{"id":148,"date":"2010-07-20T04:15:06","date_gmt":"2010-07-20T04:15:06","guid":{"rendered":"http:\/\/lbcsultan.wordpress.com\/"},"modified":"2010-07-20T04:15:06","modified_gmt":"2010-07-20T04:15:06","slug":"domestic","status":"publish","type":"page","link":"https:\/\/cris.joongbu.ac.kr\/?page_id=148","title":{"rendered":"Domestic Journal"},"content":{"rendered":"<ol>\n<li>\uc774\ubcd1\ucc9c, \u201c<a href=\"http:\/\/cris.joongbu.ac.kr\/publication\/WPA-DualToken.pdf\">\uc774\uc911\ud1a0\ud070\uc744 \uc774\uc6a9\ud55c \ud6a8\uc728\uc801\uc778 Wi-Fi \ubcf4\uc548 \ud504\ub85c\ud1a0\ucf5c(Efficient Wi-Fi Security Protocol Using Dual Tokens)<\/a>\u201c, \uc815\ubcf4\ubcf4\ud638\ud559\ud68c\ub17c\ubb38\uc9c0, Vol. 29, No. 2, pages 417-429, Apr. 2019.<\/li>\n<li>\uc774\ubcd1\ucc9c, \u201c<a href=\"http:\/\/cris.joongbu.ac.kr\/publication\/RTA-kiisc2018.pdf\">OAuth 2.0 MAC \ud1a0\ud070\uc778\uc99d\uc758 \ud6a8\uc728\uc131 \uac1c\uc120\uc744 \uc704\ud55c \ubb34\uc0c1\ud0dc \ub09c\uc218\ud654\ud1a0\ud070\uc778\uc99d(Stateless Randomized Token Authentication for Performance Improvement\u00a0of OAuth 2.0 MAC Token Authentication)<\/a>\u201c,\u00a0\uc815\ubcf4\ubcf4\ud638\ud559\ud68c\ub17c\ubb38\uc9c0, Vol. 28, No. 6, pages 1343-1354, Dec. 2018.<\/li>\n<li>\uc9c0\uc6b0\uc911, \uc774\uacbd\ubb38, \uc774\ubcd1\ucc9c, \u201c<a href=\"http:\/\/cris.joongbu.ac.kr\/publication\/VAPMS-kiisc2018.pdf\">\uacf5\uacf5\uae30\uad00\u00a0\ud504\ub9b0\ud130 \uad00\ub9ac \uc2dc\uc2a4\ud15c\uc758 \ucde8\uc57d\uc810 \ubd84\uc11d (Vulnerability Analysis of Printer Management System in Public Institutions)<\/a>\u201c, \uc815\ubcf4\ubcf4\ud638\ud559\ud68c\ub17c\ubb38\uc9c0 V.28, No. 3, pages 655-663, Jun. 2018.<\/li>\n<li>\uc774\ubcd1\ucc9c, \u201c<a href=\"http:\/\/cris.joongbu.ac.kr\/publication\/CKM-KFIDO-kiisc2017.pdf\">\ubcf5\uc218 K-FIDO \uae30\uae30 \ud658\uacbd\uc5d0\uc11c\uc758 \uc778\uc99d\ud0a4 \uad00\ub9ac(Certified Key Management in Multi K-FIDO Device Environment)<\/a>\u201c, \uc815\ubcf4\ubcf4\ud638\ud559\ud68c\ub17c\ubb38\uc9c0, Vol. 27, No. 2, pages 293-303, Apr. 2017.<\/li>\n<li>\uc774\ubcd1\ucc9c, \u201c<a href=\"http:\/\/cris.joongbu.ac.kr\/publication\/TokenAuth-JOSE2017.pdf\">\uc2dc\uac04\uae30\ubc18 \ub09c\uc218\ud654\ub97c \uc774\uc6a9\ud55c \ud1a0\ud070\uc778\uc99d\uc758 \uac15\ud654(Strengthening of Token Authentication Using Time-based Randomization)<\/a>\u201c,\u00a0<a href=\"http:\/\/jse.or.kr\/insiter.php?design_file=74338.php&amp;article_num=14\">\ubcf4\uc548\uacf5\ud559\uc5f0\uad6c\ub17c\ubb38\uc9c0<\/a>, Vol. 14, No. 2, pages 103-114, 2017.<\/li>\n<li>\uc774\ubcd1\ucc9c, \u201c<a href=\"http:\/\/cris.joongbu.ac.kr\/publication\/KMS-JOSE2016.pdf\">\ud558\uc774\ube0c\ub9ac\ub4dc \uc778\uc99d\uc744 \uc704\ud55c \ud0a4\uad00\ub9ac\uc11c\ubc84 \ubaa8\ub378 (Model of Key Management Server for Hybrid Certification)<\/a>\u201c,\u00a0<a href=\"http:\/\/jse.or.kr\/insiter.php?design_file=74328.php&amp;PB_1456470531=6&amp;article_num=5\">\ubcf4\uc548\uacf5\ud559\uc5f0\uad6c\ub17c\ubb38\uc9c0<\/a>, Vol.13, No.1, pages 27-40, 2016.<\/li>\n<li>\uc774\ubcd1\ucc9c, \u201c<a href=\"http:\/\/cris.joongbu.ac.kr\/publication\/MHIBE-JOSE2015.pdf\">\ud0a4\uc5d0\uc2a4\ud06c\ub85c\ub97c \ucd5c\uc18c\ud654\ud55c \uacc4\uce35\uc801 \uc544\uc774\ub514\uae30\ubc18 \uc554\ud638 (Hierarchical ID-based Encryption with Minimized Key Escrow)<\/a>\u201c,\u00a0<a href=\"http:\/\/jse.or.kr\/insiter.php?design_file=74322.php&amp;article_num=60\">\ubcf4\uc548\uacf5\ud559\uc5f0\uad6c\ub17c\ubb38\uc9c0<\/a>, Vol. 12, No. 6, pages 545-552, 2015.<\/li>\n<li>\uc774\ubcd1\ucc9c, \u201c<a href=\"http:\/\/cris.joongbu.ac.kr\/publication\/%EC%9E%90%EC%B2%B4%ED%99%95%EC%9E%A5%EC%9D%B8%EC%A6%9D-JOSE2014.pdf\">\uc790\uccb4\ud655\uc7a5\uc778\uc99d\uacfc \ud558\ub4dc\uc6e8\uc5b4\ubcf4\uc548\ubaa8\ub4c8\uc744 \uc774\uc6a9\ud55c \ud558\uc774\ube0c\ub9ac\ub4dc \ud0a4\uad00\ub9ac<\/a>\u00a0(Hybrid Key Management Using Self-Extended Certification and Hardware Security Module)\u201d, \ubcf4\uc548\uacf5\ud559\uc5f0\uad6c\ub17c\ubb38\uc9c0, Vol.11, No.4, pages 273-286, 2014.<\/li>\n<li>\uc591\ud658\uc11d, \uc774\ubcd1\ucc9c, \uc720\uc2b9\uc7ac, \u201c<a href=\"http:\/\/cris.joongbu.ac.kr\/publication\/CIDS-2012.pdf\">\ud074\ub77c\uc6b0\ub4dc \ucef4\ud4e8\ud305 \ud658\uacbd\uc744 \uc704\ud55c \uce68\uc785\ud0d0\uc9c0\uc2dc\uc2a4\ud15c \ud2b9\uc9d5 \ubd84\uc11d<\/a>\u00a0(Study on Intrusion Detection System under Cloud Computing Environment)\u201d, \uc815\ubcf4\ubcf4\uc548\ub17c\ubb38\uc9c0, Vol 12, No 3, pages 59-65, June, 2012.<\/li>\n<li>\uc774\ubcd1\ucc9c, \u201c<a href=\"http:\/\/cris.joongbu.ac.kr\/publication\/%EB%B3%B4%EC%95%88%ED%86%A0%ED%81%B0%EA%B3%B5%EC%9D%B8%EC%9D%B8%EC%A6%9D-%EC%A0%95%EB%B3%B4%EC%B2%98%EB%A6%AC%ED%95%99%ED%9A%8C%EC%A7%802010.pdf\">\uc548\uc804\ud55c \uc804\uc790\uc0c1\uac70\ub798\ub97c \uc704\ud55c \ubcf4\uc548\ud1a0\ud070 \uae30\ubc18\uc758 \uacf5\uc778\uc778\uc99d \ubc29\uc2dd\uc5d0 \ub300\ud55c \uace0\ucc30<\/a>\u201c, \uc815\ubcf4\ucc98\ub9ac\ud559\ud68c\uc9c0 \uc81c 17\uad8c \uc81c 2\ud638, pages 95-102, 2010. 3<\/li>\n<li>\uc774\ubcd1\ucc9c, \u201c<a href=\"http:\/\/cris.joongbu.ac.kr\/publication\/%EC%A0%84%EC%9E%90%EC%84%A0%EA%B1%B0%EB%8F%84%EC%9E%85%EC%9D%84%EC%9C%84%ED%95%9C%EC%9D%B4%EC%8A%88%EB%B6%84%EC%84%9D-%EC%A0%95%EB%B3%B4%EC%B2%98%EB%A6%AC%ED%95%99%ED%9A%8C%EC%A7%802005.pdf\">\uc804\uc790\uc120\uac70 \ub3c4\uc785\uc744 \uc704\ud55c \uc774\uc288 \ubd84\uc11d<\/a>\u201c, \ud55c\uad6d\uc815\ubcf4\ucc98\ub9ac\ud559\ud68c\uc9c0 \uc804\uc790\ud22c\ud45c \ud2b9\uc9d1, 2005\ub144 7\uc6d4\ud638, pages 33-45.<\/li>\n<li><\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>\uc774\ubcd1\ucc9c, \u201c\uc774\uc911\ud1a0\ud070\uc744 \uc774\uc6a9\ud55c \ud6a8\uc728\uc801\uc778 Wi-Fi \ubcf4\uc548 \ud504\ub85c\ud1a0\ucf5c(Efficient Wi-Fi Security Protocol Using Dual Tokens)\u201c, \uc815\ubcf4\ubcf4\ud638\ud559\ud68c\ub17c\ubb38\uc9c0, Vol. 29, No. 2, pages 417-429, Apr. 2019. \uc774\ubcd1\ucc9c, \u201cOAuth 2.0 MAC \ud1a0\ud070\uc778\uc99d\uc758 \ud6a8\uc728\uc131 \uac1c\uc120\uc744 \uc704\ud55c \ubb34\uc0c1\ud0dc \ub09c\uc218\ud654\ud1a0\ud070\uc778\uc99d(Stateless Randomized Token Authentication for Performance Improvement\u00a0of OAuth 2.0 MAC Token Authentication)\u201c,\u00a0\uc815\ubcf4\ubcf4\ud638\ud559\ud68c\ub17c\ubb38\uc9c0, Vol. 28, No. 6, pages 1343-1354, Dec. 2018. \uc9c0\uc6b0\uc911, \uc774\uacbd\ubb38, \uc774\ubcd1\ucc9c, \u201c\uacf5\uacf5\uae30\uad00\u00a0\ud504\ub9b0\ud130 &hellip; <a href=\"https:\/\/cris.joongbu.ac.kr\/?page_id=148\" class=\"more-link\">\ub354 \ubcf4\uae30<span class=\"screen-reader-text\"> &#8220;Domestic Journal&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"open","ping_status":"open","template":"","meta":{"footnotes":""},"class_list":["post-148","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/cris.joongbu.ac.kr\/index.php?rest_route=\/wp\/v2\/pages\/148","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cris.joongbu.ac.kr\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cris.joongbu.ac.kr\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cris.joongbu.ac.kr\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cris.joongbu.ac.kr\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=148"}],"version-history":[{"count":0,"href":"https:\/\/cris.joongbu.ac.kr\/index.php?rest_route=\/wp\/v2\/pages\/148\/revisions"}],"wp:attachment":[{"href":"https:\/\/cris.joongbu.ac.kr\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=148"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}