International Conference

  • [C78] Ahn Sung Kyu*, Jung Hyelim, Ki-Woong Park “Framework for Analyzing Abnormal Behavior of Real Drones through Simulation Parallelization”, The 6th International Symposium on Mobile Internet Security (MobiSec 2022), Dec. 15-17, 2022 (ISSN: 1598-3978), In Press , supported by [PJ30][PJ35][PJ36] PDF
  • [C77] Hye Lim Jung*, Ki-Woong Park “ReplayFuzzer: IoT attack replay analysis platform based on IoT virtualization”, The 6th International Symposium on Mobile Internet Security (MobiSec 2022), Dec. 15-17, 2022 (ISSN: 1598-3978), In Press , supported by [PJ29][PJ35][PJ36][PJ37] PDF
  • [C76] Sang-Hoon Choi*, Seong-Jin Kim, Hanjin Park, Ki-Woong Park “Application Hibernation Framework with Dynamic Throttling of Resources”, The 6th International Symposium on Mobile Internet Security (MobiSec 2022), Dec. 15-17, 2022 (ISSN: 1598-3978), In Press , supported by [PJ30][PJ35][PJ36][PJ37] PDF
  • [C75] Yeo-Reum Jo*,Ki-Woong Park “A Study on the VMI-based Kernel Runtime Protection System for Virtual Machine in Cloud Environment”, The 6th International Symposium on Mobile Internet Security (MobiSec 2022), Dec. 15-17, 2022 (ISSN: 1598-3978), In Press , supported by [PJ30][PJ35][PJ36][PJ37] PDF
  • [C74] Se-Han Lee*, Ki-Woong Park “Derivation of Blueprint for an IoT Device Protection Design through Analysis of MTD Research”, The 8th International Conference on Next Generation Computing 2022 (ICNGC 2022), pp. 312-315, Oct 6-8, 2022, Jeju, Korea , supported by [PJ35][PJ36] PDF
  • [C73] Se-Han Lee*, Ahn Sung-Kyu*, Ki-Woong Park, “Auto-HRS: An Automated System Design for a Secure Home Router Environment”, The 7th International Conference on Next Generation Computing 2021 (ICNGC 2021), pp. 225-227, Nov 4 – 6, 2021, Jeju, Korea , supported by [PJ29][PJ30] PDF
  • [C72] Hye Lim Jung*, Ahn Sung-Kyu*, Ki-Woong Park, “Time Internal Side-Channel for Authentication in an IoT Environment”, The 7th International Conference on Next Generation Computing 2021 (ICNGC 2021), pp. 103-104, Nov 4 – 6, 2021, Jeju, Korea , supported by [PJ29][PJ30] PDF
  • [C71] Ahn Sung-Kyu*, Ji-Won Kang, Ki-Woong Park, “POSTER: Toward Hourglass-Concepted Memory Data Leakage protection with Capacitor-Based Timer”, The 5th International Symposium on Mobile Internet Security 2021 (MobiSec 2021), Oct 7 – 9, 2021, Jeju, Korea , supported by [PJ29][PJ30] PDF
  • [C70] Hye Lim Jung*, Gi-Choel Choi*, Ki-Woong Park, “MemTwin Consecutive Memory-Recording enhanced with FPGA for IoT Memory Inspection”, The 5th International Symposium on Mobile Internet Security 2021 (MobiSec 2021), Oct 7 – 9, 2021, Jeju, Korea , supported by [PJ29][PJ30] PDF
  • [C69] Jae-Kyung Ju *, Ki-Woong Park, “Deign of Exploit-Helper for Penetrating into a Black-Box System”, The 22nd World Conference on Information Security Applications 2021 (WISA 2021), pp.30-33, Aug. 11 – 13, 2021, Jeju, Korea , supported by [PJ29][PJ30] PDF
  • [C68] Hye-Lim Jung *,Sung-Kyu Ahn, Ki-Cheol Choi, Jae-Kyung Ju, Ki-Woong Park, “Neutralizing Side-Channel Attacks Through Hardware Uniqueness Derivation “, The 6th International Conference on Next Generation Computing 2020 (ICNGC 2020), pp.312-314, Dec. 17 – 19, 2020, Busan, Korea , supported by [PJ25][PJ30] PDF
  • [C67] Sang-Hoon Choi *, Ki-Woong Park, “Timeline-Based Container Restore via a Computationally Efficient Snapshot “, The 6th International Conference on Next Generation Computing 2020 (ICNGC 2020), pp.277-279, Dec. 17 – 19, 2020, Busan, Korea , supported by [PJ25][PJ30] PDF
  • [C66] Namjun Kim*, Chanmo Yang*, Daebeom Cho, Seung Hyeon Geum, Ki-Woong Park, “CERT Training Platform over the Event-Recordable Container “, 2020 ACM International Conference on Intelligent Computing and its Emerging Applications (ACM ICEA 2020), Dec. 12 – 15, 2020, GangWon, Korea , supported by [PJ25][PJ30] PDF
  • [C65] Ki-Wan Kang*, Ki-Woong Park, “Toward Software-Defined Moving Target Defense for Secure Service Deployment Enhanced with a User-Defined Orchestration “, 2020 ACM International Conference on Intelligent Computing and its Emerging Applications (ACM ICEA 2020), Dec. 12 – 15, 2020, GangWon, Korea , supported by [PJ25][PJ29][PJ30] PDF
  • [C64] Seong-Jin Kim*, Ki-Woong Park, “Blueprint for a secure container to protect data in edge cloud computing environment”, 2020 ACM International Conference on Intelligent Computing and its Emerging Applications (ACM ICEA 2020), Dec. 12 – 15, 2020, GangWon, Korea , supported by [PJ25][PJ30] PDF
  • [C63] Sung-Kyung Kim*, Eun-Tae Jang, Seung-Ho Lim, Ki-Woong Park, “Reduction of Data Leakage Using Software Streaming”, Mobile Internet Security. MobiSec 2019. Communications in Computer and Information Science Springer(ISBN 978-981-15-9608-7), vol 1121 , Springer Singapore, pp. 99-111, Nov. 02, 2020 , supported by [PJ25][PJ30] PDF
  • [C62] Sung-Kyung Kim*, Eun-Tae Jang, Ki-Woong Park “Toward a Fine-Grained Evaluation of The Pwnable CTF: Extracting Common Assessment Points,” The 21th World Conference on Information Security Applications (WISA 2020), pp.179 – 190, Aug. 26 – 28, 2020, Jeju, Korea , supported by [PJ25][PJ28]   PDF
  • [C61] Sung-Kuy Ahn*, HyeLim Jung, Sung-Kyung Kim, Ki-Woong Park “Poster: Self-Destructible Electronic Bracelets for Privacy in Quarantine Monotoring System ,” The 21th World Conference on Information Security Applications (WISA 2020), pp.59, Aug. 26 – 28, 2020, Jeju, Korea , “Best Poster Gold Award”   PDF
  • [C60] Hyun Kwon*, Hyunsoo Yoon, Jungmin Roh, Ki-Woong Park “TargetNet Backdoor: Attack on Deep Neural Network with Use of Different Triggers,” 5th International Conference on Intelligent Information Technology (ACM ICIIT 2020), Hanoi, Vietnam, Feb. 19-22, 2020 , supported by [PJ19][PJ25][PJ29]  PDF
  • [C59] Hyun Kwon*, Hyunsoo Yoon, Ki-Woong Park “AvoidNet Backdoor: Misclassification with Certain Avoided Classes on Deep Neural Network,” The 5th International Conference on Next Generation Computing 2019 (ICNGC 2019), ISSN 2672-1562, pp.65-68, Dec. 19-21, 2020, Chiang Mai, Thailand , supported by [PJ19][PJ25][PJ29]  PDF
  • [C58] Byeong-Yong Yi*, Sang-Hoon Choi, Ki-Woong Park “”Resource Usage Monitoring in Cloud Environment: Approach via Linux Kernel Module,” The 5th International Conference on Next Generation Computing 2019 (ICNGC 2019), ISSN 2672-1562, pp.272-274, Dec. 19-21, 2020, Chiang Mai, Thailand , supported by [PJ19][PJ25][PJ28]  PDF
  • [C57] Ki-Wan Kang*, SungKyung Kim, Ki-Woong Park “”Requirements Derivation of Testbed of UAV Anomaly Detection,” The 5th International Conference on Next Generation Computing 2019 (ICNGC 2019), ISSN 2672-1562, pp.151-153, Dec. 19-21, 2020, Chiang Mai, Thailand , supported by [PJ29]  PDF
  • [C56] Hyun Kwon*, Hyunsoo Yoon, Ki-Woong Park“POSTER: Detecting Audio Adversarial Example through Audio Modification,” The 26th ACM Conference on Computer and Communications (ACM CCS 2019), Nov. 11 – 15, 2019, London, United Kingdom, supported by [PJ19][PJ25]  PDF LINK
  • [C55] Hyun Kwon*, Hyunsoo Yoon, Ki-Woong Park“FriendNet Backdoor: Indentifying Backdoor Attack that is safe for Friendly Deep Neural Network,” The 3rd ACM International Conference on Software Engineering and Information Management (ACM ICSIM 2020), Jan. 12 – 15, 2020, Sydney, Austrailia, supported by [PJ19][PJ25][PJ29]  PDF LINK
  • [C54] Hye Lim Jeong*, Sungkyu Ahn, Sung Hoon Baek, Ki-Woong Park“Computationless Abnormal Data-Flow Detection based on Microcurrent Measurement,” The 4th International Symposium on Mobile Internet Security (MobiSec 2019), Oct.17 – Oct. 19, 2019, Taichung, Taiwan, pp. 75, supported by [PJ19][PJ25][PJ29]  PDF LINK
  • [C53] Keon-Ho Park*, Ki-Woong Park“LEGO-NETBOOT: Scalable TFTP Network-Booting Enhanced with a Deduplication of Boot-Packet,” The 4th International Symposium on Mobile Internet Security (MobiSec 2019), Oct.17 – Oct. 19, 2019, Taichung, Taiwan, pp. 68, supported by [PJ19][PJ29]  PDF LINK
  • [C52] Sung-Kyung Kim*, Eun-Tae Jang, Seung-Ho Lim, Ki-Woong Park“Towards Disposable Computing: Could You Throw Away Your Device?,” The 4th International Symposium on Mobile Internet Security (MobiSec 2019), Oct.17 – Oct. 19, 2019, Taichung, Taiwan, pp. 68, supported by [PJ19][PJ29]  PDF LINK
  • [C51] Hyun Kwon*, Hyunsoo Yoon, Ki-Woong Park“CAPTCHA Image Generation using Style Transfer Learning in Deep Neural Network,” The 20th World Conference on Information Security Applications (WISA 2019), pp.251-262, Aug. 21 – 24, 2019, Jeju, Korea, supported by [PJ19][PJ25][PJ29]  PDF LINK
  • [C50] Hyun Kwon*, Hyunsoo Yoon, Ki-Woong Park“Selective Poisoning Attack on Deep Neural Network to Induce Fine-Grained Recognition Error,” The IEEE International Conference on Artificial Intelligence and Knowledge Engineering (AIKE), pp.136-139, Jun. 5 – 7, 2019, Cagliari, Italy, supported by [PJ19][PJ25][PJ29]  PDF LINK
  • [C49] Hyun Kwon*, Ohmin Kwon, Hyunsoo Yoon, Ki-Woong Park“Face Friend-Safe Adversarial Example on Face Recognition System,” The 11st IEEE International Conference on Ubiquitous and Future Networks (ICUFN),pp.547-551, Jul. 2 – 5, 2019, Split, Croatia, supported by [PJ19][PJ25]  PDF LINK
  • [C48] Seung-Ho Lim*, Ki-Woong Park, Kwangho Cha“Developing an OpenSHMEM model over a Switchless PCIe Non-Transparent Bridge Interface,” The 33rd IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPS-2019),pp.593-602, May. 20 – 24, 2019, Rio de Janeiro, supported by [PJ19]  PDF LINK
  • [C47] Yangjae Lee*, Keon-Ho Park, Daeseon Choi, Ki-Woong Park“Sharing Experience and Knowledge: How to verify Secure Boot against Modify Attack,” The 4th International Conference on Next Generation Computing (ICNGC-2018), Dec. 20 – 22, 2018, Vietnam, supported by [PJ19][PJ20]  PDF
  • [C46] Jun-Gyu Park*, Sang-Hoon Choi, Hyun-il Kim, Dowon Hong, Ki-Woong Park“Our Experiences on the Design, Build and Run of CTF,” The 4th International Conference on Next Generation Computing (ICNGC-2018), Dec. 20 – 22, 2018, Vietnam, supported by [PJ20][PJ25]  PDF
  • [C45] Sieun Kim*, Dowon Hong, Ki-Woong Park“Secure Disposable Computing Technology for Low-end Embedded Devices,” The 4th International Conference on Next Generation Computing (ICNGC-2018), Dec. 20 – 22, 2018, Vietnam, supported by [PJ19][PJ20]  PDF
  • [C44] Woojin Jeon*, Daeseon Choi, Ki-Woong Park“Applying Time-Lapse Concepts onto Storage System for Long-Term System Trace Analysis: Technical Challenges and Blueprints,” IEEE AIKE 2018 – AI Bigdata Cloud Technologies Workshop (IEEE Workshop ABC 2018), Sep.26-Sep.28, 2018, Laguna Hills, California, USA, supported by [PJ19][PJ20][PJ25]  PDF
  • [C43] Sieun Kim*, Taek-Young Youn, Daeseon Choi, Ki-Woong Park“Securely Controllable and Trustworthy Remote Erasure on Embedded Computing System for Unmanned Aerial Vehicle,” The 3rd International Symposium on Mobile Internet Security (MobiSec’18), Aug. 29-Sep. 1, 2018, Cebu, Philippines, Article No. 8, pp. 1-9“The Best Paper Award”, , supported by [PJ19][PJ20][PJ25]  PDF
  • [C42] Taek-Young Youn*, Ki-Woong Park, and Joongheon Kim“Dynamic Replication for Secure Mobile Caching: A Control Theoretic Approach,” The 3rd International Symposium on Mobile Internet Security (MobiSec’18), Aug. 29-Sep. 1, 2018, Cebu, Philippines, Article No. 16, pp. 1-9 PDF
  • [C41] Yangjae Lee*, Dongmin Yang, Taek-Young Youn, and Ki-Woong Park“Authorized Wireless Charging System based on Double-Frequency-Hopping for Mobile Devices,” The 3rd International Symposium on Mobile Internet Security (MobiSec’18), Aug. 29-Sep. 1, 2018, Cebu, Philippines, Article No. 9, pp. 1-12, supported by [PJ19][PJ20][PJ25]  PDF
  • [C40] Sang-Hoon Choi*, Daeseon Choi, and Ki-Woong Park“Usability of Docker-based Container System Health Monitoring by Memory Dump Visualization,” The 3rd International Conference on Next Generation Computing (ICNGC) 2017b, Dec. 21 – 24, 2017, Kaohsiung, Taiwan, supported by [PJ19][PJ20]  PDF
  • [C39] Woo-Jin Jeon*, Sang-Hoon Choi, and Ki-Woong Park“Detecting Ransomware with File System-Awareness Scheme in Cloud Computing Environment,” The 3rd International Conference on Next Generation Computing (ICNGC) 2017b, Dec. 21 – 24, 2017, Kaohsiung, Taiwan, supported by [PJ19]  PDF
  • [C38] Keon-Ho Park*, Sang-Hoon Choi, Chul-Woo Kim, and Ki-Woong Park“Usability of Software Weakness Discovery based on the Binary File Visualization,” The 3rd International Conference on Next Generation Computing (ICNGC) 2017b, Dec. 21 – 24, 2017, Kaohsiung, Taiwan, supported by [PJ19]  PDF
  • [C37] Young Jun Lee*, Sang-Hoon Choi, Chul-Woo Kim, Seung-Ho Lim, and Ki-Woong Park“Learning Binary Code with Deep Learning to Detect Software Weakness,” KSII The 9th International Conference on Internet (ICONI) 2017 Symposium, Dec. 17 – 20, 2017, Vientiane, Laos, supported by [PJ19][PJ20]  PDF LINK
  • [C36] Sang-Hoon Choi*, Woomin Hwang, and Ki-Woong Park“Towards Software-Defined Malware Analysis with a Deep Introspection,” The 9th International Conference on Future Computational Technologies and Applications, Poster Session, Feb. 19 – 23, 2017, Athens, Greece, supported by [PJ16][PJ20]  PDF LINK
  • [C35] Hye-Lim Jeong*, Sung-Kyu Ahn, Mun Sung Kim, and Ki-Woong Park“Design and Implementation of TPM-Enhanced Privacy Protection System,” 2nd International Conference on Next Generation Computing 2017, Jan. 2017, Excellent Paper Award, supported by [PJ16][PJ20]  PDF
  • [C34] Yu-Seong Kim*, Sang-Hoon Choi, and Ki-Woong Park“Customizing Cuckoo Sandbox for Malware with Tricky Execution Conditions,” 2nd International Conference on Next Generation Computing 2017, Jan. 2017, supported by [PJ16][PJ20]  PDF
  • [C33] Sang-Hoon Choi*, Sung-Kyu Ahn, Dongmin Yang, and Ki-Woong Park“Secret-Stamp: Document Leakage Prevention via Steganographic Marking ,” 2nd International Conference on Next Generation Computing 2017, Jan. 2017, supported by [PJ16]  PDF
  • [C32] Hye-Lim Jeong*, and Ki-Woong Park“A Synchronized Virtual Link File based on User-friendly Interface for Privacy Protection,” 6th International Conference on Convergence Technology(ICCT 2016), Jun. 2016, supported by [PJ16]  PDF
  • [C31] Sang-Hoon Choi*, Yu-Seong Kim, and Ki-Woong Park“Toward Semantic Gap-less Memory Dump for Malware Analysis,” International Conference on Next Generation Computing 2016, Jan. 2016, supported by [PJ16]  PDF
  • [C30] Hye-Lim Jeong*, Sung-Kyu Ahn, Chang-Hoon Lee, and Ki-Woong Park“Data Management System based on Privacy Aware File Virtualization,” International Conference on Next Generation Computing 2016, Jan. 2016, supported by [PJ16]  PDF
  • [C29] Chulmin Kim*, Ki-Woong Park, Kyu Ho Park“GHOST: GPGPU-Offloaded High Performance Storage I/O Deduplication for Primary Storage System,” Proceedings of the 2012 IEEE International Workshop on Programming Models and Applications for Multicores and Manycores, pp.17-26, Feb. 2012, supported by [PJ4]  PDF LINK
  • [C28] Kyu Ho Park*, Sung-Kyu Park, Hyunchul Seok, Woomin Hwang, Dong-Jae Shin, Jong Hun Choi, and Ki-Woong Park“Efficient Memory Management of a Hierarchical and a Hybrid Main Memory for MN-MATE Platform,” Proceedings of the 2012 IEEE International Workshop on Programming Models and Applications for Multicores and Manycores, pp.83-92, Feb. 2012, supported by [PJ4]  PDF LINK
  • [C27] Woomin Hwang*, Ki-Woong Park, and Kyu Ho Park“MN-GEMS: A Timing-aware Simulator for a Cloud Node with Manycore, DRAM, and Non-Volatile Memories,” 4th IEEE International Conference on Cloud Computing, Jul. 2011, supported by [PJ4]  PDF LINK
  • [C26] Jong Hun Choi*, Ki-Woong Park, Sung-Kyu Park, and Kyu Ho Park“Multimedia Matching as a Service: Technical Challenges and Blueprints,” , supported by [PJ4]26th International Technical Conference on Circuits/Systems, Computers and Communications, Jun. 2011 PDF
  • [C25] Woong Choi*, Ki-Woong Park, and Kyu Ho Park“SCOUT: Data Center Monitoring System with Multiple Mobile Robots,” 7th IEEE International Conference on Networked Computing and Advanced Information Management, Jun. 2011, supported by [PJ5]  PDF LINK
  • [C24] Chulmin Kim*, Ki-Woong Park, KyoungSoo Park, and Kyu Ho Park“Rethinking Deduplication in Cloud: From Data Profiling to Blueprint,” 7th IEEE International Conference on Networked Computing and Advanced Information Management, Jun. 2011, supported by [PJ5]  PDF LINK
  • [C23] Ki-Woong Park*, Chulmin Kim, and Kyu Ho Park“BLAST: Applying Streaming Ciphers into Outsourced Cloud Storage,” IEEE International Conference on Parallel and Distributed Systems, Dec. 2010, supported by [PJ5]  PDF LINK
  • [C22] Ki-Woong Park*, Woomin Hwang, and Kyu Ho Park“FalconEye: Data Center Status Extraction using Vision-Transformation Techniques,” IEEE COMPSAC 2010-CloudApp, supported by [PJ5]  PDF LINK
  • [C21] Ki-Woong Park*, Sung-Kyu Park, and Kyu Ho Park“THEMIS: Towards mutual-verifiable billing transaction for cloud computing environment,” IEEE International Conference on CLOUD 2010, supported by [PJ5]  PDF LINK
  • [C20] Woomin Hwang*, Yangwoo Roh, Youngwoo Park, Ki-Woong Park, and Kyu Ho Park“HyperDealer: Reference-pattern-aware instant memory balancing for Consolidated Virtual Machines,” IEEE International Conference on CLOUD 2010 Industry Track, supported by [PJ4]  PDF LINK
  • [C19] Ki-Woong Park*, Byung-Cheol Kim, Jong-Woon Yoo, and Kyu Ho Park“Enabling Sportive Games with a Do-It-Yourself Wearable Computing Platform,” IEEE Game Innovation Conference 2010, supported by [PJ2]  PDF LINK
  • [C18] Jong-Woon Yoo*, Ki-Woong Park, Sung-Kyu Park, and Kyu Ho Park“PokerFace: Game Players Themselves Are Truly Memorable,” IEEE Game Innovation Conference 2010, supported by [PJ2]  PDF LINK
  • [C17] Ki-Woong Park*, Woong Choi, and Kyu Ho Park“SqueezeBall: Enabling Intuitive Copy and Paste using Soft Ball-Type Device as Mobile Clipboard,” IEEE International Symposium on ISWC 2010, Late Breaking Results Session, supported by [PJ2]  PDF
  • [C16] Ki-Woong Park*, Jong-Woon Yoo, Sung-Kyu Park, Yo-Won Jeong, Woomin Hwang, Kyu Ho Park, Hyunjung Kim, Boram Lee, and Woohun Lee“Our Experiences on the Design and Implementation of Wearable Computer: From Body-Storming to Realized Services,” IEEE International Symposium on ISWC 2010, Video Paper Session PDF
  • [C15] Hyunchul Seok*, Ki-Woong Park, and Kyu Ho Park“Secure Remote Desktop with Necklace-Type Security Device,” IEEE International Symposium on ISWC 2010, Video Paper Session, supported by [PJ2]  PDF
  • [C14] Ki-Woong Park*, Sung-Kyu Park, Jong-Woon Yoo, and Kyu Ho Park“Towards Interactive Museum: Mapping Cultural Contexts to Historical Objects,” ACM Mibile HCI 2009, supported by [PJ2]  PDF LINK
  • [C13] Jong-Woon Yoo*, Woong Choi,Ki-Woong Park, and Kyu Ho Park“An Intuitive Data Transfer Technique using Bartender’s Gesture,” ACM Multimedia 2009, supported by [PJ2]  PDF LINK
  • [C12] Ki-Woong Park*, and Kyu Ho Park“Authentication Latency Reduction Technique for Secure and Seamless Ubiquitous Services,” 2nd International Conference on ICON, Nov. 28-30, 2007, supported by [PJ2]  PDF
  • [C11] Yo-Won Jeong*, Chul Lee, Ki-Woong Park, and Kyu Ho Park“An Application for Efficient Management of User Created Content in Ubiquitous Fashionable Computer,” 2nd International Conference on ICON, Nov. 28-30, 2007, supported by [PJ2]  PDF
  • [C10] Sung-Kyu Park*, Ki-Woong Park, and Kyu Ho Park“Mobile Office Platform, PPP-UFC, providing Mobility and Intuitive Presentation,” 2nd International Conference on ICON, Nov. 28-30, 2007, supported by [PJ2]  PDF
  • [C9] Ki-Woong Park*, Jupyung Lee, Jong-Woon Yoo, Seung-Ho Lim, Sung-Kyu Park, and Kyu Ho Park“A Ubiquitous Space User Interface (UUI) of Ubiquitous Fashionable Computer in a Ubiquitous Computing Environment, U-TOPIA,” 2nd International Conference on ICON, Nov. 28-30, 2007, supported by [PJ2]  PDF
  • [C8] Ki-Woong Park*, Hyunchul Seok, and Kyu Ho Park, “pKASSO: Towards Seamless Authentication providing Non-Repudiation on Resource-Constrained Devices,” 21st IEEE Conference on Advanced Information Networking and Applications Workshops (AINAW’07), May 2007, supported by [PJ2]  PDF LINK
  • [C7] Kyu Ho Park, Ki-Woong Park*, Jupyung Lee, Jong-Woon Yoo, Seung-Ho Lim“A Ubiquitous Environment with a Wearable Platform, UFC and its Security Infrastructure, pKASSO,” 2nd European Conference on Ambient Intelligence, Nov 2007, supported by [PJ2]  PDF
  • [C6] Jupyung Lee*, Seung-Ho Lim, Jong-Woon Yoo, Ki-Woong Park, Hyun-Jin Choi, and Kyu Ho Park“A Ubiquitous Fashionable Computer with an i-Throw Device,” 21st IEEE Conference on Advanced Information Networking and Applications Workshops (AINAW’07), May 2007, supported by [PJ2]  PDF LINK
  • [C5] Jong-Woon Yoo*, Yo-Won Jeong, Yong Song, Jupyung Lee, Seung-Ho Lim, Ki-Woong Park, and Kyu Ho Park“i-Throw: A New Gesture-based Wearable Input Device with Target Selection Algorithm,” , supported by [PJ2]Proceedings of International Conference on Machine Learning and Cybernetics, September 2007 PDF
  • [C4] Ki-Woong Park*, Sang Seok Lim, Hosung Song, and Kyu Ho Park“A New PKI-based Single Sign-On Protocol for a Diminutive Security Device, PANDA, in a Ubiquitous Security Environment,” 8th IEEE Symposium on Systems & Information Security, November 2006, supported by [PJ2]  PDF
  • [C3] Jong-Woon Yoo, Ki-Woong Park*, Seung-Ho Lim, Jupyung Lee, Hyun-Jin Choi, and Kyu Ho Park“A Ubiquitous Intuitive Interaction with a Wearable Computer,” 4th IEEE International Conference on Pervasive Computer and Communications(PerCom 2006), March 2006, supported by [PJ2]  PDF
  • [C2] Ki-Woong Park*, Hyun-Jin Choi, and Kyu Ho Park“An Interoperable Authentication System using ZigBee-enabled Tiny Portable Device and PKI,” Proceedings of International Conference on ICON, October 2005, pp.63-68, supported by [PJ2]  PDF
  • [C1] Seung-Ho Lim*, Hyun-Jin Choi, Ki-Woong Park, Jong-Woon Yoo, and Kyu Ho Park“Interoperable wearable computer with intuitive device i-Throw,” Proceedings of International Conference on ICON, October 2005, pp.211-218, supported by [PJ2]  PDF
Theme: Overlay by Kaira Extra Text
Seoul, Korea