System Security & Computer Engineering Research Lab.
International Conference
[C78]
Ahn Sung Kyu*, Jung Hyelim, Ki-Woong Park† “Framework for Analyzing Abnormal Behavior of Real Drones through Simulation
Parallelization”,
The 6th International Symposium on Mobile Internet Security (MobiSec 2022), Dec. 15-17, 2022 (ISSN: 1598-3978), In Press, supported by [PJ30][PJ35][PJ36]
[C77]
Hye Lim Jung*, Ki-Woong Park† “ReplayFuzzer: IoT attack replay analysis platform based on IoT virtualization”,
The 6th International Symposium on Mobile Internet Security (MobiSec 2022), Dec. 15-17, 2022 (ISSN: 1598-3978), In Press, supported by [PJ29][PJ35][PJ36][PJ37]
[C76]
Sang-Hoon Choi*, Seong-Jin Kim, Hanjin Park, Ki-Woong Park† “Application Hibernation Framework with Dynamic Throttling of
Resources”,
The 6th International Symposium on Mobile Internet Security (MobiSec 2022), Dec. 15-17, 2022 (ISSN: 1598-3978), In Press, supported by [PJ30][PJ35][PJ36][PJ37]
[C75]
Yeo-Reum Jo*,Ki-Woong Park† “A Study on the VMI-based Kernel Runtime Protection System for Virtual Machine in
Cloud Environment”,
The 6th International Symposium on Mobile Internet Security (MobiSec 2022), Dec. 15-17, 2022 (ISSN: 1598-3978), In Press, supported by [PJ30][PJ35][PJ36][PJ37]
[C74]
Se-Han Lee*, Ki-Woong Park† “Derivation of Blueprint for an IoT Device Protection Design through Analysis of MTD
Research”,
The 8th International Conference on Next Generation Computing 2022 (ICNGC 2022), pp. 312-315, Oct 6-8, 2022, Jeju, Korea, supported by [PJ35][PJ36]
[C73] Se-Han Lee*, Ahn
Sung-Kyu*, Ki-Woong Park†,
“Auto-HRS: An Automated System Design for a Secure Home Router Environment”,
The 7th International Conference on Next Generation Computing 2021 (ICNGC 2021), pp. 225-227, Nov 4 – 6, 2021, Jeju, Korea
, supported by [PJ29][PJ30]
[C72] Hye Lim Jung*, Ahn
Sung-Kyu*, Ki-Woong Park†,
“Time Internal Side-Channel for Authentication in an IoT Environment”,
The 7th International Conference on Next Generation Computing 2021 (ICNGC 2021), pp. 103-104, Nov 4 – 6, 2021, Jeju, Korea
, supported by [PJ29][PJ30]
[C71] Ahn Sung-Kyu*, Ji-Won
Kang, Ki-Woong Park†,
“POSTER: Toward Hourglass-Concepted Memory Data Leakage protection with Capacitor-Based Timer”,
The 5th International Symposium on Mobile Internet Security 2021 (MobiSec 2021), Oct 7 – 9, 2021, Jeju, Korea
, supported by [PJ29][PJ30]
[C70] Hye Lim Jung*,
Gi-Choel Choi*, Ki-Woong Park†,
“MemTwin Consecutive Memory-Recording enhanced with FPGA for IoT Memory Inspection”,
The 5th International Symposium on Mobile Internet Security 2021 (MobiSec 2021), Oct 7 – 9, 2021, Jeju, Korea
, supported by [PJ29][PJ30]
[C69] Jae-Kyung Ju *,
Ki-Woong Park†,
“Deign of Exploit-Helper for Penetrating into a Black-Box System”,
The 22nd World Conference on Information Security Applications 2021 (WISA 2021), pp.30-33, Aug. 11 – 13, 2021, Jeju, Korea
, supported by [PJ29][PJ30]
[C68] Hye-Lim Jung *,Sung-Kyu
Ahn, Ki-Cheol Choi, Jae-Kyung Ju, Ki-Woong Park†,
“Neutralizing Side-Channel Attacks Through Hardware Uniqueness Derivation
“,
The 6th International Conference on Next Generation Computing 2020 (ICNGC 2020), pp.312-314, Dec. 17 – 19, 2020, Busan, Korea
, supported by [PJ25][PJ30]
[C67] Sang-Hoon Choi *,
Ki-Woong Park†,
“Timeline-Based Container Restore via a Computationally Efficient Snapshot
“,
The 6th International Conference on Next Generation Computing 2020 (ICNGC 2020), pp.277-279, Dec. 17 – 19, 2020, Busan, Korea
, supported by [PJ25][PJ30]
[C66] Namjun Kim*, Chanmo
Yang*, Daebeom Cho, Seung Hyeon Geum, Ki-Woong Park†,
“CERT Training Platform over the Event-Recordable Container
“,
2020 ACM International Conference on Intelligent Computing and its Emerging Applications (ACM ICEA 2020), Dec. 12 – 15, 2020, GangWon, Korea
, supported by [PJ25][PJ30]
[C65] Ki-Wan Kang*, Ki-Woong
Park†,
“Toward Software-Defined Moving Target Defense for Secure Service Deployment Enhanced with a
User-Defined Orchestration
“,
2020 ACM International Conference on Intelligent Computing and its Emerging Applications (ACM ICEA 2020), Dec. 12 – 15, 2020, GangWon, Korea
, supported by [PJ25][PJ29][PJ30]
[C64] Seong-Jin Kim*,
Ki-Woong Park†,
“Blueprint for a secure container to protect data in edge cloud computing
environment”,
2020 ACM International Conference on Intelligent Computing and its Emerging Applications (ACM ICEA 2020), Dec. 12 – 15, 2020, GangWon, Korea
, supported by [PJ25][PJ30]
[C63] Sung-Kyung Kim*,
Eun-Tae Jang, Seung-Ho Lim, Ki-Woong Park†,
“Reduction of Data Leakage Using Software Streaming”,
Mobile Internet Security. MobiSec 2019. Communications in Computer and Information Science Springer(ISBN 978-981-15-9608-7), vol 1121 , Springer Singapore, pp. 99-111, Nov. 02, 2020
, supported by [PJ25][PJ30]
[C62] Sung-Kyung Kim*, Eun-Tae Jang, Ki-Woong Park†“Toward a Fine-Grained Evaluation of The Pwnable CTF: Extracting Common Assessment Points,”The 21th World Conference on Information Security Applications (WISA 2020), pp.179 – 190, Aug. 26 – 28, 2020, Jeju, Korea
, supported by [PJ25][PJ28]
[C61] Sung-Kuy Ahn*, HyeLim Jung, Sung-Kyung Kim, Ki-Woong
Park†“Poster: Self-Destructible Electronic Bracelets for Privacy in Quarantine Monotoring System
,”The 21th World Conference on Information Security Applications (WISA 2020), pp.59, Aug. 26 – 28, 2020, Jeju, Korea
, “Best Poster Gold Award”
[C60] Hyun Kwon*, Hyunsoo
Yoon, Jungmin Roh, Ki-Woong Park†“TargetNet Backdoor: Attack on Deep Neural Network with
Use of Different Triggers,”5th International Conference on Intelligent Information Technology (ACM ICIIT 2020), Hanoi, Vietnam, Feb. 19-22, 2020
, supported by [PJ19][PJ25][PJ29]
[C59] Hyun Kwon*, Hyunsoo
Yoon, Ki-Woong Park†“AvoidNet Backdoor: Misclassification with Certain Avoided Classes
on Deep Neural Network,” The 5th International Conference on Next Generation Computing 2019 (ICNGC 2019), ISSN 2672-1562, pp.65-68, Dec. 19-21, 2020, Chiang Mai, Thailand
, supported by [PJ19][PJ25][PJ29]
[C58] Byeong-Yong Yi*,
Sang-Hoon Choi, Ki-Woong Park† “”Resource Usage Monitoring in Cloud Environment: Approach
via Linux Kernel Module,” The 5th International Conference on Next Generation Computing 2019 (ICNGC 2019), ISSN 2672-1562, pp.272-274, Dec. 19-21, 2020, Chiang Mai, Thailand
, supported by [PJ19][PJ25][PJ28]
[C57]Ki-Wan Kang*, SungKyung
Kim, Ki-Woong Park† “”Requirements Derivation of Testbed of UAV Anomaly Detection,” The 5th International Conference on Next Generation Computing 2019 (ICNGC 2019), ISSN 2672-1562, pp.151-153, Dec. 19-21, 2020, Chiang Mai, Thailand ,
supported by [PJ29]
[C56]Hyun Kwon*, Hyunsoo
Yoon, Ki-Woong Park†“POSTER: Detecting Audio
Adversarial Example through Audio Modification,”The 26th ACM Conference on Computer and Communications (ACM CCS 2019), Nov. 11 – 15, 2019, London, United Kingdom, supported by [PJ19][PJ25]
[C55]Hyun Kwon*, Hyunsoo
Yoon, Ki-Woong Park†“FriendNet Backdoor:
Indentifying Backdoor Attack that is safe for Friendly Deep Neural Network,”The 3rd ACM International Conference on Software Engineering and Information Management (ACM ICSIM 2020), Jan. 12 – 15, 2020, Sydney, Austrailia, supported by [PJ19][PJ25][PJ29]
[C54]Hye Lim Jeong*, Sungkyu
Ahn, Sung Hoon Baek†, Ki-Woong Park†“Computationless
Abnormal Data-Flow Detection based on Microcurrent Measurement,”The 4th International Symposium on Mobile Internet Security (MobiSec 2019), Oct.17 – Oct. 19, 2019, Taichung, Taiwan, pp. 75, supported by [PJ19][PJ25][PJ29]
[C53]Keon-Ho Park*, Ki-Woong Park†“LEGO-NETBOOT: Scalable TFTP
Network-Booting Enhanced with a Deduplication of Boot-Packet,”The 4th International Symposium on Mobile Internet Security (MobiSec 2019), Oct.17 – Oct. 19, 2019, Taichung, Taiwan, pp. 68, supported by [PJ19][PJ29]
[C52]Sung-Kyung Kim*,
Eun-Tae Jang, Seung-Ho Lim, Ki-Woong Park†“Towards
Disposable Computing: Could You Throw Away Your Device?,”The 4th International Symposium on Mobile Internet Security (MobiSec 2019), Oct.17 – Oct. 19, 2019, Taichung, Taiwan, pp. 68, supported by [PJ19][PJ29]
[C51]Hyun Kwon*, Hyunsoo
Yoon, Ki-Woong Park†“CAPTCHA Image Generation using
Style Transfer Learning in Deep Neural Network,”The 20th World Conference on Information Security Applications (WISA 2019), pp.251-262, Aug. 21 – 24, 2019, Jeju, Korea, supported by [PJ19][PJ25][PJ29]
[C50]Hyun Kwon*, Hyunsoo
Yoon, Ki-Woong Park†“Selective Poisoning Attack on
Deep Neural Network to Induce Fine-Grained Recognition Error,”The IEEE International Conference on Artificial Intelligence and Knowledge Engineering (AIKE), pp.136-139, Jun. 5 – 7, 2019, Cagliari, Italy, supported by [PJ19][PJ25][PJ29]
[C49]Hyun Kwon*, Ohmin
Kwon, Hyunsoo Yoon, Ki-Woong Park†“Face Friend-Safe
Adversarial Example on Face Recognition System,”The 11st IEEE International Conference on Ubiquitous and Future Networks (ICUFN),pp.547-551, Jul. 2 – 5, 2019, Split, Croatia, supported by [PJ19][PJ25]
[C48]Seung-Ho Lim*, Ki-Woong Park, Kwangho Cha“Developing an OpenSHMEM model over a
Switchless PCIe Non-Transparent Bridge Interface,”The 33rd IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPS-2019),pp.593-602, May. 20 – 24, 2019, Rio de Janeiro, supported by [PJ19]
[C47]Yangjae Lee*, Keon-Ho
Park, Daeseon Choi, Ki-Woong Park†“Sharing
Experience and Knowledge: How to verify Secure Boot against Modify Attack,”The 4th International Conference on Next Generation Computing (ICNGC-2018), Dec. 20 – 22, 2018, Vietnam, supported by [PJ19][PJ20]
[C46]Jun-Gyu Park*,
Sang-Hoon Choi, Hyun-il Kim, Dowon Hong, Ki-Woong Park†“Our Experiences on the Design,
Build and Run of CTF,”The 4th International Conference on Next Generation Computing (ICNGC-2018), Dec. 20 – 22, 2018, Vietnam, supported by [PJ20][PJ25]
[C45]Sieun Kim*, Dowon
Hong, Ki-Woong Park†“Secure Disposable Computing
Technology for Low-end Embedded Devices,”The 4th International Conference on Next Generation Computing (ICNGC-2018), Dec. 20 – 22, 2018, Vietnam, supported by [PJ19][PJ20]
[C44]Woojin Jeon*, Daeseon
Choi, Ki-Woong Park†“Applying Time-Lapse Concepts
onto Storage System for Long-Term System Trace Analysis: Technical Challenges and Blueprints,”IEEE AIKE 2018 – AI Bigdata Cloud Technologies Workshop (IEEE Workshop ABC 2018), Sep.26-Sep.28, 2018, Laguna Hills, California, USA, supported by [PJ19][PJ20][PJ25]
[C43]Sieun Kim*, Taek-Young
Youn, Daeseon Choi†, Ki-Woong Park†“Securely
Controllable and Trustworthy Remote Erasure on Embedded Computing System for Unmanned Aerial
Vehicle,”The 3rd International Symposium on Mobile Internet Security (MobiSec’18), Aug. 29-Sep. 1, 2018, Cebu, Philippines, Article No. 8, pp. 1-9“The Best Paper Award”, , supported by [PJ19][PJ20][PJ25]
[C42]Taek-Young Youn*,
Ki-Woong Park†, and Joongheon Kim“Dynamic
Replication for Secure Mobile Caching: A Control Theoretic Approach,”The 3rd International Symposium on Mobile Internet Security (MobiSec’18), Aug. 29-Sep. 1, 2018, Cebu, Philippines, Article No. 16, pp. 1-9
[C41]Yangjae Lee*, Dongmin
Yang, Taek-Young Youn†, and Ki-Woong Park†“Authorized Wireless Charging System
based on Double-Frequency-Hopping for Mobile Devices,”The 3rd International Symposium on Mobile Internet Security (MobiSec’18), Aug. 29-Sep. 1, 2018, Cebu, Philippines, Article No. 9, pp. 1-12, supported by [PJ19][PJ20][PJ25]
[C40]Sang-Hoon Choi*,
Daeseon Choi†, and Ki-Woong Park†“Usability
of Docker-based Container System Health Monitoring by Memory Dump Visualization,”The 3rd International Conference on Next Generation Computing (ICNGC) 2017b, Dec. 21 – 24, 2017, Kaohsiung, Taiwan, supported by [PJ19][PJ20]
[C39]Woo-Jin Jeon*,
Sang-Hoon Choi, and Ki-Woong Park†“Detecting
Ransomware with File System-Awareness Scheme in Cloud Computing Environment,”The 3rd International Conference on Next Generation Computing (ICNGC) 2017b, Dec. 21 – 24, 2017, Kaohsiung, Taiwan, supported by [PJ19]
[C38]Keon-Ho Park*,
Sang-Hoon Choi, Chul-Woo Kim, and Ki-Woong Park†“Usability
of Software Weakness Discovery based on the Binary File Visualization,”The 3rd International Conference on Next Generation Computing (ICNGC) 2017b, Dec. 21 – 24, 2017, Kaohsiung, Taiwan, supported by [PJ19]
[C37]Young Jun Lee*,
Sang-Hoon Choi, Chul-Woo Kim, Seung-Ho Lim, and Ki-Woong Park†“Learning Binary Code with Deep
Learning to Detect Software Weakness,”KSII The 9th International Conference on Internet (ICONI) 2017 Symposium, Dec. 17 – 20, 2017, Vientiane, Laos, supported by [PJ19][PJ20]
[C36]Sang-Hoon Choi*,
Woomin Hwang, and Ki-Woong Park†“Towards
Software-Defined Malware Analysis with a Deep Introspection,”The 9th International Conference on Future Computational Technologies and Applications, Poster Session, Feb. 19 – 23, 2017, Athens, Greece, supported by [PJ16][PJ20]
[C35]Hye-Lim Jeong*,
Sung-Kyu Ahn, Mun Sung Kim, and Ki-Woong Park†“Design
and Implementation of TPM-Enhanced Privacy Protection System,”2nd International Conference on Next Generation Computing 2017, Jan. 2017, Excellent Paper Award, supported by [PJ16][PJ20]
[C34]Yu-Seong Kim*,
Sang-Hoon Choi, and Ki-Woong Park†“Customizing
Cuckoo Sandbox for Malware with Tricky Execution Conditions,”2nd International Conference on Next Generation Computing 2017, Jan. 2017, supported by [PJ16][PJ20]
[C33]Sang-Hoon Choi*,
Sung-Kyu Ahn, Dongmin Yang, and Ki-Woong Park†“Secret-Stamp:
Document Leakage Prevention via Steganographic Marking ,”2nd International Conference on Next Generation Computing 2017, Jan. 2017, supported by [PJ16]
[C32]Hye-Lim Jeong*, and
Ki-Woong Park†“A Synchronized Virtual Link File
based on User-friendly Interface for Privacy Protection,”6th International Conference on Convergence Technology(ICCT 2016), Jun. 2016, supported by [PJ16]
[C31]Sang-Hoon Choi*,
Yu-Seong Kim, and Ki-Woong Park†“Toward Semantic
Gap-less Memory Dump for Malware Analysis,”International Conference on Next Generation Computing 2016, Jan. 2016, supported by [PJ16]
[C30]Hye-Lim Jeong*,
Sung-Kyu Ahn, Chang-Hoon Lee, and Ki-Woong Park†“Data
Management System based on Privacy Aware File Virtualization,”International Conference on Next Generation Computing 2016, Jan. 2016, supported by [PJ16]
[C29]Chulmin Kim*, Ki-Woong Park, Kyu Ho Park†“GHOST: GPGPU-Offloaded
High Performance Storage I/O Deduplication for Primary Storage System,”Proceedings of the 2012 IEEE International Workshop on Programming Models and Applications for Multicores and Manycores, pp.17-26, Feb. 2012, supported by [PJ4]
[C28]Kyu Ho Park*, Sung-Kyu
Park, Hyunchul Seok, Woomin Hwang, Dong-Jae Shin, Jong Hun Choi, and Ki-Woong Park†“Efficient Memory Management of a
Hierarchical and a Hybrid Main Memory for MN-MATE Platform,”Proceedings of the 2012 IEEE International Workshop on Programming Models and Applications for Multicores and Manycores, pp.83-92, Feb. 2012, supported by [PJ4]
[C27]Woomin Hwang*, Ki-Woong Park, and Kyu Ho Park†“MN-GEMS: A
Timing-aware Simulator for a Cloud Node with Manycore, DRAM, and Non-Volatile
Memories,”4th IEEE International Conference on Cloud Computing, Jul. 2011, supported by [PJ4]
[C26]Jong Hun Choi*, Ki-Woong Park, Sung-Kyu Park, and Kyu Ho Park†“Multimedia
Matching as a Service: Technical Challenges and Blueprints,”, supported by [PJ4]26th International Technical Conference on Circuits/Systems, Computers and Communications, Jun. 2011
[C25]Woong Choi*, Ki-Woong Park, and Kyu Ho Park†“SCOUT: Data Center
Monitoring System with Multiple Mobile Robots,”7th IEEE International Conference on Networked Computing and Advanced Information Management, Jun. 2011, supported by [PJ5]
[C24]Chulmin Kim*, Ki-Woong Park, KyoungSoo Park, and Kyu Ho Park†“Rethinking
Deduplication in Cloud: From Data Profiling to Blueprint,”7th IEEE International Conference on Networked Computing and Advanced Information Management, Jun. 2011, supported by [PJ5]
[C23]Ki-Woong Park*,
Chulmin Kim, and Kyu Ho Park†“BLAST: Applying Streaming Ciphers into Outsourced Cloud
Storage,”IEEE International Conference on Parallel and Distributed Systems, Dec. 2010, supported by [PJ5]
[C22]Ki-Woong Park*,
Woomin Hwang, and Kyu Ho Park†“FalconEye: Data Center Status Extraction using
Vision-Transformation Techniques,”IEEE COMPSAC 2010-CloudApp, supported by [PJ5]
[C21]Ki-Woong Park*,
Sung-Kyu Park, and Kyu Ho Park†“THEMIS: Towards mutual-verifiable billing transaction for
cloud computing environment,”IEEE International Conference on CLOUD 2010, supported by [PJ5]
[C20]Woomin Hwang*, Yangwoo
Roh, Youngwoo Park, Ki-Woong Park, and Kyu Ho Park†“HyperDealer:
Reference-pattern-aware instant memory balancing for Consolidated Virtual
Machines,”IEEE International Conference on CLOUD 2010 Industry Track, supported by [PJ4]
[C19]Ki-Woong Park*,
Byung-Cheol Kim, Jong-Woon Yoo, and Kyu Ho Park†“Enabling Sportive Games with a
Do-It-Yourself Wearable Computing Platform,”IEEE Game Innovation Conference 2010, supported by [PJ2]
[C18]Jong-Woon Yoo*, Ki-Woong Park, Sung-Kyu Park, and Kyu Ho Park†“PokerFace:
Game Players Themselves Are Truly Memorable,”IEEE Game Innovation Conference 2010, supported by [PJ2]
[C17]Ki-Woong Park*,
Woong Choi, and Kyu Ho Park†“SqueezeBall: Enabling Intuitive Copy and Paste using Soft
Ball-Type Device as Mobile Clipboard,”IEEE International Symposium on ISWC 2010, Late Breaking Results Session, supported by [PJ2]
[C16]Ki-Woong Park*,
Jong-Woon Yoo, Sung-Kyu Park, Yo-Won Jeong, Woomin Hwang, Kyu Ho Park, Hyunjung Kim, Boram Lee, and Woohun
Lee†“Our Experiences on the Design and Implementation of Wearable Computer: From
Body-Storming to Realized Services,”IEEE International Symposium on ISWC 2010, Video Paper Session
[C15]Hyunchul Seok*, Ki-Woong Park, and Kyu Ho Park†“Secure Remote Desktop
with Necklace-Type Security Device,”IEEE International Symposium on ISWC 2010, Video Paper Session, supported by [PJ2]
[C14]Ki-Woong Park*,
Sung-Kyu Park, Jong-Woon Yoo, and Kyu Ho Park†“Towards Interactive Museum: Mapping
Cultural Contexts to Historical Objects,”ACM Mibile HCI 2009, supported by [PJ2]
[C13]Jong-Woon Yoo*, Woong
Choi,Ki-Woong Park, and Kyu Ho Park†“An Intuitive
Data Transfer Technique using Bartender’s Gesture,”ACM Multimedia 2009, supported by [PJ2]
[C12]Ki-Woong Park*,
and Kyu Ho Park†“Authentication Latency Reduction Technique for Secure and Seamless
Ubiquitous Services,”2nd International Conference on ICON, Nov. 28-30, 2007, supported by [PJ2]
[C11]Yo-Won Jeong*, Chul
Lee, Ki-Woong Park, and Kyu Ho Park†“An Application
for Efficient Management of User Created Content in Ubiquitous Fashionable
Computer,”2nd International Conference on ICON, Nov. 28-30, 2007, supported by [PJ2]
[C10]Sung-Kyu Park*, Ki-Woong Park, and Kyu Ho Park†“Mobile Office
Platform, PPP-UFC, providing Mobility and Intuitive Presentation,”2nd International Conference on ICON, Nov. 28-30, 2007, supported by [PJ2]
[C9]Ki-Woong Park*,
Jupyung Lee, Jong-Woon Yoo, Seung-Ho Lim, Sung-Kyu Park, and Kyu Ho Park“A Ubiquitous Space User
Interface (UUI) of Ubiquitous Fashionable Computer in a Ubiquitous Computing Environment, U-TOPIA,”2nd International Conference on ICON, Nov. 28-30, 2007, supported by [PJ2]
[C8]Ki-Woong Park*,
Hyunchul Seok, and Kyu Ho Park†, “pKASSO: Towards Seamless Authentication providing
Non-Repudiation on Resource-Constrained Devices,”21st IEEE Conference on Advanced Information Networking and Applications Workshops (AINAW’07), May 2007, supported by [PJ2]
[C7]Kyu Ho Park, Ki-Woong Park*, Jupyung Lee, Jong-Woon Yoo, Seung-Ho
Lim†“A Ubiquitous Environment with a Wearable Platform, UFC and its Security
Infrastructure, pKASSO,”2nd European Conference on Ambient Intelligence, Nov 2007, supported by [PJ2]
[C6]Jupyung Lee*, Seung-Ho
Lim, Jong-Woon Yoo, Ki-Woong Park, Hyun-Jin Choi, and Kyu Ho
Park†“A Ubiquitous Fashionable Computer with an i-Throw Device,”21st IEEE Conference on Advanced Information Networking and Applications Workshops (AINAW’07), May 2007, supported by [PJ2]
[C5]Jong-Woon Yoo*, Yo-Won
Jeong, Yong Song, Jupyung Lee, Seung-Ho Lim, Ki-Woong Park, and Kyu Ho Park†“i-Throw:
A New Gesture-based Wearable Input Device with Target Selection Algorithm,”, supported by [PJ2]Proceedings of International Conference on Machine Learning and Cybernetics, September 2007
[C4]Ki-Woong Park*,
Sang Seok Lim, Hosung Song, and Kyu Ho Park†“A New PKI-based Single Sign-On Protocol for
a Diminutive Security Device, PANDA, in a Ubiquitous Security Environment,”8th IEEE Symposium on Systems & Information Security, November 2006, supported by [PJ2]
[C3]Jong-Woon Yoo, Ki-Woong Park*, Seung-Ho Lim, Jupyung Lee, Hyun-Jin Choi, and Kyu
Ho Park†“A Ubiquitous Intuitive Interaction with a Wearable Computer,”4th IEEE International Conference on Pervasive Computer and Communications(PerCom 2006), March 2006, supported by [PJ2]
[C2]Ki-Woong Park*,
Hyun-Jin Choi, and Kyu Ho Park†“An Interoperable Authentication System using
ZigBee-enabled Tiny Portable Device and PKI,”Proceedings of International Conference on ICON, October 2005, pp.63-68, supported by [PJ2]
[C1]Seung-Ho Lim*, Hyun-Jin
Choi, Ki-Woong Park, Jong-Woon Yoo, and Kyu Ho Park†“Interoperable
wearable computer with intuitive device i-Throw,”Proceedings of International Conference on ICON, October 2005, pp.211-218, supported by [PJ2]