{"id":411,"date":"2024-07-16T14:50:53","date_gmt":"2024-07-16T05:50:53","guid":{"rendered":"https:\/\/lbcsultan.wordpress.com\/?page_id=411"},"modified":"2024-07-16T14:50:53","modified_gmt":"2024-07-16T05:50:53","slug":"domestic-proceeding","status":"publish","type":"page","link":"https:\/\/cris.joongbu.ac.kr\/?page_id=411","title":{"rendered":"Domestic Proceeding"},"content":{"rendered":"\n<ol class=\"wp-block-list\">\n<li>\uc774\uaddc\ubbfc, \uae40\uc900\ud604, \uc131\uc6b0\uc0c1, \uc774\uc2b9\ud6c8, \uc804\uc900\uc601, \ucd5c\ubcd1\uc900, \uc774\ubcd1\ucc9c, \u201c<a href=\"http:\/\/cris.joongbu.ac.kr\/publication\/%EB%B8%94%EB%A1%9D%EC%B2%B4%EC%9D%B8%EA%B8%B0%EB%B0%98%EC%95%88%EC%A0%84%EA%B1%B0%EB%9E%98%ED%94%8C%EB%9E%AB%ED%8F%BC-%ED%95%9C%EA%B5%AD%EC%A0%95%EB%B3%B4%EB%B3%B4%ED%98%B8%ED%95%99%ED%9A%8C%EB%8F%99%EA%B3%84%ED%95%99%EC%88%A0%EB%8C%80%ED%9A%8C2023.pdf\">\ube14\ub85d\uccb4\uc778 \uae30\ubc18 \uc548\uc804 \uac70\ub798 \ud50c\ub7ab\ud3fc<\/a>\u201c, 2023 \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ub3d9\uacc4\ud559\uc220\ub300\ud68c, 2023. 12. 2.<\/li>\n\n\n\n<li>\uc720\uc7ac\uacb8, \uae40\uc6b0\uc885, \ub0a8\uc11c\ud604, \uc11c\ubbfc\uc7ac, \uc774\ub2e4\uc601, \uc774\uc720\uacbd, \uc7a5\ud61c\uc120, \uc774\ubcd1\ucc9c, \u201c<a href=\"http:\/\/cris.joongbu.ac.kr\/publication\/%EC%95%85%EC%84%B1%EB%8F%84%EC%BB%A4%EC%9D%B4%EB%AF%B8%EC%A7%80%ED%83%90%EC%A7%80%EC%8B%9C%EC%8A%A4%ED%85%9C%EA%B5%AC%EC%B6%95-%EC%9C%B5%ED%95%A9%EB%B3%B4%EC%95%88%ED%95%99%ED%9A%8C%EC%B6%94%EA%B3%84%ED%95%99%EC%88%A0%EB%8C%80%ED%9A%8C2023.pdf\">\uc545\uc131 \ub3c4\ucee4 \uc774\ubbf8\uc9c0 \ud0d0\uc9c0 \uc2dc\uc2a4\ud15c \uad6c\ucd95<\/a>\u201c, 2023 \ud55c\uad6d\uc735\ud569\ubcf4\uc548\ud559\ud68c \ucd94\uacc4\ud559\uc220\ub300\ud68c, 2023. 11.<\/li>\n\n\n\n<li>\uc11c\uc815\uc6b0 , \uc784\ubbfc\uc131 , \uc774\ubcd1\ucc9c, \u201c\uc774\ub354\ub9ac\uc6c0 \ube14\ub85d\uccb4\uc778\uc744 \ud65c\uc6a9\ud55c \uc804\uc790\ud22c\ud45c \uc11c\ube44\uc2a4\u201d,\u00a02021 \ud55c\uad6d\uc735\ud569\ubcf4\uc548\ud559\ud68c \ud558\uacc4\ud559\uc220\ub300\ud68c \ubc0f \uc735\ud569\ubcf4\uc548 \ucea1\uc2a4\ud1a4\ub300\ud68c. 2021. 8. 20.<\/li>\n\n\n\n<li>\uc774\ud604\uc885 , \uc870\uc7ac\ud604 , \uc7a5\uc608\uc9c4 , \ucd5c\uc720\uc9c4 , \uc774\ubcd1\ucc9c, \u201c\uc548\uc804\ud55c \uacf5\uc720 \uce98\ub9b0\ub354 \uc11c\ube44\uc2a4 \uc124\uacc4 \ubc0f \uad6c\ud604\u201d,\u00a02021 \ud55c\uad6d\uc735\ud569\ubcf4\uc548\ud559\ud68c \ud558\uacc4\ud559\uc220\ub300\ud68c \ubc0f \uc735\ud569\ubcf4\uc548 \ucea1\uc2a4\ud1a4\ub300\ud68c.\u00a02021. 8. 20.<\/li>\n\n\n\n<li>\uac15\uc778\uc81c , \uc9c4\ud6a8\uc900 , \ubc15\uc21c\ud604 , \ubc15\uc885\uba85 , \uc774\ubcd1\ucc9c, \u201cQR \ucf54\ub4dc\ub97c \uc774\uc6a9\ud55c \ub2a5\ub3d9\uc801 \ucd9c\uc11d\uccb4\ud06c\u201d,\u00a02021 \ud55c\uad6d\uc735\ud569\ubcf4\uc548\ud559\ud68c \ud558\uacc4\ud559\uc220\ub300\ud68c \ubc0f \uc735\ud569\ubcf4\uc548 \ucea1\uc2a4\ud1a4\ub300\ud68c.\u00a02021. 8. 20.<\/li>\n\n\n\n<li>\uad8c\ud604\uc8fc, \uc2e0\uc138\uc601, \uc720\ud604\uc9c4, \uc774\ubcd1\ucc9c, \u201c<a href=\"http:\/\/cris.joongbu.ac.kr\/publication\/QR%EC%95%88%EC%8B%AC%ED%83%9D%EB%B0%B0%EC%84%9C%EB%B9%84%EC%8A%A4-CISC-S21.pdf\">\uc778\uc99d\uc11c\uc640 \uc804\uc790\uc11c\uba85\uc744 \uc774\uc6a9\ud558\ub294 QR\ucf54\ub4dc \uae30\ubc18 \uc548\uc2ec\ud0dd\ubc30\uc11c\ube44\uc2a4<\/a>\u201c, 2021\ub144 \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ud558\uacc4\ud559\uc220\ub300\ud68c, 2021.6.24.<\/li>\n\n\n\n<li>\uc724\uc815\ubbfc, \ubc15\uc885\ud6c8, \uad8c\ud601\ubbfc, \ub9c8\ubbfc\uae30, \uc774\ubcd1\ucc9c, \u201c<a href=\"http:\/\/cris.joongbu.ac.kr\/publication\/%EC%BD%94%EC%BD%94%EB%84%9B%ED%8E%98%EC%9D%B4-ciscw2019.pdf\">QR\ucf54\ub4dc\uc640 \ucd94\uac00\uc778\uc99d\uc11c\ub97c \uc774\uc6a9\ud558\ub294 \uac04\ud3b8\uacb0\uc81c \uc6f9\uc11c\ube44\uc2a4<\/a>\u201c,\u00a02019\ub144 \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ub3d9\uacc4\ud559\uc220\ub300\ud68c, 2019.11.30.<\/li>\n\n\n\n<li>\ud669\uc120\ud64d, \uc774\ubcd1\ucc9c, \u201c<a href=\"http:\/\/cris.joongbu.ac.kr\/publication\/%EC%9D%B4%EB%AF%B8%EC%A7%80%EB%B7%B0%EC%96%B4%EC%B7%A8%EC%95%BD%EC%A0%90-ciscw2019.pdf\">RAW \uc774\ubbf8\uc9c0 \ubdf0\uc5b4 \ucde8\uc57d\uc810 \ubd84\uc11d<\/a>\u201c, 2019\ub144 \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ub3d9\uacc4\ud559\uc220\ub300\ud68c, 2019.11.30.<\/li>\n\n\n\n<li>\uc774\uc815\ubaa8, \uc774\ubcd1\ucc9c, \u201c<a href=\"http:\/\/cris.joongbu.ac.kr\/publication\/Fuzzing-2019.pdf\">\ud558\uc774\ube0c\ub9ac\ub4dc \ud37c\uc800\ub97c \uc774\uc6a9\ud55c \ube0c\ub77c\uc6b0\uc800 \ucde8\uc57d\uc810 \ubd84\uc11d(Analysis of Browser Vulnerabilities using Hybrid Fuzzer)<\/a>\u201c, 2019\ub144 \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \uc601\ub0a8\uc9c0\ubd80\/\ucda9\uccad\uc9c0\ubd80 \uc5f0\ud569\ud559\uc220\ub300\ud68c, 2019.2.14.<\/li>\n\n\n\n<li>\uc9c0\uc6b0\uc911, \uc774\uacbd\ubb38, \uc774\ubcd1\ucc9c, \u201c<a href=\"http:\/\/cris.joongbu.ac.kr\/publication\/svpms-cisc2017.pdf\">\ud504\ub9b0\ud130 \uad00\ub9ac \uc2dc\uc2a4\ud15c\uc758 \ucde8\uc57d\uc810 \ubd84\uc11d(Security Vulnerability of Printer Management System)<\/a>\u201c, 2017\ub144\ub3c4 \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ub3d9\uacc4\ud559\uc220\ub300\ud68c, Vol. 27, No. 2, pages 265-288, 2017. 12. 9.<\/li>\n\n\n\n<li>\uc870\uc9c4\uc6b0, \uc591\ud658\uc11d, \uc774\ubcd1\ucc9c, \u201c<a href=\"http:\/\/cris.joongbu.ac.kr\/publication\/%EA%B0%80%EC%83%81%ED%82%A4%EB%B3%B4%EB%93%9C%EC%8A%A4%ED%81%AC%EB%A6%B0%ED%82%A4%EB%A1%9C%EA%B1%B0-ciscs2017.pdf\">\uac00\uc0c1\ud0a4\ubcf4\ub4dc\uc5d0 \ub300\ud55c \uc2a4\ud06c\ub9b0 \ud0a4\ub85c\uac70 \uad6c\ud604 \ubc0f \uadf8 \ub300\uc751\ubc29\uc548 (Implementation of screen key-logger for virtual keyboard and its countermeasure)<\/a>\u201c, 2017\ub144\ub3c4 \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ud558\uacc4\ud559\uc220\ub300\ud68c, 2017. 6. 22.<\/li>\n\n\n\n<li>\uc9c0\uc6b0\uc911, \uc774\uacbd\ubb38, \uc774\ubcd1\ucc9c, \u201c<a href=\"http:\/\/cris.joongbu.ac.kr\/publication\/SSL-MITM-CISC2016.pdf\">\ucde8\uc57d\ud55c HTTPS \uc778\uc99d \uc2dc\uc2a4\ud15c\uc5d0 \ub300\ud55c SSL \ud504\ub85d\uc2dc \uc911\uac04\uc790 \uacf5\uaca9(SSL Proxy MITM Attacks Against Insecure HTTPS\u00a0Authentication System)<\/a>\u201c, 2016\ub144\ub3c4 \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ub3d9\uacc4\ud559\uc220\ub300\ud68c, 2016. 12. 3.<\/li>\n\n\n\n<li>\uc774\ubcd1\ucc9c, \u201c<a href=\"http:\/\/cris.joongbu.ac.kr\/publication\/%ED%82%A4%ED%95%A9%EC%9D%98-cisc2014s.pdf\">\uc2e0\ub8b0 \ub3c4\uba54\uc778\uc774 \ub2e4\ub978 \uc0ac\uc6a9\uc790\uac04\uc758 ID\uae30\ubc18 \ud0a4\ud569\uc758 \ud504\ub85c\ud1a0\ucf5c (ID-based Key Agreement Protocol Between Users in Different Trust\u00a0Domain)<\/a>\u201c, 2014\ub144\ub3c4 \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ud558\uacc4\ud559\uc220\ub300\ud68c, 2014. 6. 26.<\/li>\n\n\n\n<li>\uae40\ub355\uacbd, \uc591\ud658\uc11d, \uc774\ubcd1\ucc9c, \u201c<a href=\"http:\/\/cris.joongbu.ac.kr\/publication\/NFC%EC%B6%9C%EC%9E%85%ED%86%B5%EC%A0%9C%EC%8B%9C%EC%8A%A4%ED%85%9C-cisc2014s.pdf\">NFC\ub97c \ud65c\uc6a9\ud55c \ucd9c\uc785 \ud1b5\uc81c \uc2dc\uc2a4\ud15c (Access Control System Using NFC)<\/a>\u201c,\u00a02014\ub144\ub3c4 \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ud558\uacc4\ud559\uc220\ub300\ud68c, 2014. 6. 26.<\/li>\n\n\n\n<li>\uc774\ubcd1\ucc9c, \u201c<a href=\"http:\/\/cris.joongbu.ac.kr\/publication\/TPM%ED%82%A4%EA%B4%80%EB%A6%AC-cisc2013.pdf\">\ud558\ub4dc\uc6e8\uc5b4 \ubcf4\uc548\ubaa8\ub4c8\uc744 \uc7a5\ucc29\ud55c \ucef4\ud4e8\ud305\uae30\uae30\uc5d0\uc11c\uc758 \uc720\ube44\ucffc\ud130\uc2a4 \ud0a4\uad00\ub9ac \ubc29\uc548<\/a>\u00a0(Ubiquitous Key Management in Computers Equipped with Hardware Security Module)\u201d, 2013\ub144\ub3c4 \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ub3d9\uacc4\ud559\uc220\ub300\ud68c, pages 12-15, 2013. 12. 6.<\/li>\n\n\n\n<li>\uc774\ubcd1\ucc9c, \u201c<a href=\"http:\/\/cris.joongbu.ac.kr\/publication\/CHS-2013.pdf\">\uc804\uc790\uc11c\uba85 \uc7a5\uae30\uac80\uc99d\uc744 \uc704\ud55c \uc778\uc99d\uc5ed\uc0ac\uc11c\ube44\uc2a4<\/a>\u00a0(Certification History Service for Long-term Signature Verification)\u201d, 2012\ub144\ub3c4 \ud55c\uad6d\ucef4\ud4e8\ud130\uc815\ubcf4\ud559\ud68c \ud558\uacc4\ud559\uc220\ub300\ud68c \ub17c\ubb38\uc9d1, \uc81c 20\uad8c 2\ud638, pages 195-197, 2012. 7. 12.<\/li>\n\n\n\n<li>\uc774\ubcd1\ucc9c, \u201c<a href=\"http:\/\/cris.joongbu.ac.kr\/publication\/LTP-2013.pdf\">\uac1c\uc778 \ub514\uc9c0\ud138 \uc720\uc0b0\uc758 \uc7a5\uae30\ubcf4\uc874 \ubc29\uc548<\/a>\u00a0(Long-term Preservation of Private Digital Heritage)\u201d, 2012\ub144\ub3c4 \ud55c\uad6d\ucef4\ud4e8\ud130\uc815\ubcf4\ud559\ud68c \ud558\uacc4\ud559\uc220\ub300\ud68c \ub17c\ubb38\uc9d1, \uc81c 20\uad8c 2\ud638,\u00a0pages 107-109,\u00a0\u00a02012. 7. 12.<\/li>\n\n\n\n<li>\uc774\ubcd1\ucc9c, \uae40\uc131\ud658, \uad8c\uc131\ud0dc, \uae40\uad11\uc870, \u201c<a href=\"http:\/\/cris.joongbu.ac.kr\/publication\/%EC%A7%81%EC%A0%91%EA%B4%91%EA%B3%A0%EC%8B%9C%EC%8A%A4%ED%85%9C-CISCW2007.pdf\">\uad11\uace0\uc8fc\uc758 \uc9c1\uc811\uad11\uace0\uac00 \uac00\ub2a5\ud55c \uc0c8\ub85c\uc6b4 \uc6f9\uc11c\ube44\uc2a4 \uae30\uc220<\/a>\u00a0(A New Web Service with Direct Advertisement by Advertiser)\u201d, 2007\ub144 \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ub3d9\uacc4\ud559\uc220\ub300\ud68c(CISC-W2007), pages 685-690, \uc0c1\uba85\ub300\ud559\uad50, Dec. 1, 2007.<\/li>\n\n\n\n<li>\uc774\ubcd1\ucc9c, \uc591\uc815\ubaa8, \uc720\uc2b9\uc7ac, \u201c<a href=\"http:\/\/cris.joongbu.ac.kr\/publication\/ski-CISCS2005.pdf\">ID\uae30\ubc18 \uc554\ud638\uc2dc\uc2a4\ud15c\uc5d0\uc11c\uc758 \uc548\uc804\ud55c \ud0a4\uc0dd\uc131 \ud504\ub85c\ud1a0\ucf5c<\/a>\u00a0(Secure Key Issuing Protocol in ID-based Cryptography)\u201d, 2005\ub144 \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ud558\uacc4\ud559\uc220\ub300\ud68c(CISC S\u201905), pages 111-115, \uc870\uc120\ub300\ud559\uad50, June 3-4, 2005. (presentation)<\/li>\n\n\n\n<li>\uae40\ud658\uad6c, \ubc15\ubd09\uc8fc, \ud558\uc7ac\ucca0, \ubc15\ub3d9\uad6d, \uc774\ubcd1\ucc9c, \ub9ac\ud64d\ud654, \u201c\ub2e4\uc911 \uacc4\uce35 \ud0a4 \uad00\ub9ac \ubb38\uc81c\uc758 \uc554\ud638\ud559\uc801 \ud574\ubc95\u201d, 2005\ub144 \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \ud558\uacc4\ud559\uc220\ub300\ud68c(CISC S\u201905), pages 95-98, \uc870\uc120\ub300\ud559\uad50, June 3-4, 2005.<\/li>\n\n\n\n<li>\uc774\ubcd1\ucc9c, \u201c<a href=\"http:\/\/cris.joongbu.ac.kr\/publication\/%EA%B5%90%EA%B3%BC%EA%B3%BC%EC%A0%95%EC%82%AC%EB%A1%80%EB%B6%84%EC%84%9D-WISE2002.pdf\">KAIST\uc758 \ubd80\uc804\uacf5 \ubc0f \uc5f0\uacc4\uc804\uacf5 \uc804\uacf5\uc790\ub97c \uc704\ud55c \uad50\uacfc\uacfc\uc815 \uc0ac\ub840\ubd84\uc11d<\/a>\u201c, \uc815\ubcf4\ubcf4\ud638\uad50\uc721\uc6cc\ud06c\uc0f5 (WISE2002), pages 73-76, Jun. 28, 2002, \ub2e8\uad6d\ub300\ud559\uad50, \uc11c\uc6b8. (presentation)<\/li>\n\n\n\n<li>\uae40\uc9c4\ud638, \uae40\uad11\uc870, \uc774\ubcd1\ucc9c, \u201c<a href=\"http:\/\/cris.joongbu.ac.kr\/publication\/cisc2001_kman_2.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Applying PKI for Internet Voting System<\/a>\u201c, 2001\ub144\ub3c4 \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \uc885\ud569\ud559\uc220 \ubc1c\ud45c\ub300\ud68c, pp.318-321, 2001.11.24, \uc11c\uc6b8\ub300, \ud55c\uad6d.<\/li>\n\n\n\n<li>\uc774\ubcd1\ucc9c, \uae40\uad11\uc870, \u201c<a href=\"http:\/\/cris.joongbu.ac.kr\/publication\/%EC%A0%84%EC%9E%90%EC%A4%91%EB%A7%A4-%EC%A0%95%EB%B3%B4%EC%B2%98%EB%A6%AC%ED%95%99%ED%9A%8C2000.pdf\">\uc548\uc804\ud55c \uc804\uc790\uc911\ub9e4 \ud504\ub85c\ud1a0\ucf5c (Secure Match-Making Protocol)<\/a>\u201c, 2000 \ud55c\uad6d\uc815\ubcf4\ucc98\ub9ac\ud559\ud68c (KIPS) \ucd94\uacc4 \ud559\uc220\ubc1c\ud45c \ub17c\ubb38\uc9d1, Vol 7, No 2, pp781~784. ICU, Oct. 13~14, 2000. (presentation)<\/li>\n\n\n\n<li>\uc774\ubcd1\ucc9c, \ubc31\uc900\uc0c1, \uc11c\ubb38\uc11d, \ud5c8\uc6d0\uadfc, \uae40\uad11\uc870, \u201c<a href=\"http:\/\/cris.joongbu.ac.kr\/publication\/%ED%9A%A8%EC%9C%A8%EC%A0%81%EC%9D%B8%EC%A6%9D%ED%8A%B8%EB%A6%AC-%EC%B6%A9%EC%B2%AD%EC%A7%80%EB%B6%802000.pdf\">PKI\uc5d0\uc11c \uc778\uc99d\ud2b8\ub9ac \uac80\uc99d\uc758 \ud6a8\uc728\uc131 \ud5a5\uc0c1 \uae30\ubc95 (Efficient Verification of Certification Tree in PKI)<\/a>\u201d, KIISC \ucda9\uccad\uc9c0\ubd80 2000\ub144 \uc815\ubcf4\ubcf4\ud638\ud559\uc220\ub17c\ubb38\ubc1c\ud45c\ud68c, pp.255-261, \uc21c\ucc9c\ud5a5\ub300\ud559\uad50, Nov. 3~4, 2000. (presentation)<\/li>\n\n\n\n<li>\uc774\ubcd1\ucc9c, \uae40\uad11\uc870, \u201c<a href=\"http:\/\/cris.joongbu.ac.kr\/publication\/selfcert-CISC2000.pdf\">Self-Certificate: PKI using Self-Certified Key<\/a>\u201d, KIISC \uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c (CISC2000), \uc885\ud569 \ud559\uc220\ubc1c\ud45c \ub17c\ubb38\uc9d1, Vol. 10, No. 1, pp. 65-73, \uc131\uade0\uad00\ub300\ud559\uad50, Nov. 25, 2000. (in English) (presentation)<\/li>\n\n\n\n<li>\uae40\ud76c\uc120, \ubc31\uc900\uc0c1, \uc774\ubcd1\ucc9c, \uae40\uad11\uc870, \u201c<a href=\"http:\/\/cris.joongbu.ac.kr\/publication\/one-time-proxy-CISC2000.ps\">\ub300\ub9ac\uc11c\uba85\uc744 \uc774\uc6a9\ud55c \ubaa8\ubc14\uc77c \uc5d0\uc774\uc804\ud2b8\uc758 \uc548\uc804\uc131 \uac15\ud654 \ubc29\ubc95 (Enhancing Security of Mobile Agent using Proxy Signature)<\/a>\u201d, KIISC \uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c (CISC2000), \uc885\ud569 \ud559\uc220\ubc1c\ud45c \ub17c\ubb38\uc9d1, Vol. 10, No. 1, pp. 424-437, \uc131\uade0\uad00\ub300\ud559\uad50, Nov. 25, 2000.<\/li>\n\n\n\n<li>\uc774\ubcd1\ucc9c,\uae40\uad11\uc870, \u201c<a href=\"http:\/\/cris.joongbu.ac.kr\/publication\/%EC%82%AC%EC%9A%A9%EC%9E%90%EC%9C%84%EC%A3%BC-CISC99.pdf\">\uc0ac\uc6a9\uc790 \uc704\uc8fc\uc758 \uc0c8\ub85c\uc6b4 \uacf5\uac1c\ud0a4 \uae30\ubc18 \uad6c\uc870 \uc81c\uc548 (A Proposal for User-oriented Public Key Infrastructure)<\/a>\u201d, KIISC \uc885\ud569\ud559\uc220 \ubc1c\ud45c\ud68c \ub17c\ubb38\uc9d1 (CISC\u201999), Vol.9, No.1, pp.47-59, Nov. 6. 1999. (presentation)<\/li>\n\n\n\n<li>\uc11c\ubb38\uc11d,\uc774\ubcd1\ucc9c,\ubc31\uc900\uc0c1,\uae40\uad11\uc870,\uae40\uc0c1\uc815,\uc774\uacbd\uad6c, \u201c<a href=\"http:\/\/cris.joongbu.ac.kr\/publication\/%EB%B6%80%EC%9D%B8%EB%B0%A9%EC%A7%80%ED%91%9C%EC%A4%80-CISC99.pdf\">\ubd80\uc778 \ubc29\uc9c0 \ud45c\uc900 \uba54\ucee4\ub2c8\uc998\uc758 \ubd84\uc11d (On the Standard Mechanism for Non-repudiation Services)<\/a>\u201d, KIISC \uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c \ub17c\ubb38\uc9d1 (CISC\u201999), Vol.9, No.1, pp.228-240, Nov. 6. 1999. (presentation)<\/li>\n\n\n\n<li>\uc774\ubcd1\ucc9c, \uc784\uc2e0\uc601(ETRI), \uae40\uad11\uc870, \u201c<a href=\"http:\/\/cris.joongbu.ac.kr\/publication\/%EC%86%8C%ED%94%84%ED%8A%B8%EC%9B%A8%EC%96%B4%EC%A0%80%EC%9E%91%EA%B6%8C%EB%B3%B4%ED%98%B8-CISC98.pdf\">\uacf5\uac1c\ud0a4 \uae30\ubc18\uad6c\uc870\ub97c \uc774\uc6a9\ud55c \uc18c\ud504\ud2b8\uc6e8\uc5b4\uc758 \uc800\uc791\uad8c \ubcf4\ud638 (Copyright Protection of Software using Public Key Infrastructure)<\/a>\u201d, CISC\u201998, pages 33-48, Dec. 18-19, 1998. (presentation)<\/li>\n\n\n\n<li>\uc784\uc2e0\uc601(ETRI), \uc774\ubcd1\ucc9c(ICU), \ud568\ud638\uc0c1, \ubc15\uc0c1\ubd09(ETRI), \u201c\uc778\ud2b8\ub77c\ub137\uc6a9 \ud0a4 \ubcf5\uad6c \uc815\ucc45 \ubc0f \uc2dc\uc2a4\ud15c \uc124\uacc4 (Design of Key Recovery System for Intranet)\u201d, CISC\u201998, pages 151-165, Dec. 18-19, 1998.<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-411","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/cris.joongbu.ac.kr\/index.php?rest_route=\/wp\/v2\/pages\/411","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cris.joongbu.ac.kr\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cris.joongbu.ac.kr\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cris.joongbu.ac.kr\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cris.joongbu.ac.kr\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=411"}],"version-history":[{"count":0,"href":"https:\/\/cris.joongbu.ac.kr\/index.php?rest_route=\/wp\/v2\/pages\/411\/revisions"}],"wp:attachment":[{"href":"https:\/\/cris.joongbu.ac.kr\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=411"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}