Skip to content
- [C86] Arpita Dinesh Sarang*, Sang-Hoon Choi, and Ki-Woong Park†, “Plotting OSS-based Supply Chain attack strategies and the defense failure,” The 25th World Conference on Information Security Applications 2024 (WISA 2024), Aug 21-23, 2024, Jeju, Korea, supported by [PJ35][PJ36][PJ37][PJ38][PJ39]
- [C85] Se-Han Lee*, Mohsen Ali Alawami, and Ki-Woong Park†, “Data Visualization Engine for Systematic MTD Strategy Configuration linked to Cyber Attack Information,” The 9th International Conference on Next Generation Computing 2023 (ICNGC 2023), ISSN: 2672-1562, Vol. 9, pp. 235-238, Dec 20-23, 2023, Danang, Vietnam, supported by [PJ35][PJ36][PJ37][PJ38][PJ39]
- [C84] Arpita Dinesh Sarang*, Ki-Woong Park†, “Security Vulnerability Analysis in Deploying Avatar in the Metaverse,” The 9th International Conference on Next Generation Computing 2023 (ICNGC 2023), ISSN: 2672-1562, Vol. 9, pp. 300-303, Dec 20-23, 2023, Danang, Vietnam, supported by [PJ35][PJ36][PJ37][PJ38][PJ39]
- [C83] Mohsen Ali Alawami*, Dahyun Jung, Yewon Park, Yoonseo Ku, Gyeonghwan Choi, and Ki-Woong Park†, “The Car is Safe: A Fast and Accurate Pressure-based Authentication System for Identifying Car Drivers,” The 7th International Symposium on Mobile Internet Security 2023 (MobeSec 2023), Dec 12-21, 2023, Okinawa, Japan, supported by [PJ35][PJ36][PJ37][PJ38][PJ39]
- [C82] In Hoe Ku*, Sang-Hoon Choi, Ki-Woong Park†, “A Study for Decrease False Positive and False Negative Antivirus Technique in File Partial Encryption,” The 7th International Symposium on Mobile Internet Security 2023 (MobeSec 2023), Dec 12-21, 2023, Okinawa, Japan, supported by [PJ35][PJ36][PJ37][PJ38][PJ39]
- [C81] HyeLim Jung*, Sang-Hoon Choi, Mohsen Ali Alawami, Sung-Kyu Ahn, Ki-Woong Park†, “I Know Where You Are: A Non-intrusive Geospatial–Electrical Authentication System,” Proceedings of the 2023 IEEE 6th International Conference on Artificial Intelligence and Knowledge Engineering (AIKE 2023), pp.129-132, Sep. 25-27, 2023, Laguna Hills, California, USA, supported by [PJ35][PJ36][PJ37][PJ38][PJ39]
- [C80] Sung-Kyu Ahn*, Sang-Hoon Choi, Ki-Woong Park†, “Side-Channel Based Device Authentication in Wireless Charging: An Experimental Study,” Proceedings of the 2023 IEEE 6th International Conference on Artificial Intelligence and Knowledge Engineering (AIKE 2023), pp.125-128, Sep. 25-27, 2023, Laguna Hills, California, USA, supported by [PJ35][PJ36][PJ37][PJ38][PJ39]
- [C79] Joo-Young Roh*, Sang-Hoon Choi, Ki-Woong Park†, “CO-TRIS: Container Orchestration-Transforming Container using Resource Inspection System,” Proceedings of the 2023 IEEE 6th International Conference on Artificial Intelligence and Knowledge Engineering (AIKE 2023), pp.121-124, Sep. 25-27, 2023, Laguna Hills, California, USA, supported by [PJ35][PJ36][PJ37][PJ38][PJ39]
- [C78] Ahn Sung Kyu*, Jung Hyelim, Ki-Woong Park†, “Framework for Analyzing Abnormal Behavior of Real Drones through Simulation Parallelization,” The 6th International Symposium on Mobile Internet Security (MobiSec 2022), Dec. 15-17, 2022 (ISSN: 1598-3978), In Press, supported by [PJ30][PJ35][PJ36]
- [C77] Hye Lim Jung*, Ki-Woong Park†, “ReplayFuzzer: IoT attack replay analysis platform based on IoT virtualization,” The 6th International Symposium on Mobile Internet Security (MobiSec 2022), Dec. 15-17, 2022 (ISSN: 1598-3978), In Press, supported by [PJ29][PJ35][PJ36][PJ37]
- [C76] Sang-Hoon Choi*, Seong-Jin Kim, Hanjin Park, Ki-Woong Park†, “Application Hibernation Framework with Dynamic Throttling of Resources,” The 6th International Symposium on Mobile Internet Security (MobiSec 2022), Dec. 15-17, 2022 (ISSN: 1598-3978), In Press, supported by [PJ30][PJ35][PJ36][PJ37]
- [C75] Yeo-Reum Jo*, Ki-Woong Park†, “A Study on the VMI-based Kernel Runtime Protection System for Virtual Machine in Cloud Environment,” The 6th International Symposium on Mobile Internet Security (MobiSec 2022), Dec. 15-17, 2022 (ISSN: 1598-3978), In Press, supported by [PJ30][PJ35][PJ36][PJ37]
- [C74] Se-Han Lee*, Ki-Woong Park†, “Derivation of Blueprint for an IoT Device Protection Design through Analysis of MTD Research,” The 8th International Conference on Next Generation Computing 2022 (ICNGC 2022), pp. 312-315, Oct 6-8, 2022, Jeju, Korea, supported by [PJ35][PJ36]
- [C73] Se-Han Lee*, Ahn Sung-Kyu*, Ki-Woong Park†, “Auto-HRS: An Automated System Design for a Secure Home Router Environment,” The 7th International Conference on Next Generation Computing 2021 (ICNGC 2021), pp. 225-227, Nov 4 – 6, 2021, Jeju, Korea, supported by [PJ29][PJ30]
- [C72] Hye Lim Jung*, Ahn Sung-Kyu*, Ki-Woong Park†, “Time Internal Side-Channel for Authentication in an IoT Environment,” The 7th International Conference on Next Generation Computing 2021 (ICNGC 2021), pp. 103-104, Nov 4 – 6, 2021, Jeju, Korea, supported by [PJ29][PJ30]
- [C71] Ahn Sung-Kyu*, Ji-Won Kang, Ki-Woong Park†, “POSTER: Toward Hourglass-Concepted Memory Data Leakage protection with Capacitor-Based Timer,” The 5th International Symposium on Mobile Internet Security 2021 (MobiSec 2021), Oct 7 – 9, 2021, Jeju, Korea, supported by [PJ29][PJ30]
- [C70] Hye Lim Jung*, Gi-Choel Choi*, Ki-Woong Park†, “MemTwin Consecutive Memory-Recording enhanced with FPGA for IoT Memory Inspection,” The 5th International Symposium on Mobile Internet Security 2021 (MobiSec 2021), Oct 7 – 9, 2021, Jeju, Korea, supported by [PJ29][PJ30]
- [C69] Jae-Kyung Ju *, Ki-Woong Park†, “Deign of Exploit-Helper for Penetrating into a Black-Box System,” The 22nd World Conference on Information Security Applications 2021 (WISA 2021), pp.30-33, Aug. 11 – 13, 2021, Jeju, Korea, supported by [PJ29][PJ30]
- [C68] Hye-Lim Jung *,Sung-Kyu Ahn, Ki-Cheol Choi, Jae-Kyung Ju, Ki-Woong Park†, “Neutralizing Side-Channel Attacks Through Hardware Uniqueness Derivation,” The 6th International Conference on Next Generation Computing 2020 (ICNGC 2020), pp.312-314, Dec. 17 – 19, 2020, Busan, Korea, supported by [PJ25][PJ30]
- [C67] Sang-Hoon Choi *, Ki-Woong Park†, “Timeline-Based Container Restore via a Computationally Efficient Snapshot,” The 6th International Conference on Next Generation Computing 2020 (ICNGC 2020), pp.277-279, Dec. 17 – 19, 2020, Busan, Korea, supported by [PJ25][PJ30]
- [C66] Namjun Kim*, Chanmo Yang*, Daebeom Cho, Seung Hyeon Geum, Ki-Woong Park†, “CERT Training Platform over the Event-Recordable Container,” 2020 ACM International Conference on Intelligent Computing and its Emerging Applications (ACM ICEA 2020), Dec. 12 – 15, 2020, GangWon, Korea, supported by [PJ25][PJ30]
- [C65] Ki-Wan Kang*, Ki-Woong Park†, “Toward Software-Defined Moving Target Defense for Secure Service Deployment Enhanced with a User-Defined Orchestration,” 2020 ACM International Conference on Intelligent Computing and its Emerging Applications (ACM ICEA 2020), Dec. 12 – 15, 2020, GangWon, Korea, supported by [PJ25][PJ29][PJ30]
- [C64] Seong-Jin Kim*, Ki-Woong Park†, “Blueprint for a secure container to protect data in edge cloud computing environment,” 2020 ACM International Conference on Intelligent Computing and its Emerging Applications (ACM ICEA 2020), Dec. 12 – 15, 2020, GangWon, Korea, supported by [PJ25][PJ30]
- [C63] Sung-Kyung Kim*, Eun-Tae Jang, Seung-Ho Lim, Ki-Woong Park†, “Reduction of Data Leakage Using Software Streaming,” Mobile Internet Security. MobiSec 2019. Communications in Computer and Information Science Springer(ISBN 978-981-15-9608-7), vol 1121 , Springer Singapore, pp. 99-111, Nov. 02, 2020, supported by [PJ25][PJ30]
- [C62] Sung-Kyung Kim*, Eun-Tae Jang, Ki-Woong Park†, “Toward a Fine-Grained Evaluation of The Pwnable CTF: Extracting Common Assessment Points,” The 21th World Conference on Information Security Applications (WISA 2020), pp.179 – 190, Aug. 26 – 28, 2020, Jeju, Korea, supported by [PJ25][PJ28]
- [C61] Sung-Kuy Ahn*, HyeLim Jung, Sung-Kyung Kim, Ki-Woong Park†, “Poster: Self-Destructible Electronic Bracelets for Privacy in Quarantine Monotoring System ,” The 21th World Conference on Information Security Applications (WISA 2020), pp.59, Aug. 26 – 28, 2020, Jeju, Korea, “Best Poster Gold Award”
- [C60] Hyun Kwon*, Hyunsoo Yoon, Jungmin Roh, Ki-Woong Park†, “TargetNet Backdoor: Attack on Deep Neural Network with Use of Different Triggers,” 5th International Conference on Intelligent Information Technology (ACM ICIIT 2020), Hanoi, Vietnam, Feb. 19-22, 2020, supported by [PJ19][PJ25][PJ29]
- [C59] Hyun Kwon*, Hyunsoo Yoon, Ki-Woong Park†, “AvoidNet Backdoor: Misclassification with Certain Avoided Classes on Deep Neural Network,” The 5th International Conference on Next Generation Computing 2019 (ICNGC 2019), ISSN 2672-1562, pp.65-68, Dec. 19-21, 2020, Chiang Mai, Thailand, supported by [PJ19][PJ25][PJ29]
- [C58] Byeong-Yong Yi*, Sang-Hoon Choi, Ki-Woong Park†, ”Resource Usage Monitoring in Cloud Environment: Approach via Linux Kernel Module,” The 5th International Conference on Next Generation Computing 2019 (ICNGC 2019), ISSN 2672-1562, pp.272-274, Dec. 19-21, 2020, Chiang Mai, Thailand, supported by [PJ19][PJ25][PJ28]
- [C57] Ki-Wan Kang*, SungKyung Kim, Ki-Woong Park†, ”Requirements Derivation of Testbed of UAV Anomaly Detection,” The 5th International Conference on Next Generation Computing 2019 (ICNGC 2019), ISSN 2672-1562, pp.151-153, Dec. 19-21, 2020, Chiang Mai, Thailand, supported by [PJ29]
- [C56] Hyun Kwon*, Hyunsoo Yoon, Ki-Woong Park†, “POSTER: Detecting Audio Adversarial Example through Audio Modification,” The 26th ACM Conference on Computer and Communications (ACM CCS 2019), Nov. 11 – 15, 2019, London, United Kingdom, supported by [PJ19][PJ25]
- [C55] Hyun Kwon*, Hyunsoo Yoon, Ki-Woong Park†, “FriendNet Backdoor: Indentifying Backdoor Attack that is safe for Friendly Deep Neural Network,” The 3rd ACM International Conference on Software Engineering and Information Management (ACM ICSIM 2020), Jan. 12 – 15, 2020, Sydney, Austrailia, supported by [PJ19][PJ25][PJ29]
- [C54] Hye Lim Jeong*, Sungkyu Ahn, Sung Hoon Baek†, Ki-Woong Park†, “Computationless Abnormal Data-Flow Detection based on Microcurrent Measurement,” The 4th International Symposium on Mobile Internet Security (MobiSec 2019), Oct.17 – Oct. 19, 2019, Taichung, Taiwan, pp. 75, supported by [PJ19][PJ25][PJ29]
- [C53] Keon-Ho Park*, Ki-Woong Park†, “LEGO-NETBOOT: Scalable TFTP Network-Booting Enhanced with a Deduplication of Boot-Packet,” The 4th International Symposium on Mobile Internet Security (MobiSec 2019), Oct.17 – Oct. 19, 2019, Taichung, Taiwan, pp. 68, supported by [PJ19][PJ29]
- [C52] Sung-Kyung Kim*, Eun-Tae Jang, Seung-Ho Lim, Ki-Woong Park†, “Towards Disposable Computing: Could You Throw Away Your Device?,” The 4th International Symposium on Mobile Internet Security (MobiSec 2019), Oct.17 – Oct. 19, 2019, Taichung, Taiwan, pp. 68, supported by [PJ19][PJ29]
- [C51] Hyun Kwon*, Hyunsoo Yoon, Ki-Woong Park†, “CAPTCHA Image Generation using Style Transfer Learning in Deep Neural Network,” The 20th World Conference on Information Security Applications (WISA 2019), pp.251-262, Aug. 21 – 24, 2019, Jeju, Korea, supported by [PJ19][PJ25][PJ29]
- [C50] Hyun Kwon*, Hyunsoo Yoon, Ki-Woong Park†, “Selective Poisoning Attack on Deep Neural Network to Induce Fine-Grained Recognition Error,” The IEEE International Conference on Artificial Intelligence and Knowledge Engineering (AIKE), pp.136-139, Jun. 5 – 7, 2019, Cagliari, Italy, supported by [PJ19][PJ25][PJ29]
- [C49] Hyun Kwon*, Ohmin Kwon, Hyunsoo Yoon, Ki-Woong Park†, “Face Friend-Safe Adversarial Example on Face Recognition System,” The 11st IEEE International Conference on Ubiquitous and Future Networks (ICUFN),pp.547-551, Jul. 2 – 5, 2019, Split, Croatia, supported by [PJ19][PJ25]
- [C48] Seung-Ho Lim*, Ki-Woong Park, Kwangho Cha, “Developing an OpenSHMEM model over a Switchless PCIe Non-Transparent Bridge Interface,” The 33rd IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPS-2019),pp.593-602, May. 20 – 24, 2019, Rio de Janeiro, supported by [PJ19]
- [C47] Yangjae Lee*, Keon-Ho Park, Daeseon Choi, Ki-Woong Park†, “Sharing Experience and Knowledge: How to verify Secure Boot against Modify Attack,” The 4th International Conference on Next Generation Computing (ICNGC-2018), Dec. 20 – 22, 2018, Vietnam, supported by [PJ19][PJ20]
- [C46] Jun-Gyu Park*, Sang-Hoon Choi, Hyun-il Kim, Dowon Hong, Ki-Woong Park†, “Our Experiences on the Design, Build and Run of CTF,” The 4th International Conference on Next Generation Computing (ICNGC-2018), Dec. 20 – 22, 2018, Vietnam, supported by [PJ20][PJ25]
- [C45] Sieun Kim*, Dowon Hong, Ki-Woong Park†, “Secure Disposable Computing Technology for Low-end Embedded Devices,” The 4th International Conference on Next Generation Computing (ICNGC-2018), Dec. 20 – 22, 2018, Vietnam, supported by [PJ19][PJ20]
- [C44] Woojin Jeon*, Daeseon Choi, Ki-Woong Park†, “Applying Time-Lapse Concepts onto Storage System for Long-Term System Trace Analysis: Technical Challenges and Blueprints,” IEEE AIKE 2018 – AI Bigdata Cloud Technologies Workshop (IEEE Workshop ABC 2018), Sep.26-Sep.28, 2018, Laguna Hills, California, USA, supported by [PJ19][PJ20][PJ25]
- [C43] Sieun Kim*, Taek-Young Youn, Daeseon Choi†, Ki-Woong Park†, “Securely Controllable and Trustworthy Remote Erasure on Embedded Computing System for Unmanned Aerial Vehicle,” The 3rd International Symposium on Mobile Internet Security (MobiSec’18), Aug. 29-Sep. 1, 2018, Cebu, Philippines, Article No. 8, pp. 1-9, “The Best Paper Award”, supported by [PJ19][PJ20][PJ25]
- [C42] Taek-Young Youn*, Ki-Woong Park†, and Joongheon Kim, “Dynamic Replication for Secure Mobile Caching: A Control Theoretic Approach,” The 3rd International Symposium on Mobile Internet Security (MobiSec’18), Aug. 29-Sep. 1, 2018, Cebu, Philippines, Article No. 16, pp. 1-9
- [C41] Yangjae Lee*, Dongmin Yang, Taek-Young Youn†, and Ki-Woong Park†, “Authorized Wireless Charging System based on Double-Frequency-Hopping for Mobile Devices,” The 3rd International Symposium on Mobile Internet Security (MobiSec’18), Aug. 29-Sep. 1, 2018, Cebu, Philippines, Article No. 9, pp. 1-12, supported by [PJ19][PJ20][PJ25]
- [C40] Sang-Hoon Choi*, Daeseon Choi†, and Ki-Woong Park†, “Usability of Docker-based Container System Health Monitoring by Memory Dump Visualization,” The 3rd International Conference on Next Generation Computing (ICNGC) 2017b, Dec. 21 – 24, 2017, Kaohsiung, Taiwan, supported by [PJ19][PJ20]
- [C39] Woo-Jin Jeon*, Sang-Hoon Choi, and Ki-Woong Park†, “Detecting Ransomware with File System-Awareness Scheme in Cloud Computing Environment,” The 3rd International Conference on Next Generation Computing (ICNGC) 2017b, Dec. 21 – 24, 2017, Kaohsiung, Taiwan, supported by [PJ19]
- [C38] Keon-Ho Park*, Sang-Hoon Choi, Chul-Woo Kim, and Ki-Woong Park†, “Usability of Software Weakness Discovery based on the Binary File Visualization,” The 3rd International Conference on Next Generation Computing (ICNGC) 2017b, Dec. 21 – 24, 2017, Kaohsiung, Taiwan, supported by [PJ19]
- [C37] Young Jun Lee*, Sang-Hoon Choi, Chul-Woo Kim, Seung-Ho Lim, and Ki-Woong Park†, “Learning Binary Code with Deep Learning to Detect Software Weakness,” KSII The 9th International Conference on Internet (ICONI) 2017 Symposium, Dec. 17 – 20, 2017, Vientiane, Laos, supported by [PJ19][PJ20]
- [C36] Sang-Hoon Choi*, Woomin Hwang, and Ki-Woong Park†, “Towards Software-Defined Malware Analysis with a Deep Introspection,” The 9th International Conference on Future Computational Technologies and Applications, Poster Session, Feb. 19 – 23, 2017, Athens, Greece, supported by [PJ16][PJ20]
- [C35] Hye-Lim Jeong*, Sung-Kyu Ahn, Mun Sung Kim, and Ki-Woong Park†, “Design and Implementation of TPM-Enhanced Privacy Protection System,” 2nd International Conference on Next Generation Computing 2017, Jan. 2017, Excellent Paper Award, supported by [PJ16][PJ20]
- [C34] Yu-Seong Kim*, Sang-Hoon Choi, and Ki-Woong Park†, “Customizing Cuckoo Sandbox for Malware with Tricky Execution Conditions,” 2nd International Conference on Next Generation Computing 2017, Jan. 2017, supported by [PJ16][PJ20]
- [C33] Sang-Hoon Choi*, Sung-Kyu Ahn, Dongmin Yang, and Ki-Woong Park†, “Secret-Stamp: Document Leakage Prevention via Steganographic Marking ,” 2nd International Conference on Next Generation Computing 2017, Jan. 2017, supported by [PJ16]
- [C32] Hye-Lim Jeong*, and Ki-Woong Park†, “A Synchronized Virtual Link File based on User-friendly Interface for Privacy Protection,” 6th International Conference on Convergence Technology(ICCT 2016), Jun. 2016, supported by [PJ16]
- [C31] Sang-Hoon Choi*, Yu-Seong Kim, and Ki-Woong Park†, “Toward Semantic Gap-less Memory Dump for Malware Analysis,” International Conference on Next Generation Computing 2016, Jan. 2016, supported by [PJ16]
- [C30] Hye-Lim Jeong*, Sung-Kyu Ahn, Chang-Hoon Lee, and Ki-Woong Park†, “Data Management System based on Privacy Aware File Virtualization,” International Conference on Next Generation Computing 2016, Jan. 2016, supported by [PJ16]
- [C29] Chulmin Kim*, Ki-Woong Park, Kyu Ho Park†, “GHOST: GPGPU-Offloaded High Performance Storage I/O Deduplication for Primary Storage System,” Proceedings of the 2012 IEEE International Workshop on Programming Models and Applications for Multicores and Manycores, pp.17-26, Feb. 2012, supported by [PJ4]
- [C28] Kyu Ho Park*, Sung-Kyu Park, Hyunchul Seok, Woomin Hwang, Dong-Jae Shin, Jong Hun Choi, and Ki-Woong Park†, “Efficient Memory Management of a Hierarchical and a Hybrid Main Memory for MN-MATE Platform,” Proceedings of the 2012 IEEE International Workshop on Programming Models and Applications for Multicores and Manycores, pp.83-92, Feb. 2012, supported by [PJ4]
- [C27] Woomin Hwang*, Ki-Woong Park, and Kyu Ho Park†, “MN-GEMS: A Timing-aware Simulator for a Cloud Node with Manycore, DRAM, and Non-Volatile Memories,” 4th IEEE International Conference on Cloud Computing, Jul. 2011, supported by [PJ4]
- [C26] Jong Hun Choi*, Ki-Woong Park, Sung-Kyu Park, and Kyu Ho Park†, “Multimedia Matching as a Service: Technical Challenges and Blueprints,” 26th International Technical Conference on Circuits/Systems, Computers and Communications, Jun. 2011, supported by [PJ4]
- [C25] Woong Choi*, Ki-Woong Park, and Kyu Ho Park†, “SCOUT: Data Center Monitoring System with Multiple Mobile Robots,” 7th IEEE International Conference on Networked Computing and Advanced Information Management, Jun. 2011, supported by [PJ5]
- [C24] Chulmin Kim*, Ki-Woong Park, KyoungSoo Park, and Kyu Ho Park†, “Rethinking Deduplication in Cloud: From Data Profiling to Blueprint,” 7th IEEE International Conference on Networked Computing and Advanced Information Management, Jun. 2011, supported by [PJ5]
- [C23] Ki-Woong Park*, Chulmin Kim, and Kyu Ho Park†, “BLAST: Applying Streaming Ciphers into Outsourced Cloud Storage,” IEEE International Conference on Parallel and Distributed Systems, Dec. 2010, supported by [PJ5]
- [C22] Ki-Woong Park*, Woomin Hwang, and Kyu Ho Park†, “FalconEye: Data Center Status Extraction using Vision-Transformation Techniques,” IEEE COMPSAC 2010-CloudApp, supported by [PJ5]
- [C21] Ki-Woong Park*, Sung-Kyu Park, and Kyu Ho Park†, “THEMIS: Towards mutual-verifiable billing transaction for cloud computing environment,” IEEE International Conference on CLOUD 2010, supported by [PJ5]
- [C20] Woomin Hwang*, Yangwoo Roh, Youngwoo Park, Ki-Woong Park, and Kyu Ho Park†, “HyperDealer: Reference-pattern-aware instant memory balancing for Consolidated Virtual Machines,” IEEE International Conference on CLOUD 2010 Industry Track, supported by [PJ4]
- [C19] Ki-Woong Park*, Byung-Cheol Kim, Jong-Woon Yoo, and Kyu Ho Park†, “Enabling Sportive Games with a Do-It-Yourself Wearable Computing Platform,” IEEE Game Innovation Conference 2010, supported by [PJ2]
- [C18] Jong-Woon Yoo*, Ki-Woong Park, Sung-Kyu Park, and Kyu Ho Park†, “PokerFace: Game Players Themselves Are Truly Memorable,” IEEE Game Innovation Conference 2010, supported by [PJ2]
- [C17] Ki-Woong Park*, Woong Choi, and Kyu Ho Park†, “SqueezeBall: Enabling Intuitive Copy and Paste using Soft Ball-Type Device as Mobile Clipboard,” IEEE International Symposium on ISWC 2010, Late Breaking Results Session, supported by [PJ2]
- [C16] Ki-Woong Park*, Jong-Woon Yoo, Sung-Kyu Park, Yo-Won Jeong, Woomin Hwang, Kyu Ho Park, Hyunjung Kim, Boram Lee, and Woohun Lee†, “Our Experiences on the Design and Implementation of Wearable Computer: From Body-Storming to Realized Services,” IEEE International Symposium on ISWC 2010, Video Paper Session
- [C15] Hyunchul Seok*, Ki-Woong Park, and Kyu Ho Park†, “Secure Remote Desktop with Necklace-Type Security Device,” IEEE International Symposium on ISWC 2010, Video Paper Session, supported by [PJ2]
- [C14] Ki-Woong Park*, Sung-Kyu Park, Jong-Woon Yoo, and Kyu Ho Park†, “Towards Interactive Museum: Mapping Cultural Contexts to Historical Objects,” ACM Mibile HCI 2009, supported by [PJ2]
- [C13] Jong-Woon Yoo*, Woong Choi, Ki-Woong Park, and Kyu Ho Park†, “An Intuitive Data Transfer Technique using Bartender’s Gesture,” ACM Multimedia 2009, supported by [PJ2]
- [C12] Ki-Woong Park*, and Kyu Ho Park†, “Authentication Latency Reduction Technique for Secure and Seamless Ubiquitous Services,” 2nd International Conference on ICON, Nov. 28-30, 2007, supported by [PJ2]
- [C11] Yo-Won Jeong*, Chul Lee, Ki-Woong Park, and Kyu Ho Park†, “An Application for Efficient Management of User Created Content in Ubiquitous Fashionable Computer,” 2nd International Conference on ICON, Nov. 28-30, 2007, supported by [PJ2]
- [C10] Sung-Kyu Park*, Ki-Woong Park, and Kyu Ho Park†, “Mobile Office Platform, PPP-UFC, providing Mobility and Intuitive Presentation,” 2nd International Conference on ICON, Nov. 28-30, 2007, supported by [PJ2]
- [C9] Ki-Woong Park*, Jupyung Lee, Jong-Woon Yoo, Seung-Ho Lim, Sung-Kyu Park, and Kyu Ho Park, “A Ubiquitous Space User Interface (UUI) of Ubiquitous Fashionable Computer in a Ubiquitous Computing Environment, U-TOPIA,” 2nd International Conference on ICON, Nov. 28-30, 2007, supported by [PJ2]
- [C8] Ki-Woong Park*, Hyunchul Seok, and Kyu Ho Park†, “pKASSO: Towards Seamless Authentication providing Non-Repudiation on Resource-Constrained Devices,” 21st IEEE Conference on Advanced Information Networking and Applications Workshops (AINAW’07), May 2007, supported by [PJ2]
- [C7] Kyu Ho Park, Ki-Woong Park*, Jupyung Lee, Jong-Woon Yoo, Seung-Ho Lim†, “A Ubiquitous Environment with a Wearable Platform, UFC and its Security Infrastructure, pKASSO,” 2nd European Conference on Ambient Intelligence, Nov 2007, supported by [PJ2]
- [C6] Jupyung Lee*, Seung-Ho Lim, Jong-Woon Yoo, Ki-Woong Park, Hyun-Jin Choi, and Kyu Ho Park†, “A Ubiquitous Fashionable Computer with an i-Throw Device,” 21st IEEE Conference on Advanced Information Networking and Applications Workshops (AINAW’07), May 2007, supported by [PJ2]
- [C5] Jong-Woon Yoo*, Yo-Won Jeong, Yong Song, Jupyung Lee, Seung-Ho Lim, Ki-Woong Park, and Kyu Ho Park†, “i-Throw: A New Gesture-based Wearable Input Device with Target Selection Algorithm,” Proceedings of International Conference on Machine Learning and Cybernetics, September 2007, supported by [PJ2]
- [C4] Ki-Woong Park*, Sang Seok Lim, Hosung Song, and Kyu Ho Park†, “A New PKI-based Single Sign-On Protocol for a Diminutive Security Device, PANDA, in a Ubiquitous Security Environment,” 8th IEEE Symposium on Systems & Information Security, November 2006, supported by [PJ2]
- [C3] Jong-Woon Yoo, Ki-Woong Park*, Seung-Ho Lim, Jupyung Lee, Hyun-Jin Choi, and Kyu Ho Park†, “A Ubiquitous Intuitive Interaction with a Wearable Computer,” 4th IEEE International Conference on Pervasive Computer and Communications(PerCom 2006), March 2006, supported by [PJ2]
- [C2] Ki-Woong Park*, Hyun-Jin Choi, and Kyu Ho Park†, “An Interoperable Authentication System using ZigBee-enabled Tiny Portable Device and PKI,” Proceedings of International Conference on ICON, October 2005, pp.63-68, supported by [PJ2]
- [C1] Seung-Ho Lim*, Hyun-Jin Choi, Ki-Woong Park, Jong-Woon Yoo, and Kyu Ho Park†, “Interoperable wearable computer with intuitive device i-Throw,” Proceedings of International Conference on ICON, October 2005, pp.211-218, supported by [PJ2]