{"id":475,"date":"2024-07-16T15:41:14","date_gmt":"2024-07-16T06:41:14","guid":{"rendered":"https:\/\/lbcsultan.wordpress.com\/?page_id=475"},"modified":"2024-07-16T15:41:14","modified_gmt":"2024-07-16T06:41:14","slug":"%ec%99%b8%eb%b6%80-%ea%b0%95%ec%9d%98","status":"publish","type":"page","link":"https:\/\/cris.joongbu.ac.kr\/?page_id=475","title":{"rendered":"\uc678\ubd80 \uac15\uc758"},"content":{"rendered":"\n<p><br \/><strong>\uc678\ubd80 \ud2b9\uac15 <\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><a href=\"http:\/\/cris.joongbu.ac.kr\/lecture\/RTA-v2.pdf\">\ub09c\uc218\ud654 \ud1a0\ud070\uc778\uc99d \uae30\uc220 (Randomized Token Authentication)<\/a>, \ud55c\ub0a8\ub300 \ud2b9\uac15, 2018. 6. 25<\/li>\n\n\n\n<li><a href=\"https:\/\/prezi.com\/embed\/5lmc6ps2qzty\/\">\uc77c\ubc18 \uc0ac\uc6a9\uc790\ub97c \uc704\ud55c \uc54c\uae30\uc26c\uc6b4 \uc815\ubcf4\ubcf4\ud638 \uc548\ub0b4<\/a>, APEC \uae30\ud6c4\uc13c\ud130 \uc815\ubcf4\ubcf4\ud638 \ud2b9\uac15, 2016. 6. 10<\/li>\n<\/ol>\n\n\n\n<p><strong>2012.3.5-3.7<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>\uacfc\uc815\uba85: \ud2b9\ud5c8\uccad \uc2ec\uc0ac\uad00 \uc2e0\uae30\uc220 \uad50\uc721 \u2013 \ub370\uc774\ud130\ud1b5\uc2e0<\/li>\n\n\n\n<li>\uad50\uc721\uae30\uad00: KAIST-ICC<\/li>\n\n\n\n<li>\uacfc\ubaa9:\n<ol class=\"wp-block-list\">\n<li>\u00a0\uc554\ud638\ud504\ub85c\ud1a0\ucf5c<\/li>\n\n\n\n<li>\u00a0\uc778\uc99d, \uacf5\uac1c\ud0a4\uae30\ubc18\uad6c\uc870<\/li>\n\n\n\n<li>\u00a0\uc554\ud638\uc751\uc6a9\uc11c\ube44\uc2a4<\/li>\n<\/ol>\n<\/li>\n<\/ul>\n\n\n\n<p><strong>2011.11.21-11.23<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>\uacfc\uc815\uba85: \ud2b9\ud5c8\uccad \uc2ec\uc0ac\uad00 \uc2e0\uae30\uc220 \uad50\uc721 \u2013 \uc815\ubcf4\ubcf4\uc548 \ubc0f \uc778\uc99d<\/li>\n\n\n\n<li>\uad50\uc721\uae30\uad00: KAIST-ICC<\/li>\n\n\n\n<li>\uacfc\ubaa9:\n<ol class=\"wp-block-list\">\n<li>\u00a0<a href=\"http:\/\/cris.joongbu.ac.kr\/lecture\/1-%EC%95%94%ED%98%B8%ED%94%84%EB%A1%9C%ED%86%A0%EC%BD%9C.pdf\">\uc554\ud638\ud504\ub85c\ud1a0\ucf5c<\/a><\/li>\n\n\n\n<li>\u00a0<a href=\"http:\/\/cris.joongbu.ac.kr\/lecture\/2-%EC%9D%B8%EC%A6%9D%EA%B3%B5%EA%B0%9C%ED%82%A4%EA%B8%B0%EB%B0%98%EA%B5%AC%EC%A1%B0.pdf\">\uc778\uc99d, \uacf5\uac1c\ud0a4\uae30\ubc18\uad6c\uc870<\/a><\/li>\n\n\n\n<li>\u00a0<a href=\"http:\/\/cris.joongbu.ac.kr\/lecture\/3-%EC%95%94%ED%98%B8%EC%9D%91%EC%9A%A9%EC%84%9C%EB%B9%84%EC%8A%A4.pdf\">\uc554\ud638\uc751\uc6a9<\/a><\/li>\n<\/ol>\n<\/li>\n<\/ul>\n\n\n\n<p><strong>2010.4.5-4.9<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>\uacfc\uc815\uba85: \ud2b9\ud5c8\uccad \uc2ec\uc0ac\uad00 \uc2e0\uae30\uc220 \uad50\uc721 \u2013 \uc815\ubcf4\ubcf4\ud638 \uac1c\uc694 \ubc0f \ub124\ud2b8\uc6cc\ud06c \ubcf4\uc548<\/li>\n\n\n\n<li>\uad50\uc721\uae30\uad00: KAIST-ICC<\/li>\n\n\n\n<li>\uacfc\ubaa9:\n<ol class=\"wp-block-list\">\n<li><a href=\"http:\/\/cris.joongbu.ac.kr\/lecture\/%EC%95%94%ED%98%B8%ED%95%99.pdf\">\uc554\ud638\ud559<\/a><\/li>\n<\/ol>\n<\/li>\n<\/ul>\n\n\n\n<p><strong>2008.10.13-17<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>\uacfc\uc815\uba85: \ud2b9\ud5c8\uccad \uc2ec\uc0ac\uad00 \uc2e0\uae30\uc220 \uad50\uc721 \u2013 \uc804\uc790\uc0c1\uac70\ub798\/\uc815\ubcf4\uac80\uc0c9<\/li>\n\n\n\n<li>\uad50\uc721\uae30\uad00: KAIST-ICC<\/li>\n\n\n\n<li>\uacfc\ubaa9\n<ol class=\"wp-block-list\">\n<li><a href=\"http:\/\/cris.joongbu.ac.kr\/lecture\/Lect1-%EC%A0%95%EB%B3%B4%EB%B3%B4%ED%98%B8%EC%99%80%EC%95%94%ED%98%B8.pdf\">\uc815\ubcf4\ubcf4\ud638\uc640 \uc554\ud638<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/cris.joongbu.ac.kr\/lecture\/Lect2-%EB%84%A4%ED%8A%B8%EC%9B%8C%ED%81%AC%EB%B3%B4%EC%95%88.pdf\">\ub124\ud2b8\uc6cc\ud06c\ubcf4\uc548<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/cris.joongbu.ac.kr\/lecture\/Lect3-%EC%A0%84%EC%9E%90%EC%83%81%EA%B1%B0%EB%9E%98%EB%B3%B4%EC%95%88.pdf\">\uc804\uc790\uc0c1\uac70\ub798\ubcf4\uc548<\/a><\/li>\n<\/ol>\n<\/li>\n<\/ul>\n\n\n\n<p><strong>2008.8.11-20<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>\uacfc\uc815\uba85: \ud574\uc678\uc815\ubcf4\ud1b5\uc2e0\uc804\ubb38\uac00 \ucd08\uccad\uc5f0\uc218<\/li>\n\n\n\n<li>\uad50\uc721\uae30\uad00: \ud55c\uad6d\uc815\ubcf4\ubb38\ud654\uc9c4\ud765\uc6d0<\/li>\n\n\n\n<li>\uacfc\ubaa9\n<ol class=\"wp-block-list\">\n<li><a href=\"http:\/\/cris.joongbu.ac.kr\/lecture\/System%20Network%20Security%20-%20bclee.pdf\">System Network Security<\/a><\/li>\n<\/ol>\n<\/li>\n<\/ul>\n\n\n\n<p><strong>2008.3.21<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>\uacfc\uc815\uba85: \ud574\uc678IT\uc804\ubb38\uac00 \ucd08\uccad\uc5f0\uc218<\/li>\n\n\n\n<li>\uc8fc\uad00\uae30\uad00: \ud55c\uad6d\uc815\ubcf4\ubb38\ud654\uc9c4\ud765\uc6d0<\/li>\n\n\n\n<li>\uacfc\ubaa9\n<ol class=\"wp-block-list\">\n<li><a href=\"http:\/\/cris.joongbu.ac.kr\/lecture\/Network%20Security%20-%20bclee.pdf\">Network Security<\/a><\/li>\n<\/ol>\n<\/li>\n<\/ul>\n\n\n\n<p><strong>2007.6<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>\uacfc\uc815\uba85: Introduction to Information Security<\/li>\n\n\n\n<li>\uad50\uc721\uae30\uad00: KAIST (ICU)\n<ul class=\"wp-block-list\">\n<li>\uacfc\ubaa9:\n<ol class=\"wp-block-list\">\n<li>Lecture 1:\u00a0<a href=\"http:\/\/cris.joongbu.ac.kr\/lecture\/Lect1-introduction.pdf\">Introduction &amp; Overview<\/a><\/li>\n\n\n\n<li>Lecture 2:\u00a0<a href=\"http:\/\/cris.joongbu.ac.kr\/lecture\/Lect2-classical.pdf\">Classical Ciphers<\/a><\/li>\n\n\n\n<li>Lecture 3:\u00a0<a href=\"http:\/\/cris.joongbu.ac.kr\/lecture\/Lect3-block.pdf\">Block and Stream Ciphers<\/a><\/li>\n\n\n\n<li>Lecture 4:\u00a0<a href=\"http:\/\/cris.joongbu.ac.kr\/lecture\/Lect4-hash.pdf\">Hash Functions and MAC<\/a><\/li>\n\n\n\n<li>Lecture 5:\u00a0<a href=\"http:\/\/cris.joongbu.ac.kr\/lecture\/Lect5-number.pdf\">Number Theory<\/a><\/li>\n\n\n\n<li>Lecture 6:\u00a0<a href=\"http:\/\/cris.joongbu.ac.kr\/lecture\/Lect6-pubkey.pdf\">Public Key Cryptography<\/a><\/li>\n\n\n\n<li>Lecture 7:\u00a0<a href=\"http:\/\/cris.joongbu.ac.kr\/lecture\/Lect7-netsec.pdf\">Network Security<\/a><\/li>\n\n\n\n<li>Lecture 8:\u00a0<a href=\"http:\/\/cris.joongbu.ac.kr\/lecture\/Lect8-protocol.pdf\">Cryptographic Protocols<\/a><\/li>\n\n\n\n<li>Lecture 9:\u00a0<a href=\"http:\/\/cris.joongbu.ac.kr\/lecture\/Lect9-ecommerce.pdf\">Electronic Commerce<\/a><\/li>\n<\/ol>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\uc678\ubd80 \ud2b9\uac15 2012.3.5-3.7 2011.11.21-11.23 2010.4.5-4.9 2008.10.13-17 2008.8.11-20 2008.3.21 2007.6<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-475","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/cris.joongbu.ac.kr\/index.php?rest_route=\/wp\/v2\/pages\/475","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cris.joongbu.ac.kr\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cris.joongbu.ac.kr\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cris.joongbu.ac.kr\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cris.joongbu.ac.kr\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=475"}],"version-history":[{"count":0,"href":"https:\/\/cris.joongbu.ac.kr\/index.php?rest_route=\/wp\/v2\/pages\/475\/revisions"}],"wp:attachment":[{"href":"https:\/\/cris.joongbu.ac.kr\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=475"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}