{"id":44,"date":"2010-07-19T02:51:26","date_gmt":"2010-07-19T02:51:26","guid":{"rendered":"http:\/\/lbcsultan.wordpress.com\/"},"modified":"2010-07-19T02:51:26","modified_gmt":"2010-07-19T02:51:26","slug":"contribution","status":"publish","type":"page","link":"https:\/\/cris.joongbu.ac.kr\/?page_id=44","title":{"rendered":"Contribution"},"content":{"rendered":"<p><strong>\uc870\ud3d0\uacf5\uc0ac \uc0ac\ubcf4 \uc5f0\uc7ac &#8211; \uc5f0\uc911 \ud2b9\ubcc4\uae30\ud68d &#8211; IT\ub85c \uc2b9\ubd80\ud55c\ub2e4 (2002. 7.- 2007. 12.)<\/strong><\/p>\n<ul>\n<li>\uc6d4\ub4dc\ucef5\uacfc IT \ud601\uba85 (2002. 7.)<\/li>\n<li>\uc778\uc99d\uc11c &#8211; \uc815\ubcf4\ud654 \uc2dc\ub300\uc758 \uc778\uac10\ub3c4\uc7a5 (2002. 8.)<\/li>\n<li>\uc778\ud130\ub137 \uc804\uc790\ud22c\ud45c\uc640 \ucc38\uc5ec\ubbfc\uc8fc\uc8fc\uc758 (2002. 9.)<\/li>\n<li>\uc544\uc90c\ub9c8\uac00 \ubc14\uafd4\uac00\ub294 IT\uacbd\uc81c (2002. 10.)<\/li>\n<li>\uc804\uc790\uc0c1\uac70\ub798 \uc0ac\ud68c\ub97c \uc5f4\uc5b4 \uac00\ub294 \uc804\uc790\ud654\ud3d0(2002. 11.)<\/li>\n<li>\uc778\ud130\ub137\uacfc \uc138\uacc4\ud654 (2002. 12.)<\/li>\n<\/ul>\n<p><strong>Advising PhD thesis<\/strong><\/p>\n<ul>\n<li>Zeen Kim, \u201cPrivacy-Preserving Information Aggregation and Authentication in the Distributed and Mobile Networks\u201d,\u00a0KAIST, Korea (2012. 2.)<\/li>\n<li>Jangseong Kim, \u201cA Scalable Privacy-Preserving Authentication Framework for the Public Ubiquitous Computing Environments\u201d,\u00a0KAIST, Korea (2011. 5.)<\/li>\n<li>Divyan Munirathnam Konidala, \u201cSecure and Privacy-Preserving Protocols for RFID Applications\u201d, KAIST, Korea (2011. 2.)<\/li>\n<li>Kyusuk Han, \u201cAdvanced Security Schemes in Sensor Networks and Mobile Networks\u201d, KAIST, Korea (2010. 8.)<\/li>\n<li>Dang Nguyen Duc, \u201cA Study on Cryptographic Protocols for RFID Tags\u201d, KAIST, Korea (2010. 2.)<\/li>\n<li>Vo Duc Liem, \u201cA Study on Provably Secure Authentication Schemes from Bilinear Pairing\u201d, ICU, Korea (2008. 2.)<\/li>\n<li>Kun Peng, \u201cAnalysis and design of secure sealed-bid auction\u201d, ISRC, QUT, Australia (2004. 2.)<\/li>\n<li>Riza Aditya, ISRC, \u201cSecure Electronic Voting with Flexible Ballot Structure\u201d,QUT, Australia (2005. 10.)<\/li>\n<\/ul>\n<p><strong>Advising Master thesis <\/strong><\/p>\n<ul>\n<li>\uc2e0\uc2b9\ubaa9, &#8220;\ub2e4\uc911 \ub77c\ub514\uc624 \ub2e4\uc911 \ucc44\ub110 \ubb34\uc120 \uba54\uc26c \ub124\ud2b8\uc6cc\ud06c\uc5d0\uc11c\uc758 \uc548\uc804\ud55c \ucc44\ub110 \ud560\ub2f9\uc744 \uc704\ud55c \uc778\uc99d \uae30\ubc95\uc5d0 \uad00\ud55c \uc5f0\uad6c&#8221;, KAIST (2010. 2)<\/li>\n<li>\ucd5c\uc784\uc131, &#8220;\ubb34\uc120 \uc13c\uc11c \ubc0f \uc561\ud130 \ub124\ud2b8\uc6cc\ud06c\uc5d0\uc11c \uc704\uce58 \uae30\ubc18\uc758 \uc778\uc99d\ub41c \ud0a4\ud569\uc758 \uae30\ubc95\uc5d0 \uad00\ud55c \uc5f0\uad6c&#8221;, KAIST (2010. 2)<\/li>\n<li>\uc720\uba85\ud55c, &#8220;\ubb34\uc120 \uc13c\uc11c \ub124\ud2b8\uc6cc\ud06c\uc5d0\uc11c \uc548\uc804\ud55c \uc13c\uc11c \ub178\ub4dc\uc758 \ud074\ub7ec\uc2a4\ud130 \ud615\uc131 \uae30\ubc95 \uc5f0\uad6c&#8221;, KAIST (2010. 2)<\/li>\n<li>Sungbae Ji, &#8220;RFID-enabled Extensible Authentication Framework and Its Applications&#8221;, ICU, Korea (2008. 2)<\/li>\n<li>Sungjune Yoon, &#8220;A Study on Localized Multi-user Broadcast Authentication Protocol for Wireless Sensor Networks&#8221;, ICU, Korea (2008. 2)<\/li>\n<li>Youngjoon Seo, &#8220;A Study on Scalable and Untraceable Authentication Protocol of RFID Tags&#8221;, ICU, Korea (2007. 2)<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>\uc870\ud3d0\uacf5\uc0ac \uc0ac\ubcf4 \uc5f0\uc7ac &#8211; \uc5f0\uc911 \ud2b9\ubcc4\uae30\ud68d &#8211; IT\ub85c \uc2b9\ubd80\ud55c\ub2e4 (2002. 7.- 2007. 12.) \uc6d4\ub4dc\ucef5\uacfc IT \ud601\uba85 (2002. 7.) \uc778\uc99d\uc11c &#8211; \uc815\ubcf4\ud654 \uc2dc\ub300\uc758 \uc778\uac10\ub3c4\uc7a5 (2002. 8.) \uc778\ud130\ub137 \uc804\uc790\ud22c\ud45c\uc640 \ucc38\uc5ec\ubbfc\uc8fc\uc8fc\uc758 (2002. 9.) \uc544\uc90c\ub9c8\uac00 \ubc14\uafd4\uac00\ub294 IT\uacbd\uc81c (2002. 10.) \uc804\uc790\uc0c1\uac70\ub798 \uc0ac\ud68c\ub97c \uc5f4\uc5b4 \uac00\ub294 \uc804\uc790\ud654\ud3d0(2002. 11.) \uc778\ud130\ub137\uacfc \uc138\uacc4\ud654 (2002. 12.) Advising PhD thesis Zeen Kim, \u201cPrivacy-Preserving Information Aggregation and Authentication &hellip; <a href=\"https:\/\/cris.joongbu.ac.kr\/?page_id=44\" class=\"more-link\">\ub354 \ubcf4\uae30<span class=\"screen-reader-text\"> &#8220;Contribution&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"open","ping_status":"open","template":"","meta":{"footnotes":""},"class_list":["post-44","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/cris.joongbu.ac.kr\/index.php?rest_route=\/wp\/v2\/pages\/44","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cris.joongbu.ac.kr\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cris.joongbu.ac.kr\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cris.joongbu.ac.kr\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cris.joongbu.ac.kr\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=44"}],"version-history":[{"count":0,"href":"https:\/\/cris.joongbu.ac.kr\/index.php?rest_route=\/wp\/v2\/pages\/44\/revisions"}],"wp:attachment":[{"href":"https:\/\/cris.joongbu.ac.kr\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=44"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}