<ol>\n<li><img decoding=\"async\" src=\"https:\/\/infosec.pusan.ac.kr\/wp-content\/uploads\/2020\/03\/sub41_3.gif\" \/><\/li>\n<li>\ud504\ub85c\uc81d\ud2b8\n<p class=\"count\">44<\/p>\n<\/li>\n<\/ol>\n<\/div>\n<\/li>\n<\/ul>\n<\/div>\n<div class=\"space40\"><\/div>\n<div id=\"sub31_tab1\" class=\"sub31\">\n<p><!-- sub tab --><\/p>\n<div class=\"sub_tab\">\n<ul>\n<li><a href=\"index.php\/sub41\">SCI<\/a><\/li>\n<li><a href=\"index.php\/sub44\">\uad6d\uc81c\ud559\uc220\ub300\ud68c<\/a><\/li>\n<li><a class=\"on\" href=\"index.php\/sub45\">\uad6d\ub0b4\ub17c\ubb38 \ubc0f \uad6d\ub0b4\ud559\uc220\ub300\ud68c<\/a><\/li>\n<li><a href=\"index.php\/sub42\">\ud2b9\ud5c8\uc2e4\uc801<\/a><\/li>\n<li><a href=\"index.php\/sub43\">\ud504\ub85c\uc81d\ud2b8<\/a><\/li>\n<\/ul>\n<\/div>\n<div class=\"space20\"><\/div>\n<div class=\"sub_content_title\">\uad6d\ub0b4\ub17c\ubb38<\/div>\n<div class=\"research_list\"><div class=\"mb-widget\"><div class=\"mb-latest-basic mb-widget-shortcode\"><div class=\"mb-latest-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/\" title=\"sub41_2\">sub41_2<\/a><\/div><div class=\"mb-latest-box\"><table  cellspacing=\"0\" cellpadding=\"0\" border=\"0\" class=\"table table-latest\"><colgroup><col style=\"width:100%\" \/><\/colgroup><tbody><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ub17c\ubb38\uc9c0&#038;vid=371\" title=\"Thi-Thu-Huong Le;Upjun Ha;Hyunjin Jang;Howon Kim &quot;WSN \uce68\uc785 \ud0d0\uc9c0\ub97c \uc704\ud55c \ub525\ub7ec\ub2dd \ubc0f \ud2b8\ub79c\uc2a4\ud3ec\uba38 \uae30\ubc18 \ubaa8\ub378\uc758 \ube44\uad50 \uc131\ub2a5 \ubd84\uc11d&quot;, JIIS, 2026-04 (KCI)\"><span class=\"mb-latest-item-title-text\">Thi-Thu-Huong Le;Upjun Ha;Hyunjin Jang;Howon Kim &quot;WSN \uce68\uc785 \ud0d0\uc9c0\ub97c \uc704\ud55c \ub525\ub7ec\ub2dd \ubc0f \ud2b8\ub79c\uc2a4\ud3ec\uba38 \uae30\ubc18 \ubaa8\ub378\uc758 \ube44\uad50 \uc131\ub2a5 \ubd84\uc11d&quot;, JIIS, 2026-04 (KCI)<\/span> <img decoding=\"async\" class=\"list-i-new\" alt=\"new\" style=\"vertical-align:middle;\" src=\"https:\/\/infosec.pusan.ac.kr\/wp-content\/plugins\/mangboard\/skins\/bbs_basic\/images\/icon_new.gif\" \/><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ub17c\ubb38\uc9c0&#038;vid=370\" title=\"Ahmada Yusril Kadiptya;ANDRO APRILA ADIPUTRA;Jang HyunJin;Thi-Thu-Huong Le;Kim Howon, &quot;\ucc28\ub7c9\uc6a9 \ucee8\ud2b8\ub864\ub7ec \uc5d0\uc5b4\ub9ac\uc5b4 \ub124\ud2b8\uc6cc\ud06c\uc5d0\uc11c\uc758 \uac15\uac74\ud55c \uce68\uc785 \ud0d0\uc9c0 \uc2dc\uc2a4\ud15c\uc744 \uc704\ud55c \uc5f0\uad6c&quot;, JIIS, 2026-04 (KCI)\"><span class=\"mb-latest-item-title-text\">Ahmada Yusril Kadiptya;ANDRO APRILA ADIPUTRA;Jang HyunJin;Thi-Thu-Huong Le;Kim Howon, &quot;\ucc28\ub7c9\uc6a9 \ucee8\ud2b8\ub864\ub7ec \uc5d0\uc5b4\ub9ac\uc5b4 \ub124\ud2b8\uc6cc\ud06c\uc5d0\uc11c\uc758 \uac15\uac74\ud55c \uce68\uc785 \ud0d0\uc9c0 \uc2dc\uc2a4\ud15c\uc744 \uc704\ud55c \uc5f0\uad6c&quot;, JIIS, 2026-04 (KCI)<\/span> <img decoding=\"async\" class=\"list-i-new\" alt=\"new\" style=\"vertical-align:middle;\" src=\"https:\/\/infosec.pusan.ac.kr\/wp-content\/plugins\/mangboard\/skins\/bbs_basic\/images\/icon_new.gif\" \/><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ub17c\ubb38\uc9c0&#038;vid=344\" title=\"Jiwon Yun, Yeonjeong Hwang, Thi-Thu-Huong Le, Howon Kim. The Impact of Generative AI Models on Large-Scale Password Generation for Guessing Attacks Classification. KIISC, Dec 2024, https:\/\/public.thinkonweb.com\/journals\/jkiisc\/digital-library\/101725, (KCI index) \"><span class=\"mb-latest-item-title-text\">Jiwon Yun, Yeonjeong Hwang, Thi-Thu-Huong Le, Howon Kim. The Impact of Generative AI Models on Large-Scale Password Generation for Guessing Attacks Classification. KIISC, Dec 2024, https:\/\/public.thinkonweb.com\/journals\/jkiisc\/digital-library\/101725, (KCI index) <\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ub17c\ubb38\uc9c0&#038;vid=323\" title=\"R. W. Wardhani, D. S. C. Putranto, Jo Uk, Thi-Thu-Huong Le, Aji Teguh Prihatno, Yustus Eko Oktian, Naufal Suryanto and H. Kim. Trend of Paradigm for Integrating Blockchain, AI, Quantum Computing, and IoT (\uc2a4\ub9c8\ud2b8\ubbf8\ub514\uc5b4\uc800\ub110 Smart Media Journal 2023)\"><span class=\"mb-latest-item-title-text\">R. W. Wardhani, D. S. C. Putranto, Jo Uk, Thi-Thu-Huong Le, Aji Teguh Prihatno, Yustus Eko Oktian, Naufal Suryanto and H. Kim. Trend of Paradigm for Integrating Blockchain, AI, Quantum Computing, and IoT (\uc2a4\ub9c8\ud2b8\ubbf8\ub514\uc5b4\uc800\ub110 Smart Media Journal 2023)<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ub17c\ubb38\uc9c0&#038;vid=230\" title=\"\uc870\ud604\uc9c4, \uac15\ud6a8\uc740, \uc2ec\uc900\uc11d, \ud64d\uc724\uc601 and \uae40\ud638\uc6d0. (2022). \uc0f4 \ub124\ud2b8\uc6cc\ud06c\uc640 \ub3d9\ud615\uc554\ud638\ub97c \uc774\uc6a9\ud55c \uac1c\uc778\uc815\ubcf4 \ubcf4\ud638 \uc5bc\uad74 \uac80\uc99d \uc2dc\uc2a4\ud15c. \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c\ub17c\ubb38\uc9c0, 47(3), 551-558.\"><span class=\"mb-latest-item-title-text\">\uc870\ud604\uc9c4, \uac15\ud6a8\uc740, \uc2ec\uc900\uc11d, \ud64d\uc724\uc601 and \uae40\ud638\uc6d0. (2022). \uc0f4 \ub124\ud2b8\uc6cc\ud06c\uc640 \ub3d9\ud615\uc554\ud638\ub97c \uc774\uc6a9\ud55c \uac1c\uc778\uc815\ubcf4 \ubcf4\ud638 \uc5bc\uad74 \uac80\uc99d \uc2dc\uc2a4\ud15c. \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c\ub17c\ubb38\uc9c0, 47(3), 551-558.<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ub17c\ubb38\uc9c0&#038;vid=229\" title=\"\uc774\uc9c4\uc7ac, \ubc15\uc885\uc6b1, \uae40\ubbfc\uc7ac and \uae40\ud638\uc6d0. (2021). RISC-V \ud504\ub85c\uc138\uc11c\uc0c1\uc5d0\uc11c\uc758 \ud6a8\uc728\uc801\uc778 ARIA \uc554\ud638 \ud655\uc7a5 \uba85\ub839\uc5b4. \uc815\ubcf4\ubcf4\ud638\ud559\ud68c\ub17c\ubb38\uc9c0, 31(3), 309-322.\"><span class=\"mb-latest-item-title-text\">\uc774\uc9c4\uc7ac, \ubc15\uc885\uc6b1, \uae40\ubbfc\uc7ac and \uae40\ud638\uc6d0. (2021). RISC-V \ud504\ub85c\uc138\uc11c\uc0c1\uc5d0\uc11c\uc758 \ud6a8\uc728\uc801\uc778 ARIA \uc554\ud638 \ud655\uc7a5 \uba85\ub839\uc5b4. \uc815\ubcf4\ubcf4\ud638\ud559\ud68c\ub17c\ubb38\uc9c0, 31(3), 309-322.<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ub17c\ubb38\uc9c0&#038;vid=228\" title=\"\ub77c\ub77c\uc0ac\ud2f0 \ud558\ub77c\uc2a4\ud0c0 \ud0c0\ud2f0\ub9c8, \uc9c0\uc7a5\ud604, \ubc15\uc815\ud658 and \uae40\ud638\uc6d0. (2021). Performance Evaluation of Ripple-Carry Adders in Quantum Factoring Algorithm. \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c\ub17c\ubb38\uc9c0, 46(2), 333-344.\"><span class=\"mb-latest-item-title-text\">\ub77c\ub77c\uc0ac\ud2f0 \ud558\ub77c\uc2a4\ud0c0 \ud0c0\ud2f0\ub9c8, \uc9c0\uc7a5\ud604, \ubc15\uc815\ud658 and \uae40\ud638\uc6d0. (2021). Performance Evaluation of Ripple-Carry Adders in Quantum Factoring Algorithm. \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c\ub17c\ubb38\uc9c0, 46(2), 333-344.<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ub17c\ubb38\uc9c0&#038;vid=185\" title=\"\uc774\uc0c1\ud604, \uae40\uc6a9\uc218, &quot;\ube14\ub85d\uccb4\uc778 \ud504\ub77c\uc774\ubc84\uc2dc \ubcf4\ud638 \ud504\ub85c\ud1a0\ucf5c \ub3d9\ud5a5 \ubc0f \ubd84\uc11d&quot;, \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c\ub17c\ubb38\uc9c0, 2019.12\"><span class=\"mb-latest-item-title-text\">\uc774\uc0c1\ud604, \uae40\uc6a9\uc218, &quot;\ube14\ub85d\uccb4\uc778 \ud504\ub77c\uc774\ubc84\uc2dc \ubcf4\ud638 \ud504\ub85c\ud1a0\ucf5c \ub3d9\ud5a5 \ubc0f \ubd84\uc11d&quot;, \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c\ub17c\ubb38\uc9c0, 2019.12<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ub17c\ubb38\uc9c0&#038;vid=184\" title=\"\uae40\uc6a9\uc218, \uc774\uc0c1\ud604, &quot;\uae30\uc0c1\uc815\ubcf4\ub97c \ud65c\uc6a9\ud55c LSTM \uae30\ubc18 \ud0dc\uc591\uad11 \ubc1c\uc804\ub7c9 \uc608\uce21 \uae30\ubc95&quot;, \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c\ub17c\ubb38\uc9c0, 2019.12\"><span class=\"mb-latest-item-title-text\">\uae40\uc6a9\uc218, \uc774\uc0c1\ud604, &quot;\uae30\uc0c1\uc815\ubcf4\ub97c \ud65c\uc6a9\ud55c LSTM \uae30\ubc18 \ud0dc\uc591\uad11 \ubc1c\uc804\ub7c9 \uc608\uce21 \uae30\ubc95&quot;, \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c\ub17c\ubb38\uc9c0, 2019.12<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ub17c\ubb38\uc9c0&#038;vid=183\" title=\"\ubc15\ucc2c\ud76c, \uae40\ud574\uc6a9, \uc9c0\uc7a5\ud604, &quot;\uc591\uc790\ub0b4\uc131\uc554\ud638 \ud558\ub4dc\uc6e8\uc5b4 \uad6c\ud604 \ub3d9\ud5a5 \ubc0f \ubd84\uc11d&quot;, \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c\ub17c\ubb38\uc9c0, 2019.07\"><span class=\"mb-latest-item-title-text\">\ubc15\ucc2c\ud76c, \uae40\ud574\uc6a9, \uc9c0\uc7a5\ud604, &quot;\uc591\uc790\ub0b4\uc131\uc554\ud638 \ud558\ub4dc\uc6e8\uc5b4 \uad6c\ud604 \ub3d9\ud5a5 \ubc0f \ubd84\uc11d&quot;, \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c\ub17c\ubb38\uc9c0, 2019.07<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ub17c\ubb38\uc9c0&#038;vid=182\" title=\"\uac15\ud6a8\uc740, &quot;Matrix Profile \uae30\ubc18\uc758 \uac00\uc804\uae30\uae30 \uc774\ubca4\ud2b8 \ud0d0\uc9c0 \ubc0f \ud2b9\uc9d5 \ucd94\ucd9c \uae30\ubc95&quot;, \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c\ub17c\ubb38\uc9c0, 2019. 06\"><span class=\"mb-latest-item-title-text\">\uac15\ud6a8\uc740, &quot;Matrix Profile \uae30\ubc18\uc758 \uac00\uc804\uae30\uae30 \uc774\ubca4\ud2b8 \ud0d0\uc9c0 \ubc0f \ud2b9\uc9d5 \ucd94\ucd9c \uae30\ubc95&quot;, \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c\ub17c\ubb38\uc9c0, 2019. 06<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ub17c\ubb38\uc9c0&#038;vid=130\" title=\"\ubc15\ud0dc\ud658, \ubc30\ubd09\uc9c4, \uae40\ud638\uc6d0, \u201c\ud574\uc2dc \uae30\ubc18 \uc11c\uba85 \uae30\ubc95 \ucd5c\uc2e0 \uae30\uc220 \ub3d9\ud5a5 \ubc0f \uc804\ub9dd.\u201d, \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c, 2016.12\"><span class=\"mb-latest-item-title-text\">\ubc15\ud0dc\ud658, \ubc30\ubd09\uc9c4, \uae40\ud638\uc6d0, \u201c\ud574\uc2dc \uae30\ubc18 \uc11c\uba85 \uae30\ubc95 \ucd5c\uc2e0 \uae30\uc220 \ub3d9\ud5a5 \ubc0f \uc804\ub9dd.\u201d, \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c, 2016.12<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ub17c\ubb38\uc9c0&#038;vid=129\" title=\"Taehwan Park, Hwajeong Seo, Bongjin Bae, Howon Kim, \u201cSecure Message Transmission against Remote Control System\u201d, \ud55c\uad6d\uc815\ubcf4\ud1b5\uc2e0\ud559\ud68c, 2016.12\"><span class=\"mb-latest-item-title-text\">Taehwan Park, Hwajeong Seo, Bongjin Bae, Howon Kim, \u201cSecure Message Transmission against Remote Control System\u201d, \ud55c\uad6d\uc815\ubcf4\ud1b5\uc2e0\ud559\ud68c, 2016.12<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ub17c\ubb38\uc9c0&#038;vid=128\" title=\"Taehwan Park, Hwajeong Seo, Bongjin Bae, Howon Kim, \u201cEfficient Implementation of Simeck Family Block Cipher on 8-Bit Processor.\u201d, \ud55c\uad6d\uc815\ubcf4\ud1b5\uc2e0\ud559\ud68c, 2016.9\"><span class=\"mb-latest-item-title-text\">Taehwan Park, Hwajeong Seo, Bongjin Bae, Howon Kim, \u201cEfficient Implementation of Simeck Family Block Cipher on 8-Bit Processor.\u201d, \ud55c\uad6d\uc815\ubcf4\ud1b5\uc2e0\ud559\ud68c, 2016.9<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ub17c\ubb38\uc9c0&#038;vid=127\" title=\"\uc11c\ud654\uc815, \uae40\ud638\uc6d0, \u201c\uc785\ub825 \uc704\uce58 \uc720\ucd94 \ubc29\uc9c0\ub97c \uc704\ud55c \ubcf4\uc548 \ud0a4\ud328\ub4dc\uc758 \uc124\uacc4\u201d, \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c, 26(1), Feb, 2016 \"><span class=\"mb-latest-item-title-text\">\uc11c\ud654\uc815, \uae40\ud638\uc6d0, \u201c\uc785\ub825 \uc704\uce58 \uc720\ucd94 \ubc29\uc9c0\ub97c \uc704\ud55c \ubcf4\uc548 \ud0a4\ud328\ub4dc\uc758 \uc124\uacc4\u201d, \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c, 26(1), Feb, 2016 <\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ub17c\ubb38\uc9c0&#038;vid=126\" title=\"\uc11c\ud654\uc815, \uae40\ud638\uc6d0, \u201c\ub2e4\uc911 \ucc44\ub110 \uc778\uc99d \uae30\ubc18 \ubcf4\uc548 \uce74\ub4dc\uc758 \uc124\uacc4 \ubc0f \uad6c\ud604\u201d, \ud55c\uad6d\uc815\ubcf4\ud1b5\uc2e0\ud559\ud68c, 20(1), Jan, 2016\"><span class=\"mb-latest-item-title-text\">\uc11c\ud654\uc815, \uae40\ud638\uc6d0, \u201c\ub2e4\uc911 \ucc44\ub110 \uc778\uc99d \uae30\ubc18 \ubcf4\uc548 \uce74\ub4dc\uc758 \uc124\uacc4 \ubc0f \uad6c\ud604\u201d, \ud55c\uad6d\uc815\ubcf4\ud1b5\uc2e0\ud559\ud68c, 20(1), Jan, 2016<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ub17c\ubb38\uc9c0&#038;vid=125\" title=\"\uc11c\ud654\uc815, \uc11d\uc120\ud76c, \uae40\uacbd\ud6c8, \uae40\ud638\uc6d0, \u201c\ub09c\uc218\uc0dd\uc131\uae30\ub97c \uc774\uc6a9\ud55c \uba40\ud2f0\ucc44\ub110 \ubcf4\uc548\uce74\ub4dc \uc124\uacc4\u201d, \uc815\ubcf4\ubcf4\ud638\ud559\ud68c, 25(3), Jun, 2015\"><span class=\"mb-latest-item-title-text\">\uc11c\ud654\uc815, \uc11d\uc120\ud76c, \uae40\uacbd\ud6c8, \uae40\ud638\uc6d0, \u201c\ub09c\uc218\uc0dd\uc131\uae30\ub97c \uc774\uc6a9\ud55c \uba40\ud2f0\ucc44\ub110 \ubcf4\uc548\uce74\ub4dc \uc124\uacc4\u201d, \uc815\ubcf4\ubcf4\ud638\ud559\ud68c, 25(3), Jun, 2015<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ub17c\ubb38\uc9c0&#038;vid=124\" title=\"\uc11c\ud654\uc815, \uae40\ud638\uc6d0, \u201c\uae08\uc735\ubcf4\uc548\uc744 \uc704\ud55c \ubb3c\ub9ac\uc801 \ubcf4\uc548 \uce74\ub4dc\uc758 \uc124\uacc4 \ubc0f \uad6c\ud604\u201d, \ud55c\uad6d\uc815\ubcf4\ud1b5\uc2e0\ud559\ud68c, 19(4), Apr, 2015\"><span class=\"mb-latest-item-title-text\">\uc11c\ud654\uc815, \uae40\ud638\uc6d0, \u201c\uae08\uc735\ubcf4\uc548\uc744 \uc704\ud55c \ubb3c\ub9ac\uc801 \ubcf4\uc548 \uce74\ub4dc\uc758 \uc124\uacc4 \ubc0f \uad6c\ud604\u201d, \ud55c\uad6d\uc815\ubcf4\ud1b5\uc2e0\ud559\ud68c, 19(4), Apr, 2015<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ub17c\ubb38\uc9c0&#038;vid=123\" title=\"\uc11c\ud654\uc815, \uae40\ud638\uc6d0, \u201cConsecutive Operand-Caching Method for Multi-precision Multiplication, Revisited,\u201d \ud55c\uad6d\uc815\ubcf4\ud1b5\uc2e0\ud559\ud68c, 3, 2015 . Accepted for Publication.\"><span class=\"mb-latest-item-title-text\">\uc11c\ud654\uc815, \uae40\ud638\uc6d0, \u201cConsecutive Operand-Caching Method for Multi-precision Multiplication, Revisited,\u201d \ud55c\uad6d\uc815\ubcf4\ud1b5\uc2e0\ud559\ud68c, 3, 2015 . Accepted for Publication.<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ub17c\ubb38\uc9c0&#038;vid=122\" title=\"\uc11c\ud654\uc815, \uae40\ud638\uc6d0, \u201cLEA Block Cipher in Javascript,\u201d \ud55c\uad6d\uc815\ubcf4\ud1b5\uc2e0\ud559\ud68c, 12(4), 2014 . Accepted for Publication.\"><span class=\"mb-latest-item-title-text\">\uc11c\ud654\uc815, \uae40\ud638\uc6d0, \u201cLEA Block Cipher in Javascript,\u201d \ud55c\uad6d\uc815\ubcf4\ud1b5\uc2e0\ud559\ud68c, 12(4), 2014 . Accepted for Publication.<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ub17c\ubb38\uc9c0&#038;vid=121\" title=\"\uc11c\ud654\uc815, \uae40\ud638\uc6d0, \u201c\uc785\ub825 \uba54\uc2dc\uc9c0 \uc554\ud638\ud654\ub97c \ud1b5\ud55c \ubcf4\uc548 \ud0a4\ud328\ub4dc\uc758 \uc124\uacc4\uc640 \uad6c\ud604 ,\u201d \ud55c\uad6d\uc815\ubcf4\ud1b5\uc2e0\ud559\ud68c, 12, 2014 . Accepted for Publication.\"><span class=\"mb-latest-item-title-text\">\uc11c\ud654\uc815, \uae40\ud638\uc6d0, \u201c\uc785\ub825 \uba54\uc2dc\uc9c0 \uc554\ud638\ud654\ub97c \ud1b5\ud55c \ubcf4\uc548 \ud0a4\ud328\ub4dc\uc758 \uc124\uacc4\uc640 \uad6c\ud604 ,\u201d \ud55c\uad6d\uc815\ubcf4\ud1b5\uc2e0\ud559\ud68c, 12, 2014 . Accepted for Publication.<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ub17c\ubb38\uc9c0&#038;vid=120\" title=\"\uc11c\ud654\uc815, \uae40\ud638\uc6d0, \u201cStudy of Modular Multiplication Methods on Embedded Processors ,\u201d \ud55c\uad6d\uc815\ubcf4\ud1b5\uc2e0\ud559\ud68c, 12(3), pp. 145-153, Sep. 2014 .\"><span class=\"mb-latest-item-title-text\">\uc11c\ud654\uc815, \uae40\ud638\uc6d0, \u201cStudy of Modular Multiplication Methods on Embedded Processors ,\u201d \ud55c\uad6d\uc815\ubcf4\ud1b5\uc2e0\ud559\ud68c, 12(3), pp. 145-153, Sep. 2014 .<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ub17c\ubb38\uc9c0&#038;vid=119\" title=\"\uc11c\ud654\uc815, \uae40\ud638\uc6d0, \u201c\ub09c\uc218 \ubc1c\uc0dd\uae30\ub97c \uc774\uc6a9\ud55c \uc774\uc911\ud654 \uad6c\uc870\uc758 \uc548\uc804\ud55c \ube44\ubc00\ubc88\ud638 \uc0dd\uc131 \uae30\ubc95 ,\u201d \ud55c\uad6d\uc815\ubcf4\ud1b5\uc2e0\ud559\ud68c, 18(4) pp. 867-875, Apr, 2014.\"><span class=\"mb-latest-item-title-text\">\uc11c\ud654\uc815, \uae40\ud638\uc6d0, \u201c\ub09c\uc218 \ubc1c\uc0dd\uae30\ub97c \uc774\uc6a9\ud55c \uc774\uc911\ud654 \uad6c\uc870\uc758 \uc548\uc804\ud55c \ube44\ubc00\ubc88\ud638 \uc0dd\uc131 \uae30\ubc95 ,\u201d \ud55c\uad6d\uc815\ubcf4\ud1b5\uc2e0\ud559\ud68c, 18(4) pp. 867-875, Apr, 2014.<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ub17c\ubb38\uc9c0&#038;vid=118\" title=\"\uc544\ud30c\ub974\ub098, \uc11c\ud654\uc815, \uc774\ub3d9\uac74, \uae40\ud638\uc6d0, \u201cImplementation of an RFID Key Management System for DASH7,\u201d \ud55c\uad6d\uc815\ubcf4\ud1b5\uc2e0\ud559\ud68c, 12(1) pp. 19-25, Mar. 2014.\"><span class=\"mb-latest-item-title-text\">\uc544\ud30c\ub974\ub098, \uc11c\ud654\uc815, \uc774\ub3d9\uac74, \uae40\ud638\uc6d0, \u201cImplementation of an RFID Key Management System for DASH7,\u201d \ud55c\uad6d\uc815\ubcf4\ud1b5\uc2e0\ud559\ud68c, 12(1) pp. 19-25, Mar. 2014.<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ub17c\ubb38\uc9c0&#038;vid=117\" title=\"\uc11c\ud654\uc815, \uae40\ud638\uc6d0, \u201c\uc13c\uc11c \ub124\ud2b8\uc6cc\ud06c \uc0c1\uc5d0\uc11c\uc758 \uc800\uc804\ub825 \ubcf4\uc548 \uc218\uc911 \ud1b5\uc2e0\uc744 \uc704\ud55c \ub3d9\uc791 \uc804\uc555 \uc2a4\ucf00\uc77c \uae30\ubc18 \uc554\ud638\ud654\uc5d0 \ub300\ud55c \uc5f0\uad6c ,\u201d \ud55c\uad6d\uc815\ubcf4\ud1b5\uc2e0\ud559\ud68c, 18(3) pp. 586-594, Mar. 2014.\"><span class=\"mb-latest-item-title-text\">\uc11c\ud654\uc815, \uae40\ud638\uc6d0, \u201c\uc13c\uc11c \ub124\ud2b8\uc6cc\ud06c \uc0c1\uc5d0\uc11c\uc758 \uc800\uc804\ub825 \ubcf4\uc548 \uc218\uc911 \ud1b5\uc2e0\uc744 \uc704\ud55c \ub3d9\uc791 \uc804\uc555 \uc2a4\ucf00\uc77c \uae30\ubc18 \uc554\ud638\ud654\uc5d0 \ub300\ud55c \uc5f0\uad6c ,\u201d \ud55c\uad6d\uc815\ubcf4\ud1b5\uc2e0\ud559\ud68c, 18(3) pp. 586-594, Mar. 2014.<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ub17c\ubb38\uc9c0&#038;vid=116\" title=\"\uae40\uc9c0\ud604,\uc774\uc724\uc9c4, \uae40\ud638\uc6d0, \u201c\uc2a4\ub9c8\ud2b8 \uadf8\ub9ac\ub4dc \ud658\uacbd\uc5d0\uc11c \uac00\uc815\uc758 \uc18c\ube44\uc804\ub825 \uc0dd\uc131 \uc2dc\ubbac\ub808\uc774\ud130 \uac1c\ubc1c \ubc0f \ub370\uc774\ud130 \ub9c8\uc774\ub2dd \uae30\ubc95\uc744 \uc774\uc6a9\ud55c \uac00\uc871 \uc720\ud615 \ubd84\ub958\u201d, \ud55c\uad6d\uc815\ubcf4\ucc98\ub9ac\ud559\ud68c, \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c\ub17c\ubb38\uc9c0, ISSN 1226-4717, Vol. 39C, No. 1, pp.72-81, 2014.01\"><span class=\"mb-latest-item-title-text\">\uae40\uc9c0\ud604,\uc774\uc724\uc9c4, \uae40\ud638\uc6d0, \u201c\uc2a4\ub9c8\ud2b8 \uadf8\ub9ac\ub4dc \ud658\uacbd\uc5d0\uc11c \uac00\uc815\uc758 \uc18c\ube44\uc804\ub825 \uc0dd\uc131 \uc2dc\ubbac\ub808\uc774\ud130 \uac1c\ubc1c \ubc0f \ub370\uc774\ud130 \ub9c8\uc774\ub2dd \uae30\ubc95\uc744 \uc774\uc6a9\ud55c \uac00\uc871 \uc720\ud615 \ubd84\ub958\u201d, \ud55c\uad6d\uc815\ubcf4\ucc98\ub9ac\ud559\ud68c, \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c\ub17c\ubb38\uc9c0, ISSN 1226-4717, Vol. 39C, No. 1, pp.72-81, 2014.01<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ub17c\ubb38\uc9c0&#038;vid=115\" title=\"\ucd5c\uc885\uc11d, \uae40\ud638\uc6d0, \u201c\ud0c0\uc6d0\uace1\uc120\uc0c1\uc758 \uc601\uc9c0\uc2dd\uae30\ubc18 \uc0ac\uc6a9\uc790 \uc6d0\uaca9\uc778\uc99d \ud504\ub85c\ud1a0\ucf5c\u201d, \ud55c\uad6d\uc815\ubcf4\ucc98\ub9ac\ud559\ud68c, \uc815\ubcf4\ucc98\ub9ac\ud559\ud68c\ub17c\ubb38\uc9c0, ISSN 2287-5891, Vol. 2, No. 12, pp.517-524, 2013.12\"><span class=\"mb-latest-item-title-text\">\ucd5c\uc885\uc11d, \uae40\ud638\uc6d0, \u201c\ud0c0\uc6d0\uace1\uc120\uc0c1\uc758 \uc601\uc9c0\uc2dd\uae30\ubc18 \uc0ac\uc6a9\uc790 \uc6d0\uaca9\uc778\uc99d \ud504\ub85c\ud1a0\ucf5c\u201d, \ud55c\uad6d\uc815\ubcf4\ucc98\ub9ac\ud559\ud68c, \uc815\ubcf4\ucc98\ub9ac\ud559\ud68c\ub17c\ubb38\uc9c0, ISSN 2287-5891, Vol. 2, No. 12, pp.517-524, 2013.12<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ub17c\ubb38\uc9c0&#038;vid=114\" title=\"\uc774\uc5f0\ucca0, \uc11c\ud654\uc815, \uae40\ud638\uc6d0, \u201cWAVE \ud558\ub4dc\uc6e8\uc5b4 \uc554\ud638 \ub77c\uc774\ube0c\ub7ec\ub9ac\uc5d0 \uc801\ud569\ud55c \ud6a8\uc728\uc801\uc778 AES-CCM \uad6c\uc870 \uc124\uacc4\u201d, \ud55c\uad6d\uc815\ubcf4\ud1b5\uc2e0\ud559\ud68c\ub17c\ubb38\uc9c0, Vol. 17, No. 12, pp.2899-2905, 2013. 12\"><span class=\"mb-latest-item-title-text\">\uc774\uc5f0\ucca0, \uc11c\ud654\uc815, \uae40\ud638\uc6d0, \u201cWAVE \ud558\ub4dc\uc6e8\uc5b4 \uc554\ud638 \ub77c\uc774\ube0c\ub7ec\ub9ac\uc5d0 \uc801\ud569\ud55c \ud6a8\uc728\uc801\uc778 AES-CCM \uad6c\uc870 \uc124\uacc4\u201d, \ud55c\uad6d\uc815\ubcf4\ud1b5\uc2e0\ud559\ud68c\ub17c\ubb38\uc9c0, Vol. 17, No. 12, pp.2899-2905, 2013. 12<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ub17c\ubb38\uc9c0&#038;vid=113\" title=\"\uc11c\ud654\uc815, \uae40\ud638\uc6d0,\u201dEC-ELGAMAL \uc900\ub3d9\ud615 \uc554\ud638\ud654\uae30\ubc18 \uc804\uc790\ud22c\ud45c,\u201d \ud55c\uad6d\uc815\ubcf4\ud1b5\uc2e0\ud559\ud68c\ub17c\ubb38\uc9c0, Vol. 17, No, 4, pp.909-916. 2013. 4\"><span class=\"mb-latest-item-title-text\">\uc11c\ud654\uc815, \uae40\ud638\uc6d0,\u201dEC-ELGAMAL \uc900\ub3d9\ud615 \uc554\ud638\ud654\uae30\ubc18 \uc804\uc790\ud22c\ud45c,\u201d \ud55c\uad6d\uc815\ubcf4\ud1b5\uc2e0\ud559\ud68c\ub17c\ubb38\uc9c0, Vol. 17, No, 4, pp.909-916. 2013. 4<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ub17c\ubb38\uc9c0&#038;vid=112\" title=\"\uc11c\ud654\uc815, \uae40\ud638\uc6d0, \u201c\uc784\ubca0\ub514\ub4dc \ub9c8\uc774\ud06c\ub85c \ud504\ub85c\uc138\uc11c \uc0c1\uc5d0\uc11c\uc758 \ucd5c\uc2e0 \uc554\ud638 \uad6c\ud604 \ub3d9\ud5a5 ,\u201d \uc815\ubcf4\ubcf4\ud638\ud559\ud68c(Accepted for Publication)\"><span class=\"mb-latest-item-title-text\">\uc11c\ud654\uc815, \uae40\ud638\uc6d0, \u201c\uc784\ubca0\ub514\ub4dc \ub9c8\uc774\ud06c\ub85c \ud504\ub85c\uc138\uc11c \uc0c1\uc5d0\uc11c\uc758 \ucd5c\uc2e0 \uc554\ud638 \uad6c\ud604 \ub3d9\ud5a5 ,\u201d \uc815\ubcf4\ubcf4\ud638\ud559\ud68c(Accepted for Publication)<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ub17c\ubb38\uc9c0&#038;vid=111\" title=\"Hwajeong Seo, Howon Kim, \u201cImplemetation of Multi-precision multiplication over sensor networks with efficient instructions,\u201d the korea institute of information and communication engineering, Vol. 11. No. 1. pp. 12-16, 2013. 3 \"><span class=\"mb-latest-item-title-text\">Hwajeong Seo, Howon Kim, \u201cImplemetation of Multi-precision multiplication over sensor networks with efficient instructions,\u201d the korea institute of information and communication engineering, Vol. 11. No. 1. pp. 12-16, 2013. 3 <\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ub17c\ubb38\uc9c0&#038;vid=110\" title=\"\uc774\ub3d9\uac74, \ucd5c\uc6a9\uc81c, \ucd5c\ub450\ud638, \uae40\ubbfc\ud638, \uae40\ud638\uc6d0, \u201c\uad11\ud559 \uc624\ub958 \uc8fc\uc785 \uacf5\uaca9\uc5d0 \uac15\uc778\ud55c \ubabd\uace0\uba54\ub9ac \uc9c0\uc218\uc2b9 \uae30\ubc18 RSA \ud558\ub4dc\uc6e8\uc5b4 \uad6c\ud604\u201d, \ud55c\uad6d\uc815\ubcf4\ud1b5\uc2e0\ud559\ud68c\ub17c\ubb38\uc9c0, Vol. 17, No. 1, pp.76-89, 2013. 1\"><span class=\"mb-latest-item-title-text\">\uc774\ub3d9\uac74, \ucd5c\uc6a9\uc81c, \ucd5c\ub450\ud638, \uae40\ubbfc\ud638, \uae40\ud638\uc6d0, \u201c\uad11\ud559 \uc624\ub958 \uc8fc\uc785 \uacf5\uaca9\uc5d0 \uac15\uc778\ud55c \ubabd\uace0\uba54\ub9ac \uc9c0\uc218\uc2b9 \uae30\ubc18 RSA \ud558\ub4dc\uc6e8\uc5b4 \uad6c\ud604\u201d, \ud55c\uad6d\uc815\ubcf4\ud1b5\uc2e0\ud559\ud68c\ub17c\ubb38\uc9c0, Vol. 17, No. 1, pp.76-89, 2013. 1<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ub17c\ubb38\uc9c0&#038;vid=109\" title=\"Hwajeong Seo, Howon Kim, \u201cImplemetation of Multi-precision multiplication over sensor networks with efficient instructions,\u201d the korea institute of information and communication engineering, Vol. 11. No. 1. pp. 12-16, 2013. 3 \"><span class=\"mb-latest-item-title-text\">Hwajeong Seo, Howon Kim, \u201cImplemetation of Multi-precision multiplication over sensor networks with efficient instructions,\u201d the korea institute of information and communication engineering, Vol. 11. No. 1. pp. 12-16, 2013. 3 <\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ub17c\ubb38\uc9c0&#038;vid=108\" title=\"Hwajeong Seo, Howon Kim, \u201cZigBee Security using Attribute-Based Proxy Re-encryption,\u201d the korea institute of information and communication engineering, vol. 10, No. 4, pp. 343-348, 2012. 12\"><span class=\"mb-latest-item-title-text\">Hwajeong Seo, Howon Kim, \u201cZigBee Security using Attribute-Based Proxy Re-encryption,\u201d the korea institute of information and communication engineering, vol. 10, No. 4, pp. 343-348, 2012. 12<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ub17c\ubb38\uc9c0&#038;vid=107\" title=\"\uc11c\ud654\uc815, \uae40\ud638\uc6d0,\u201dNDK \uae30\ubc18 \uacf5\uac1c\ud0a4 \uc554\ud638\ub97c \uc704\ud55c \uacf1\uc148\uae30 \uad6c\ud604 \ubc0f \ubd84\uc11d,\u201d \ud55c\uad6d\uc815\ubcf4\ud1b5\uc2e0\ud559\ud68c\ub17c\ubb38\uc9c0, vol. 16, No. 11, pp. 2347-2354, 2012. 11\"><span class=\"mb-latest-item-title-text\">\uc11c\ud654\uc815, \uae40\ud638\uc6d0,\u201dNDK \uae30\ubc18 \uacf5\uac1c\ud0a4 \uc554\ud638\ub97c \uc704\ud55c \uacf1\uc148\uae30 \uad6c\ud604 \ubc0f \ubd84\uc11d,\u201d \ud55c\uad6d\uc815\ubcf4\ud1b5\uc2e0\ud559\ud68c\ub17c\ubb38\uc9c0, vol. 16, No. 11, pp. 2347-2354, 2012. 11<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ub17c\ubb38\uc9c0&#038;vid=106\" title=\"\uc11c\ud654\uc815, \uae40\ud638\uc6d0, \u201c\uc784\ubca0\ub514\ub4dc \uc7a5\ube44 \uc0c1\uc5d0\uc11c\uc758 \uacf5\uac1c\ud0a4 \uae30\ubc18 \uc554\ud638\ub97c \uc704\ud55c \ub2e4\uc911 \uacf1\uc148\uae30 \ucd5c\uc2e0 \uc5f0\uad6c \ub3d9\ud5a5,\u201d \uc815\ubcf4\ubcf4\ud638\ud559\ud68c vol. 22, No. 5, pp. 999-1008, 2012. 10\"><span class=\"mb-latest-item-title-text\">\uc11c\ud654\uc815, \uae40\ud638\uc6d0, \u201c\uc784\ubca0\ub514\ub4dc \uc7a5\ube44 \uc0c1\uc5d0\uc11c\uc758 \uacf5\uac1c\ud0a4 \uae30\ubc18 \uc554\ud638\ub97c \uc704\ud55c \ub2e4\uc911 \uacf1\uc148\uae30 \ucd5c\uc2e0 \uc5f0\uad6c \ub3d9\ud5a5,\u201d \uc815\ubcf4\ubcf4\ud638\ud559\ud68c vol. 22, No. 5, pp. 999-1008, 2012. 10<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ub17c\ubb38\uc9c0&#038;vid=105\" title=\"\uc11c\ud654\uc815, \uae40\ud638\uc6d0, \u201c\uc548\ub4dc\ub85c\uc774\ub4dc \uae30\ubc18 \uacf5\uac1c\ud0a4 \uc554\ud638\ub97c \uc704\ud55c \uacf1\uc148\uae30 \uad6c\ud604 \ubc0f \ubd84\uc11d,\u201d \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c vol. 37C, No. 10, pp. 940-948, 2012. 10\"><span class=\"mb-latest-item-title-text\">\uc11c\ud654\uc815, \uae40\ud638\uc6d0, \u201c\uc548\ub4dc\ub85c\uc774\ub4dc \uae30\ubc18 \uacf5\uac1c\ud0a4 \uc554\ud638\ub97c \uc704\ud55c \uacf1\uc148\uae30 \uad6c\ud604 \ubc0f \ubd84\uc11d,\u201d \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c vol. 37C, No. 10, pp. 940-948, 2012. 10<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ub17c\ubb38\uc9c0&#038;vid=104\" title=\"Hwajeong Seo, Howon Kim, \u201cAlways Metastable State True Random Number Generator,\u201d the korea institute of information and communication engineering, vol. 10, No. 3, pp. 253-257, 2012. 9\"><span class=\"mb-latest-item-title-text\">Hwajeong Seo, Howon Kim, \u201cAlways Metastable State True Random Number Generator,\u201d the korea institute of information and communication engineering, vol. 10, No. 3, pp. 253-257, 2012. 9<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ub17c\ubb38\uc9c0&#038;vid=103\" title=\"Hwajeong Seo, Howon Kim, \u201cNetwork and Data Link Layer Security for DASH7,\u201d the korea institute of information and communication engineering, vol. 10, No. 3, pp. 248-252, 2012. 9\"><span class=\"mb-latest-item-title-text\">Hwajeong Seo, Howon Kim, \u201cNetwork and Data Link Layer Security for DASH7,\u201d the korea institute of information and communication engineering, vol. 10, No. 3, pp. 248-252, 2012. 9<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ub17c\ubb38\uc9c0&#038;vid=102\" title=\"\uc11c\ud654\uc815, \uae40\ud638\uc6d0, \u201cVANET \ud658\uacbd\uc5d0\uc11c\uc758 \uc0ac\uc6a9\uc790 \uc778\uc99d \uae30\ubc95,\u201d \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c, 37\uad8c 7\ud638, pp. 576-583, 2012.7\"><span class=\"mb-latest-item-title-text\">\uc11c\ud654\uc815, \uae40\ud638\uc6d0, \u201cVANET \ud658\uacbd\uc5d0\uc11c\uc758 \uc0ac\uc6a9\uc790 \uc778\uc99d \uae30\ubc95,\u201d \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c, 37\uad8c 7\ud638, pp. 576-583, 2012.7<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ub17c\ubb38\uc9c0&#038;vid=101\" title=\"Jongseok Choi and Howon Kim, \u201cHalf-Broadcast Encryption for Anonymity,\u201d International Journal of Grid and Distributed Computing, 5(2), pp. 43-51, 2012.6 (SCOPUS)\"><span class=\"mb-latest-item-title-text\">Jongseok Choi and Howon Kim, \u201cHalf-Broadcast Encryption for Anonymity,\u201d International Journal of Grid and Distributed Computing, 5(2), pp. 43-51, 2012.6 (SCOPUS)<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ub17c\ubb38\uc9c0&#038;vid=100\" title=\"\uc11c\ud654\uc815, \uae40\ud638\uc6d0, \u201c\uc13c\uc11c \ub124\ud2b8\uc6cc\ud06c \uc0c1\uc5d0\uc11c\uc758 HUMMINGBIRD2 \uc554\ud638\ud654 \uc18d\ub3c4 \ucd5c\uc801\ud654 \uad6c\ud604\uae30\ubc95\u201d, \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c\ub17c\ubb38\uc9c0, 37\uad8c 6\ud638, pp. 414-422, 2012.6\"><span class=\"mb-latest-item-title-text\">\uc11c\ud654\uc815, \uae40\ud638\uc6d0, \u201c\uc13c\uc11c \ub124\ud2b8\uc6cc\ud06c \uc0c1\uc5d0\uc11c\uc758 HUMMINGBIRD2 \uc554\ud638\ud654 \uc18d\ub3c4 \ucd5c\uc801\ud654 \uad6c\ud604\uae30\ubc95\u201d, \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c\ub17c\ubb38\uc9c0, 37\uad8c 6\ud638, pp. 414-422, 2012.6<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ub17c\ubb38\uc9c0&#038;vid=99\" title=\"\ucd5c\uc885\uc11d, \uae40\ud638\uc6d0, \u201c\ub2e8\uc77c \uc81c\uc5b4 \ubaa8\ubc14\uc77c \uc77c\ud68c\uc6a9 \ud328\uc2a4\uc6cc\ub4dc \uae30\ubc95\u201d, \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c, 37C(6), pp. 497-501, 2012.6\"><span class=\"mb-latest-item-title-text\">\ucd5c\uc885\uc11d, \uae40\ud638\uc6d0, \u201c\ub2e8\uc77c \uc81c\uc5b4 \ubaa8\ubc14\uc77c \uc77c\ud68c\uc6a9 \ud328\uc2a4\uc6cc\ub4dc \uae30\ubc95\u201d, \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c, 37C(6), pp. 497-501, 2012.6<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ub17c\ubb38\uc9c0&#038;vid=98\" title=\"Jongseok Choi and Howon Kim, \u201cA Novel Approach for SMS Security\u201d, International Journal of Security and Its Applications, 6(2), pp. 372-378, 2012.4 (SCOPUS)\"><span class=\"mb-latest-item-title-text\">Jongseok Choi and Howon Kim, \u201cA Novel Approach for SMS Security\u201d, International Journal of Security and Its Applications, 6(2), pp. 372-378, 2012.4 (SCOPUS)<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ub17c\ubb38\uc9c0&#038;vid=97\" title=\"Hwajeong Seo, Howon Kim, \u201cAttribute-Based Proxy Re-encryption with constant number of pairing operation,\u201d the korea institute of information and communication engineering, Vol.10, No.1, March. 2012(\uc815\ubcf4\ud1b5\uc2e0\ud559\ud68c)\"><span class=\"mb-latest-item-title-text\">Hwajeong Seo, Howon Kim, \u201cAttribute-Based Proxy Re-encryption with constant number of pairing operation,\u201d the korea institute of information and communication engineering, Vol.10, No.1, March. 2012(\uc815\ubcf4\ud1b5\uc2e0\ud559\ud68c)<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ub17c\ubb38\uc9c0&#038;vid=96\" title=\"\uad8c\uc591\ud604, \ucd5c\ub450\ud638, \ucd5c\uc6a9\uc81c, \uae40\ud638\uc6d0, \u201c\ubc30\ud130\ub9ac \uad50\uccb4\uc2dd \uc804\uae30 \uc790\ub3d9\ucc28 \uc2dc\uc2a4\ud15c \uc5f0\uad6c \ubc0f \ubcf4\uc548 \uc694\uad6c \uc0ac\ud56d \ubd84\uc11d\u201d, \ud55c\uad6d\uc815\ubcf4\ud1b5\uc2e0\ud559\ud68c\ub17c\ubb38\uc9c0, 2012\"><span class=\"mb-latest-item-title-text\">\uad8c\uc591\ud604, \ucd5c\ub450\ud638, \ucd5c\uc6a9\uc81c, \uae40\ud638\uc6d0, \u201c\ubc30\ud130\ub9ac \uad50\uccb4\uc2dd \uc804\uae30 \uc790\ub3d9\ucc28 \uc2dc\uc2a4\ud15c \uc5f0\uad6c \ubc0f \ubcf4\uc548 \uc694\uad6c \uc0ac\ud56d \ubd84\uc11d\u201d, \ud55c\uad6d\uc815\ubcf4\ud1b5\uc2e0\ud559\ud68c\ub17c\ubb38\uc9c0, 2012<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ub17c\ubb38\uc9c0&#038;vid=95\" title=\"\ud669\uc544\ub984, \uc11c\ud654\uc815, \uae40\ud638\uc6d0,\u201d\ud56d\ub9cc \ubb3c\ub958 \ud658\uacbd\uc5d0\uc11c\uc758 \ubcf5\uc81c\ub41c CSD \ud0d0\uc9c0\ub97c \uc704\ud55c \uc815\ucc45 \uae30\ubc18 \ubcf5\uc81c \ud0d0\uc9c0 \uba54\ucee4\ub2c8\uc998,\u201d \ud55c\uad6d\uc815\ubcf4\ud1b5\uc2e0\ud559\ud68c\ub17c\ubb38\uc9c0, vol.16, no.1, pp.98-106, 2012. 1\"><span class=\"mb-latest-item-title-text\">\ud669\uc544\ub984, \uc11c\ud654\uc815, \uae40\ud638\uc6d0,\u201d\ud56d\ub9cc \ubb3c\ub958 \ud658\uacbd\uc5d0\uc11c\uc758 \ubcf5\uc81c\ub41c CSD \ud0d0\uc9c0\ub97c \uc704\ud55c \uc815\ucc45 \uae30\ubc18 \ubcf5\uc81c \ud0d0\uc9c0 \uba54\ucee4\ub2c8\uc998,\u201d \ud55c\uad6d\uc815\ubcf4\ud1b5\uc2e0\ud559\ud68c\ub17c\ubb38\uc9c0, vol.16, no.1, pp.98-106, 2012. 1<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ub17c\ubb38\uc9c0&#038;vid=94\" title=\"Hwajeong Seo, Howon Kim, \u201cTransmission Power Range based Sybil Attack Detection Method over Wireless Sensor Networks,\u201d the korea institute of information and communication engineering, Vol.9, No.6, December 2011(\uc815\ubcf4\ud1b5\uc2e0\ud559\ud68c) \"><span class=\"mb-latest-item-title-text\">Hwajeong Seo, Howon Kim, \u201cTransmission Power Range based Sybil Attack Detection Method over Wireless Sensor Networks,\u201d the korea institute of information and communication engineering, Vol.9, No.6, December 2011(\uc815\ubcf4\ud1b5\uc2e0\ud559\ud68c) <\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ub17c\ubb38\uc9c0&#038;vid=93\" title=\"\uae40\uc131\uc724, \uae40\ud638\uc6d0, \u201cEfficient RFID Secure Protocol with Forward Secrecy,\u201d \ud55c\uad6d\uc778\ud130\ub137\uc815\ubcf4\ud559\ud68c\ub17c\ubb38\uc9c0, \uc81c12\uad8c\uc81c6\ud638, 2011.12, pp.139-147\"><span class=\"mb-latest-item-title-text\">\uae40\uc131\uc724, \uae40\ud638\uc6d0, \u201cEfficient RFID Secure Protocol with Forward Secrecy,\u201d \ud55c\uad6d\uc778\ud130\ub137\uc815\ubcf4\ud559\ud68c\ub17c\ubb38\uc9c0, \uc81c12\uad8c\uc81c6\ud638, 2011.12, pp.139-147<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ub17c\ubb38\uc9c0&#038;vid=92\" title=\"Hwajeong Seo, Howon Kim, \u201cSpeed Optimized Implementation of HUMMINGBIRD Cryptography for Sensor Networks,\u201d the korea institute of information and communication engineering, Vol.9, No.6, December 2011(\uc815\ubcf4\ud1b5\uc2e0\ud559\ud68c) \"><span class=\"mb-latest-item-title-text\">Hwajeong Seo, Howon Kim, \u201cSpeed Optimized Implementation of HUMMINGBIRD Cryptography for Sensor Networks,\u201d the korea institute of information and communication engineering, Vol.9, No.6, December 2011(\uc815\ubcf4\ud1b5\uc2e0\ud559\ud68c) <\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ub17c\ubb38\uc9c0&#038;vid=91\" title=\"\uc11c\ud654\uc815, \uae40\ud638\uc6d0, \u201c\uc704\uce58\uae30\ubc18 Two-Factor L-OTP \ud504\ub85c\ud1a0\ucf5c,\u201d \uc815\ubcf4\ucc98\ub9ac\ud559\ud68c\ub17c\ubb38\uc9c0, 18-C, 5, 327, 2011. 10\"><span class=\"mb-latest-item-title-text\">\uc11c\ud654\uc815, \uae40\ud638\uc6d0, \u201c\uc704\uce58\uae30\ubc18 Two-Factor L-OTP \ud504\ub85c\ud1a0\ucf5c,\u201d \uc815\ubcf4\ucc98\ub9ac\ud559\ud68c\ub17c\ubb38\uc9c0, 18-C, 5, 327, 2011. 10<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ub17c\ubb38\uc9c0&#038;vid=90\" title=\"\uc11c\ud654\uc815, \uae40\ud638\uc6d0, \u201c\uc775\uba85\uc131\uc744 \uc81c\uacf5\ud558\ub294 RSSI\uae30\ubc18 V2V \uba54\uc2dc\uc9c0 \uc778\uc99d\uae30\ubc95\u201d, Vol. 18-C, No. 4, \uc815\ubcf4\ucc98\ub9ac\ud559\ud68c\ub17c\ubb38\uc9c0, 2011, 9 \"><span class=\"mb-latest-item-title-text\">\uc11c\ud654\uc815, \uae40\ud638\uc6d0, \u201c\uc775\uba85\uc131\uc744 \uc81c\uacf5\ud558\ub294 RSSI\uae30\ubc18 V2V \uba54\uc2dc\uc9c0 \uc778\uc99d\uae30\ubc95\u201d, Vol. 18-C, No. 4, \uc815\ubcf4\ucc98\ub9ac\ud559\ud68c\ub17c\ubb38\uc9c0, 2011, 9 <\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ub17c\ubb38\uc9c0&#038;vid=89\" title=\"\uc11c\ud654\uc815, \uae40\ud638\uc6d0, \u201c\uc13c\uc11c\ub124\ud2b8\uc6cc\ud06c\uc5d0 \uc801\uc6a9 \uac00\ub2a5\ud55c HIGHT \uc54c\uace0\ub9ac\uc998\uc758 \ucd5c\uc801\ud654 \uad6c\ud604 \uae30\ubc95\u201d, \ud55c\uad6d\ud574\uc591\uc815\ubcf4\ud1b5\uc2e0\ud559\ud68c\ub17c\ubb38\uc9c0,Vol. 15, No. 5, 2011, 7\"><span class=\"mb-latest-item-title-text\">\uc11c\ud654\uc815, \uae40\ud638\uc6d0, \u201c\uc13c\uc11c\ub124\ud2b8\uc6cc\ud06c\uc5d0 \uc801\uc6a9 \uac00\ub2a5\ud55c HIGHT \uc54c\uace0\ub9ac\uc998\uc758 \ucd5c\uc801\ud654 \uad6c\ud604 \uae30\ubc95\u201d, \ud55c\uad6d\ud574\uc591\uc815\ubcf4\ud1b5\uc2e0\ud559\ud68c\ub17c\ubb38\uc9c0,Vol. 15, No. 5, 2011, 7<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ub17c\ubb38\uc9c0&#038;vid=88\" title=\"\uc11c\ud654\uc815, \uae40\ud638\uc6d0, \u201cVANET \uc0c1\uc5d0\uc11c\uc758 \uc774\ub3d9\uc131\uc744 \uace0\ub824\ud55c \uc548\uc804\ud55c \uba54\uc2dc\uc9c0 \uc778\uc99d\uae30\ubc95\u201d, \ud55c\uad6d\ud574\uc591\uc815\ubcf4\ud1b5\uc2e0\ud559\ud68c\ub17c\ubb38\uc9c0, Vol. 15, No. 5, pp1087-1095, 2011. 5\"><span class=\"mb-latest-item-title-text\">\uc11c\ud654\uc815, \uae40\ud638\uc6d0, \u201cVANET \uc0c1\uc5d0\uc11c\uc758 \uc774\ub3d9\uc131\uc744 \uace0\ub824\ud55c \uc548\uc804\ud55c \uba54\uc2dc\uc9c0 \uc778\uc99d\uae30\ubc95\u201d, \ud55c\uad6d\ud574\uc591\uc815\ubcf4\ud1b5\uc2e0\ud559\ud68c\ub17c\ubb38\uc9c0, Vol. 15, No. 5, pp1087-1095, 2011. 5<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ub17c\ubb38\uc9c0&#038;vid=87\" title=\"\uae40\uc644\uc9c4, \uc1a1\uacbd\uc6d0, \uc774\uc720\ub9ac, \uae40\ud638\uc6d0, \uae40\ud615\ub0a8, \u201c\uc6e8\uc774\ube14\ub9bf \uc7a1\uc74c \uc81c\uac70 \ubc29\ubc95\uc744 \uc774\uc6a9\ud55c \uc804\ub825 \ubd84\uc11d \uacf5\uaca9 \uc131\ub2a5 \uac1c\uc120,\u201d \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c\ub17c\ubb38\uc9c0, vol. 35, no.9, pp. 1330-1341, 2010. 9\"><span class=\"mb-latest-item-title-text\">\uae40\uc644\uc9c4, \uc1a1\uacbd\uc6d0, \uc774\uc720\ub9ac, \uae40\ud638\uc6d0, \uae40\ud615\ub0a8, \u201c\uc6e8\uc774\ube14\ub9bf \uc7a1\uc74c \uc81c\uac70 \ubc29\ubc95\uc744 \uc774\uc6a9\ud55c \uc804\ub825 \ubd84\uc11d \uacf5\uaca9 \uc131\ub2a5 \uac1c\uc120,\u201d \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c\ub17c\ubb38\uc9c0, vol. 35, no.9, pp. 1330-1341, 2010. 9<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ub17c\ubb38\uc9c0&#038;vid=86\" title=\"\uc774\ucca0\ud76c, \ud669\uc544\ub984, \uc774\ub3d9\uac74, \uae40\ud615\ub0a8, \uae40\ud638\uc6d0,\u201cIT\uc735\ud569 \ub514\ubc14\uc774\uc2a4\uc5d0 \ub300\ud55c \ubb3c\ub9ac\uc801 2\ucc28 CPA \uacf5\uaca9\uc744 \uc704\ud55c \uc0c8\ub85c\uc6b4 \uc804\ucc98\ub9ac \uae30\ubc95\u201d, \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c, \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c\ub17c\ubb38\uc9c0, ISSN 1226-4717, Vol. 35, No. 9, pp. 1369~1380, 2010. 9\"><span class=\"mb-latest-item-title-text\">\uc774\ucca0\ud76c, \ud669\uc544\ub984, \uc774\ub3d9\uac74, \uae40\ud615\ub0a8, \uae40\ud638\uc6d0,\u201cIT\uc735\ud569 \ub514\ubc14\uc774\uc2a4\uc5d0 \ub300\ud55c \ubb3c\ub9ac\uc801 2\ucc28 CPA \uacf5\uaca9\uc744 \uc704\ud55c \uc0c8\ub85c\uc6b4 \uc804\ucc98\ub9ac \uae30\ubc95\u201d, \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c, \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c\ub17c\ubb38\uc9c0, ISSN 1226-4717, Vol. 35, No. 9, pp. 1369~1380, 2010. 9<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ub17c\ubb38\uc9c0&#038;vid=85\" title=\"\uc11c\ud654\uc815,\uae40\ud638\uc6d0,\u201d\uc18d\uc131\uae30\ubc18 \uc7ac \uc554\ud638\ud654\ub97c \uc774\uc6a9\ud55c \uc2a4\ub9c8\ud2b8\uce74\ub4dc \uc778\uc99d\uad8c\ud55c \ubd84\ubc30\uc2a4\ud0b4\u201d,\ub300\ud55c\uc784\ubca0\ub514\ub4dc\uacf5\ud559\ud68c,\ub300\ud55c\uc784\ubca0\ub514\ub4dc\uacf5\ud559\ud68c\ub17c\ubb38\uc9c0, ISSN 1975-5066, Vol. 5, No. 3, pp. 168~174, 2010. 9\"><span class=\"mb-latest-item-title-text\">\uc11c\ud654\uc815,\uae40\ud638\uc6d0,\u201d\uc18d\uc131\uae30\ubc18 \uc7ac \uc554\ud638\ud654\ub97c \uc774\uc6a9\ud55c \uc2a4\ub9c8\ud2b8\uce74\ub4dc \uc778\uc99d\uad8c\ud55c \ubd84\ubc30\uc2a4\ud0b4\u201d,\ub300\ud55c\uc784\ubca0\ub514\ub4dc\uacf5\ud559\ud68c,\ub300\ud55c\uc784\ubca0\ub514\ub4dc\uacf5\ud559\ud68c\ub17c\ubb38\uc9c0, ISSN 1975-5066, Vol. 5, No. 3, pp. 168~174, 2010. 9<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ub17c\ubb38\uc9c0&#038;vid=84\" title=\"\uc11c\ud654\uc815, \uae40\ud638\uc6d0, \u201cElliptic curve \uae30\ubc18 \uc13c\uc11c\ub124\ud2b8\uc6cc\ud06c \ubcf4\uc548\uc744 \uc704\ud55c \uacf1\uc148 \ucd5c\uc801\ud654 \uae30\ubc95\u201d, \ud55c\uad6d\ud574\uc591\uc815\ubcf4\ud1b5\uc2e0\ud559\ud68c, \ud55c\uad6d\ud574\uc591\uc815\ubcf4\ud1b5\uc2e0\ud559\ud68c\ub17c\ubb38\uc9c0, ISSN 1226-6981, Vol. 14, No. 8, pp. 1836~1842, 2010. 8\"><span class=\"mb-latest-item-title-text\">\uc11c\ud654\uc815, \uae40\ud638\uc6d0, \u201cElliptic curve \uae30\ubc18 \uc13c\uc11c\ub124\ud2b8\uc6cc\ud06c \ubcf4\uc548\uc744 \uc704\ud55c \uacf1\uc148 \ucd5c\uc801\ud654 \uae30\ubc95\u201d, \ud55c\uad6d\ud574\uc591\uc815\ubcf4\ud1b5\uc2e0\ud559\ud68c, \ud55c\uad6d\ud574\uc591\uc815\ubcf4\ud1b5\uc2e0\ud559\ud68c\ub17c\ubb38\uc9c0, ISSN 1226-6981, Vol. 14, No. 8, pp. 1836~1842, 2010. 8<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ub17c\ubb38\uc9c0&#038;vid=83\" title=\"\uc774\ub3d9\uac74, \uc774\ucca0\ud76c, \ucd5c\ub450\ud638, \uae40\ucca0\uc218, \ucd5c\uc740\uc601, \uae40\ud638\uc6d0,\u201cEta-T Pairing \uc54c\uace0\ub9ac\uc998\uc758 \ud6a8\uc728\uc801\uc778 \ud558\ub4dc\uc6e8\uc5b4 \uad6c\ud604\u201d, \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c, \uc815\ubcf4\ubcf4\ud638\ud559\ud68c\ub17c\ubb38\uc9c0, ISSN 1598-3986, Vol. 20, No. 1, pp. 3~16, 2010. 2\"><span class=\"mb-latest-item-title-text\">\uc774\ub3d9\uac74, \uc774\ucca0\ud76c, \ucd5c\ub450\ud638, \uae40\ucca0\uc218, \ucd5c\uc740\uc601, \uae40\ud638\uc6d0,\u201cEta-T Pairing \uc54c\uace0\ub9ac\uc998\uc758 \ud6a8\uc728\uc801\uc778 \ud558\ub4dc\uc6e8\uc5b4 \uad6c\ud604\u201d, \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c, \uc815\ubcf4\ubcf4\ud638\ud559\ud68c\ub17c\ubb38\uc9c0, ISSN 1598-3986, Vol. 20, No. 1, pp. 3~16, 2010. 2<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ub17c\ubb38\uc9c0&#038;vid=82\" title=\"\uc7a5\ub0a8\uc218,\uae40\ud0dc\ud604,\uae40\ucc3d\ud55c,\ud55c\ub3d9\uad6d,\uae40\ud638\uc6d0,\u201dDigit-Serial Finite Field Multiplier for GF(3^m),\u201d \uc804\uc790\uacf5\ud559\ub17c\ubb38\uc9c0 \uc81c45\uad8c SD\ud3b8 \uc81c10\ud638, pp23~30, 2008.10\"><span class=\"mb-latest-item-title-text\">\uc7a5\ub0a8\uc218,\uae40\ud0dc\ud604,\uae40\ucc3d\ud55c,\ud55c\ub3d9\uad6d,\uae40\ud638\uc6d0,\u201dDigit-Serial Finite Field Multiplier for GF(3^m),\u201d \uc804\uc790\uacf5\ud559\ub17c\ubb38\uc9c0 \uc81c45\uad8c SD\ud3b8 \uc81c10\ud638, pp23~30, 2008.10<\/span><\/a><\/td><\/tr><\/tbody><\/table><\/div><\/div><\/div><\/div>\n<div class=\"space40 pc640\"><\/div>\n<div class=\"space10 pc640\"><\/div>\n<div class=\"sub_content_title\">\uad6d\ub0b4\ud559\uc220\ud559\ud68c<\/div>\n<div class=\"research_list\"><div class=\"mb-widget\"><div class=\"mb-latest-basic mb-widget-shortcode\"><div class=\"mb-latest-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/\" title=\"sub41_2\">sub41_2<\/a><\/div><div class=\"mb-latest-box\"><table  cellspacing=\"0\" cellpadding=\"0\" border=\"0\" class=\"table table-latest\"><colgroup><col style=\"width:100%\" \/><\/colgroup><tbody><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=368\" title=\"Andro Aprila Adiputra, Thi-Thu-Huong Le, Dawit Shin and Howon Kim, \uad50\ub780\ub41c \uc774\ubbf8\uc9c0 \uad6c\ubcc4\ud558\uae30 \uc704\ud55c Siamese \uc2e0\uacbd\ub9dd\uc758 \uacac\uace0\uc131 \ubd84\uc11d, CICS&#039;s W-25. \"><span class=\"mb-latest-item-title-text\">Andro Aprila Adiputra, Thi-Thu-Huong Le, Dawit Shin and Howon Kim, \uad50\ub780\ub41c \uc774\ubbf8\uc9c0 \uad6c\ubcc4\ud558\uae30 \uc704\ud55c Siamese \uc2e0\uacbd\ub9dd\uc758 \uacac\uace0\uc131 \ubd84\uc11d, CICS&#039;s W-25. <\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=367\" title=\"\uc544\ub9c8\ub2e4 \uc720\uc2a4\ub9b4 \uce74\ub525\ud2f0\uc57c, \ud2f0\ud22c\ud750\uc5c9 \ub808, \ud76c\ucc2c \uae40 and \ud638\uc6d0 \uae40, \uc778\uacf5\uc9c0\ub2a5 \ubcf4\uc548\uc5d0\uc11c \ube14\ub85d\uccb4\uc778\uc758 \uc5ed\ud560\uc5d0 \ub300\ud55c \uc124\ubb38\uc870\uc0ac,  CICS&#039;s W-25. \"><span class=\"mb-latest-item-title-text\">\uc544\ub9c8\ub2e4 \uc720\uc2a4\ub9b4 \uce74\ub525\ud2f0\uc57c, \ud2f0\ud22c\ud750\uc5c9 \ub808, \ud76c\ucc2c \uae40 and \ud638\uc6d0 \uae40, \uc778\uacf5\uc9c0\ub2a5 \ubcf4\uc548\uc5d0\uc11c \ube14\ub85d\uccb4\uc778\uc758 \uc5ed\ud560\uc5d0 \ub300\ud55c \uc124\ubb38\uc870\uc0ac,  CICS&#039;s W-25. <\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=366\" title=\"Thi-Thu-Huong Le, Andro Aprila Adiputra, Hyunjin Jang and Howon Kim, Adversarial Attacks on Autonomous Systems: Emerging Threats, CICS&#039;s W-25. \"><span class=\"mb-latest-item-title-text\">Thi-Thu-Huong Le, Andro Aprila Adiputra, Hyunjin Jang and Howon Kim, Adversarial Attacks on Autonomous Systems: Emerging Threats, CICS&#039;s W-25. <\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=365\" title=\"Thi-Thu-Huong Le, Hyunjin Jang and Howon Kim\t\uc790\uc728\uc8fc\ud589 \uc2dc\uc2a4\ud15c\uc758 \ubd84\ud3ec \uc678 \ud0d0\uc9c0: \ubc29\ubc95 \ubc0f \ubca4\uce58\ub9c8\ud06c,  CICS&#039;s W-25. \"><span class=\"mb-latest-item-title-text\">Thi-Thu-Huong Le, Hyunjin Jang and Howon Kim\t\uc790\uc728\uc8fc\ud589 \uc2dc\uc2a4\ud15c\uc758 \ubd84\ud3ec \uc678 \ud0d0\uc9c0: \ubc29\ubc95 \ubc0f \ubca4\uce58\ub9c8\ud06c,  CICS&#039;s W-25. <\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=364\" title=\"Morsheda Akter, Thi-Thu-Huong Le, Beomsu Lee and Junyoung Son, A Survey and Comparative Analysis of Global AI Governance Based on the NIST AI Risk Management Framework, CICS&#039;s W-25. \"><span class=\"mb-latest-item-title-text\">Morsheda Akter, Thi-Thu-Huong Le, Beomsu Lee and Junyoung Son, A Survey and Comparative Analysis of Global AI Governance Based on the NIST AI Risk Management Framework, CICS&#039;s W-25. <\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=363\" title=\"Anak Agung Ngurah Dharmawangsa, Hyunjin Jang, Thi-Thu-Huong Le and Howon Kim, Dynamic Class Awareness: Towards Sparse Taxonomy Learning, CICS&#039;s W-25\"><span class=\"mb-latest-item-title-text\">Anak Agung Ngurah Dharmawangsa, Hyunjin Jang, Thi-Thu-Huong Le and Howon Kim, Dynamic Class Awareness: Towards Sparse Taxonomy Learning, CICS&#039;s W-25<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=353\" title=\"Jaehan Cho, Dawit Shin, Howon Kim, &quot;\uc1fc\uc5b4 \uc54c\uace0\ub9ac\uc998 \ucd5c\uc801\ud654\ub97c \uc704\ud55c \uc591\uc790 \ud68c\ub85c\uc5d0\uc11c\uc758 \uc5f0\uc0b0 \uc54c\uace0\ub9ac\uc998 \uad6c\ud604&quot;, 2024 \uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ub3d9\uacc4\ud559\uc220\ub300\ud68c, 2024.11\"><span class=\"mb-latest-item-title-text\">Jaehan Cho, Dawit Shin, Howon Kim, &quot;\uc1fc\uc5b4 \uc54c\uace0\ub9ac\uc998 \ucd5c\uc801\ud654\ub97c \uc704\ud55c \uc591\uc790 \ud68c\ub85c\uc5d0\uc11c\uc758 \uc5f0\uc0b0 \uc54c\uace0\ub9ac\uc998 \uad6c\ud604&quot;, 2024 \uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ub3d9\uacc4\ud559\uc220\ub300\ud68c, 2024.11<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=352\" title=\"Yeonjeong Hwang, Eunse Kang, Iqbal Muhammad, Howon Kim, &quot;\ubfcc\ub9ac\uacf5\uc815 \ub124\ud2b8\uc6cc\ud06c \ud2b8\ub798\ud53d\uc5d0 \ub300\ud55c E2E \uc554\ud638\ud654\uc640 TLS \uae30\ubc18 \uc554\ud638\ud654 \uc131\ub2a5 \ube44\uad50 \ubd84\uc11d&quot;, 2024 \uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ub3d9\uacc4\ud559\uc220\ub300\ud68c, 2024.11\"><span class=\"mb-latest-item-title-text\">Yeonjeong Hwang, Eunse Kang, Iqbal Muhammad, Howon Kim, &quot;\ubfcc\ub9ac\uacf5\uc815 \ub124\ud2b8\uc6cc\ud06c \ud2b8\ub798\ud53d\uc5d0 \ub300\ud55c E2E \uc554\ud638\ud654\uc640 TLS \uae30\ubc18 \uc554\ud638\ud654 \uc131\ub2a5 \ube44\uad50 \ubd84\uc11d&quot;, 2024 \uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ub3d9\uacc4\ud559\uc220\ub300\ud68c, 2024.11<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=351\" title=\"Jaehyun Kim, Howon Kim, &quot;\uc804\uae30\ucc28 \ubc30\ud130\ub9ac \ub370\uc774\ud130\uc758 \uc2e0\ub8b0\uc131 \uac80\uc99d\uc744 \uc704\ud55c \ubc30\ud130\ub9ac \uad00\ub9ac \uc2dc\uc2a4\ud15c(BMS)\uc6a9 \ube14\ub85d\uccb4\uc778 \ud50c\ub7ab\ud3fc \uc124\uacc4&quot;, 2024 \uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ub3d9\uacc4\ud559\uc220\ub300\ud68c, 2024.11\"><span class=\"mb-latest-item-title-text\">Jaehyun Kim, Howon Kim, &quot;\uc804\uae30\ucc28 \ubc30\ud130\ub9ac \ub370\uc774\ud130\uc758 \uc2e0\ub8b0\uc131 \uac80\uc99d\uc744 \uc704\ud55c \ubc30\ud130\ub9ac \uad00\ub9ac \uc2dc\uc2a4\ud15c(BMS)\uc6a9 \ube14\ub85d\uccb4\uc778 \ud50c\ub7ab\ud3fc \uc124\uacc4&quot;, 2024 \uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ub3d9\uacc4\ud559\uc220\ub300\ud68c, 2024.11<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=350\" title=\"Naufal Suryanto, Derry Pratama, Dawit Shin, Howon Kim, &quot;\uacf5\uaca9\uc801 \ubcf4\uc548\uc744 \uc704\ud55c \uc5b8\uc5b4 \ubaa8\ub378 \ud3c9\uac00: \uce68\ud22c \ud14c\uc2a4\ud2b8 \uc751\uc6a9\uc744 \uc704\ud55c \ubca4\uce58\ub9c8\ud06c \ubc0f \uba54\ud2b8\ub9ad \uc870\uc0ac&quot;, 2024 \uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ub3d9\uacc4\ud559\uc220\ub300\ud68c, 2024.11\"><span class=\"mb-latest-item-title-text\">Naufal Suryanto, Derry Pratama, Dawit Shin, Howon Kim, &quot;\uacf5\uaca9\uc801 \ubcf4\uc548\uc744 \uc704\ud55c \uc5b8\uc5b4 \ubaa8\ub378 \ud3c9\uac00: \uce68\ud22c \ud14c\uc2a4\ud2b8 \uc751\uc6a9\uc744 \uc704\ud55c \ubca4\uce58\ub9c8\ud06c \ubc0f \uba54\ud2b8\ub9ad \uc870\uc0ac&quot;, 2024 \uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ub3d9\uacc4\ud559\uc220\ub300\ud68c, 2024.11<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=349\" title=\"Rini-Wisnu Wardhani, Dedy-Septono Catur Putranto, Jaehan Cho, Dawit Shin, Howon Kim, &quot;Toom-Cook \uae30\ubc18 \uacf1\uc148\uae30\uc758 \uc810\uadfc\uc801 \uc131\ub2a5 \ubd84\uc11d&quot;, 2024 \uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ub3d9\uacc4\ud559\uc220\ub300\ud68c, 2024.11\"><span class=\"mb-latest-item-title-text\">Rini-Wisnu Wardhani, Dedy-Septono Catur Putranto, Jaehan Cho, Dawit Shin, Howon Kim, &quot;Toom-Cook \uae30\ubc18 \uacf1\uc148\uae30\uc758 \uc810\uadfc\uc801 \uc131\ub2a5 \ubd84\uc11d&quot;, 2024 \uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ub3d9\uacc4\ud559\uc220\ub300\ud68c, 2024.11<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=348\" title=\"Byeonguk Jeong, Eunse Kang, Yeonjeong Hwang, Howon Kim, &quot;NIST PQC \ud45c\uc900\ud654 \uc54c\uace0\ub9ac\uc998 \uc5f0\uad6c \ubc0f \uc804\ud658 \ub3d9\ud5a5&quot;, 2024 \uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ub3d9\uacc4\ud559\uc220\ub300\ud68c, 2024.11\"><span class=\"mb-latest-item-title-text\">Byeonguk Jeong, Eunse Kang, Yeonjeong Hwang, Howon Kim, &quot;NIST PQC \ud45c\uc900\ud654 \uc54c\uace0\ub9ac\uc998 \uc5f0\uad6c \ubc0f \uc804\ud658 \ub3d9\ud5a5&quot;, 2024 \uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ub3d9\uacc4\ud559\uc220\ub300\ud68c, 2024.11<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=339\" title=\"Andro Aprila Adiputra, YeongJeong Hwang, Thi-Thu-Huong Le, Howon Kim, CNN \ubd84\ub958\uae30\ub97c \ud1b5\ud55c \uc801\ub300\uc801 \uacf5\uaca9 \ud544\ud130\ub9c1 \ubc0f \ubcf4\ud638  \uc548\ub4dc\ub85c, CISC-W&#039;24\"><span class=\"mb-latest-item-title-text\">Andro Aprila Adiputra, YeongJeong Hwang, Thi-Thu-Huong Le, Howon Kim, CNN \ubd84\ub958\uae30\ub97c \ud1b5\ud55c \uc801\ub300\uc801 \uacf5\uaca9 \ud544\ud130\ub9c1 \ubc0f \ubcf4\ud638  \uc548\ub4dc\ub85c, CISC-W&#039;24<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=338\" title=\"Beomsu Lee, Jiwon Jun, Thi-Thu-Huong Le, Howon Kim, YouTube\uc5d0\uc11c\uc758 \uc740\ub2c9 \uc2a4\ud338 \ud0d0\uc9c0: RAG\uc640 LangChain \ud504\ub808\uc784\uc6cc\ud06c\ub97c \ud65c\uc6a9\ud55c \uad00\uacc4 \uae30\ubc18 \uc811\uadfc \uae30\ubc95, CISC-W&#039;24\"><span class=\"mb-latest-item-title-text\">Beomsu Lee, Jiwon Jun, Thi-Thu-Huong Le, Howon Kim, YouTube\uc5d0\uc11c\uc758 \uc740\ub2c9 \uc2a4\ud338 \ud0d0\uc9c0: RAG\uc640 LangChain \ud504\ub808\uc784\uc6cc\ud06c\ub97c \ud65c\uc6a9\ud55c \uad00\uacc4 \uae30\ubc18 \uc811\uadfc \uae30\ubc95, CISC-W&#039;24<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=337\" title=\"Thi-Thu-Huong Le, YeonJeong Hwang, Beomsu Lee, Howon Kim, \uc790\ub3d9\ucc28 \ubcf4\uc548 \ud14c\uc2a4\ud2b8\ub97c \uc704\ud55c CAN \ub124\ud2b8\uc6cc\ud06c\uc5d0\uc11c\uc758 \ub2e4\uc911 \ud37c\uc800 \uacf5\uaca9 \uc2dc\ubbac\ub808\uc774\uc158, KIISC \uc601\ub0a8\uc9c0\ubd80\"><span class=\"mb-latest-item-title-text\">Thi-Thu-Huong Le, YeonJeong Hwang, Beomsu Lee, Howon Kim, \uc790\ub3d9\ucc28 \ubcf4\uc548 \ud14c\uc2a4\ud2b8\ub97c \uc704\ud55c CAN \ub124\ud2b8\uc6cc\ud06c\uc5d0\uc11c\uc758 \ub2e4\uc911 \ud37c\uc800 \uacf5\uaca9 \uc2dc\ubbac\ub808\uc774\uc158, KIISC \uc601\ub0a8\uc9c0\ubd80<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=325\" title=\"D. Pratama, A.M.A. Laksmono, M. Iqbal, and H. Kim. MECHA: Multithreaded and Efficient Cryptographic Hardware Access. In Annual Spring Conference of KIPS (ASK 2023).\"><span class=\"mb-latest-item-title-text\">D. Pratama, A.M.A. Laksmono, M. Iqbal, and H. Kim. MECHA: Multithreaded and Efficient Cryptographic Hardware Access. In Annual Spring Conference of KIPS (ASK 2023).<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=307\" title=\"Thi-Thu-Huong Le, Jihyun Kim, Howon Kim (Jan 2016), \u201cClassification Performance using Gated Recurrent Unit Recurrent Neural Network on Intrusion Detection System\u201d, Korea Institute of Information Security &amp; Cryptology (KIISC).\"><span class=\"mb-latest-item-title-text\">Thi-Thu-Huong Le, Jihyun Kim, Howon Kim (Jan 2016), \u201cClassification Performance using Gated Recurrent Unit Recurrent Neural Network on Intrusion Detection System\u201d, Korea Institute of Information Security &amp; Cryptology (KIISC).<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=306\" title=\"Thi-Thu-Huong Le, Dongkeun Cho, Howon Kim, (June 2018), \u201cStateful LSTM for Classification ON\/OFF Event of Household Appliance\u201d, Korean Institutes of Communications and Information Sciences (KICS).\"><span class=\"mb-latest-item-title-text\">Thi-Thu-Huong Le, Dongkeun Cho, Howon Kim, (June 2018), \u201cStateful LSTM for Classification ON\/OFF Event of Household Appliance\u201d, Korean Institutes of Communications and Information Sciences (KICS).<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=305\" title=\"Renitia Murti Rahayu, Thi-Thu-Huong Le, Howon Kim (Jul 2018), \u201cImplementation of MbedOS- TLS (Transport Layer Security) Applications on a Crypto Hardware\u201d, Korea Institute of Information Security and Cryptology (KIISC). \"><span class=\"mb-latest-item-title-text\">Renitia Murti Rahayu, Thi-Thu-Huong Le, Howon Kim (Jul 2018), \u201cImplementation of MbedOS- TLS (Transport Layer Security) Applications on a Crypto Hardware\u201d, Korea Institute of Information Security and Cryptology (KIISC). <\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=304\" title=\"Thi-Thu-Huong Le, Renitia Murti Rahayu, Howon Kim (Jul 2018), \u201cThe High Performance in Network Intrusion Detection System using GRU and PCA-Standardized\u201d, Korea Institute of Information Security and Cryptology (KIISC) 2018.\"><span class=\"mb-latest-item-title-text\">Thi-Thu-Huong Le, Renitia Murti Rahayu, Howon Kim (Jul 2018), \u201cThe High Performance in Network Intrusion Detection System using GRU and PCA-Standardized\u201d, Korea Institute of Information Security and Cryptology (KIISC) 2018.<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=302\" title=\"Thi-Thu-Huong Le, Yongsu Kim, Howon Kim (Feb 2019), \u201cIntrusion Detection Classifier Using Feature Selection and Recurrent Neural Network\u201d, Korea Institute of Information Security and Cryptology (KIISC).\"><span class=\"mb-latest-item-title-text\">Thi-Thu-Huong Le, Yongsu Kim, Howon Kim (Feb 2019), \u201cIntrusion Detection Classifier Using Feature Selection and Recurrent Neural Network\u201d, Korea Institute of Information Security and Cryptology (KIISC).<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=301\" title=\"Thi-Thu-Huong Le, Putri Ramawati, Howon Kim (Jun 2019), \u201cThe Effect of Load Mask to Estimate Target Load in NILM\u201d, Conference on Information Security and Cryptography Summer (CISC-S).\"><span class=\"mb-latest-item-title-text\">Thi-Thu-Huong Le, Putri Ramawati, Howon Kim (Jun 2019), \u201cThe Effect of Load Mask to Estimate Target Load in NILM\u201d, Conference on Information Security and Cryptography Summer (CISC-S).<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=300\" title=\"Thi-Thu-Huong Le, Afifatul Mukaroh, Howon Kim (Jun 2019), \u201cEstimation Target Load from Mixed Load Based on Time-Frequency Magnitude and Phase Measurement in NILM\u201d, Korean Institutes of Communications and Information Sciences (KISC).\"><span class=\"mb-latest-item-title-text\">Thi-Thu-Huong Le, Afifatul Mukaroh, Howon Kim (Jun 2019), \u201cEstimation Target Load from Mixed Load Based on Time-Frequency Magnitude and Phase Measurement in NILM\u201d, Korean Institutes of Communications and Information Sciences (KISC).<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=299\" title=\"Aji Teguh Prihatnom, Thi-Thu-Huong Le, Hyoeun Kang, Howon Kim (Sep 2022), \u201cCFD Prediction of Indoor Airflow using Deep Learning&quot;, \uc81c3\ud68c \ud55c\uad6d \uc778\uacf5\uc9c0\ub2a5 \ud559\uc220\ub300\ud68c (3rd Korea Artificial Intelligence Conference). \"><span class=\"mb-latest-item-title-text\">Aji Teguh Prihatnom, Thi-Thu-Huong Le, Hyoeun Kang, Howon Kim (Sep 2022), \u201cCFD Prediction of Indoor Airflow using Deep Learning&quot;, \uc81c3\ud68c \ud55c\uad6d \uc778\uacf5\uc9c0\ub2a5 \ud559\uc220\ub300\ud68c (3rd Korea Artificial Intelligence Conference). <\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=298\" title=\"\ucd5c\ucc3d\uc6b0,\ud64d\uc724\uc601,\uc2e0\uc601\uc7ac,\uae40\ud638\uc6d0, &quot;TransUNet \uae30\ubc18\uc758 \uad6c\ub984 \uc720\ub3d9 \uc608\uce21&quot;, \uc81c3\ud68c \ud55c\uad6d\uc778\uacf5\uc9c0\ub2a5\ud559\uc220\ub300\ud68c, 2022.09\"><span class=\"mb-latest-item-title-text\">\ucd5c\ucc3d\uc6b0,\ud64d\uc724\uc601,\uc2e0\uc601\uc7ac,\uae40\ud638\uc6d0, &quot;TransUNet \uae30\ubc18\uc758 \uad6c\ub984 \uc720\ub3d9 \uc608\uce21&quot;, \uc81c3\ud68c \ud55c\uad6d\uc778\uacf5\uc9c0\ub2a5\ud559\uc220\ub300\ud68c, 2022.09<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=297\" title=\"\uc774\uc900\ud638,\ubc15\uc885\uc6b1,\uae40\ud638\uc6d0, &quot;FPGA\uae30\ubc18 \uc774\uc9c4 \uc2e0\uacbd\ub9dd \uc5f0\uc0b0 \uac00\uc18d \uc2dc\uc2a4\ud15c \uacbd\ub7c9 \uc124\uacc4 \ubc0f \uad6c\ud604_\ub525\ub7ec\ub2dd\uac00\uc18d\uae30&quot;, \uc81c3\ud68c \ud55c\uad6d\uc778\uacf5\uc9c0\ub2a5\ud559\uc220\ub300\ud68c, 2022.09\"><span class=\"mb-latest-item-title-text\">\uc774\uc900\ud638,\ubc15\uc885\uc6b1,\uae40\ud638\uc6d0, &quot;FPGA\uae30\ubc18 \uc774\uc9c4 \uc2e0\uacbd\ub9dd \uc5f0\uc0b0 \uac00\uc18d \uc2dc\uc2a4\ud15c \uacbd\ub7c9 \uc124\uacc4 \ubc0f \uad6c\ud604_\ub525\ub7ec\ub2dd\uac00\uc18d\uae30&quot;, \uc81c3\ud68c \ud55c\uad6d\uc778\uacf5\uc9c0\ub2a5\ud559\uc220\ub300\ud68c, 2022.09<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=296\" title=\"\uc544\uc9c0 \ud2b8\uad6c\ud750 \ud504\ub9ac\ud558\ud2b8\ub178,\uac15\ud6a8\uc740,\uae40\ud638\uc6d0, &quot;CFD Prediction of Indoor Airflow using Deep Learning&quot;, \uc81c3\ud68c \ud55c\uad6d\uc778\uacf5\uc9c0\ub2a5\ud559\uc220\ub300\ud68c, 2022.09\"><span class=\"mb-latest-item-title-text\">\uc544\uc9c0 \ud2b8\uad6c\ud750 \ud504\ub9ac\ud558\ud2b8\ub178,\uac15\ud6a8\uc740,\uae40\ud638\uc6d0, &quot;CFD Prediction of Indoor Airflow using Deep Learning&quot;, \uc81c3\ud68c \ud55c\uad6d\uc778\uacf5\uc9c0\ub2a5\ud559\uc220\ub300\ud68c, 2022.09<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=295\" title=\"\uc218\ub7b8\ud1a0 \ub098\uc6b0\ud314,\ud64d\uc724\uc601,\uae40\ud638\uc6d0, &quot;A Study on the Physical World Adversarial Attack in Computer Vision&quot;, \uc81c3\ud68c \ud55c\uad6d\uc778\uacf5\uc9c0\ub2a5\ud559\uc220\ub300\ud68c, 2022.09\"><span class=\"mb-latest-item-title-text\">\uc218\ub7b8\ud1a0 \ub098\uc6b0\ud314,\ud64d\uc724\uc601,\uae40\ud638\uc6d0, &quot;A Study on the Physical World Adversarial Attack in Computer Vision&quot;, \uc81c3\ud68c \ud55c\uad6d\uc778\uacf5\uc9c0\ub2a5\ud559\uc220\ub300\ud68c, 2022.09<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=294\" title=\"\uae40\ubcf4\uae08,\uac15\ud6a8\uc740,\uae40\ud638\uc6d0, &quot;\ud14d\uc2a4\ud2b8 \ubd84\uc57c \uc801\ub300\uc801 \uacf5\uaca9 \uae30\ubc95 \uc5f0\uad6c \ub3d9\ud5a5&quot;, \uc815\ubcf4\ucc98\ub9ac\ud559\ud68c \ucd94\uacc4\ud559\uc220\ubc1c\ud45c\ub300\ud68c, 2022.11\"><span class=\"mb-latest-item-title-text\">\uae40\ubcf4\uae08,\uac15\ud6a8\uc740,\uae40\ud638\uc6d0, &quot;\ud14d\uc2a4\ud2b8 \ubd84\uc57c \uc801\ub300\uc801 \uacf5\uaca9 \uae30\ubc95 \uc5f0\uad6c \ub3d9\ud5a5&quot;, \uc815\ubcf4\ucc98\ub9ac\ud559\ud68c \ucd94\uacc4\ud559\uc220\ubc1c\ud45c\ub300\ud68c, 2022.11<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=293\" title=\"\uc218\ub7b8\ud1a0\ub098\uc6b0\ud314, \ub77c\ub77c\uc0ac\ud2f0 \ud558\ub77c\uc2a4\ud0c0 \ud0c0\ud2f0\ub9c8,\uae40\ud638\uc6d0, &quot;\ub3c4\uc2dc \ud658\uacbd\uc5d0\uc11c\uc758 \uc774\ubbf8\uc9c0 \ubd84\ud560 \ubaa8\ub378 \ub300\uc0c1 \uc801\ub300\uc801 \ubb3c\ub9ac \uacf5\uaca9 \uae30\ubc95&quot;, \uc815\ubcf4\ucc98\ub9ac\ud559\ud68c \ucd94\uacc4\ud559\uc220\ubc1c\ud45c\ub300\ud68c, 2022.11\"><span class=\"mb-latest-item-title-text\">\uc218\ub7b8\ud1a0\ub098\uc6b0\ud314, \ub77c\ub77c\uc0ac\ud2f0 \ud558\ub77c\uc2a4\ud0c0 \ud0c0\ud2f0\ub9c8,\uae40\ud638\uc6d0, &quot;\ub3c4\uc2dc \ud658\uacbd\uc5d0\uc11c\uc758 \uc774\ubbf8\uc9c0 \ubd84\ud560 \ubaa8\ub378 \ub300\uc0c1 \uc801\ub300\uc801 \ubb3c\ub9ac \uacf5\uaca9 \uae30\ubc95&quot;, \uc815\ubcf4\ucc98\ub9ac\ud559\ud68c \ucd94\uacc4\ud559\uc220\ubc1c\ud45c\ub300\ud68c, 2022.11<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=292\" title=\"\uc2e0\uc601\uc7ac,\ud64d\uc724\uc601,\uae40\ud638\uc6d0, &quot;ViT \uae30\ubc18 \ubaa8\ub378\uc758 \uac15\uac74\uc131 \uc5f0\uad6c\ub3d9\ud5a5&quot;, \uc815\ubcf4\ucc98\ub9ac\ud559\ud68c \ucd94\uacc4\ud559\uc220\ubc1c\ud45c\ub300\ud68c, 2022.11\"><span class=\"mb-latest-item-title-text\">\uc2e0\uc601\uc7ac,\ud64d\uc724\uc601,\uae40\ud638\uc6d0, &quot;ViT \uae30\ubc18 \ubaa8\ub378\uc758 \uac15\uac74\uc131 \uc5f0\uad6c\ub3d9\ud5a5&quot;, \uc815\ubcf4\ucc98\ub9ac\ud559\ud68c \ucd94\uacc4\ud559\uc220\ubc1c\ud45c\ub300\ud68c, 2022.11<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=291\" title=\"\uc2ec\ud61c\uc9c4,\ucd5c\ucc3d\uc6b0,\uae40\ud638\uc6d0, &quot;AI \uc2e0\ub8b0\uc131\uc744 \uc704\ud55c XAI \uae30\uc220 \ub3d9\ud5a5&quot;, \uc815\ubcf4\ucc98\ub9ac\ud559\ud68c \ucd94\uacc4\ud559\uc220\ubc1c\ud45c\ub300\ud68c, 2022.11\"><span class=\"mb-latest-item-title-text\">\uc2ec\ud61c\uc9c4,\ucd5c\ucc3d\uc6b0,\uae40\ud638\uc6d0, &quot;AI \uc2e0\ub8b0\uc131\uc744 \uc704\ud55c XAI \uae30\uc220 \ub3d9\ud5a5&quot;, \uc815\ubcf4\ucc98\ub9ac\ud559\ud68c \ucd94\uacc4\ud559\uc220\ubc1c\ud45c\ub300\ud68c, 2022.11<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=290\" title=\"\uc774\uc900\ud638,\ubc15\uc885\uc6b1,\uae40\ud638\uc6d0, &quot;\uaca9\uc790\uae30\ubc18 \uc591\uc790\ub0b4\uc131\uc554\ud638 NTRU\ub97c \uc704\ud55c \ud558\ub4dc\uc6e8\uc5b4 \uad6c\uc870 \uc124\uacc4&quot;, 2022 \uc815\ubcf4\ubcf4\ud638\ud559\ud68c\uc601\ub0a8\uc9c0\ubd80\ud559\uc220\ub300\ud68c, 2022.10\"><span class=\"mb-latest-item-title-text\">\uc774\uc900\ud638,\ubc15\uc885\uc6b1,\uae40\ud638\uc6d0, &quot;\uaca9\uc790\uae30\ubc18 \uc591\uc790\ub0b4\uc131\uc554\ud638 NTRU\ub97c \uc704\ud55c \ud558\ub4dc\uc6e8\uc5b4 \uad6c\uc870 \uc124\uacc4&quot;, 2022 \uc815\ubcf4\ubcf4\ud638\ud559\ud68c\uc601\ub0a8\uc9c0\ubd80\ud559\uc220\ub300\ud68c, 2022.10<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=289\" title=\"\uc624\uc0c1\ubd09,\uae40\uc694\ud55c,\uc815\ud55c\ud638,\uae40\ud638\uc6d0, &quot;zk-STARKs\ub97c \ud65c\uc6a9\ud55c \ube14\ub85d\uccb4\uc778 \uc131\ub2a5 \ud5a5\uc0c1 \ubc0f \ub370\uc774\ud130 \ud504\ub77c\uc774\ubc84\uc2dc \ubcf4\ud638 \uad00\ub828 \uc5f0\uad6c\ub3d9\ud5a5&quot;, 2022 \uc815\ubcf4\ubcf4\ud638\ud559\ud68c\uc601\ub0a8\uc9c0\ubd80\ud559\uc220\ub300\ud68c, 2022.10\"><span class=\"mb-latest-item-title-text\">\uc624\uc0c1\ubd09,\uae40\uc694\ud55c,\uc815\ud55c\ud638,\uae40\ud638\uc6d0, &quot;zk-STARKs\ub97c \ud65c\uc6a9\ud55c \ube14\ub85d\uccb4\uc778 \uc131\ub2a5 \ud5a5\uc0c1 \ubc0f \ub370\uc774\ud130 \ud504\ub77c\uc774\ubc84\uc2dc \ubcf4\ud638 \uad00\ub828 \uc5f0\uad6c\ub3d9\ud5a5&quot;, 2022 \uc815\ubcf4\ubcf4\ud638\ud559\ud68c\uc601\ub0a8\uc9c0\ubd80\ud559\uc220\ub300\ud68c, 2022.10<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=288\" title=\"\uc870\uc6b1,\uae40\ub3d9\uaddc,\uc624\uc2dc\ubaac,\uae40\ud638\uc6d0, &quot;IoT \uc7a5\uce58\ub97c \uc704\ud55c \uc548\uc804\ud558\uace0 \uc548\uc815\uc801\uc778 P2P \uc18c\ud504\ud2b8\uc6e8\uc5b4 \uc5c5\ub370\uc774\ud2b8 \uc804\ub2ec\uc5d0 \uad00\ud55c \uc5f0\uad6c&quot;, 2022 \uc815\ubcf4\ubcf4\ud638\ud559\ud68c\uc601\ub0a8\uc9c0\ubd80\ud559\uc220\ub300\ud68c, 2022.10\"><span class=\"mb-latest-item-title-text\">\uc870\uc6b1,\uae40\ub3d9\uaddc,\uc624\uc2dc\ubaac,\uae40\ud638\uc6d0, &quot;IoT \uc7a5\uce58\ub97c \uc704\ud55c \uc548\uc804\ud558\uace0 \uc548\uc815\uc801\uc778 P2P \uc18c\ud504\ud2b8\uc6e8\uc5b4 \uc5c5\ub370\uc774\ud2b8 \uc804\ub2ec\uc5d0 \uad00\ud55c \uc5f0\uad6c&quot;, 2022 \uc815\ubcf4\ubcf4\ud638\ud559\ud68c\uc601\ub0a8\uc9c0\ubd80\ud559\uc220\ub300\ud68c, 2022.10<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=287\" title=\"\uc774\ud604\ud76c,\uc624\uacbd\uc6b0,\uae40\ud638\uc6d0, &quot;ERC(Ethereum Request for Comment)-721 \uc5f0\uad6c\ub3d9\ud5a5 NFT\uc640 \ud655\uc7a5 ERC\uc5d0 \ub300\ud55c \ubd84\uc11d&quot;, 2022 \uc815\ubcf4\ubcf4\ud638\ud559\ud68c\uc601\ub0a8\uc9c0\ubd80\ud559\uc220\ub300\ud68c, 2022.10 \"><span class=\"mb-latest-item-title-text\">\uc774\ud604\ud76c,\uc624\uacbd\uc6b0,\uae40\ud638\uc6d0, &quot;ERC(Ethereum Request for Comment)-721 \uc5f0\uad6c\ub3d9\ud5a5 NFT\uc640 \ud655\uc7a5 ERC\uc5d0 \ub300\ud55c \ubd84\uc11d&quot;, 2022 \uc815\ubcf4\ubcf4\ud638\ud559\ud68c\uc601\ub0a8\uc9c0\ubd80\ud559\uc220\ub300\ud68c, 2022.10 <\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=286\" title=\"\uae40\uae08\ubcf4,\uae40\ud638\uc6d0, &quot;\ud504\ub77c\uc774\ube57 \ube14\ub85d\uccb4\uc778 \uace0\uc18d\ud654 \uae30\uc220 \uc5f0\uad6c \ub3d9\ud5a5&quot;, 2022 \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ud558\uacc4\ud559\uc220\ub300\ud68c, 2022.06\"><span class=\"mb-latest-item-title-text\">\uae40\uae08\ubcf4,\uae40\ud638\uc6d0, &quot;\ud504\ub77c\uc774\ube57 \ube14\ub85d\uccb4\uc778 \uace0\uc18d\ud654 \uae30\uc220 \uc5f0\uad6c \ub3d9\ud5a5&quot;, 2022 \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ud558\uacc4\ud559\uc220\ub300\ud68c, 2022.06<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=285\" title=\"\uac15\ud6a8\uc740,\uc870\ud604\uc9c4,\uc544\uc9c0 \ud2b8\uad6c\ud750 \ud504\ub9ac\ud558\ud2b8\ub178,\uae40\ud638\uc6d0, &quot;\uc2e0\ub8b0\uc131 \uc788\ub294 \uc778\uacf5\uc9c0\ub2a5\uc744 \uc704\ud55c \uc778\uacf5\uc9c0\ub2a5\uacfc \ube14\ub85d\uccb4\uc778 \uc735\ud569 \ud504\ub808\uc784\uc6cc\ud06c&quot;, 2022 \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ud558\uacc4\ud559\uc220\ub300\ud68c, 2022.06\"><span class=\"mb-latest-item-title-text\">\uac15\ud6a8\uc740,\uc870\ud604\uc9c4,\uc544\uc9c0 \ud2b8\uad6c\ud750 \ud504\ub9ac\ud558\ud2b8\ub178,\uae40\ud638\uc6d0, &quot;\uc2e0\ub8b0\uc131 \uc788\ub294 \uc778\uacf5\uc9c0\ub2a5\uc744 \uc704\ud55c \uc778\uacf5\uc9c0\ub2a5\uacfc \ube14\ub85d\uccb4\uc778 \uc735\ud569 \ud504\ub808\uc784\uc6cc\ud06c&quot;, 2022 \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ud558\uacc4\ud559\uc220\ub300\ud68c, 2022.06<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=284\" title=\"\uae40\ub3d9\uaddc,\uae40\uc694\ud55c,\uc870\uc6b1,\uae40\ud638\uc6d0, &quot;\ube14\ub85d\uccb4\uc778 \uae30\uc220\uc744 \ud65c\uc6a9\ud55c \uc0ac\ubb3c \uc778\ud130\ub137 \ud50c\ub7ab\ud3fc \uc778\ud130\uc6cc\ud0b9 \ud504\ub808\uc784\uc6cc\ud06c \ubaa8\ub378\uc758 \uad6c\ud604 \ubc0f \ud3c9\uac00&quot;, 2022 \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ud558\uacc4\ud559\uc220\ub300\ud68c, 2022.06\"><span class=\"mb-latest-item-title-text\">\uae40\ub3d9\uaddc,\uae40\uc694\ud55c,\uc870\uc6b1,\uae40\ud638\uc6d0, &quot;\ube14\ub85d\uccb4\uc778 \uae30\uc220\uc744 \ud65c\uc6a9\ud55c \uc0ac\ubb3c \uc778\ud130\ub137 \ud50c\ub7ab\ud3fc \uc778\ud130\uc6cc\ud0b9 \ud504\ub808\uc784\uc6cc\ud06c \ubaa8\ub378\uc758 \uad6c\ud604 \ubc0f \ud3c9\uac00&quot;, 2022 \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ud558\uacc4\ud559\uc220\ub300\ud68c, 2022.06<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=283\" title=\"\uae40\ubbfc\uc7ac,\ubc15\uc885\uc6b1,\uae40\ud638\uc6d0, &quot;\ubd80\ucc44\ub110 \uacf5\uaca9\uc5d0 \uc548\uc804\ud55c ChaCha20, LEA \uc5f0\uc0b0 32-bit RISC-V \ud504\ub85c\uc138\uc11c \uad6c\uc870&quot;, 2022 \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ud558\uacc4\ud559\uc220\ub300\ud68c, 2022.06\"><span class=\"mb-latest-item-title-text\">\uae40\ubbfc\uc7ac,\ubc15\uc885\uc6b1,\uae40\ud638\uc6d0, &quot;\ubd80\ucc44\ub110 \uacf5\uaca9\uc5d0 \uc548\uc804\ud55c ChaCha20, LEA \uc5f0\uc0b0 32-bit RISC-V \ud504\ub85c\uc138\uc11c \uad6c\uc870&quot;, 2022 \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ud558\uacc4\ud559\uc220\ub300\ud68c, 2022.06<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=282\" title=\"\ud64d\uc724\uc601,\ucd5c\ucc3d\uc6b0,\uc870\ud604\uc9c4,\uae40\ud638\uc6d0, &quot;Vision Transformer \ub300\uc0c1 \uc801\ub300\uc801 \uacf5\uaca9\uae30\ubc95 \ub3d9\ud5a5\uc870\uc0ac&quot;, 2022 \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ud558\uacc4\ud559\uc220\ub300\ud68c, 2022.06\"><span class=\"mb-latest-item-title-text\">\ud64d\uc724\uc601,\ucd5c\ucc3d\uc6b0,\uc870\ud604\uc9c4,\uae40\ud638\uc6d0, &quot;Vision Transformer \ub300\uc0c1 \uc801\ub300\uc801 \uacf5\uaca9\uae30\ubc95 \ub3d9\ud5a5\uc870\uc0ac&quot;, 2022 \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ud558\uacc4\ud559\uc220\ub300\ud68c, 2022.06<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=281\" title=\"\ub77c\ub77c\uc0ac\ud2f0 \ud558\ub77c\uc2a4\ud0c0 \ud0c0\ud2f0\ub9c8,\uae40\ud638\uc6d0, &quot;\uc2dc\uac04 \ud6a8\uc728\uc801\uc778 \uc591\uc790 \uc0b0\uc220 \uacf1\uc148\uc758 \uac1c\uc120&quot;, 2022 \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ud558\uacc4\ud559\uc220\ub300\ud68c, 2022.06\"><span class=\"mb-latest-item-title-text\">\ub77c\ub77c\uc0ac\ud2f0 \ud558\ub77c\uc2a4\ud0c0 \ud0c0\ud2f0\ub9c8,\uae40\ud638\uc6d0, &quot;\uc2dc\uac04 \ud6a8\uc728\uc801\uc778 \uc591\uc790 \uc0b0\uc220 \uacf1\uc148\uc758 \uac1c\uc120&quot;, 2022 \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ud558\uacc4\ud559\uc220\ub300\ud68c, 2022.06<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=280\" title=\"\uc774\uc900\ud638,\ubc15\uc885\uc6b1,\uae40\ud638\uc6d0, &quot;FPGA\uc0c1\uc5d0\uc11c \uacbd\ub7c9 BNN \ucd94\ub860 \uac00\uc18d\uae30\ub97c \uc704\ud55c \uad6c\uc870 \uc124\uacc4&quot;, 2022\ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ud558\uacc4\ud559\uc220\ub300\ud68c, 2022.06\"><span class=\"mb-latest-item-title-text\">\uc774\uc900\ud638,\ubc15\uc885\uc6b1,\uae40\ud638\uc6d0, &quot;FPGA\uc0c1\uc5d0\uc11c \uacbd\ub7c9 BNN \ucd94\ub860 \uac00\uc18d\uae30\ub97c \uc704\ud55c \uad6c\uc870 \uc124\uacc4&quot;, 2022\ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ud558\uacc4\ud559\uc220\ub300\ud68c, 2022.06<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=279\" title=\"\uc624\uc0c1\ubd09,\uc774\ud604\ud76c,\uae40\ud638\uc6d0, &quot;ERC-998\uae30\ubc18 \uc18c\uc2a4\ucf54\ub4dc \ud615\uc0c1\uad00\ub9ac \uc2dc\uc2a4\ud15c \uc81c\uc548&#039;, 2022 \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ud558\uacc4\ud559\uc220\ub300\ud68c, 2022.06\"><span class=\"mb-latest-item-title-text\">\uc624\uc0c1\ubd09,\uc774\ud604\ud76c,\uae40\ud638\uc6d0, &quot;ERC-998\uae30\ubc18 \uc18c\uc2a4\ucf54\ub4dc \ud615\uc0c1\uad00\ub9ac \uc2dc\uc2a4\ud15c \uc81c\uc548&#039;, 2022 \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ud558\uacc4\ud559\uc220\ub300\ud68c, 2022.06<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=278\" title=\"\uc774\ud604\ud76c,\uae40\uc694\ud55c,\uae40\ud638\uc6d0, &quot;\uba54\ud0c0\ubc84\uc2a4 \uae30\ubc18 NFT \uac70\ub798\uc18c \uc81c\uc548&quot;, 2022 \ud55c\uad6d\ub514\uc9c0\ud138\ucf58\ud150\uce20\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ub300\ud68c, 2022.06\"><span class=\"mb-latest-item-title-text\">\uc774\ud604\ud76c,\uae40\uc694\ud55c,\uae40\ud638\uc6d0, &quot;\uba54\ud0c0\ubc84\uc2a4 \uae30\ubc18 NFT \uac70\ub798\uc18c \uc81c\uc548&quot;, 2022 \ud55c\uad6d\ub514\uc9c0\ud138\ucf58\ud150\uce20\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ub300\ud68c, 2022.06<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=277\" title=\"\uc774\ud604\ud76c,\uc624\uc0c1\ubd09,\uae40\ud638\uc6d0, &quot;\uc601\uc9c0\uc2dd \uc99d\uba85 \uae30\ubc18 EBaaS(Edge Computing based Blockchain as a Service) \ubaa8\ub378 \uc81c\uc548&quot;, 2022 \ud55c\uad6d\uc815\ubcf4\ucc98\ub9ac\ud559\ud68c \ucd98\uacc4\ud559\uc220\ubc1c\ud45c\ub300\ud68c, 2022.05\"><span class=\"mb-latest-item-title-text\">\uc774\ud604\ud76c,\uc624\uc0c1\ubd09,\uae40\ud638\uc6d0, &quot;\uc601\uc9c0\uc2dd \uc99d\uba85 \uae30\ubc18 EBaaS(Edge Computing based Blockchain as a Service) \ubaa8\ub378 \uc81c\uc548&quot;, 2022 \ud55c\uad6d\uc815\ubcf4\ucc98\ub9ac\ud559\ud68c \ucd98\uacc4\ud559\uc220\ubc1c\ud45c\ub300\ud68c, 2022.05<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=276\" title=\"\uae40\ubbfc\uc7ac,\uc774\uc900\ud638,\uae40\ud638\uc6d0, &quot;\uc0ac\ubb3c\uc778\ud130\ub137 \ud658\uacbd\uc5d0\uc11c \ud558\ub4dc\uc6e8\uc5b4(FPGA)\uae30\ubc18 \uc554\ud638\uac00\uc18d\uae30 \uc0ac\uc6a9 \uc2e4\uc2dc\uac04 \uc601\uc0c1 \ub370\uc774\ud130 \uc554\ud638\ud654 \uc2dc\uc2a4\ud15c&quot;, 2022 \ud55c\uad6d\uc815\ubcf4\ucc98\ub9ac\ud559\ud68c \ucd98\uacc4\ud559\uc220\ubc1c\ud45c\ub300\ud68c, 2022.05\"><span class=\"mb-latest-item-title-text\">\uae40\ubbfc\uc7ac,\uc774\uc900\ud638,\uae40\ud638\uc6d0, &quot;\uc0ac\ubb3c\uc778\ud130\ub137 \ud658\uacbd\uc5d0\uc11c \ud558\ub4dc\uc6e8\uc5b4(FPGA)\uae30\ubc18 \uc554\ud638\uac00\uc18d\uae30 \uc0ac\uc6a9 \uc2e4\uc2dc\uac04 \uc601\uc0c1 \ub370\uc774\ud130 \uc554\ud638\ud654 \uc2dc\uc2a4\ud15c&quot;, 2022 \ud55c\uad6d\uc815\ubcf4\ucc98\ub9ac\ud559\ud68c \ucd98\uacc4\ud559\uc220\ubc1c\ud45c\ub300\ud68c, 2022.05<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=275\" title=\"\uae40\ub3d9\uaddc,\uae40\uc694\ud55c,\uae40\ud638\uc6d0, &quot;\ube14\ub85d\uccb4\uc778\uae30\uc220\uc744\ud65c\uc6a9\ud55c\uc0ac\ubb3c\uc778\ud130\ub137\ud50c\ub7ab\ud3fc\uc778\ud130\uc6cc\ud0b9\ud504\ub808\uc784\uc6cc\ud06c\ubaa8\ub378\uc81c\uc548&quot;, 2022 \ud55c\uad6d\uc815\ubcf4\ucc98\ub9ac\ud559\ud68c \ucd98\uacc4\ud559\uc220\ubc1c\ud45c\ub300\ud68c, 2022.05\"><span class=\"mb-latest-item-title-text\">\uae40\ub3d9\uaddc,\uae40\uc694\ud55c,\uae40\ud638\uc6d0, &quot;\ube14\ub85d\uccb4\uc778\uae30\uc220\uc744\ud65c\uc6a9\ud55c\uc0ac\ubb3c\uc778\ud130\ub137\ud50c\ub7ab\ud3fc\uc778\ud130\uc6cc\ud0b9\ud504\ub808\uc784\uc6cc\ud06c\ubaa8\ub378\uc81c\uc548&quot;, 2022 \ud55c\uad6d\uc815\ubcf4\ucc98\ub9ac\ud559\ud68c \ucd98\uacc4\ud559\uc220\ubc1c\ud45c\ub300\ud68c, 2022.05<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=274\" title=\"\ud64d\uc724\uc601,\ucd5c\ucc3d\uc6b0,\uae40\ud638\uc6d0, &quot;Segmentation \uae30\ubc18 \uc801\ub300\uc801 \uacf5\uaca9 \ub3d9\ud5a5 \uc870\uc0ac&quot;, 2022 \ud55c\uad6d\uc815\ubcf4\ucc98\ub9ac\ud559\ud68c \ucd98\uacc4\ud559\uc220\ubc1c\ud45c\ub300\ud68c, 2022.05\"><span class=\"mb-latest-item-title-text\">\ud64d\uc724\uc601,\ucd5c\ucc3d\uc6b0,\uae40\ud638\uc6d0, &quot;Segmentation \uae30\ubc18 \uc801\ub300\uc801 \uacf5\uaca9 \ub3d9\ud5a5 \uc870\uc0ac&quot;, 2022 \ud55c\uad6d\uc815\ubcf4\ucc98\ub9ac\ud559\ud68c \ucd98\uacc4\ud559\uc220\ubc1c\ud45c\ub300\ud68c, 2022.05<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=273\" title=\"\uc870\uc6b1,\uae40\uae08\ubcf4, &quot;CMT\ub97c \ud65c\uc6a9\ud55c \ud504\ub77c\uc774\ube57 \ube14\ub85d\uccb4\uc778 \uace0\uc18d\ud654\ub85c \uc778\ud55c \ub2e8\uc77c \uc7a5\uc560 \uc9c0\uc810 \ubb38\uc81c \ud574\uacb0\uc5d0 \uad00\ud55c \uc5f0\uad6c&quot;, 2022 \ud55c\uad6d\uc815\ubcf4\ucc98\ub9ac\ud559\ud68c \ucd98\uacc4\ud559\uc220\ubc1c\ud45c\ub300\ud68c, 2022.05\"><span class=\"mb-latest-item-title-text\">\uc870\uc6b1,\uae40\uae08\ubcf4, &quot;CMT\ub97c \ud65c\uc6a9\ud55c \ud504\ub77c\uc774\ube57 \ube14\ub85d\uccb4\uc778 \uace0\uc18d\ud654\ub85c \uc778\ud55c \ub2e8\uc77c \uc7a5\uc560 \uc9c0\uc810 \ubb38\uc81c \ud574\uacb0\uc5d0 \uad00\ud55c \uc5f0\uad6c&quot;, 2022 \ud55c\uad6d\uc815\ubcf4\ucc98\ub9ac\ud559\ud68c \ucd98\uacc4\ud559\uc220\ubc1c\ud45c\ub300\ud68c, 2022.05<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=272\" title=\"\uac15\ud6a8\uc740,\uae40\ud638\uc6d0, &quot;Bi-LSTM VAE \uae30\ubc18 \ucc28\ub7c9 CAN \uce68\uc785 \ud0d0\uc9c0 \uc2dc\uc2a4\ud15c&quot;, 2022 \ud55c\uad6d\uc815\ubcf4\ucc98\ub9ac\ud559\ud68c \ucd98\uacc4\ud559\uc220\ubc1c\ud45c\ub300\ud68c, 2022.05\"><span class=\"mb-latest-item-title-text\">\uac15\ud6a8\uc740,\uae40\ud638\uc6d0, &quot;Bi-LSTM VAE \uae30\ubc18 \ucc28\ub7c9 CAN \uce68\uc785 \ud0d0\uc9c0 \uc2dc\uc2a4\ud15c&quot;, 2022 \ud55c\uad6d\uc815\ubcf4\ucc98\ub9ac\ud559\ud68c \ucd98\uacc4\ud559\uc220\ubc1c\ud45c\ub300\ud68c, 2022.05<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=271\" title=\"\uc870\ud604\uc9c4,\uae40\ud638\uc6d0, &quot;\ub525\ub7ec\ub2dd \ubc0f \uc774\ubbf8\uc9c0\ud654\ub97c \ud1b5\ud55c \uc545\uc131\ucf54\ub4dc \ubd84\ub958 \uc2dc\uc2a4\ud15c&quot;, \uc81c2\ud68c \ud55c\uad6d\uc778\uacf5\uc9c0\ub2a5\ud559\uc220\ub300\ud68c, 2021.09\"><span class=\"mb-latest-item-title-text\">\uc870\ud604\uc9c4,\uae40\ud638\uc6d0, &quot;\ub525\ub7ec\ub2dd \ubc0f \uc774\ubbf8\uc9c0\ud654\ub97c \ud1b5\ud55c \uc545\uc131\ucf54\ub4dc \ubd84\ub958 \uc2dc\uc2a4\ud15c&quot;, \uc81c2\ud68c \ud55c\uad6d\uc778\uacf5\uc9c0\ub2a5\ud559\uc220\ub300\ud68c, 2021.09<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=270\" title=\"\uc2ec\uc900\uc11d,\uc870\ud604\uc9c4,\uae40\ud638\uc6d0, &quot;\ub3d9\ud615\uc554\ud638\ub97c \uc774\uc6a9\ud55c \ud504\ub77c\uc774\ubc84\uc2dc \ubcf4\ud638 \uc5bc\uad74 \uac80\uc99d \uc2dc\uc2a4\ud15c&quot;, \uc81c2\ud68c \ud55c\uad6d\uc778\uacf5\uc9c0\ub2a5\ud559\uc220\ub300\ud68c, 2021.09\"><span class=\"mb-latest-item-title-text\">\uc2ec\uc900\uc11d,\uc870\ud604\uc9c4,\uae40\ud638\uc6d0, &quot;\ub3d9\ud615\uc554\ud638\ub97c \uc774\uc6a9\ud55c \ud504\ub77c\uc774\ubc84\uc2dc \ubcf4\ud638 \uc5bc\uad74 \uac80\uc99d \uc2dc\uc2a4\ud15c&quot;, \uc81c2\ud68c \ud55c\uad6d\uc778\uacf5\uc9c0\ub2a5\ud559\uc220\ub300\ud68c, 2021.09<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=269\" title=\"\uac15\ud6a8\uc740,\uae40\ud638\uc6d0, &quot;\uadf8\ub798\ud504 \uc2e0\uacbd\ub9dd\uc744 \uc774\uc6a9\ud55c \uc804\ub825 \uac70\ub798 \ud30c\ud2b8\ub108 \ub9e4\uce6d \uc11c\ube44\uc2a4_&quot;, \uc81c2\ud68c \ud55c\uad6d\uc778\uacf5\uc9c0\ub2a5\ud559\uc220\ub300\ud68c, 2021.09\"><span class=\"mb-latest-item-title-text\">\uac15\ud6a8\uc740,\uae40\ud638\uc6d0, &quot;\uadf8\ub798\ud504 \uc2e0\uacbd\ub9dd\uc744 \uc774\uc6a9\ud55c \uc804\ub825 \uac70\ub798 \ud30c\ud2b8\ub108 \ub9e4\uce6d \uc11c\ube44\uc2a4_&quot;, \uc81c2\ud68c \ud55c\uad6d\uc778\uacf5\uc9c0\ub2a5\ud559\uc220\ub300\ud68c, 2021.09<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=268\" title=\"\uae40\ub3c4\ud6c8,\uae40\ud638\uc6d0, &quot;\uc815\ubcf4\ubcf4\uc548 \uad00\ub9ac\uc2e4\ud0dc \ud3c9\uac00\ub97c \uc704\ud55c \ube14\ub85d\uccb4\uc778 \uae30\ubc18 \ud1b5\ud569\ubcf4\uc548\ub85c\uadf8 \uad00\ub9ac \uc2dc\uc2a4\ud15c&quot;, 2021\ub144 \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \uc601\ub0a8\uc9c0\ubd80 \ud559\uc220\ub300\ud68c, 2021.09\"><span class=\"mb-latest-item-title-text\">\uae40\ub3c4\ud6c8,\uae40\ud638\uc6d0, &quot;\uc815\ubcf4\ubcf4\uc548 \uad00\ub9ac\uc2e4\ud0dc \ud3c9\uac00\ub97c \uc704\ud55c \ube14\ub85d\uccb4\uc778 \uae30\ubc18 \ud1b5\ud569\ubcf4\uc548\ub85c\uadf8 \uad00\ub9ac \uc2dc\uc2a4\ud15c&quot;, 2021\ub144 \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \uc601\ub0a8\uc9c0\ubd80 \ud559\uc220\ub300\ud68c, 2021.09<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=267\" title=\"\uc774\uc9c4\uc7ac,\ub370\ub9ac \ud504\ub77c\ud0c0\ub9c8,\uae40\ud638\uc6d0, &quot;\uc811\uadfc\uc81c\uc5b4\ub97c \uc9c0\uc6d0\ud558\ub294 Tagged Memory Extension \ub3d9\ud5a5&quot;, 2021\ub144 \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \uc601\ub0a8\uc9c0\ubd80 \ud559\uc220\ub300\ud68c, 2021.09\"><span class=\"mb-latest-item-title-text\">\uc774\uc9c4\uc7ac,\ub370\ub9ac \ud504\ub77c\ud0c0\ub9c8,\uae40\ud638\uc6d0, &quot;\uc811\uadfc\uc81c\uc5b4\ub97c \uc9c0\uc6d0\ud558\ub294 Tagged Memory Extension \ub3d9\ud5a5&quot;, 2021\ub144 \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \uc601\ub0a8\uc9c0\ubd80 \ud559\uc220\ub300\ud68c, 2021.09<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=266\" title=\"\uc724\uc601\uc5ec,\uc2ec\uc900\uc11d,\uc870\ud604\uc9c4,\uac15\ud6a8\uc740,\uae40\ud638\uc6d0, &quot;\uc801\ub300\uc801 \uc608\uc81c\ub97c \uc774\uc6a9\ud55c \ub514\uc9c0\ud138 \uc6cc\ud130\ub9c8\ud0b9&quot;, 2021\ub144 \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \uc601\ub0a8\uc9c0\ubd80 \ud559\uc220\ub300\ud68c, 2021.09\"><span class=\"mb-latest-item-title-text\">\uc724\uc601\uc5ec,\uc2ec\uc900\uc11d,\uc870\ud604\uc9c4,\uac15\ud6a8\uc740,\uae40\ud638\uc6d0, &quot;\uc801\ub300\uc801 \uc608\uc81c\ub97c \uc774\uc6a9\ud55c \ub514\uc9c0\ud138 \uc6cc\ud130\ub9c8\ud0b9&quot;, 2021\ub144 \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \uc601\ub0a8\uc9c0\ubd80 \ud559\uc220\ub300\ud68c, 2021.09<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=265\" title=\"\uae40\uae08\ubcf4,\uc870\uc6b1,\uae40\ud638\uc6d0, &quot;\uc911\uc559\uc740\ud589 \ub514\uc9c0\ud138\ud654\ud3d0 CBDC \ub3d9\ud5a5&quot;, 2021\ub144 \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ub3d9\uacc4\ud559\uc220\ub300\ud68c, 2021.11\"><span class=\"mb-latest-item-title-text\">\uae40\uae08\ubcf4,\uc870\uc6b1,\uae40\ud638\uc6d0, &quot;\uc911\uc559\uc740\ud589 \ub514\uc9c0\ud138\ud654\ud3d0 CBDC \ub3d9\ud5a5&quot;, 2021\ub144 \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ub3d9\uacc4\ud559\uc220\ub300\ud68c, 2021.11<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=264\" title=\"\uc870\uc6b1,\uae40\ud638\uc6d0, &quot;\ube14\ub85d\uccb4\uc778 \ud655\uc7a5\uc131 \uc194\ub8e8\uc158 Layer II \uc5f0\uad6c\ub3d9\ud5a5&quot;, 2021\ub144 \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ub3d9\uacc4\ud559\uc220\ub300\ud68c, 2021.11\"><span class=\"mb-latest-item-title-text\">\uc870\uc6b1,\uae40\ud638\uc6d0, &quot;\ube14\ub85d\uccb4\uc778 \ud655\uc7a5\uc131 \uc194\ub8e8\uc158 Layer II \uc5f0\uad6c\ub3d9\ud5a5&quot;, 2021\ub144 \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ub3d9\uacc4\ud559\uc220\ub300\ud68c, 2021.11<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=263\" title=\"\ucd5c\ucc3d\uc6b0,\uc2ec\uc900\uc11d,\uc218\ub7b8\ud1a0 \ub098\uc6b0\ud314, \uc724\uc601\uc5ec,\uae40\ud638\uc6d0, &quot;LSTM \uae30\ubc18 \ucc28\ub7c9 \ub124\ud2b8\uc6cc\ud06c \uce68\uc785\ud0d0\uc9c0 \ubaa8\ub378&quot;, 2021\ub144 \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ub3d9\uacc4\ud559\uc220\ub300\ud68c, 2021.11\"><span class=\"mb-latest-item-title-text\">\ucd5c\ucc3d\uc6b0,\uc2ec\uc900\uc11d,\uc218\ub7b8\ud1a0 \ub098\uc6b0\ud314, \uc724\uc601\uc5ec,\uae40\ud638\uc6d0, &quot;LSTM \uae30\ubc18 \ucc28\ub7c9 \ub124\ud2b8\uc6cc\ud06c \uce68\uc785\ud0d0\uc9c0 \ubaa8\ub378&quot;, 2021\ub144 \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ub3d9\uacc4\ud559\uc220\ub300\ud68c, 2021.11<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=262\" title=\"\uc774\ud604\ud76c,\uae40\uae08\ubcf4,\uae40\ud638\uc6d0, &quot;\uc11c\ube44\uc2a4\ud615 \ube14\ub85d\uccb4\uc778(BaaS)&quot;, 2021\ub144 \ucd94\uacc4 \ud55c\uad6d \ube14\ub85d\uccb4\uc778 \ud559\uc220\ub300\ud68c, 2021.11\"><span class=\"mb-latest-item-title-text\">\uc774\ud604\ud76c,\uae40\uae08\ubcf4,\uae40\ud638\uc6d0, &quot;\uc11c\ube44\uc2a4\ud615 \ube14\ub85d\uccb4\uc778(BaaS)&quot;, 2021\ub144 \ucd94\uacc4 \ud55c\uad6d \ube14\ub85d\uccb4\uc778 \ud559\uc220\ub300\ud68c, 2021.11<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=261\" title=\"\uae40\ub3d9\uaddc,\uc624\uc0c1\ubd09,\uae40\ud638\uc6d0, &quot;\uba54\ud0c0\ubc84\uc2a4 \ub0b4 \ubc95\uc801 \ubb38\uc81c \ud574\uacb0\uc744 \uc704\ud55c \ube14\ub85d\uccb4\uc778 \uae30\ubc18 \uc2dc\uc2a4\ud15c \ubd84\uc11d \ubc0f \uace0\ucc30&quot;, 2021\ub144 \ucd94\uacc4 \ud55c\uad6d \ube14\ub85d\uccb4\uc778 \ud559\uc220\ub300\ud68c, 2021.11\"><span class=\"mb-latest-item-title-text\">\uae40\ub3d9\uaddc,\uc624\uc0c1\ubd09,\uae40\ud638\uc6d0, &quot;\uba54\ud0c0\ubc84\uc2a4 \ub0b4 \ubc95\uc801 \ubb38\uc81c \ud574\uacb0\uc744 \uc704\ud55c \ube14\ub85d\uccb4\uc778 \uae30\ubc18 \uc2dc\uc2a4\ud15c \ubd84\uc11d \ubc0f \uace0\ucc30&quot;, 2021\ub144 \ucd94\uacc4 \ud55c\uad6d \ube14\ub85d\uccb4\uc778 \ud559\uc220\ub300\ud68c, 2021.11<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=260\" title=\"\uae40\ubbfc\uc7ac,\uae40\ud638\uc6d0, &quot;\ud558\ub4dc\uc6e8\uc5b4 \uae30\ubc18 \ud0a4 \uad00\ub9ac \ubaa8\ub4c8\uc758 \ubd80\ucc44\ub110 \uacf5\uaca9 \ub3d9\ud5a5\uc870\uc11c&quot;, 2021\ub144\ub3c4 \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ud558\uacc4\ud559\uc220\ub300\ud68c, 2021.06\"><span class=\"mb-latest-item-title-text\">\uae40\ubbfc\uc7ac,\uae40\ud638\uc6d0, &quot;\ud558\ub4dc\uc6e8\uc5b4 \uae30\ubc18 \ud0a4 \uad00\ub9ac \ubaa8\ub4c8\uc758 \ubd80\ucc44\ub110 \uacf5\uaca9 \ub3d9\ud5a5\uc870\uc11c&quot;, 2021\ub144\ub3c4 \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ud558\uacc4\ud559\uc220\ub300\ud68c, 2021.06<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=259\" title=\"\uc724\uc5ec\uc601,\uc2ec\uc900\uc11d,\uae40\ud638\uc6d0, &quot;\uc801\ub300\uc801 \uc608\uc81c\ub97c \uc774\uc6a9\ud55c \uc2a4\ud14c\uac00\ub178\uadf8\ub798\ud53c \uc774\ubbf8\uc9c0&quot;, 2021\ub144\ub3c4 \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ud558\uacc4\ud559\uc220\ub300\ud68c, 2021.06\"><span class=\"mb-latest-item-title-text\">\uc724\uc5ec\uc601,\uc2ec\uc900\uc11d,\uae40\ud638\uc6d0, &quot;\uc801\ub300\uc801 \uc608\uc81c\ub97c \uc774\uc6a9\ud55c \uc2a4\ud14c\uac00\ub178\uadf8\ub798\ud53c \uc774\ubbf8\uc9c0&quot;, 2021\ub144\ub3c4 \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ud558\uacc4\ud559\uc220\ub300\ud68c, 2021.06<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=258\" title=\"\uc870\uc6b1,\uae40\uae08\ubcf4,\uae40\ud638\uc6d0, &quot;\uc601\uc9c0\uc2dd \uc99d\uba85\uc744 \ud65c\uc6a9\ud55c \uc2e4\ub0b4 \uc704\uce58 \uae30\ubc18 \uc11c\ube44\uc2a4\uc758 \uc0ac\uc6a9\uc790 \uc704\uce58 \uc815\ubcf4 \ubcf4\ud638&quot;, 2021\ub144\ub3c4 \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ud558\uacc4\ud559\uc220\ub300\ud68c, 2021.06\"><span class=\"mb-latest-item-title-text\">\uc870\uc6b1,\uae40\uae08\ubcf4,\uae40\ud638\uc6d0, &quot;\uc601\uc9c0\uc2dd \uc99d\uba85\uc744 \ud65c\uc6a9\ud55c \uc2e4\ub0b4 \uc704\uce58 \uae30\ubc18 \uc11c\ube44\uc2a4\uc758 \uc0ac\uc6a9\uc790 \uc704\uce58 \uc815\ubcf4 \ubcf4\ud638&quot;, 2021\ub144\ub3c4 \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ud558\uacc4\ud559\uc220\ub300\ud68c, 2021.06<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=257\" title=\"\uae40\ub3c4\ud6c8,\uae40\ud638\uc6d0, &quot;\ube14\ub85d\uccb4\uc778 \uae30\ubc18 \ud504\ub77c\uc774\ubc84\uc2dc \uac15\ud654 \uc790\uae30\uc8fc\uad8c \uc2e0\uc6d0\uc99d\uba85 \uc544\ud0a4\ud14d\ucc98&quot;, 2021\ub144\ub3c4 \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ud558\uacc4\ud559\uc220\ub300\ud68c, 2021.06\"><span class=\"mb-latest-item-title-text\">\uae40\ub3c4\ud6c8,\uae40\ud638\uc6d0, &quot;\ube14\ub85d\uccb4\uc778 \uae30\ubc18 \ud504\ub77c\uc774\ubc84\uc2dc \uac15\ud654 \uc790\uae30\uc8fc\uad8c \uc2e0\uc6d0\uc99d\uba85 \uc544\ud0a4\ud14d\ucc98&quot;, 2021\ub144\ub3c4 \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ud558\uacc4\ud559\uc220\ub300\ud68c, 2021.06<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=256\" title=\"\uc870\ud604\uc9c4,\uac15\ud6a8\uc740,\uae40\ud638\uc6d0, &quot;\uac1d\uccb4\ud0d0\uc9c0\ubaa8\ub378\uc5d0\uc11c\uc758 \uc801\ub300\uc801 \uacf5\uaca9 \uae30\ubc95 \uc5f0\uad6c \ub3d9\ud5a5&quot;, 2021\ub144\ub3c4 \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ud558\uacc4\ud559\uc220\ub300\ud68c, 2021.06\"><span class=\"mb-latest-item-title-text\">\uc870\ud604\uc9c4,\uac15\ud6a8\uc740,\uae40\ud638\uc6d0, &quot;\uac1d\uccb4\ud0d0\uc9c0\ubaa8\ub378\uc5d0\uc11c\uc758 \uc801\ub300\uc801 \uacf5\uaca9 \uae30\ubc95 \uc5f0\uad6c \ub3d9\ud5a5&quot;, 2021\ub144\ub3c4 \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ud558\uacc4\ud559\uc220\ub300\ud68c, 2021.06<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=255\" title=\"\uc870\uc6b1,\uae40\ub3c4\ud6c8,\uae40\ud638\uc6d0, &quot;:FastText \uae30\ubc18\uc758 \ud55c\uad6d\uc5b4 \uac00\uc9dc \ub274\uc2a4 \ubd84\ub958 \ubaa8\ub378&quot;, 2021\ub144 \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \uc601\ub0a8\uc9c0\ubd80 \ud559\uc220\ub300\ud68c, 2021.02\"><span class=\"mb-latest-item-title-text\">\uc870\uc6b1,\uae40\ub3c4\ud6c8,\uae40\ud638\uc6d0, &quot;:FastText \uae30\ubc18\uc758 \ud55c\uad6d\uc5b4 \uac00\uc9dc \ub274\uc2a4 \ubd84\ub958 \ubaa8\ub378&quot;, 2021\ub144 \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \uc601\ub0a8\uc9c0\ubd80 \ud559\uc220\ub300\ud68c, 2021.02<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=254\" title=\"\uc774\uc9c4\uc7ac,\uae40\ud638\uc6d0, &quot;CNN \ub124\ud2b8\uc6cc\ud06c \ubb3c\ub9ac\ucc44\ub110 \ubcf4\uc548 \ubd84\uc11d\uc744 \uc704\ud55c \ud558\ub4dc\uc6e8\uc5b4 \uac00\uc18d\uae30 \uc124\uacc4&quot;, 2021\ub144 \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \uc601\ub0a8\uc9c0\ubd80 \ud559\uc220\ub300\ud68c, 2021.02\"><span class=\"mb-latest-item-title-text\">\uc774\uc9c4\uc7ac,\uae40\ud638\uc6d0, &quot;CNN \ub124\ud2b8\uc6cc\ud06c \ubb3c\ub9ac\ucc44\ub110 \ubcf4\uc548 \ubd84\uc11d\uc744 \uc704\ud55c \ud558\ub4dc\uc6e8\uc5b4 \uac00\uc18d\uae30 \uc124\uacc4&quot;, 2021\ub144 \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \uc601\ub0a8\uc9c0\ubd80 \ud559\uc220\ub300\ud68c, 2021.02<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=253\" title=\"\uc724\uc601\uc5ec,\uac15\ud6a8\uc740,\uae40\ud638\uc6d0, &quot;\uc2e4\uc81c \ubc0f \uc2dc\ubbac\ub808\uc774\uc158 \ud658\uacbd\uc5d0\uc11c\uc758 \uc801\ub300\uc801 \uacf5\uaca9 \uae30\ubc95 \uc5f0\uad6c \ub3d9\ud5a5&quot;, 2021\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ub3d9\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, 2021.03\"><span class=\"mb-latest-item-title-text\">\uc724\uc601\uc5ec,\uac15\ud6a8\uc740,\uae40\ud638\uc6d0, &quot;\uc2e4\uc81c \ubc0f \uc2dc\ubbac\ub808\uc774\uc158 \ud658\uacbd\uc5d0\uc11c\uc758 \uc801\ub300\uc801 \uacf5\uaca9 \uae30\ubc95 \uc5f0\uad6c \ub3d9\ud5a5&quot;, 2021\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ub3d9\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, 2021.03<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=252\" title=\"\uac15\ud6a8\uc740,\uc724\uc601\uc5ec,\uae40\ubbfc\uc7ac,\uae40\ud638\uc6d0, &quot;\uc801\ub300\uc801 \uacf5\uaca9 \ubc29\uc5b4\ub97c \uc704\ud55c \uc559\uc0c1\ube14 \uae30\ubc95\uc5d0 \uad00\ud55c \uc5f0\uad6c&quot;, \uc81c1\ud68c \ud55c\uad6d \uc778\uacf5\uc9c0\ub2a5 \ud559\uc220\ub300\ud68c, 2020.12\"><span class=\"mb-latest-item-title-text\">\uac15\ud6a8\uc740,\uc724\uc601\uc5ec,\uae40\ubbfc\uc7ac,\uae40\ud638\uc6d0, &quot;\uc801\ub300\uc801 \uacf5\uaca9 \ubc29\uc5b4\ub97c \uc704\ud55c \uc559\uc0c1\ube14 \uae30\ubc95\uc5d0 \uad00\ud55c \uc5f0\uad6c&quot;, \uc81c1\ud68c \ud55c\uad6d \uc778\uacf5\uc9c0\ub2a5 \ud559\uc220\ub300\ud68c, 2020.12<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=251\" title=\"\uc2ec\uc900\uc11d,\uc870\ud604\uc9c4,\ubc15\uc815\ud658,\uae40\ud638\uc6d0, &quot;BLDC \ud32c\ubaa8\ud130\uc758 \ubaa8\ud130 DC \uc804\uc555\uc744 \uc774\uc6a9\ud55c \uace0\uc7a5 \uc9c4\ub2e8&quot;, \uc81c1\ud68c \ud55c\uad6d \uc778\uacf5\uc9c0\ub2a5 \ud559\uc220\ub300\ud68c, 2020.12\"><span class=\"mb-latest-item-title-text\">\uc2ec\uc900\uc11d,\uc870\ud604\uc9c4,\ubc15\uc815\ud658,\uae40\ud638\uc6d0, &quot;BLDC \ud32c\ubaa8\ud130\uc758 \ubaa8\ud130 DC \uc804\uc555\uc744 \uc774\uc6a9\ud55c \uace0\uc7a5 \uc9c4\ub2e8&quot;, \uc81c1\ud68c \ud55c\uad6d \uc778\uacf5\uc9c0\ub2a5 \ud559\uc220\ub300\ud68c, 2020.12<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=250\" title=\"\uac15\ud6a8\uc740,\uc774\uc0c1\ud604,\uae40\ud638\uc6d0, &quot;\uac15\ud654\ud559\uc2b5\uc744 \uc0ac\uc6a9\ud55c \uc774\ubbf8\uc9c0 \ucc98\ub9ac \uae30\ubc95 \uae30\ubc18 \uc801\ub300\uc801 \uc0ac\ub840 \uc0dd\uc131\uc5d0 \uad00\ud55c \uc5f0\uad6c&quot;, \uc81c1\ud68c \ud55c\uad6d \uc778\uacf5\uc9c0\ub2a5 \ud559\uc220\ub300\ud68c, 2020.12\"><span class=\"mb-latest-item-title-text\">\uac15\ud6a8\uc740,\uc774\uc0c1\ud604,\uae40\ud638\uc6d0, &quot;\uac15\ud654\ud559\uc2b5\uc744 \uc0ac\uc6a9\ud55c \uc774\ubbf8\uc9c0 \ucc98\ub9ac \uae30\ubc95 \uae30\ubc18 \uc801\ub300\uc801 \uc0ac\ub840 \uc0dd\uc131\uc5d0 \uad00\ud55c \uc5f0\uad6c&quot;, \uc81c1\ud68c \ud55c\uad6d \uc778\uacf5\uc9c0\ub2a5 \ud559\uc220\ub300\ud68c, 2020.12<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=249\" title=\"\uc724\uc601\uc5ec,\uc774\uc9c4\uc7ac,\uae40\ud638\uc6d0, &quot;\ud558\ub4dc\uc6e8\uc5b4 \ud2b8\ub85c\uc774\uc794 \uac1c\uc694 \ubc0f \ubd84\ub958&quot;, \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ub3d9\uacc4\ud559\uc220\ub300\ud68c, 2020.11\"><span class=\"mb-latest-item-title-text\">\uc724\uc601\uc5ec,\uc774\uc9c4\uc7ac,\uae40\ud638\uc6d0, &quot;\ud558\ub4dc\uc6e8\uc5b4 \ud2b8\ub85c\uc774\uc794 \uac1c\uc694 \ubc0f \ubd84\ub958&quot;, \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ub3d9\uacc4\ud559\uc220\ub300\ud68c, 2020.11<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=248\" title=\"\uc870\ud604\uc9c4,\uae40\ud638\uc6d0, &quot;\ud2b9\uc9d5 \ub9f5\uc758 \ub178\uc774\uc988 \uc81c\uac70\ub97c \ud1b5\ud55c \uc801\ub300\uc801 \uacf5\uaca9 \ubc29\uc5b4&quot;, \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ub3d9\uacc4\ud559\uc220\ub300\ud68c, 2020.11\"><span class=\"mb-latest-item-title-text\">\uc870\ud604\uc9c4,\uae40\ud638\uc6d0, &quot;\ud2b9\uc9d5 \ub9f5\uc758 \ub178\uc774\uc988 \uc81c\uac70\ub97c \ud1b5\ud55c \uc801\ub300\uc801 \uacf5\uaca9 \ubc29\uc5b4&quot;, \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ub3d9\uacc4\ud559\uc220\ub300\ud68c, 2020.11<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=247\" title=\"\uc774\uc9c4\uc7ac,\uae40\ubbfc\uc7ac,\uae40\ud638\uc6d0, &quot;\uc800\uc131\ub2a5 RISC-V \ud504\ub85c\uc138\uc11c\ub97c \uc704\ud55c \uace0\uc18d ARIA \uc554\ud638 Extension&quot;, \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ub3d9\uacc4\ud559\uc220\ub300\ud68c, 2020.11\"><span class=\"mb-latest-item-title-text\">\uc774\uc9c4\uc7ac,\uae40\ubbfc\uc7ac,\uae40\ud638\uc6d0, &quot;\uc800\uc131\ub2a5 RISC-V \ud504\ub85c\uc138\uc11c\ub97c \uc704\ud55c \uace0\uc18d ARIA \uc554\ud638 Extension&quot;, \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ub3d9\uacc4\ud559\uc220\ub300\ud68c, 2020.11<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=246\" title=\"\uc2ec\uc900\uc11d,\uae40\ud638\uc6d0, &quot;\uae30\uacc4\ud559\uc2b5 \ubaa8\ub378\uc5d0 \ub300\ud55c \uc801\ub300\uc801 \uacf5\uaca9 \ubc0f \ubc29\uc5b4 \uc5f0\uad6c \ub3d9\ud5a5&quot;, \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ub3d9\uacc4\ud559\uc220\ub300\ud68c, 2020.11\"><span class=\"mb-latest-item-title-text\">\uc2ec\uc900\uc11d,\uae40\ud638\uc6d0, &quot;\uae30\uacc4\ud559\uc2b5 \ubaa8\ub378\uc5d0 \ub300\ud55c \uc801\ub300\uc801 \uacf5\uaca9 \ubc0f \ubc29\uc5b4 \uc5f0\uad6c \ub3d9\ud5a5&quot;, \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ub3d9\uacc4\ud559\uc220\ub300\ud68c, 2020.11<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=245\" title=\"\uae40\ubbfc\uc7ac,\uae40\ud638\uc6d0, &quot;RISC-V ISA cryptography extension \uc5f0\uad6c \ub3d9\ud5a5 \ubd84\uc11d&quot;, \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ub3d9\uacc4\ud559\uc220\ub300\ud68c, 2020.11\"><span class=\"mb-latest-item-title-text\">\uae40\ubbfc\uc7ac,\uae40\ud638\uc6d0, &quot;RISC-V ISA cryptography extension \uc5f0\uad6c \ub3d9\ud5a5 \ubd84\uc11d&quot;, \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ub3d9\uacc4\ud559\uc220\ub300\ud68c, 2020.11<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=244\" title=\"\uc774\uc0c1\ud604,\uac15\uc6d0\ud0dc,\uae40\ud638\uc6d0, &quot;DID \uae30\ubc18 \uc2e0\uc6d0 \uc778\uc99d \uc2dc\uc2a4\ud15c&quot;, \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ub3d9\uacc4\ud559\uc220\ub300\ud68c, 2020.11\"><span class=\"mb-latest-item-title-text\">\uc774\uc0c1\ud604,\uac15\uc6d0\ud0dc,\uae40\ud638\uc6d0, &quot;DID \uae30\ubc18 \uc2e0\uc6d0 \uc778\uc99d \uc2dc\uc2a4\ud15c&quot;, \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ub3d9\uacc4\ud559\uc220\ub300\ud68c, 2020.11<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=243\" title=\"\ub77c\ub77c\uc0ac\ud2f0 \ud558\ub77c\uc2a4\ud0c0 \ud0c0\ud2f0\ub9c8,\uae40\ud638\uc6d0, &quot;An Improvement of Quantum Ripple-Carry Addition Circuit&quot;, \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ub3d9\uacc4\ud559\uc220\ub300\ud68c, 2020.11\"><span class=\"mb-latest-item-title-text\">\ub77c\ub77c\uc0ac\ud2f0 \ud558\ub77c\uc2a4\ud0c0 \ud0c0\ud2f0\ub9c8,\uae40\ud638\uc6d0, &quot;An Improvement of Quantum Ripple-Carry Addition Circuit&quot;, \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ub3d9\uacc4\ud559\uc220\ub300\ud68c, 2020.11<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=242\" title=\"\uae40\ub3c4\ud6c8,\uc870\uc6b1,\uae40\ud638\uc6d0, &quot;\ube14\ub85d\uccb4\uc778 \uae30\ubc18 \uc548\ub4dc\ub85c\uc774\ub4dc \uc545\uc131 \uc571 \uc559\uc0c1\ube14 \ud0d0\uc9c0 \uc2dc\uc2a4\ud15c\uc5d0 \uad00\ud55c \uc5f0\uad6c&quot;, \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ucd94\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, 2020.11\"><span class=\"mb-latest-item-title-text\">\uae40\ub3c4\ud6c8,\uc870\uc6b1,\uae40\ud638\uc6d0, &quot;\ube14\ub85d\uccb4\uc778 \uae30\ubc18 \uc548\ub4dc\ub85c\uc774\ub4dc \uc545\uc131 \uc571 \uc559\uc0c1\ube14 \ud0d0\uc9c0 \uc2dc\uc2a4\ud15c\uc5d0 \uad00\ud55c \uc5f0\uad6c&quot;, \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ucd94\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, 2020.11<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=241\" title=\"\uc870\uc6b1, \uae40\ud638\uc6d0, &quot;\ube14\ub85d\uccb4\uc778 \uae30\ubc18 \ubcf4\uc0c1\ud615 \ud06c\ub77c\uc6b0\ub4dc \ud380\ub529 \ubb3c\ub958 \uc735\ud569 \ud50c\ub7ab\ud3fc&quot;, \ud55c\uad6dIT\uc11c\ube44\uc2a4\ud559\ud68c \ucd94\uacc4\ud559\uc220\ub300\ud68c, 2020.11\"><span class=\"mb-latest-item-title-text\">\uc870\uc6b1, \uae40\ud638\uc6d0, &quot;\ube14\ub85d\uccb4\uc778 \uae30\ubc18 \ubcf4\uc0c1\ud615 \ud06c\ub77c\uc6b0\ub4dc \ud380\ub529 \ubb3c\ub958 \uc735\ud569 \ud50c\ub7ab\ud3fc&quot;, \ud55c\uad6dIT\uc11c\ube44\uc2a4\ud559\ud68c \ucd94\uacc4\ud559\uc220\ub300\ud68c, 2020.11<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=240\" title=\"\uac15\uc6d0\ud0dc,\uc774\uc0c1\ud604,\uae40\ud638\uc6d0, &quot;DID\ub97c \uc774\uc6a9\ud55c \ud0c8\uc911\uc559\ud654 IoT \ud50c\ub7ab\ud3fc \uc124\uacc4&quot;, \ud55c\uad6dIT\uc11c\ube44\uc2a4\ud559\ud68c \ucd94\uacc4\ud559\uc220\ub300\ud68c, 2020.11\"><span class=\"mb-latest-item-title-text\">\uac15\uc6d0\ud0dc,\uc774\uc0c1\ud604,\uae40\ud638\uc6d0, &quot;DID\ub97c \uc774\uc6a9\ud55c \ud0c8\uc911\uc559\ud654 IoT \ud50c\ub7ab\ud3fc \uc124\uacc4&quot;, \ud55c\uad6dIT\uc11c\ube44\uc2a4\ud559\ud68c \ucd94\uacc4\ud559\uc220\ub300\ud68c, 2020.11<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=239\" title=\"\uc724\uc601\uc5ec,\uac15\ud6a8\uc740,\uae40\ud638\uc6d0, &quot;\uc2e4\uc81c \ubc0f \uc2dc\ubbac\ub808\uc774\uc158 \ud658\uacbd\uc5d0\uc11c\uc758 \uc801\ub300\uc801 \uacf5\uaca9 \uae30\ubc95 \uc5f0\uad6c \ub3d9\ud5a5&quot;, 2021\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ub3d9\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, 2021.02\"><span class=\"mb-latest-item-title-text\">\uc724\uc601\uc5ec,\uac15\ud6a8\uc740,\uae40\ud638\uc6d0, &quot;\uc2e4\uc81c \ubc0f \uc2dc\ubbac\ub808\uc774\uc158 \ud658\uacbd\uc5d0\uc11c\uc758 \uc801\ub300\uc801 \uacf5\uaca9 \uae30\ubc95 \uc5f0\uad6c \ub3d9\ud5a5&quot;, 2021\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ub3d9\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, 2021.02<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=207\" title=\"\uc774\uc9c4\uc7ac, \uc9c0\uc7a5\ud604, \ubc15\uc885\uc6b1, \uae40\ud638\uc6d0, &quot;\ud558\ub4dc\uc6e8\uc5b4 \uc554\ud638IP \ud14c\uc2a4\ud2b8\ub97c \uc704\ud55c SoC\ubcf4\ub4dc\uc0c1\uc5d0\uc11c\uc758 AMBA AXI\ud658\uacbd \uad6c\ucd95&quot;, \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ub3d9\uacc4\ud559\uc220\ub300\ud68c, 2019.11\"><span class=\"mb-latest-item-title-text\">\uc774\uc9c4\uc7ac, \uc9c0\uc7a5\ud604, \ubc15\uc885\uc6b1, \uae40\ud638\uc6d0, &quot;\ud558\ub4dc\uc6e8\uc5b4 \uc554\ud638IP \ud14c\uc2a4\ud2b8\ub97c \uc704\ud55c SoC\ubcf4\ub4dc\uc0c1\uc5d0\uc11c\uc758 AMBA AXI\ud658\uacbd \uad6c\ucd95&quot;, \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ub3d9\uacc4\ud559\uc220\ub300\ud68c, 2019.11<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=206\" title=\"\uc774\uc0c1\ud604, \uae40\uc6a9\uc218, \uae40\ud638\uc6d0, &quot;\ube14\ub85d\uccb4\uc778 DID \ub3d9\ud5a5 \ubc0f \ubd84\uc11d&quot;, \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ub3d9\uacc4\ud559\uc220\ub300\ud68c, 2019.11\"><span class=\"mb-latest-item-title-text\">\uc774\uc0c1\ud604, \uae40\uc6a9\uc218, \uae40\ud638\uc6d0, &quot;\ube14\ub85d\uccb4\uc778 DID \ub3d9\ud5a5 \ubc0f \ubd84\uc11d&quot;, \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ub3d9\uacc4\ud559\uc220\ub300\ud68c, 2019.11<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=205\" title=\"\uc544\ud53c\ud30c\ud234 \ubb34\uce74\ub85c, \ud478\ud2b8\ub9ac \ub77c\ub9c8\uc640\ud2f0, \uae40\ud638\uc6d0, &quot;\uba38\uc2e0\ub7ec\ub2dd \ud504\ub77c\uc774\ubc84\uc2dc\uc5d0 \uad00\ud55c \uc5f0\uad6c : FEDERATED LEARNING&quot;, \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ub3d9\uacc4\ud559\uc220\ub300\ud68c, 2019.11\"><span class=\"mb-latest-item-title-text\">\uc544\ud53c\ud30c\ud234 \ubb34\uce74\ub85c, \ud478\ud2b8\ub9ac \ub77c\ub9c8\uc640\ud2f0, \uae40\ud638\uc6d0, &quot;\uba38\uc2e0\ub7ec\ub2dd \ud504\ub77c\uc774\ubc84\uc2dc\uc5d0 \uad00\ud55c \uc5f0\uad6c : FEDERATED LEARNING&quot;, \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ub3d9\uacc4\ud559\uc220\ub300\ud68c, 2019.11<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=204\" title=\"\uac15\uc6d0\ud0dc, \uae40\uc720\ub098, \uae40\ud638\uc6d0, &quot;zk-SNARKs\uae30\ubc18 \ube14\ub85d\uccb4\uc778 \uc775\uba85 \uc778\uc99d \uc544\ud0a4\ud14d\ucc98&quot;, \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ub3d9\uacc4\ud559\uc220\ub300\ud68c, 2019.11\"><span class=\"mb-latest-item-title-text\">\uac15\uc6d0\ud0dc, \uae40\uc720\ub098, \uae40\ud638\uc6d0, &quot;zk-SNARKs\uae30\ubc18 \ube14\ub85d\uccb4\uc778 \uc775\uba85 \uc778\uc99d \uc544\ud0a4\ud14d\ucc98&quot;, \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ub3d9\uacc4\ud559\uc220\ub300\ud68c, 2019.11<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=203\" title=\"Naufal Suryanto, Ismail, Harashta Tatimma Larasati, \ud5c8\uc2e0\uc6b1, \uae40\ud638\uc6d0, &quot;OCF Gateway Implementation for IoT Platform Interoperability&quot;, \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ub3d9\uacc4\ud559\uc220\ub300\ud68c, 2019.11\"><span class=\"mb-latest-item-title-text\">Naufal Suryanto, Ismail, Harashta Tatimma Larasati, \ud5c8\uc2e0\uc6b1, \uae40\ud638\uc6d0, &quot;OCF Gateway Implementation for IoT Platform Interoperability&quot;, \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ub3d9\uacc4\ud559\uc220\ub300\ud68c, 2019.11<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=202\" title=\"\uc724\uc601\uc5ec, \ubc15\ucc2c\ud76c, \uc190\uc218\ubbfc, \uc774\uc9c0\uc740, \uae40\ud638\uc6d0, &quot;mbedTLS \uc0c1\uc5d0\uc11c\uc758 \uc591\uc790\ub0b4\uc131\uc554\ud638 \uc801\uc6a9 \uac00\ub2a5\uc131 \uc5f0\uad6c&quot;, \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ub3d9\uacc4\ud559\uc220\ub300\ud68c, 2019.11\"><span class=\"mb-latest-item-title-text\">\uc724\uc601\uc5ec, \ubc15\ucc2c\ud76c, \uc190\uc218\ubbfc, \uc774\uc9c0\uc740, \uae40\ud638\uc6d0, &quot;mbedTLS \uc0c1\uc5d0\uc11c\uc758 \uc591\uc790\ub0b4\uc131\uc554\ud638 \uc801\uc6a9 \uac00\ub2a5\uc131 \uc5f0\uad6c&quot;, \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ub3d9\uacc4\ud559\uc220\ub300\ud68c, 2019.11<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=201\" title=\"\uac15\ud6a8\uc740, \uae40\uc6a9\uc218, \ud5c8\uc2e0\uc6b1, \uae40\ud638\uc6d0, &quot;GRU \uae30\ubc18 \uae30\uc0c1 \uad00\uce21\uc790\ub8cc\ub97c \uc774\uc6a9\ud55c \ud0dc\uc591\uad11 \ub2e8\uae30 \ubc1c\uc804\ub7c9 \uc608\uce21\ubaa8\ub378\uc5d0 \uad00\ud55c \uc5f0\uad6c&quot;, \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ucd94\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, 2019.11\"><span class=\"mb-latest-item-title-text\">\uac15\ud6a8\uc740, \uae40\uc6a9\uc218, \ud5c8\uc2e0\uc6b1, \uae40\ud638\uc6d0, &quot;GRU \uae30\ubc18 \uae30\uc0c1 \uad00\uce21\uc790\ub8cc\ub97c \uc774\uc6a9\ud55c \ud0dc\uc591\uad11 \ub2e8\uae30 \ubc1c\uc804\ub7c9 \uc608\uce21\ubaa8\ub378\uc5d0 \uad00\ud55c \uc5f0\uad6c&quot;, \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ucd94\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, 2019.11<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=200\" title=\"\uae40\uc6a9\uc218, \uac15\ud6a8\uc740, \uae40\ud638\uc6d0, &quot;\uc2a4\ub9c8\ud2b8\ud648 \ub514\ubc14\uc774\uc2a4 \uc2dd\ubcc4 \ubc0f \ub370\uc774\ud130 \ubcf4\uc548\uc744 \uc704\ud55c NILM \uae30\ubc18 \uc2dd\ubcc4\uccb4\uacc4 \ud1b5\ud569 \ud50c\ub7ab\ud3fc \uad6c\ud604&quot;, \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ud558\uacc4\ud559\uc220\ub300\ud68c, 2019.06\"><span class=\"mb-latest-item-title-text\">\uae40\uc6a9\uc218, \uac15\ud6a8\uc740, \uae40\ud638\uc6d0, &quot;\uc2a4\ub9c8\ud2b8\ud648 \ub514\ubc14\uc774\uc2a4 \uc2dd\ubcc4 \ubc0f \ub370\uc774\ud130 \ubcf4\uc548\uc744 \uc704\ud55c NILM \uae30\ubc18 \uc2dd\ubcc4\uccb4\uacc4 \ud1b5\ud569 \ud50c\ub7ab\ud3fc \uad6c\ud604&quot;, \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ud558\uacc4\ud559\uc220\ub300\ud68c, 2019.06<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=199\" title=\"\uac15\uc6d0\ud0dc, \uc774\uc0c1\ud604, \uae40\ud638\uc6d0, &quot;\ube14\ub85d\uccb4\uc778\uc744 \ud65c\uc6a9\ud55c IoT \ubcf4\uc548 \uc5f0\uad6c&quot;, \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ud558\uacc4\ud559\uc220\ub300\ud68c, 2019.06\"><span class=\"mb-latest-item-title-text\">\uac15\uc6d0\ud0dc, \uc774\uc0c1\ud604, \uae40\ud638\uc6d0, &quot;\ube14\ub85d\uccb4\uc778\uc744 \ud65c\uc6a9\ud55c IoT \ubcf4\uc548 \uc5f0\uad6c&quot;, \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ud558\uacc4\ud559\uc220\ub300\ud68c, 2019.06<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=198\" title=\"\uc544\ud53c\ud30c\ud234 \ubb34\uce74\ub85c, \uae40\ud638\uc6d0, &quot;\ub514\uc9c0\ud138 \ud3ec\ub80c\uc2dd \uac1c\ubc1c\ud558\uae30 \uc704\ud55c \uc2e4\uc2dc\uac04 \ud14d\uc2a4\ud2b8 \uc778\uc2dd&quot;, \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ud558\uacc4\ud559\uc220\ub300\ud68c, 2019.06\"><span class=\"mb-latest-item-title-text\">\uc544\ud53c\ud30c\ud234 \ubb34\uce74\ub85c, \uae40\ud638\uc6d0, &quot;\ub514\uc9c0\ud138 \ud3ec\ub80c\uc2dd \uac1c\ubc1c\ud558\uae30 \uc704\ud55c \uc2e4\uc2dc\uac04 \ud14d\uc2a4\ud2b8 \uc778\uc2dd&quot;, \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ud558\uacc4\ud559\uc220\ub300\ud68c, 2019.06<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=197\" title=\"Thi-Thu-Huong Le, Putri Rahmawati Binti Eldi, Harashta Tatimma Larasati, \uae40\ud638\uc6d0, &quot;The Effect of Load Mask to Estimate Target Load in NILM&quot;, \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ud558\uacc4\ud559\uc220\ub300\ud68c, 2019.06\"><span class=\"mb-latest-item-title-text\">Thi-Thu-Huong Le, Putri Rahmawati Binti Eldi, Harashta Tatimma Larasati, \uae40\ud638\uc6d0, &quot;The Effect of Load Mask to Estimate Target Load in NILM&quot;, \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ud558\uacc4\ud559\uc220\ub300\ud68c, 2019.06<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=196\" title=\"\uae40\ud604\uace4, \uc774\uc2a4\ub9c8\uc77c, \uc218\ub7b8\ud1a0 \ub098\uc6b0\ud314, \uae40\ud638\uc6d0, &quot;IoT DNS\ub97c \ud65c\uc6a9\ud55c \uc774\uc885 IoT \ud50c\ub7ab\ud3fc \uc2dd\ubcc4\uccb4\uacc4 \uc0c1\ud638\uc5f0\ub3d9 \ubc0f \ubcf4\uc548&quot;, \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ud558\uacc4\ud559\uc220\ub300\ud68c, 2019.06\"><span class=\"mb-latest-item-title-text\">\uae40\ud604\uace4, \uc774\uc2a4\ub9c8\uc77c, \uc218\ub7b8\ud1a0 \ub098\uc6b0\ud314, \uae40\ud638\uc6d0, &quot;IoT DNS\ub97c \ud65c\uc6a9\ud55c \uc774\uc885 IoT \ud50c\ub7ab\ud3fc \uc2dd\ubcc4\uccb4\uacc4 \uc0c1\ud638\uc5f0\ub3d9 \ubc0f \ubcf4\uc548&quot;, \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ud558\uacc4\ud559\uc220\ub300\ud68c, 2019.06<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=195\" title=\"\uc544\uc640\ub8e8\ub518 \uc544\uc149 \ubb34\ud558\ub9c8\ub4dc, \uc774\uc9c4\uc7ac, \uc9c0\uc7a5\ud604, \uae40\ud638\uc6d0, &quot;FPGA \uae30\ubc18 \uc554\ud638 \ud504\ub85c\uc138\uc11c\ub97c \uc774\uc6a9\ud55c \ubaa8\ub4dc\ubc84\uc2a4 \ubcf4\uc548 \uac8c\uc774\ud2b8\uc6e8\uc774 \uc124\uacc4 \ubc0f \uad6c\ud604&quot;, \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ud558\uacc4\ud559\uc220\ub300\ud68c, 2019.06\"><span class=\"mb-latest-item-title-text\">\uc544\uc640\ub8e8\ub518 \uc544\uc149 \ubb34\ud558\ub9c8\ub4dc, \uc774\uc9c4\uc7ac, \uc9c0\uc7a5\ud604, \uae40\ud638\uc6d0, &quot;FPGA \uae30\ubc18 \uc554\ud638 \ud504\ub85c\uc138\uc11c\ub97c \uc774\uc6a9\ud55c \ubaa8\ub4dc\ubc84\uc2a4 \ubcf4\uc548 \uac8c\uc774\ud2b8\uc6e8\uc774 \uc124\uacc4 \ubc0f \uad6c\ud604&quot;, \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ud558\uacc4\ud559\uc220\ub300\ud68c, 2019.06<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=194\" title=\"\uac15\uc6d0\ud0dc, \uc774\uc0c1\ud604, \uae40\uc720\ub098, \uc190\uc218\ubbfc, \uae40\ud638\uc6d0, &quot;\ube14\ub85d\uccb4\uc778 \uae30\ubc18 \ub3c4\uc2dc \uc11c\ube44\uc2a4 \uc0ac\ub840 \ubc0f \ud2b9\uc131 \ubd84\uc11d&quot;, \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, 2019.06\"><span class=\"mb-latest-item-title-text\">\uac15\uc6d0\ud0dc, \uc774\uc0c1\ud604, \uae40\uc720\ub098, \uc190\uc218\ubbfc, \uae40\ud638\uc6d0, &quot;\ube14\ub85d\uccb4\uc778 \uae30\ubc18 \ub3c4\uc2dc \uc11c\ube44\uc2a4 \uc0ac\ub840 \ubc0f \ud2b9\uc131 \ubd84\uc11d&quot;, \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, 2019.06<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=193\" title=\"\ud5c8\uc2e0\uc6b1, \uc774\uc0c1\ud604, \uac15\uc6d0\ud0dc, \uc724\uc601\uc5ec, \uae40\ud638\uc6d0, &quot;ZK-snark \ube14\ub85d\uccb4\uc778\uc6a9 \uc775\uba85\uc131 \ud504\ub85c\ud1a0\ucf5c \ubd84\uc11d&quot;, \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, 2019.06\"><span class=\"mb-latest-item-title-text\">\ud5c8\uc2e0\uc6b1, \uc774\uc0c1\ud604, \uac15\uc6d0\ud0dc, \uc724\uc601\uc5ec, \uae40\ud638\uc6d0, &quot;ZK-snark \ube14\ub85d\uccb4\uc778\uc6a9 \uc775\uba85\uc131 \ud504\ub85c\ud1a0\ucf5c \ubd84\uc11d&quot;, \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, 2019.06<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=192\" title=\"\ubc15\ucc2c\ud76c, \uae40\ud574\uc6a9, \uc9c0\uc7a5\ud604, \uc774\uc9c4\uc7ac, \uae40\ud638\uc6d0, &quot;KCMVP \uac80\uc99d\uc744 \uc704\ud55c \uc554\ud638 \ubaa8\ub4c8 \uc124\uacc4 \ubc0f \ub300\uc751 \ubc29\uc548&quot;, \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, 2019.06\"><span class=\"mb-latest-item-title-text\">\ubc15\ucc2c\ud76c, \uae40\ud574\uc6a9, \uc9c0\uc7a5\ud604, \uc774\uc9c4\uc7ac, \uae40\ud638\uc6d0, &quot;KCMVP \uac80\uc99d\uc744 \uc704\ud55c \uc554\ud638 \ubaa8\ub4c8 \uc124\uacc4 \ubc0f \ub300\uc751 \ubc29\uc548&quot;, \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, 2019.06<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=191\" title=\"Thi-Thu-Huong Le, Afifatul Mukaroh, Howon Kim, &quot;Estimation Target Load from Mixed Load Based on Time-Frequency Magnitude and Phase Measurement in NILM&quot;, \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, 2019.06\"><span class=\"mb-latest-item-title-text\">Thi-Thu-Huong Le, Afifatul Mukaroh, Howon Kim, &quot;Estimation Target Load from Mixed Load Based on Time-Frequency Magnitude and Phase Measurement in NILM&quot;, \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, 2019.06<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=190\" title=\"\uc9c0\uc7a5\ud604, \uae40\ud574\uc6a9, \uc774\uc9c4\uc7ac, \uae40\ud638\uc6d0, &quot;CCTV \uc2e4\uc2dc\uac04 \ucc44\ub110 \ubcf4\uc548\uc744 \uc704\ud55c TLS \ubcf4\uc548 \uce69 \uc124\uacc4 \ubc0f openVPN \uc5f0\ub3d9 \uae30\uc220&quot;, \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, 2019.06\"><span class=\"mb-latest-item-title-text\">\uc9c0\uc7a5\ud604, \uae40\ud574\uc6a9, \uc774\uc9c4\uc7ac, \uae40\ud638\uc6d0, &quot;CCTV \uc2e4\uc2dc\uac04 \ucc44\ub110 \ubcf4\uc548\uc744 \uc704\ud55c TLS \ubcf4\uc548 \uce69 \uc124\uacc4 \ubc0f openVPN \uc5f0\ub3d9 \uae30\uc220&quot;, \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, 2019.06<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=189\" title=\"Ismail, Hyeongon Kim, Suryanto Naufal, Shinwook Heo, Howon Kim, &quot;A Study on Federated Access Control in Interoperability of Heterogeneous IoT Platforms&quot;, \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, 2019.06\"><span class=\"mb-latest-item-title-text\">Ismail, Hyeongon Kim, Suryanto Naufal, Shinwook Heo, Howon Kim, &quot;A Study on Federated Access Control in Interoperability of Heterogeneous IoT Platforms&quot;, \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, 2019.06<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=180\" title=\"\ubc15\uc885\uaddc, \ud5c8\uc2e0\uc6b1, \ubc15\ud0dc\ud658, \uae40\ud638\uc6d0, \u201coneM2M \ubcf4\uc548\uc744 \uc704\ud55c \ud558\ub4dc\uc6e8\uc5b4 \uae30\ubc18\uc758 \uc554\ud638\ud1b5\uc2e0\u201d, CISC-16 \ub3d9\uacc4\ud559\uc220\ub300\ud68c, 2016.12\"><span class=\"mb-latest-item-title-text\">\ubc15\uc885\uaddc, \ud5c8\uc2e0\uc6b1, \ubc15\ud0dc\ud658, \uae40\ud638\uc6d0, \u201coneM2M \ubcf4\uc548\uc744 \uc704\ud55c \ud558\ub4dc\uc6e8\uc5b4 \uae30\ubc18\uc758 \uc554\ud638\ud1b5\uc2e0\u201d, CISC-16 \ub3d9\uacc4\ud559\uc220\ub300\ud68c, 2016.12<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=179\" title=\"\uc870\ub3d9\uadfc, \uae40\ub3d9\uc8fc, \uae40\ud638\uc6d0, \u201cMachine Learning \uc774\uc6a9\ud55c Intrusion Detection System \uc5f0\uad6c \ub3d9\ud5a5\uacfc \ubbf8\ub798 IDS \uc2dc\uc2a4\ud15c\uc758 \uc804\ub9dd\u201d, CISC-16 \ub3d9\uacc4\ud559\uc220\ub300\ud68c, 2016.12\"><span class=\"mb-latest-item-title-text\">\uc870\ub3d9\uadfc, \uae40\ub3d9\uc8fc, \uae40\ud638\uc6d0, \u201cMachine Learning \uc774\uc6a9\ud55c Intrusion Detection System \uc5f0\uad6c \ub3d9\ud5a5\uacfc \ubbf8\ub798 IDS \uc2dc\uc2a4\ud15c\uc758 \uc804\ub9dd\u201d, CISC-16 \ub3d9\uacc4\ud559\uc220\ub300\ud68c, 2016.12<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=178\" title=\"\ubc30\ubd09\uc9c4, \uc774\uac00\ub78c, \ubc15\ud0dc\ud658, \uae40\ud638\uc6d0, \u201c\ud2b8\ub9ac \uae30\ubc18 \ub2e4\uc911 \uc0ac\ubb3c\uc778\ud130\ub137(IoT) \ub514\ubc14\uc774\uc2a4 \ub3d9\uc2dc \uc778\uc99d \uad6c\uc870 \uc124\uacc4 \ubc29\uc548\u201d, CISC-16 \ub3d9\uacc4\ud559\uc220\ub300\ud68c, 2016.12 .\"><span class=\"mb-latest-item-title-text\">\ubc30\ubd09\uc9c4, \uc774\uac00\ub78c, \ubc15\ud0dc\ud658, \uae40\ud638\uc6d0, \u201c\ud2b8\ub9ac \uae30\ubc18 \ub2e4\uc911 \uc0ac\ubb3c\uc778\ud130\ub137(IoT) \ub514\ubc14\uc774\uc2a4 \ub3d9\uc2dc \uc778\uc99d \uad6c\uc870 \uc124\uacc4 \ubc29\uc548\u201d, CISC-16 \ub3d9\uacc4\ud559\uc220\ub300\ud68c, 2016.12 .<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=177\" title=\"\ubc15\ud0dc\ud658, \ubc30\ubd09\uc9c4, \uae40\ud638\uc6d0, \u201cStateless \ud574\uc2dc \uae30\ubc18 \uc11c\uba85 \uae30\ubc95 \ub3d9\ud5a5 \ubc0f \uc804\ub9dd\u201d, \uc815\ubcf4\ucc98\ub9ac\ud559\ud68c \ucd94\uacc4\ud559\uc220\ub300\ud68c, 2016.11\"><span class=\"mb-latest-item-title-text\">\ubc15\ud0dc\ud658, \ubc30\ubd09\uc9c4, \uae40\ud638\uc6d0, \u201cStateless \ud574\uc2dc \uae30\ubc18 \uc11c\uba85 \uae30\ubc95 \ub3d9\ud5a5 \ubc0f \uc804\ub9dd\u201d, \uc815\ubcf4\ucc98\ub9ac\ud559\ud68c \ucd94\uacc4\ud559\uc220\ub300\ud68c, 2016.11<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=176\" title=\"THI-THU-HUONG LE, JIHYUN KIM, HOWON KIM, \u201cCLASSIFICATION PERFORMANCE USING GATED RECURRENT UNIT RECURRENT NEURAL NETWORK ON ENERGY DISAGGREATION\u201d, ICMLC 2016, 2016.7 .\"><span class=\"mb-latest-item-title-text\">THI-THU-HUONG LE, JIHYUN KIM, HOWON KIM, \u201cCLASSIFICATION PERFORMANCE USING GATED RECURRENT UNIT RECURRENT NEURAL NETWORK ON ENERGY DISAGGREATION\u201d, ICMLC 2016, 2016.7 .<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=175\" title=\"\ubc15\ucc3d\uc900, \uc778\uc601\uc9c4, \ud5c8\uc2e0\uc6b1, \ucd5c\uc885\uc11d, \uae40\ud638\uc6d0, \u201coneM2M \uad6c\ud604 \ud50c\ub7ab\ud3fc mobius \uc0c1\uc758 end-to-end \ubcf4\uc548 \uc801\uc6a9 \ubc29\uc548 \uc5f0\uad6c\u201d, \ud55c\uad6d\ucef4\ud4e8\ud130\uc885\ud569\ud559\uc220\ub300\ud68c, 2016.6\"><span class=\"mb-latest-item-title-text\">\ubc15\ucc3d\uc900, \uc778\uc601\uc9c4, \ud5c8\uc2e0\uc6b1, \ucd5c\uc885\uc11d, \uae40\ud638\uc6d0, \u201coneM2M \uad6c\ud604 \ud50c\ub7ab\ud3fc mobius \uc0c1\uc758 end-to-end \ubcf4\uc548 \uc801\uc6a9 \ubc29\uc548 \uc5f0\uad6c\u201d, \ud55c\uad6d\ucef4\ud4e8\ud130\uc885\ud569\ud559\uc220\ub300\ud68c, 2016.6<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=174\" title=\"\ubc15\uc885\uaddc, \ucd5c\uc885\uc11d, \uae40\ud638\uc6d0, \u201coneM2M \ud50c\ub7ab\ud3fc\uc5d0 \ub300\ud55c \ubcf4\uc548 \ubd84\uc11d\u201d, \ud55c\uad6d\ucef4\ud4e8\ud130\uc885\ud569\ud559\uc220\ub300\ud68c, 2016.6\"><span class=\"mb-latest-item-title-text\">\ubc15\uc885\uaddc, \ucd5c\uc885\uc11d, \uae40\ud638\uc6d0, \u201coneM2M \ud50c\ub7ab\ud3fc\uc5d0 \ub300\ud55c \ubcf4\uc548 \ubd84\uc11d\u201d, \ud55c\uad6d\ucef4\ud4e8\ud130\uc885\ud569\ud559\uc220\ub300\ud68c, 2016.6<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=173\" title=\"\uc11c\uaddc\uc6d0, \uae40\ud638\uc6d0, \u201c\ub79c\uc12c\uc6e8\uc5b4\uc758 \uc885\ub958\uc640 \uc55e\uc73c\ub85c\uc758 \ub3d9\ud5a5\u201d, \ud55c\uad6d\ucef4\ud4e8\ud130\uc885\ud569\ud559\uc220\ub300\ud68c, 2016.6\"><span class=\"mb-latest-item-title-text\">\uc11c\uaddc\uc6d0, \uae40\ud638\uc6d0, \u201c\ub79c\uc12c\uc6e8\uc5b4\uc758 \uc885\ub958\uc640 \uc55e\uc73c\ub85c\uc758 \ub3d9\ud5a5\u201d, \ud55c\uad6d\ucef4\ud4e8\ud130\uc885\ud569\ud559\uc220\ub300\ud68c, 2016.6<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=172\" title=\"\ubc15\ud0dc\ud658, \ubc30\ubd09\uc9c4, \uae40\ud638\uc6d0, \u201c\ud574\uc2dc\uae30\ubc18 \uc11c\uba85 \uc54c\uace0\ub9ac\uc998 \ub3d9\ud5a5 \ubd84\uc11d \ubc0f \uc804\ub9dd\u201d, \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ud558\uacc4\ud559\uc220\ub300\ud68c, 2016.6\"><span class=\"mb-latest-item-title-text\">\ubc15\ud0dc\ud658, \ubc30\ubd09\uc9c4, \uae40\ud638\uc6d0, \u201c\ud574\uc2dc\uae30\ubc18 \uc11c\uba85 \uc54c\uace0\ub9ac\uc998 \ub3d9\ud5a5 \ubd84\uc11d \ubc0f \uc804\ub9dd\u201d, \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ud558\uacc4\ud559\uc220\ub300\ud68c, 2016.6<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=171\" title=\"\uae40\ub3d9\uc8fc, \uc870\ub3d9\uadfc, \uae40\ud638\uc6d0, \u201c\uc2a4\ub9c8\ud2b8 \ud648 \uc11c\ube44\uc2a4 \ub3c4\uc785\uc0ac\ub840\ub85c \ubcf8 \ubc1c\uc804 \ubc29\ud5a5 \uc81c\uc2dc\u201d, \ud55c\uad6d\ucef4\ud4e8\ud130\uc885\ud569\ud559\uc220\ub300\ud68c, 2016.6\"><span class=\"mb-latest-item-title-text\">\uae40\ub3d9\uc8fc, \uc870\ub3d9\uadfc, \uae40\ud638\uc6d0, \u201c\uc2a4\ub9c8\ud2b8 \ud648 \uc11c\ube44\uc2a4 \ub3c4\uc785\uc0ac\ub840\ub85c \ubcf8 \ubc1c\uc804 \ubc29\ud5a5 \uc81c\uc2dc\u201d, \ud55c\uad6d\ucef4\ud4e8\ud130\uc885\ud569\ud559\uc220\ub300\ud68c, 2016.6<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=170\" title=\"\uc774\uac00\ub78c, \ubc15\ud0dc\ud658, \uae40\ud638\uc6d0, \u201c\uc0ac\ubb3c\uc778\ud130\ub137 \ub514\ubc14\uc774\uc2a4\uc5d0 \ub300\ud55c Chaskey \uc54c\uace0\ub9ac\uc998 \uc801\uc6a9 \uac00\ub2a5\uc131\uc5d0 \uad00\ud55c \uc5f0\uad6c\u201d, \ud55c\uad6d\ucef4\ud4e8\ud130\uc885\ud569\ud559\uc220\ub300\ud68c, 2016.6\"><span class=\"mb-latest-item-title-text\">\uc774\uac00\ub78c, \ubc15\ud0dc\ud658, \uae40\ud638\uc6d0, \u201c\uc0ac\ubb3c\uc778\ud130\ub137 \ub514\ubc14\uc774\uc2a4\uc5d0 \ub300\ud55c Chaskey \uc54c\uace0\ub9ac\uc998 \uc801\uc6a9 \uac00\ub2a5\uc131\uc5d0 \uad00\ud55c \uc5f0\uad6c\u201d, \ud55c\uad6d\ucef4\ud4e8\ud130\uc885\ud569\ud559\uc220\ub300\ud68c, 2016.6<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=169\" title=\"\ubc15\ud0dc\ud658, \ubc30\ubd09\uc9c4, \uc774\uac00\ub78c, \uae40\ud638\uc6d0, \u201cStateful \ud574\uc2dc \uae30\ubc18 \uc11c\uba85 \uae30\ubc95 \ub3d9\ud5a5 \ubc0f \uc804\ub9dd\u201d, \ud55c\uad6d\ucef4\ud4e8\ud130\uc885\ud569\ud559\uc220\ub300\ud68c, 2016.6\"><span class=\"mb-latest-item-title-text\">\ubc15\ud0dc\ud658, \ubc30\ubd09\uc9c4, \uc774\uac00\ub78c, \uae40\ud638\uc6d0, \u201cStateful \ud574\uc2dc \uae30\ubc18 \uc11c\uba85 \uae30\ubc95 \ub3d9\ud5a5 \ubc0f \uc804\ub9dd\u201d, \ud55c\uad6d\ucef4\ud4e8\ud130\uc885\ud569\ud559\uc220\ub300\ud68c, 2016.6<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=168\" title=\"\ubc15\ud0dc\ud658, \ubc30\ubd09\uc9c4, \uae40\ud638\uc6d0, \u201c\uc2dc\uac01 \uc7a5\uc560\uc778\uc6a9 \uae08\uc735 \ubcf4\uc548 \ubc0f \uae30\uc220 \ub3d9\ud5a5\uacfc \uc804\ub9dd\u201d, \ucd98\uacc4\ud559\uc220\ubc1c\ud45c\ub300\ud68c, 2016.5\"><span class=\"mb-latest-item-title-text\">\ubc15\ud0dc\ud658, \ubc30\ubd09\uc9c4, \uae40\ud638\uc6d0, \u201c\uc2dc\uac01 \uc7a5\uc560\uc778\uc6a9 \uae08\uc735 \ubcf4\uc548 \ubc0f \uae30\uc220 \ub3d9\ud5a5\uacfc \uc804\ub9dd\u201d, \ucd98\uacc4\ud559\uc220\ubc1c\ud45c\ub300\ud68c, 2016.5<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=167\" title=\"\ubc15\ud0dc\ud658, \uc11c\ud654\uc815, \uae40\ud638\uc6d0, \u201c4\ube44\ud2b8 \ub9c8\uc774\ud06c\ub85c\ud504\ub85c\uc138\uc11c \uc0c1\uc5d0\uc11c\uc758 \ud6a8\uc728\uc801\uc778 ARX\uc5f0\uc0b0 \uae30\ubc18 \ube14\ub85d\uc554\ud638 \uad6c\ud604\uc5d0 \uad00\ud55c \uc5f0\uad6c\u201d, \ud55c\uad6d\uc815\ubcf4\ucc98\ub9ac\ud559\ud68c \ucd94\uacc4\ud559\uc220\ub300\ud68c, 2015. 10\"><span class=\"mb-latest-item-title-text\">\ubc15\ud0dc\ud658, \uc11c\ud654\uc815, \uae40\ud638\uc6d0, \u201c4\ube44\ud2b8 \ub9c8\uc774\ud06c\ub85c\ud504\ub85c\uc138\uc11c \uc0c1\uc5d0\uc11c\uc758 \ud6a8\uc728\uc801\uc778 ARX\uc5f0\uc0b0 \uae30\ubc18 \ube14\ub85d\uc554\ud638 \uad6c\ud604\uc5d0 \uad00\ud55c \uc5f0\uad6c\u201d, \ud55c\uad6d\uc815\ubcf4\ucc98\ub9ac\ud559\ud68c \ucd94\uacc4\ud559\uc220\ub300\ud68c, 2015. 10<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=166\" title=\"\uc11c\ud654\uc815, \ubc15\ud0dc\ud658, \ucd5c\uc885\uc11d, \uae40\uc9c0\ud604, LSH \ucd5c\uc801\ud654 \uad6c\ud604 \ubd84\uc57c \uc6b0\uc218\uc0c1\"><span class=\"mb-latest-item-title-text\">\uc11c\ud654\uc815, \ubc15\ud0dc\ud658, \ucd5c\uc885\uc11d, \uae40\uc9c0\ud604, LSH \ucd5c\uc801\ud654 \uad6c\ud604 \ubd84\uc57c \uc6b0\uc218\uc0c1<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=165\" title=\"\ubc15\ud0dc\ud658, \uc11c\ud654\uc815, \uc751\uc5d4\ubc18\ud558, \uc11d\uc120\ud76c, \ucd5c\uc885\uc11d, \uae40\uacbd\ud6c8, LSH \uacbd\uc9c4\ub300\ud68c \ud65c\uc6a9\ubd84\uc57c \uc6b0\uc218\uc0c1\"><span class=\"mb-latest-item-title-text\">\ubc15\ud0dc\ud658, \uc11c\ud654\uc815, \uc751\uc5d4\ubc18\ud558, \uc11d\uc120\ud76c, \ucd5c\uc885\uc11d, \uae40\uacbd\ud6c8, LSH \uacbd\uc9c4\ub300\ud68c \ud65c\uc6a9\ubd84\uc57c \uc6b0\uc218\uc0c1<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=164\" title=\"\ubc15\ud0dc\ud658, \uc11c\ud654\uc815, \uae40\uc9c0\ud604, \ucd5c\uc885\uc11d, \uae40\ud638\uc6d0, \u201c\uc0ac\ubb3c\uc778\ud130\ub137 \ub514\ubc14\uc774\uc2a4 \uc0c1\uc758 \uc554\ud638\uae30\ubc95 \uad6c\ud604 \uae30\uc220 \ub3d9\ud5a5 \ubc0f \uc804\ub9dd\u201d, \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c, 2015. 4\"><span class=\"mb-latest-item-title-text\">\ubc15\ud0dc\ud658, \uc11c\ud654\uc815, \uae40\uc9c0\ud604, \ucd5c\uc885\uc11d, \uae40\ud638\uc6d0, \u201c\uc0ac\ubb3c\uc778\ud130\ub137 \ub514\ubc14\uc774\uc2a4 \uc0c1\uc758 \uc554\ud638\uae30\ubc95 \uad6c\ud604 \uae30\uc220 \ub3d9\ud5a5 \ubc0f \uc804\ub9dd\u201d, \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c, 2015. 4<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=163\" title=\"\uc11c\ud654\uc815, \uae40\ud638\uc6d0, \u201c\uc0ac\ubb3c\uc778\ud130\ub137\uc744 \uc704\ud55c \uacbd\ub7c9 \uc554\ud638 \uc54c\uace0\ub9ac\uc998 \uad6c\ud604\u201d, \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c, 2015.4\"><span class=\"mb-latest-item-title-text\">\uc11c\ud654\uc815, \uae40\ud638\uc6d0, \u201c\uc0ac\ubb3c\uc778\ud130\ub137\uc744 \uc704\ud55c \uacbd\ub7c9 \uc554\ud638 \uc54c\uace0\ub9ac\uc998 \uad6c\ud604\u201d, \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c, 2015.4<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=162\" title=\"\uc11c\ud654\uc815, \uae40\ud638\uc6d0, \u201c\uacf5\uac1c\ud0a4 \uc554\ud638\ud654 \uc0c1\uc5d0\uc11c\uc758 Side Channel Attack \ubc29\uc9c0\ub97c \uc704\ud55c Secure Coding\u201d, \uc815\ubcf4\ubcf4\ud638\ud559\ud68c \uc601\ub0a8\uc9c0\ubd80, 2015. 2.\"><span class=\"mb-latest-item-title-text\">\uc11c\ud654\uc815, \uae40\ud638\uc6d0, \u201c\uacf5\uac1c\ud0a4 \uc554\ud638\ud654 \uc0c1\uc5d0\uc11c\uc758 Side Channel Attack \ubc29\uc9c0\ub97c \uc704\ud55c Secure Coding\u201d, \uc815\ubcf4\ubcf4\ud638\ud559\ud68c \uc601\ub0a8\uc9c0\ubd80, 2015. 2.<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=161\" title=\"\ubc15\ud0dc\ud658, \uc11c\ud654\uc815, \uae40\uc9c0\ud604, \uae40\ud638\uc6d0, \u201cARX\uc5f0\uc0b0 \uae30\ubc18\uc758 \ub300\uce6d\ud0a4 \uc554\ud638 \uc54c\uace0\ub9ac\uc998\uc758 \uc790\ubc14\uc2a4\ud06c\ub9bd\ud2b8 \uad6c\ud604 \uae30\ubc95 \uc5f0\uad6c\u201d, \uc815\ubcf4\ubcf4\ud638\ud559\ud68c \uc601\ub0a8\uc9c0\ubd80, 2015. 2.\"><span class=\"mb-latest-item-title-text\">\ubc15\ud0dc\ud658, \uc11c\ud654\uc815, \uae40\uc9c0\ud604, \uae40\ud638\uc6d0, \u201cARX\uc5f0\uc0b0 \uae30\ubc18\uc758 \ub300\uce6d\ud0a4 \uc554\ud638 \uc54c\uace0\ub9ac\uc998\uc758 \uc790\ubc14\uc2a4\ud06c\ub9bd\ud2b8 \uad6c\ud604 \uae30\ubc95 \uc5f0\uad6c\u201d, \uc815\ubcf4\ubcf4\ud638\ud559\ud68c \uc601\ub0a8\uc9c0\ubd80, 2015. 2.<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=160\" title=\"\uc11c\ud654\uc815, \uae40\ud638\uc6d0, \u201c\uacf5\uac1c\ud0a4 \uc554\ud638\ud654\ub97c \uc704\ud55c \uacf1\uc148 \uae30\ubc95 \uc5f0\uad6c\u201d, CISC-W\u201914, 2014. 12.\"><span class=\"mb-latest-item-title-text\">\uc11c\ud654\uc815, \uae40\ud638\uc6d0, \u201c\uacf5\uac1c\ud0a4 \uc554\ud638\ud654\ub97c \uc704\ud55c \uacf1\uc148 \uae30\ubc95 \uc5f0\uad6c\u201d, CISC-W\u201914, 2014. 12.<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=159\" title=\"\uae40\uacbd\ud6c8, \uc11c\ud654\uc815, \uc11d\uc120\ud76c, \uae40\ud638\uc6d0, \u201c\uc548\uc804\ud55c \uae08\uc735\uac70\ub798\ub97c \uc704\ud55c \uba40\ud2f0\ucc44\ub110 \ubcf4\uc548\uce74\ub4dc\uc758 \uc124\uacc4\u201d, CISC-W\u201914, 2014. 12.\"><span class=\"mb-latest-item-title-text\">\uae40\uacbd\ud6c8, \uc11c\ud654\uc815, \uc11d\uc120\ud76c, \uae40\ud638\uc6d0, \u201c\uc548\uc804\ud55c \uae08\uc735\uac70\ub798\ub97c \uc704\ud55c \uba40\ud2f0\ucc44\ub110 \ubcf4\uc548\uce74\ub4dc\uc758 \uc124\uacc4\u201d, CISC-W\u201914, 2014. 12.<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=158\" title=\"\uae40\ud604\uc9c4, \uae40\ud638\uc6d0, \u201c\uc2a4\ub9c8\ud2b8\ud3f0 \uc9c0\ubb38\uc778\uc2dd\uc744 \ud65c\uc6a9\ud55c \uc548\uc804\ud55c \uae08\uc735\uac70\ub798\u201d, CISC-W\u201914, 2014. 12.\"><span class=\"mb-latest-item-title-text\">\uae40\ud604\uc9c4, \uae40\ud638\uc6d0, \u201c\uc2a4\ub9c8\ud2b8\ud3f0 \uc9c0\ubb38\uc778\uc2dd\uc744 \ud65c\uc6a9\ud55c \uc548\uc804\ud55c \uae08\uc735\uac70\ub798\u201d, CISC-W\u201914, 2014. 12.<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=157\" title=\"\uc11d\uc120\ud76c, \uc11c\ud654\uc815, \uae40\uacbd\ud6c8, \u201c\ub09c\uc218 \uc0dd\uc131\uae30\ub97c \uc774\uc6a9\ud55c \uba40\ud2f0 \ucc44\ub110 \ubcf4\uc548\uce74\ub4dc\uc758 \uc124\uacc4\u201d, \uad6d\uac00\uc554\ud638\uacf5\ubaa8\uc804 \ucd5c\uc6b0\uc218\uc0c1\"><span class=\"mb-latest-item-title-text\">\uc11d\uc120\ud76c, \uc11c\ud654\uc815, \uae40\uacbd\ud6c8, \u201c\ub09c\uc218 \uc0dd\uc131\uae30\ub97c \uc774\uc6a9\ud55c \uba40\ud2f0 \ucc44\ub110 \ubcf4\uc548\uce74\ub4dc\uc758 \uc124\uacc4\u201d, \uad6d\uac00\uc554\ud638\uacf5\ubaa8\uc804 \ucd5c\uc6b0\uc218\uc0c1<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=156\" title=\"\uc11c\ud654\uc815, \u201cModular Multiplication and Squaring on ARM-NEON Revisited\u201d, \uad6d\uac00\uc554\ud638\uacf5\ubaa8\uc804 \ucd5c\uc6b0\uc218\uc0c1.\"><span class=\"mb-latest-item-title-text\">\uc11c\ud654\uc815, \u201cModular Multiplication and Squaring on ARM-NEON Revisited\u201d, \uad6d\uac00\uc554\ud638\uacf5\ubaa8\uc804 \ucd5c\uc6b0\uc218\uc0c1.<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=155\" title=\"\uc11c\ud654\uc815, \uae40\ud638\uc6d0, \u201cBathroom Safety with Smart Devices\u201d, UCWIT, 2014. 11.\"><span class=\"mb-latest-item-title-text\">\uc11c\ud654\uc815, \uae40\ud638\uc6d0, \u201cBathroom Safety with Smart Devices\u201d, UCWIT, 2014. 11.<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=154\" title=\"2014 \uc9c0\uae09\uacb0\uc81c\uc81c\ub3c4 \ubc1c\uc804 \ub17c\ubb38 \ud604\uc0c1\uacf5\ubaa8 \uc544\uc774\ub514\uc5b4\uc0c1, \uc11c\ud654\uc815,\uc774\uc5f0\ucca0,\uae40\ud604\uc9c4,\ubc15\ud0dc\ud658, \ub098\uc5d4\ud558\ubc18, \uc11d\uc120\ud76c, \uae40\uacbd\ud6c8, \uae40\ud638\uc6d0, \u201c\ucd09\uac01\uc744 \uc774\uc6a9\ud55c \ubcf4\uc548\ud0a4\ud328\ub4dc\uc758 \uc124\uacc4\u201d, 2014, 9 .\"><span class=\"mb-latest-item-title-text\">2014 \uc9c0\uae09\uacb0\uc81c\uc81c\ub3c4 \ubc1c\uc804 \ub17c\ubb38 \ud604\uc0c1\uacf5\ubaa8 \uc544\uc774\ub514\uc5b4\uc0c1, \uc11c\ud654\uc815,\uc774\uc5f0\ucca0,\uae40\ud604\uc9c4,\ubc15\ud0dc\ud658, \ub098\uc5d4\ud558\ubc18, \uc11d\uc120\ud76c, \uae40\uacbd\ud6c8, \uae40\ud638\uc6d0, \u201c\ucd09\uac01\uc744 \uc774\uc6a9\ud55c \ubcf4\uc548\ud0a4\ud328\ub4dc\uc758 \uc124\uacc4\u201d, 2014, 9 .<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=153\" title=\"\uc11c\ud654\uc815, \uae40\ud638\uc6d0, \u201cHello SIMDCRYPTO\u201d, CISC-S\u201914, 2014. 6\"><span class=\"mb-latest-item-title-text\">\uc11c\ud654\uc815, \uae40\ud638\uc6d0, \u201cHello SIMDCRYPTO\u201d, CISC-S\u201914, 2014. 6<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=152\" title=\"2013 \uad6d\uac00\uc554\ud638\uae30\uc220\uacf5\ubaa8\uc804 \uc6b0\uc218\uc0c1, \uc774\uc5f0\ucca0, \ubc15\ud0dc\ud658, \uc11c\ud654\uc815, \u201c\uc785\ub825 \uba54\uc2dc\uc9c0 \uc554\ud638\ud654\ub97c \ud1b5\ud55c \ubcf4\uc548 \ud0a4\ud328\ub4dc\uc758 \uc124\uacc4\uc640 \uad6c\ud604\u201d, 2013, 11 \"><span class=\"mb-latest-item-title-text\">2013 \uad6d\uac00\uc554\ud638\uae30\uc220\uacf5\ubaa8\uc804 \uc6b0\uc218\uc0c1, \uc774\uc5f0\ucca0, \ubc15\ud0dc\ud658, \uc11c\ud654\uc815, \u201c\uc785\ub825 \uba54\uc2dc\uc9c0 \uc554\ud638\ud654\ub97c \ud1b5\ud55c \ubcf4\uc548 \ud0a4\ud328\ub4dc\uc758 \uc124\uacc4\uc640 \uad6c\ud604\u201d, 2013, 11 <\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=151\" title=\"2013 \uad6d\uac00\uc554\ud638\uae30\uc220\uacf5\ubaa8\uc804 \ucd5c\uc6b0\uc218\uc0c1, \uc11c\ud654\uc815, \u201cmontgomery multiplication for public-kley cryptography on embedded microprocessors\u201d, 2013, 11 \"><span class=\"mb-latest-item-title-text\">2013 \uad6d\uac00\uc554\ud638\uae30\uc220\uacf5\ubaa8\uc804 \ucd5c\uc6b0\uc218\uc0c1, \uc11c\ud654\uc815, \u201cmontgomery multiplication for public-kley cryptography on embedded microprocessors\u201d, 2013, 11 <\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=150\" title=\"\uc11c\ud654\uc815, \uae40\ud638\uc6d0, \u201c\uc784\ubca0\ub514\ub4dc \ubcf4\ub4dc \uc0c1\uc5d0\uc11c\uc758 \ud0c0\uc6d0\uace1\uc120 \uc554\ud638\ud654 \uad6c\ud604 \ub3d9\ud5a5\u201d, \ud55c\uad6d\uad6d\ubc29\uae30\uc220\ud559\ud68c \uad6d\ubc29\uae30\uc220\ud559\uc220\ub300\ud68c, 2013. 10\"><span class=\"mb-latest-item-title-text\">\uc11c\ud654\uc815, \uae40\ud638\uc6d0, \u201c\uc784\ubca0\ub514\ub4dc \ubcf4\ub4dc \uc0c1\uc5d0\uc11c\uc758 \ud0c0\uc6d0\uace1\uc120 \uc554\ud638\ud654 \uad6c\ud604 \ub3d9\ud5a5\u201d, \ud55c\uad6d\uad6d\ubc29\uae30\uc220\ud559\ud68c \uad6d\ubc29\uae30\uc220\ud559\uc220\ub300\ud68c, 2013. 10<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=149\" title=\"\uae40\ud604\uc9c4, \uc11c\ud654\uc815, \ubc15\ud0dc\ud658, \uc774\uc5f0\ucca0, \uae40\ud638\uc6d0,\u201d\uc5b4\uae68\ub108\uba38 \uacf5\uaca9\uc5d0 \uac15\uc778\ud55c \ubcf4\uc548 \ud0a4\ud328\ub4dc\uc758 \uc124\uacc4\uc640 \uad6c\ud604\u201d 2013\ub144 \uae08\uc735\uc815\ubcf4\ubcf4\ud638 \uacf5\ubaa8\uc804 \uc6b0\uc218\uc0c1\"><span class=\"mb-latest-item-title-text\">\uae40\ud604\uc9c4, \uc11c\ud654\uc815, \ubc15\ud0dc\ud658, \uc774\uc5f0\ucca0, \uae40\ud638\uc6d0,\u201d\uc5b4\uae68\ub108\uba38 \uacf5\uaca9\uc5d0 \uac15\uc778\ud55c \ubcf4\uc548 \ud0a4\ud328\ub4dc\uc758 \uc124\uacc4\uc640 \uad6c\ud604\u201d 2013\ub144 \uae08\uc735\uc815\ubcf4\ubcf4\ud638 \uacf5\ubaa8\uc804 \uc6b0\uc218\uc0c1<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=148\" title=\"\uc11c\ud654\uc815, \uae40\ud638\uc6d0, \u201c\uc218\uc911 \ud1b5\uc2e0 \ubcf4\uc548\uc744 \uc704\ud55c \uacbd\ub7c9\ud654 \uc554\ud638 \uad6c\ud604\u201d, \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ub3d9\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, 2013. 1\"><span class=\"mb-latest-item-title-text\">\uc11c\ud654\uc815, \uae40\ud638\uc6d0, \u201c\uc218\uc911 \ud1b5\uc2e0 \ubcf4\uc548\uc744 \uc704\ud55c \uacbd\ub7c9\ud654 \uc554\ud638 \uad6c\ud604\u201d, \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ub3d9\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, 2013. 1<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=147\" title=\"2012 \uad6d\uac00\uc554\ud638\uae30\uc220\uacf5\ubaa8\uc804 \uc7a5\ub824\uc0c1, \uc11c\ud654\uc815, \u201cmulti-precision multiplication for public-kley cryptography on embedded microprocessors\u201d, 2012, 11\"><span class=\"mb-latest-item-title-text\">2012 \uad6d\uac00\uc554\ud638\uae30\uc220\uacf5\ubaa8\uc804 \uc7a5\ub824\uc0c1, \uc11c\ud654\uc815, \u201cmulti-precision multiplication for public-kley cryptography on embedded microprocessors\u201d, 2012, 11<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=146\" title=\"\ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \uc6b0\uc218\ub17c\ubb38\uc0c1 \uc11c\ud654\uc815, \uae40\ud638\uc6d0, \u201c\uc784\ubca0\ub514\ub4dc \uc7a5\ube44 \uc0c1\uc5d0\uc11c\uc758 \uacf5\uac1c\ud0a4 \uae30\ubc18 \uc554\ud638\ub97c \uc704\ud55c \ub2e4\uc911 \uacf1\uc148\uae30 \ucd5c\uc2e0 \uc5f0\uad6c \ub3d9\ud5a5\u201d, \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ud558\uacc4\ud559\uc220\ubc1c\ud45c\ud68c, 2012. 6\"><span class=\"mb-latest-item-title-text\">\ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \uc6b0\uc218\ub17c\ubb38\uc0c1 \uc11c\ud654\uc815, \uae40\ud638\uc6d0, \u201c\uc784\ubca0\ub514\ub4dc \uc7a5\ube44 \uc0c1\uc5d0\uc11c\uc758 \uacf5\uac1c\ud0a4 \uae30\ubc18 \uc554\ud638\ub97c \uc704\ud55c \ub2e4\uc911 \uacf1\uc148\uae30 \ucd5c\uc2e0 \uc5f0\uad6c \ub3d9\ud5a5\u201d, \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ud558\uacc4\ud559\uc220\ubc1c\ud45c\ud68c, 2012. 6<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=145\" title=\"\uc774\ub3d9\uac74, \uc11c\ud654\uc815, \uae40\ud638\uc6d0, \u201cPI \uc81c\uc5b4\ub97c \ud1b5\ud55c FPGA \uae30\ubc18 TRNG\uc5d0 \ub300\ud55c \uc7ac\uace0\u201d, \ud55c\uad6d\uc804\uc790\uacf5\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, 2012. 6\"><span class=\"mb-latest-item-title-text\">\uc774\ub3d9\uac74, \uc11c\ud654\uc815, \uae40\ud638\uc6d0, \u201cPI \uc81c\uc5b4\ub97c \ud1b5\ud55c FPGA \uae30\ubc18 TRNG\uc5d0 \ub300\ud55c \uc7ac\uace0\u201d, \ud55c\uad6d\uc804\uc790\uacf5\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, 2012. 6<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=144\" title=\"\uc774\ub3d9\uac74, \uae40\ud638\uc6d0, \u201cHummingbird-2 \uc758 \ud558\ub4dc\uc6e8\uc5b4 \uc124\uacc4 \ubc0f \uad6c\ud604\u201d, \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ub3d9\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, 2012. 2\"><span class=\"mb-latest-item-title-text\">\uc774\ub3d9\uac74, \uae40\ud638\uc6d0, \u201cHummingbird-2 \uc758 \ud558\ub4dc\uc6e8\uc5b4 \uc124\uacc4 \ubc0f \uad6c\ud604\u201d, \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ub3d9\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, 2012. 2<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=143\" title=\"\uae40\uc9c0\ud604, \uae40\ud638\uc6d0, \u201cVANET\uc5d0\uc11c \ud504\ub77c\uc774\ubc84\uc2dc \ubcf4\ud638\ub97c \uc704\ud55c \ube0c\ub85c\ub4dc\uce90\uc2a4\ud2b8 \ud504\ub85c\ud1a0\ucf5c\u201d, \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ub3d9\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, 2012. 2\"><span class=\"mb-latest-item-title-text\">\uae40\uc9c0\ud604, \uae40\ud638\uc6d0, \u201cVANET\uc5d0\uc11c \ud504\ub77c\uc774\ubc84\uc2dc \ubcf4\ud638\ub97c \uc704\ud55c \ube0c\ub85c\ub4dc\uce90\uc2a4\ud2b8 \ud504\ub85c\ud1a0\ucf5c\u201d, \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ub3d9\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, 2012. 2<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=142\" title=\"\ucd5c\uc885\uc11d, \uae40\ud638\uc6d0, \u201cOne-Handled \ubaa8\ubc14\uc77c One-Time Password \uae30\ubc95\u201d, \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c, 2012 \ub3d9\uacc4\ud559\uc220\ub300\ud68c\"><span class=\"mb-latest-item-title-text\">\ucd5c\uc885\uc11d, \uae40\ud638\uc6d0, \u201cOne-Handled \ubaa8\ubc14\uc77c One-Time Password \uae30\ubc95\u201d, \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c, 2012 \ub3d9\uacc4\ud559\uc220\ub300\ud68c<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=141\" title=\"\uad8c\uc591\ud604, \uae40\ud638\uc6d0, \u201c\uc804\uae30 \uc790\ub3d9\ucc28 \uc2dc\uc2a4\ud15c \ubc0f \uc0ac\uc6a9\uc790 \uc778\uc99d \uae30\uc220 \uc5f0\uad6c\u201d, \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ub3d9\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, 2012. 2\"><span class=\"mb-latest-item-title-text\">\uad8c\uc591\ud604, \uae40\ud638\uc6d0, \u201c\uc804\uae30 \uc790\ub3d9\ucc28 \uc2dc\uc2a4\ud15c \ubc0f \uc0ac\uc6a9\uc790 \uc778\uc99d \uae30\uc220 \uc5f0\uad6c\u201d, \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ub3d9\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, 2012. 2<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=140\" title=\"\uc11c\ud654\uc815, \uae40\ud638\uc6d0, \u201cNDK \uae30\ubc18 \ub300\uce6d\ud0a4 \uc554\ud638\ud654 \uad6c\ud604\uc5d0 \uad00\ud55c \uc5f0\uad6c\u201d, \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ub3d9\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, 2012. 2\"><span class=\"mb-latest-item-title-text\">\uc11c\ud654\uc815, \uae40\ud638\uc6d0, \u201cNDK \uae30\ubc18 \ub300\uce6d\ud0a4 \uc554\ud638\ud654 \uad6c\ud604\uc5d0 \uad00\ud55c \uc5f0\uad6c\u201d, \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ub3d9\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, 2012. 2<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=139\" title=\"\uc11c\ud654\uc815, \uae40\ud638\uc6d0,\u201dHIGHT \ube14\ub85d \uc554\ud638 \uc54c\uace0\ub9ac\uc998 \ucd5c\uc801\ud654 FPGA \uad6c\ud604,\u201d \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c, 2011. 11\"><span class=\"mb-latest-item-title-text\">\uc11c\ud654\uc815, \uae40\ud638\uc6d0,\u201dHIGHT \ube14\ub85d \uc554\ud638 \uc54c\uace0\ub9ac\uc998 \ucd5c\uc801\ud654 FPGA \uad6c\ud604,\u201d \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c, 2011. 11<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=138\" title=\"\uc81c5\ud68c \ub300\ud55c\ubbfc\uad6d \ubcf4\uc548\uae30\uc220 \ub17c\ubb38\ub300\uc0c1 \uacf5\ubaa8\uc804, \uc7a5\ub824\uc0c1 \uc218\uc0c1, \uc11c\ud654\uc815 \u201c\uc18d\uc131\uae30\ubc18 \uc2a4\ub9c8\ud2b8\uce74\ub4dc \uc804\uc790\ud654\ud3d0 \uc778\uc99d \uae30\uc220\u201d\"><span class=\"mb-latest-item-title-text\">\uc81c5\ud68c \ub300\ud55c\ubbfc\uad6d \ubcf4\uc548\uae30\uc220 \ub17c\ubb38\ub300\uc0c1 \uacf5\ubaa8\uc804, \uc7a5\ub824\uc0c1 \uc218\uc0c1, \uc11c\ud654\uc815 \u201c\uc18d\uc131\uae30\ubc18 \uc2a4\ub9c8\ud2b8\uce74\ub4dc \uc804\uc790\ud654\ud3d0 \uc778\uc99d \uae30\uc220\u201d<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=137\" title=\"Hwajeong Seo, Howon Kim,\u201dOptimizing Multiprecision Multiplication for Elliptic Curve Cryptography to Wireless Sensor Netowrks,\u201d \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c, 2011.11\"><span class=\"mb-latest-item-title-text\">Hwajeong Seo, Howon Kim,\u201dOptimizing Multiprecision Multiplication for Elliptic Curve Cryptography to Wireless Sensor Netowrks,\u201d \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c, 2011.11<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=136\" title=\"\ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \uc6b0\uc218\ub17c\ubb38\uc0c1, \uc11c\ud654\uc815, \uae40\ud638\uc6d0, \u201c\uc13c\uc11c \ub124\ud2b8\uc6cc\ud06c \uc0c1\uc5d0\uc11c\uc758 \ucd08\uacbd\ub7c9 \ube14\ub77d \uc554\ud638\ud654 \ud558\uc774\ud2b8 \uad6c\ud604 \uae30\ubc95\u201d \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ud558\uacc4\ud559\uc220\ub300\ud68c 2011 6\"><span class=\"mb-latest-item-title-text\">\ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \uc6b0\uc218\ub17c\ubb38\uc0c1, \uc11c\ud654\uc815, \uae40\ud638\uc6d0, \u201c\uc13c\uc11c \ub124\ud2b8\uc6cc\ud06c \uc0c1\uc5d0\uc11c\uc758 \ucd08\uacbd\ub7c9 \ube14\ub77d \uc554\ud638\ud654 \ud558\uc774\ud2b8 \uad6c\ud604 \uae30\ubc95\u201d \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ud558\uacc4\ud559\uc220\ub300\ud68c 2011 6<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=135\" title=\"\uc774\ub3d9\uac74, \uae40\ud638\uc6d0, \u201cHIGHT \ube14\ub85d \uc554\ud638 \uc54c\uace0\ub9ac\uc998\uc758 FPGA \uad6c\ud604\u201d, \ub300\ud55c\uc804\uc790\uacf5\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ub300\ud68c, 2011. 6\"><span class=\"mb-latest-item-title-text\">\uc774\ub3d9\uac74, \uae40\ud638\uc6d0, \u201cHIGHT \ube14\ub85d \uc554\ud638 \uc54c\uace0\ub9ac\uc998\uc758 FPGA \uad6c\ud604\u201d, \ub300\ud55c\uc804\uc790\uacf5\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ub300\ud68c, 2011. 6<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=134\" title=\"\uc11c\ud654\uc815, \uae40\ud638\uc6d0, \u201c\uc13c\uc11c\ub124\ud2b8\uc6cc\ud06c\uc0c1\uc5d0\uc11c\uc758 \ucd08\uacbd\ub7c9\ube14\ub77d\uc554\ud638\ud654 \ud558\uc774\ud2b8 \uad6c\ud604\uae30\ubc95\u201d, \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, 2011. 6\"><span class=\"mb-latest-item-title-text\">\uc11c\ud654\uc815, \uae40\ud638\uc6d0, \u201c\uc13c\uc11c\ub124\ud2b8\uc6cc\ud06c\uc0c1\uc5d0\uc11c\uc758 \ucd08\uacbd\ub7c9\ube14\ub77d\uc554\ud638\ud654 \ud558\uc774\ud2b8 \uad6c\ud604\uae30\ubc95\u201d, \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ud558\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c, 2011. 6<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=133\" title=\"\uc11c\ud654\uc815, \uae40\ud638\uc6d0, \u201c\uc774\ub3d9\uc131 \uc18d\uc131\uae30\ubc18 \uc2a4\ub9c8\ud2b8\uce74\ub4dc \uc778\uc99d\uc2a4\ud0b4\u201d, \ud55c\uad6d\uc815\ubcf4\ucc98\ub9ac\ud559\ud68c \ucd98\uacc4\ud559\uc220\ub300\ud68c, 2011. 5\"><span class=\"mb-latest-item-title-text\">\uc11c\ud654\uc815, \uae40\ud638\uc6d0, \u201c\uc774\ub3d9\uc131 \uc18d\uc131\uae30\ubc18 \uc2a4\ub9c8\ud2b8\uce74\ub4dc \uc778\uc99d\uc2a4\ud0b4\u201d, \ud55c\uad6d\uc815\ubcf4\ucc98\ub9ac\ud559\ud68c \ucd98\uacc4\ud559\uc220\ub300\ud68c, 2011. 5<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=132\" title=\"\uc11c\ud654\uc815, \uae40\ud638\uc6d0, \u201c\ud6a8\uc728\uc801\uc778 \ud0c0\uc6d0\uace1\uc120 \uc54c\uace0\ub9ac\uc998 \uad6c\ud604\uc744 \uc704\ud55c \uc13c\uc11c\uc758 \ud2b9\uc131 \ubd84\uc11d\u201d, \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ub3d9\uacc4\ud559\uc220\ub300\ud68c, 2011. 2\"><span class=\"mb-latest-item-title-text\">\uc11c\ud654\uc815, \uae40\ud638\uc6d0, \u201c\ud6a8\uc728\uc801\uc778 \ud0c0\uc6d0\uace1\uc120 \uc54c\uace0\ub9ac\uc998 \uad6c\ud604\uc744 \uc704\ud55c \uc13c\uc11c\uc758 \ud2b9\uc131 \ubd84\uc11d\u201d, \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ub3d9\uacc4\ud559\uc220\ub300\ud68c, 2011. 2<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\ub0b4\ud559\ud68c&#038;vid=131\" title=\"\uae40\uc9c0\ud604, \uc11c\ud654\uc815, \uae40\ud638\uc6d0, \u201c\ubb34\uc120 \uc13c\uc11c \ub124\ud2b8\uc6cc\ud06c \ud658\uacbd\uc5d0\uc11c RSSI\uae30\ubc18 SybilAttack \ud0d0\uc9c0 \uc54c\uace0\ub9ac\uc998 \uc81c\uc548 \ubc0f \uc131\ub2a5 \ubd84\uc11d\u201d, \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ub3d9\uacc4\ud559\uc220\ub300\ud68c, 2011.2\"><span class=\"mb-latest-item-title-text\">\uae40\uc9c0\ud604, \uc11c\ud654\uc815, \uae40\ud638\uc6d0, \u201c\ubb34\uc120 \uc13c\uc11c \ub124\ud2b8\uc6cc\ud06c \ud658\uacbd\uc5d0\uc11c RSSI\uae30\ubc18 SybilAttack \ud0d0\uc9c0 \uc54c\uace0\ub9ac\uc998 \uc81c\uc548 \ubc0f \uc131\ub2a5 \ubd84\uc11d\u201d, \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ub3d9\uacc4\ud559\uc220\ub300\ud68c, 2011.2<\/span><\/a><\/td><\/tr><\/tbody><\/table><\/div><\/div><\/div><\/div>\n<\/div>\n<div class=\"clear\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>SCI 60 \ud2b9\ud5c8 66 \ud504\ub85c\uc81d\ud2b8 44 SCI \uad6d\uc81c\ud559\uc220\ub300\ud68c \uad6d\ub0b4\ub17c\ubb38 \ubc0f \uad6d\ub0b4\ud559\uc220\ub300\ud68c \ud2b9\ud5c8\uc2e4\uc801 \ud504\ub85c\uc81d\ud2b8 \uad6d\ub0b4\ub17c\ubb38 \uad6d\ub0b4\ud559\uc220\ud559\ud68c<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-sub4.php","meta":{"footnotes":""},"class_list":["post-8392","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/pages\/8392","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/comments?post=8392"}],"version-history":[{"count":11,"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/pages\/8392\/revisions"}],"predecessor-version":[{"id":8969,"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/pages\/8392\/revisions\/8969"}],"wp:attachment":[{"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/media?parent=8392"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}