{"id":277,"date":"2018-10-05T17:41:23","date_gmt":"2018-10-05T08:41:23","guid":{"rendered":"http:\/\/caislab.kaist.ac.kr\/html\/wordpress\/?page_id=277"},"modified":"2021-01-14T12:19:47","modified_gmt":"2021-01-14T03:19:47","slug":"thesis","status":"publish","type":"page","link":"https:\/\/caislab.kaist.ac.kr\/?page_id=277","title":{"rendered":"Thesis"},"content":{"rendered":"[vc_row fullwidth=&#8221;true&#8221; css=&#8221;.vc_custom_1537781978182{margin-bottom: 40px !important;}&#8221;][vc_column][vc_column_text align=&#8221;center&#8221; el_class=&#8221;hpagetitle_container&#8221; css=&#8221;.vc_custom_1538746421768{margin-bottom: 0px !important;}&#8221;]Publications<\/p>\n<p>Thesis<\/p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1537783822927{margin-bottom: 35px !important;}&#8221;][vc_column][vc_column_text el_class=&#8221;hconference_h2 &#8221; css=&#8221;.vc_custom_1610565022625{margin-bottom: 0px !important;}&#8221;]2021[\/vc_column_text][vc_separator][vc_column_text el_class=&#8221;hconference_content&#8221; css=&#8221;.vc_custom_1610594316196{margin-bottom: 0px !important;}&#8221;]\n<ul>\n<li>Harry Chandra Tanuwidjaja, &#8220;<a href=\"http:\/\/caislab.kaist.ac.kr\/publication\/thesis_files\/2021\/HRPHD.pdf\">Deep Abstraction for Android Malware Detection and Recent Development on Privacy-Preserving Deep Learning<\/a>&#8220;, \ubc15\uc0ac\ud559\uc704\ub17c\ubb38<\/li>\n<\/ul>\n<ul>\n<li>Edwin Ayisi Opare, &#8220;<a href=\"http:\/\/caislab.kaist.ac.kr\/publication\/thesis_files\/2021\/EDPHD.pdf\">Towards Afkoin: A Distributed Ledger Technology-Based Quantum Resistant Central Bank Digital Currency for the Economic Community of West African States<\/a>&#8220;, \ubc15\uc0ac\ud559\uc704\ub17c\ubb38<\/li>\n<\/ul>\n<ul>\n<li>\uc774\uc9c0\uc740, &#8220;<a href=\"https:\/\/caislab.kaist.ac.kr\/publication\/thesis_files\/2021\/JUPHD.pdf\">Quantum Resistance on Modes of Operation in Block Ciphers<\/a>&#8220;, \ubc15\uc0ac\ud559\uc704\ub17c\ubb38<\/li>\n<\/ul>\n[\/vc_column_text][vc_column_text el_class=&#8221;hconference_h2 &#8221; css=&#8221;.vc_custom_1578377069234{margin-bottom: 0px !important;}&#8221;]2020[\/vc_column_text][vc_separator][vc_column_text el_class=&#8221;hconference_content&#8221; css=&#8221;.vc_custom_1610594362166{margin-bottom: 0px !important;}&#8221;]\n<ul>\n<li>\ubc31\uc2b9\uadfc, &#8220;<a href=\"http:\/\/caislab.kaist.ac.kr\/publication\/thesis_files\/2020\/SGMS.pdf\">Differential Neural Cryptanalysis against Reduced-round SIMON64\/96, CHAM64\/128, and HIGHT<\/a>&#8220;, \uc11d\uc0ac\ud559\uc704\ub17c\ubb38<\/li>\n<\/ul>\n<ul>\n<li>\uc774\ub098\ube44, &#8220;<a href=\"http:\/\/caislab.kaist.ac.kr\/publication\/thesis_files\/2020\/NBMS.pdf\">A Study on Artifacts Classification and Sentiment Analysis by Deep Learning in KakaoTalk Messages under Android and Windows Environments<\/a>&#8220;, \uc11d\uc0ac\ud559\uc704\ub17c\ubb38<\/li>\n<\/ul>\n<ul>\n<li>\ud64d\ub3d9\uc5f0, &#8220;<a href=\"http:\/\/caislab.kaist.ac.kr\/publication\/thesis_files\/2020\/DYMS.pdf\">Instantiation of Apon et al.&#8217;s GKE (PQCrypto 2019) and its vulnerability by key-reuse attack<\/a>&#8220;, \uc11d\uc0ac\ud559\uc704\ub17c\ubb38<\/li>\n<\/ul>\n<ul>\n<li>\ud55c\uc131\ud638, &#8220;<a href=\"http:\/\/caislab.kaist.ac.kr\/publication\/thesis_files\/2020\/SHMS.pdf\">Implementation of Static and 3-round Group Key Agreement with RLWE Assumption<\/a>&#8220;, \uc11d\uc0ac\ud559\uc704\ub17c\ubb38<\/li>\n<\/ul>\n<ul>\n<li>\ucd5c\ub77d\uc6a9, &#8220;<a href=\"https:\/\/caislab.kaist.ac.kr\/publication\/thesis_files\/2021\/RYPHD.pdf\">Key-reusable Dynamic Group Key Exchange from Lattice with Quantum Resistance<\/a>&#8220;,\u00a0\ubc15\uc0ac\ud559\uc704\ub17c\ubb38<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1537783822927{margin-bottom: 35px !important;}&#8221;][vc_column][vc_column_text el_class=&#8221;hconference_h2 &#8221; css=&#8221;.vc_custom_1565757684133{margin-bottom: 0px !important;}&#8221;]2019[\/vc_column_text][vc_separator][vc_column_text el_class=&#8221;hconference_content&#8221; css=&#8221;.vc_custom_1610594382619{margin-bottom: 0px !important;}&#8221;]\n<ul>\n<li>\ucd5c\ub099\uc900, &#8220;<a href=\"http:\/\/caislab.kaist.ac.kr\/publication\/thesis_files\/2019\/NJMS.pdf\">Frequency Injection and Glitch Attack on Ring Oscillator based True Random Number Generators<\/a>&#8220;, \uc11d\uc0ac\ud559\uc704\ub17c\ubb38<\/li>\n<\/ul>\n<ul>\n<li>\ubc15\uc7ac\ubbfc, &#8220;<a href=\"https:\/\/caislab.kaist.ac.kr\/publication\/thesis_files\/2021\/JMPHD.pdf\">Security-enhanced cloud VPN with SGX and enclave migration<\/a>&#8220;, \ubc15\uc0ac\ud559\uc704\ub17c\ubb38<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1537783822927{margin-bottom: 35px !important;}&#8221;][vc_column][vc_column_text el_class=&#8221;hconference_h2 &#8221; css=&#8221;.vc_custom_1537783001914{margin-bottom: 0px !important;}&#8221;]2018[\/vc_column_text][vc_separator][vc_column_text el_class=&#8221;hconference_content&#8221; css=&#8221;.vc_custom_1538746502772{margin-bottom: 0px !important;}&#8221;]\n<ul>\n<li>\uae40\uc131\uc219, &#8220;<a href=\"http:\/\/caislab.kaist.ac.kr\/publication\/thesis_files\/2018\/SSMS.pdf\" target=\"_blank\" rel=\"noopener\">IGE \ubaa8\ub4dc\ub97c \uc0ac\uc6a9\ud55c \ube14\ub85d\uc554\ud638\uc758 \uc591\uc790 \uc548\uc804\uc131<\/a>&#8220;, \uc11d\uc0ac\ud559\uc704\ub17c\ubb38<\/li>\n<\/ul>\n<ul>\n<li>\uc548\ud615\ucca0, &#8220;<a href=\"http:\/\/caislab.kaist.ac.kr\/publication\/thesis_files\/2018\/HCMS.pdf\" target=\"_blank\" rel=\"noopener\">Design and Analysis of Decentralized Public Key Infrastructure with Quantum-resistant Signatures<\/a>&#8220;, \uc11d\uc0ac\ud559\uc704\ub17c\ubb38<\/li>\n<\/ul>\n<ul>\n<li>Aminanto Muhamad Erza, &#8220;<a href=\"http:\/\/caislab.kaist.ac.kr\/publication\/thesis_files\/2018\/AMPhD.pdf\" target=\"_blank\" rel=\"noopener\">Utilizing Deep Abstraction for Higher Intrusion-Detection in Wireless Networks<\/a>&#8220;, \ubc15\uc0ac\ud559\uc704\ub17c\ubb38<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1537783828576{margin-bottom: 35px !important;}&#8221;][vc_column][vc_column_text el_class=&#8221;hconference_h2 &#8221; css=&#8221;.vc_custom_1537783658666{margin-bottom: 0px !important;}&#8221;]2017[\/vc_column_text][vc_separator][vc_column_text el_class=&#8221;hconference_content&#8221; css=&#8221;.vc_custom_1538746549682{margin-bottom: 0px !important;}&#8221;]\n<ul>\n<li>\uc774\uc131\ud6c8, &#8220;<a href=\"http:\/\/caislab.kaist.ac.kr\/\/publication\/thesis_files\/2017\/SHMS.pdf\" target=\"_blank\" rel=\"noopener\">\ube14\ub85d\uccb4\uc778\uc744 \uc774\uc6a9\ud55c \uc2a4\ub9c8\ud2b8 \uadf8\ub9ac\ub4dc \uc2dc\uc2a4\ud15c\uc758 \uae30\uae30 \uc778\uc99d \ubc29\uc548<\/a>&#8220;, \uc11d\uc0ac\ud559\uc704\ub17c\ubb38<\/li>\n<\/ul>\n<ul>\n<li>\ud64d\uc9c4\uc544, &#8220;<a href=\"http:\/\/caislab.kaist.ac.kr\/\/publication\/thesis_files\/2017\/JAMS.pdf\" target=\"_blank\" rel=\"noopener\">RecurFI: Practical Coarse-Grained CFI on Windows Binary Code<\/a>&#8220;, \uc11d\uc0ac\ud559\uc704\ub17c\ubb38<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1537783828576{margin-bottom: 35px !important;}&#8221;][vc_column][vc_column_text el_class=&#8221;hconference_h2 &#8221; css=&#8221;.vc_custom_1537783836028{margin-bottom: 0px !important;}&#8221;]2016[\/vc_column_text][vc_separator][vc_column_text el_class=&#8221;hconference_content&#8221; css=&#8221;.vc_custom_1538746700684{margin-bottom: 0px !important;}&#8221;]\n<ul>\n<li>\ubc15\uc900\uc815, &#8220;<a href=\"http:\/\/caislab.kaist.ac.kr\/publication\/thesis_files\/2016\/JJMS.pdf\" target=\"_blank\" rel=\"noopener\">A Scheme on Monetary Evaluation of State Secrets<\/a>&#8220;, \uc11d\uc0ac\ud559\uc704\ub17c\ubb38<\/li>\n<\/ul>\n<ul>\n<li>\uc815\uc81c\uc131, &#8220;<a href=\"http:\/\/caislab.kaist.ac.kr\/publication\/thesis_files\/2016\/JSMS.pdf\" target=\"_blank\" rel=\"noopener\">S-RAY : Secure Routing Algorithm based on Yen\u2019s algorithm for a Network<\/a>&#8220;, \uc11d\uc0ac\ud559\uc704\ub17c\ubb38<\/li>\n<\/ul>\n<ul>\n<li>\uc815\uc120\uc6b1, &#8220;<a href=\"http:\/\/caislab.kaist.ac.kr\/publication\/thesis_files\/2016\/SWMS.pdf\" target=\"_blank\" rel=\"noopener\">\uae30\uacc4\ud559\uc2b5 \uc54c\uace0\ub9ac\uc998\uc744 \uc774\uc6a9\ud55c \uce68\uc785\ud0d0\uc9c0 \uc131\ub2a5\ud5a5\uc0c1 \ubc29\uc548\uc5f0\uad6c<\/a>&#8220;, \uc11d\uc0ac\ud559\uc704\ub17c\ubb38<\/li>\n<\/ul>\n<ul>\n<li>\uae40\uacbd\ubbfc, &#8220;<a href=\"http:\/\/caislab.kaist.ac.kr\/publication\/thesis_files\/2016\/KMMS.pdf\" target=\"_blank\" rel=\"noopener\">A Bio-inspired Intrusion Detection System for Unknown-attacks combining Ant Clustering Algorithm and Decision Tree<\/a>&#8220;, \uc11d\uc0ac\ud559\uc704\ub17c\ubb38<\/li>\n<\/ul>\n<ul>\n<li>\uc548\uc218\ud604, &#8220;<a href=\"http:\/\/caislab.kaist.ac.kr\/publication\/thesis_files\/2016\/SHMS.pdf\" target=\"_blank\" rel=\"noopener\">A Countermeasure against Spoofing and DoS Attacks based on Message Sequence and Temporary ID in CAN<\/a>&#8220;, \uc11d\uc0ac\ud559\uc704\ub17c\ubb38<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1537783822927{margin-bottom: 35px !important;}&#8221;][vc_column][vc_column_text el_class=&#8221;hconference_h2 &#8221; css=&#8221;.vc_custom_1537784113634{margin-bottom: 0px !important;}&#8221;]2015[\/vc_column_text][vc_separator][vc_column_text el_class=&#8221;hconference_content&#8221; css=&#8221;.vc_custom_1538746775194{margin-bottom: 0px !important;}&#8221;]\n<ul>\n<li>halid Huseynov, &#8220;<a href=\"http:\/\/caislab.kaist.ac.kr\/publication\/thesis_files\/2014\/KL_Thesis.pdf\" target=\"_blank\" rel=\"noopener\">Hadoop-based P2P Botnet Traffic Classification Using Random Forests<\/a>&#8220;, \uc11d\uc0ac\ud559\uc704\ub17c\ubb38<\/li>\n<\/ul>\n<ul>\n<li>\uc774\ub3d9\uc218, &#8220;<a href=\"http:\/\/caislab.kaist.ac.kr\/publication\/thesis_files\/2014\/DS_Thesis.pdf\" target=\"_blank\" rel=\"noopener\">Improving Detection Capability of Flow-based IDS in SDN<\/a>&#8220;, \uc11d\uc0ac\ud559\uc704\ub17c\ubb38<\/li>\n<\/ul>\n<ul>\n<li>\uae40\ud559\uc8fc, &#8220;<a href=\"http:\/\/caislab.kaist.ac.kr\/publication\/thesis_files\/2015\/HakJu Kim_MS_thesis_final.pdf\" target=\"_blank\" rel=\"noopener\">Design and Analysis of Authenticated Encryption Scheme based on the Sponge Function<\/a>&#8220;, \uc11d\uc0ac\ud559\uc704\ub17c\ubb38<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1537783822927{margin-bottom: 35px !important;}&#8221;][vc_column][vc_column_text el_class=&#8221;hconference_h2 &#8221; css=&#8221;.vc_custom_1538746792194{margin-bottom: 0px !important;}&#8221;]2014<\/p>\n[\/vc_column_text][vc_separator][vc_column_text el_class=&#8221;hconference_content&#8221; css=&#8221;.vc_custom_1538746816784{margin-bottom: 0px !important;}&#8221;]\n<ul>\n<li>\uc2e0\uc6a9\uc8fc, &#8220;<a href=\"http:\/\/caislab.kaist.ac.kr\/publication\/thesis_files\/2014\/YJ_thesis.pdf\" target=\"_blank\" rel=\"noopener\">&#8220;Secure and Efficient Data Deduplication Techniques for Cloud Storage Systems<\/a>&#8220;, \ubc15\uc0ac\ud559\uc704\ub17c\ubb38<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1537783822927{margin-bottom: 35px !important;}&#8221;][vc_column][vc_column_text el_class=&#8221;hconference_h2 &#8221; css=&#8221;.vc_custom_1538746827525{margin-bottom: 0px !important;}&#8221;]2013<\/p>\n[\/vc_column_text][vc_separator][vc_column_text el_class=&#8221;hconference_content&#8221; css=&#8221;.vc_custom_1538746843845{margin-bottom: 0px !important;}&#8221;]\n<ul>\n<li>\uc774\ud604\ub85d, &#8220;<a href=\"http:\/\/caislab.kaist.ac.kr\/publication\/thesis_files\/2013\/Dissertation_tank_final.pdf\" target=\"_blank\" rel=\"noopener\">DDoS Attack Exploiting Location Information and its Mitigation over Wireless Networks<\/a>&#8220;, \ubc15\uc0ac\ud559\uc704\ub17c\ubb38<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1537783822927{margin-bottom: 35px !important;}&#8221;][vc_column][vc_column_text el_class=&#8221;hconference_h2 &#8221; css=&#8221;.vc_custom_1538746850101{margin-bottom: 0px !important;}&#8221;]2012<\/p>\n[\/vc_column_text][vc_separator][vc_column_text el_class=&#8221;hconference_content&#8221; css=&#8221;.vc_custom_1538746951686{margin-bottom: 0px !important;}&#8221;]\n<ul>\n<li>\uae40\uc9c4, &#8220;<a href=\"http:\/\/caislab.kaist.ac.kr\/publication\/thesis_files\/2012\/Zeen KIm Thesis_v1.pdf\" target=\"_blank\" rel=\"noopener\">Privacy-Preserving Information Aggregation and Authentication in the Distributed and Mobile Networks<\/a>&#8220;, \ubc15\uc0ac\ud559\uc704\ub17c\ubb38<\/li>\n<\/ul>\n<ul>\n<li>\ubc15\uc774\uc7ac,&#8221;<a href=\"http:\/\/caislab.kaist.ac.kr\/publication\/thesis_files\/2012\/Thesis_English_Yi_Jae_Park.pdf\" target=\"_blank\" rel=\"noopener\">A Study on Shoulder-Surfing Resistant Passowrd Scheme for Smart Devices with Full-touch Screen<\/a>&#8220;,\uc11d\uc0ac\ud559\uc704\ub17c\ubb38<\/li>\n<\/ul>\n<ul>\n<li>\uc815\ub3c4\uc601,&#8221;<a href=\"http:\/\/caislab.kaist.ac.kr\/publication\/thesis_files\/2012\/Doyoung-chung_Master2012.pdf\" target=\"_blank\" rel=\"noopener\">A Study on Privacy-preserving Authentication Scheme in Home Area Network under Smart Grid System<\/a>&#8220;, \uc11d\uc0ac\ud559\uc704\ub17c\ubb38<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1537783822927{margin-bottom: 35px !important;}&#8221;][vc_column][vc_column_text el_class=&#8221;hconference_h2 &#8221; css=&#8221;.vc_custom_1538746962586{margin-bottom: 0px !important;}&#8221;]2011<\/p>\n[\/vc_column_text][vc_separator][vc_column_text el_class=&#8221;hconference_content&#8221; css=&#8221;.vc_custom_1538747045747{margin-bottom: 0px !important;}&#8221;]\n<ul>\n<li>Made Harta Dwijaksara, &#8220;<a href=\"http:\/\/caislab.kaist.ac.kr\/publication\/thesis_files\/2011\/Thesis_Made.pdf\" target=\"_blank\" rel=\"noopener\">A Secure and Energy Efficient Communication Scheme for Wireless Sensor Networks<\/a>&#8220;, \uc11d\uc0ac\ud559\uc704\ub17c\ubb38<\/li>\n<\/ul>\n<ul>\n<li>\uc784\uc900\ud604, &#8220;<a href=\"http:\/\/caislab.kaist.ac.kr\/publication\/thesis_files\/2011\/Thesis_Junhyun.pdf\" target=\"_blank\" rel=\"noopener\">A Study on Efficient Anonymous Authentication Scheme in Vehicular Ad-hoc Networks<\/a>&#8220;, \uc11d\uc0ac\ud559\uc704\ub17c\ubb38<\/li>\n<\/ul>\n<ul>\n<li>Divyan Munirathnam Konidala, &#8220;<a href=\"http:\/\/caislab.kaist.ac.kr\/publication\/thesis_files\/2011\/Thesis_Divyan.pdf\" target=\"_blank\" rel=\"noopener\">Secure and Privacy-Preserving Protocols for RFID Applications<\/a>&#8220;, \ubc15\uc0ac\ud559\uc704\ub17c\ubb38<\/li>\n<\/ul>\n<ul>\n<li>\uae40\uc7a5\uc131, &#8220;<a href=\"http:\/\/caislab.kaist.ac.kr\/publication\/thesis_files\/2011\/Jangseong_KAIST_Thesis_v9.pdf\" target=\"_blank\" rel=\"noopener\">A Scalable Privacy-Preserving Authentication Framework for the Public Ubiquitous Computing Environments<\/a>&#8220;, \ubc15\uc0ac\ud559\uc704\ub17c\ubb38<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1537783822927{margin-bottom: 35px !important;}&#8221;][vc_column][vc_column_text el_class=&#8221;hconference_h2 &#8221; css=&#8221;.vc_custom_1538747073568{margin-bottom: 0px !important;}&#8221;]2010<\/p>\n[\/vc_column_text][vc_separator][vc_column_text el_class=&#8221;hconference_content&#8221; css=&#8221;.vc_custom_1538747170777{margin-bottom: 0px !important;}&#8221;]\n<ul>\n<li>\ud55c\uaddc\uc11d, &#8220;<a href=\"http:\/\/caislab.kaist.ac.kr\/publication\/thesis_files\/2010\/Thesis_Kyusuk.pdf\" target=\"_blank\" rel=\"noopener\">Advanced Security Schemes in Sensor Networks and Mobile Networks<\/a>&#8220;, \ubc15\uc0ac\ud559\uc704\ub17c\ubb38<\/li>\n<\/ul>\n<ul>\n<li>Dang Nguyen Duc, &#8220;<a href=\"http:\/\/caislab.kaist.ac.kr\/publication\/thesis_files\/2010\/Duc_Thesis.pdf\" target=\"_blank\" rel=\"noopener\">A Study on Cryptographic Protocols for RFID Tags<\/a>&#8220;, \ubc15\uc0ac\ud559\uc704\ub17c\ubb38 [\ubc1c\ud45c\uc790\ub8cc]<\/li>\n<\/ul>\n<ul>\n<li>\uc2e0\uc2b9\ubaa9, &#8220;<a href=\"http:\/\/caislab.kaist.ac.kr\/publication\/thesis_files\/2010\/Thesis_SSM.pdf\" target=\"_blank\" rel=\"noopener\">A Study on authentication scheme for channel assignment mechanism in multi-radio multi-channel wireless mesh networks<\/a>&#8220;, \uc11d\uc0ac\ud559\uc704\ub17c\ubb38<\/li>\n<\/ul>\n<ul>\n<li>\ucd5c\uc784\uc131, &#8220;<a href=\"http:\/\/caislab.kaist.ac.kr\/publication\/thesis_files\/2010\/Thesis_Imsung.pdf\" target=\"_blank\" rel=\"noopener\">A Study on Location-Based Authenticated Key Agreement Scheme in Wireless Sensor and Actor Networks<\/a>&#8220;, \uc11d\uc0ac\ud559\uc704\ub17c\ubb38<\/li>\n<\/ul>\n<ul>\n<li>\uc720\uba85\ud55c, &#8220;<a href=\"http:\/\/caislab.kaist.ac.kr\/publication\/thesis_files\/2010\/Thesis_Myunghan.pdf\" target=\"_blank\" rel=\"noopener\">A Study on a Secure Clustering Scheme in Wireless Sensor Network<\/a>&#8220;, \uc11d\uc0ac\ud559\uc704\ub17c\ubb38<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1537783822927{margin-bottom: 35px !important;}&#8221;][vc_column][vc_column_text el_class=&#8221;hconference_h2 &#8221; css=&#8221;.vc_custom_1538747206088{margin-bottom: 0px !important;}&#8221;]2009<\/p>\n[\/vc_column_text][vc_separator][vc_column_text el_class=&#8221;hconference_content&#8221; css=&#8221;.vc_custom_1538747304337{margin-bottom: 0px !important;}&#8221;]\n<ul>\n<li>\uacfd\ubbfc\ud61c, &#8220;<a href=\"http:\/\/caislab.kaist.ac.kr\/publication\/thesis_files\/2009\/Thesis_Minhae.pdf\" target=\"_blank\" rel=\"noopener\">A Light-weight Authentication Protocol using Integer Arithmetic for Low-cost Tags<\/a>&#8220;, \uc11d\uc0ac\ud559\uc704\ub17c\ubb38<\/li>\n<\/ul>\n<ul>\n<li>\ub178\ud55c\uc601, &#8220;<a href=\"http:\/\/caislab.kaist.ac.kr\/publication\/thesis_files\/2009\/Thesis_Hanyoung.pdf\" target=\"_blank\" rel=\"noopener\">Complexity-based Packed Executable Classification with High Accuracy<\/a>&#8220;, \uc11d\uc0ac\ud559\uc704\ub17c\ubb38<\/li>\n<\/ul>\n<ul>\n<li>\ubc15\ud61c\uc6d0, &#8220;<a href=\"http:\/\/caislab.kaist.ac.kr\/publication\/thesis_files\/2009\/Thesis_Hyewon.pdf\" target=\"_blank\" rel=\"noopener\">A Study on Identity-based Group Key Agreement Schemes with Anonymity<\/a>&#8220;, \uc11d\uc0ac\ud559\uc704\ub17c\ubb38<\/li>\n<\/ul>\n<ul>\n<li>\ubb38\ud61c\ub780, &#8220;<a href=\"http:\/\/caislab.kaist.ac.kr\/publication\/thesis_files\/2009\/Thesis_Hyeran.pdf\" target=\"_blank\" rel=\"noopener\">A Study on Authentication and Key Agreement for 3GPP-WLAN Interworking<\/a>&#8220;, \uc11d\uc0ac\ud559\uc704\ub17c\ubb38<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1537783822927{margin-bottom: 35px !important;}&#8221;][vc_column][vc_column_text el_class=&#8221;hconference_h2 &#8221; css=&#8221;.vc_custom_1538747317709{margin-bottom: 0px !important;}&#8221;]2008<\/p>\n[\/vc_column_text][vc_separator][vc_column_text el_class=&#8221;hconference_content&#8221; css=&#8221;.vc_custom_1538747361088{margin-bottom: 0px !important;}&#8221;]\n<ul>\n<li>Vo Duc Liem, &#8220;A Study on Provably Secure Authentication Schemes from Bilinear Pairings&#8221;, \ubc15\uc0ac\ud559\uc704\ub17c\ubb38<\/li>\n<\/ul>\n<ul>\n<li>\uc724\uc131\uc900, &#8220;<a href=\"http:\/\/caislab.kaist.ac.kr\/publication\/thesis_files\/2008\/thesis-sungjune.pdf\" target=\"_blank\" rel=\"noopener\">A Study on Localized Multi-user Broadcast Authentication Protocol for Wireless Sensor Networks<\/a>&#8220;, \uc11d\uc0ac\ud559\uc704\ub17c\ubb38<\/li>\n<\/ul>\n<ul>\n<li>\uc9c0\uc131\ubc30, &#8220;<a href=\"http:\/\/caislab.kaist.ac.kr\/publication\/thesis_files\/2008\/thesis-sungbae.pdf\" target=\"_blank\" rel=\"noopener\">RFID-enabled Extensible Authentication Framework and Its Applications<\/a>&#8220;, \uc11d\uc0ac\ud559\uc704\ub17c\ubb38<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1537783822927{margin-bottom: 35px !important;}&#8221;][vc_column][vc_column_text el_class=&#8221;hconference_h2 &#8221; css=&#8221;.vc_custom_1538747369137{margin-bottom: 0px !important;}&#8221;]2007<\/p>\n[\/vc_column_text][vc_separator][vc_column_text el_class=&#8221;hconference_content&#8221; css=&#8221;.vc_custom_1538747412730{margin-bottom: 0px !important;}&#8221;]\n<ul>\n<li>\uc11c\uc601\uc900, &#8220;<a href=\"http:\/\/caislab.kaist.ac.kr\/publication\/thesis_files\/2007\/thesis-yjseo.pdf\" target=\"_blank\" rel=\"noopener\">A Study on Scalable and Untraceable Authentication Protocol of RFID Tags<\/a>&#8220;, \uc11d\uc0ac\ud559\uc704\ub17c\ubb38<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1537783822927{margin-bottom: 35px !important;}&#8221;][vc_column][vc_column_text el_class=&#8221;hconference_h2 &#8221; css=&#8221;.vc_custom_1538747376698{margin-bottom: 0px !important;}&#8221;]2006<\/p>\n[\/vc_column_text][vc_separator][vc_column_text el_class=&#8221;hconference_content&#8221; css=&#8221;.vc_custom_1538747446369{margin-bottom: 0px !important;}&#8221;]\n<ul>\n<li>\ubc15\uc7ac\ubbfc, &#8220;<a href=\"http:\/\/caislab.kaist.ac.kr\/publication\/thesis_files\/2006\/thesis-jmpark-v3.pdf\" target=\"_blank\" rel=\"noopener\">A Study on Key Management Schemes for Wireless Sensor Networks<\/a>&#8220;, \uc11d\uc0ac\ud559\uc704\ub17c\ubb38<\/li>\n<\/ul>\n<ul>\n<li>\uc774\uc0c1\uc2e0, &#8220;<a href=\"http:\/\/caislab.kaist.ac.kr\/publication\/thesis_files\/2006\/thesis-sangshin.pdf\" target=\"_blank\" rel=\"noopener\">Mutual Authentication of RFID System using Synchronized Secret Information<\/a>&#8220;, \uc11d\uc0ac\ud559\uc704\ub17c\ubb38<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1537783822927{margin-bottom: 35px !important;}&#8221;][vc_column][vc_column_text el_class=&#8221;hconference_h2 &#8221; css=&#8221;.vc_custom_1538747386917{margin-bottom: 0px !important;}&#8221;]2005<\/p>\n[\/vc_column_text][vc_separator][vc_column_text el_class=&#8221;hconference_content&#8221; css=&#8221;.vc_custom_1538747502389{margin-bottom: 0px !important;}&#8221;]\n<ul>\n<li>\uc591\uc815\uaddc, &#8220;<a href=\"http:\/\/caislab.kaist.ac.kr\/publication\/thesis_files\/2005\/thesis_jkyang.pdf\" target=\"_blank\" rel=\"noopener\">Security and Privacy on Authentication Protocol for Low-cost Radio Frequency Identification<\/a>&#8220;, \uc11d\uc0ac\ud559\uc704\ub17c\ubb38<\/li>\n<\/ul>\n<ul>\n<li>\uac15\uc11d\uaddc, &#8220;<a href=\"http:\/\/caislab.kaist.ac.kr\/publication\/thesis_files\/2005\/thesis_skkang.pdf\" target=\"_blank\" rel=\"noopener\">Design of Unlinkable Transaction Protocol For Preserving Customer Privacy<\/a>&#8220;, \uc11d\uc0ac\ud559\uc704\ub17c\ubb38<\/li>\n<\/ul>\n<ul>\n<li>Ping Wang, &#8220;<a href=\"http:\/\/caislab.kaist.ac.kr\/publication\/thesis_files\/2005\/thesis_pwang.pdf\" target=\"_blank\" rel=\"noopener\">Tamper Resistance for Software Protection<\/a>&#8220;, \uc11d\uc0ac\ud559\uc704\ub17c\ubb38<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1537783822927{margin-bottom: 35px !important;}&#8221;][vc_column][vc_column_text el_class=&#8221;hconference_h2 &#8221; css=&#8221;.vc_custom_1538747518967{margin-bottom: 0px !important;}&#8221;]2004<\/p>\n[\/vc_column_text][vc_separator][vc_column_text el_class=&#8221;hconference_content&#8221; css=&#8221;.vc_custom_1538747702340{margin-bottom: 0px !important;}&#8221;]\n<ul>\n<li>\ud55c\uaddc\uc11d, &#8220;<a href=\"http:\/\/caislab.kaist.ac.kr\/publication\/thesis_files\/2004\/kshan_2004.pdf\" target=\"_blank\" rel=\"noopener\">Location Authentication in Ubiquitous Computing Environment<\/a>&#8220;, \uc11d\uc0ac\ud559\uc704\ub17c\ubb38<\/li>\n<\/ul>\n<ul>\n<li>\uc7a5\ud654\uc120, &#8220;<a href=\"http:\/\/caislab.kaist.ac.kr\/publication\/thesis_files\/2004\/w20022122_chs.pdf\" target=\"_blank\" rel=\"noopener\">A Study on Securing AES against Differential Power Analysis<\/a>&#8220;, \uc11d\uc0ac\ud559\uc704\ub17c\ubb38<\/li>\n<\/ul>\n<ul>\n<li>\ucd5c\ucca0\uc900, &#8220;<a href=\"http:\/\/caislab.kaist.ac.kr\/publication\/thesis_files\/2004\/ccj_2003.pdf\" target=\"_blank\" rel=\"noopener\">A Study on Digital Signature Secure Against Key Exposure<\/a>&#8220;, \uc11d\uc0ac\ud559\uc704\ub17c\ubb38<\/li>\n<\/ul>\n<ul>\n<li>\uae40\ubcd1\uace4, &#8220;<a href=\"http:\/\/caislab.kaist.ac.kr\/publication\/thesis_files\/2004\/Thesis_bgKim.pdf\" target=\"_blank\" rel=\"noopener\">Design of Fair Tracing E-cash System based on Blind Signature<\/a>&#8220;, \uc11d\uc0ac\ud559\uc704\ub17c\ubb38<\/li>\n<\/ul>\n<ul>\n<li>Konidala Munirathnam Divyan, &#8220;A Secure and Privacy Enhanced Location-based Service Transaction Protocol in Ubiquitous Computing Environment&#8221;, \uc11d\uc0ac\ud559\uc704\ub17c\ubb38<\/li>\n<\/ul>\n<ul>\n<li>\uc774\uc1a1\uc6d0, &#8220;<a href=\"http:\/\/caislab.kaist.ac.kr\/publication\/thesis_files\/2004\/swlee.pdf\" target=\"_blank\" rel=\"noopener\">Threshold Password-Authenticated Key Retrieval Protocol Using Bilinear Pairings<\/a>&#8220;, \uc11d\uc0ac\ud559\uc704\ub17c\ubb38<\/li>\n<\/ul>\n<ul>\n<li>\uae40\uc9c4, &#8220;<a href=\"http:\/\/caislab.kaist.ac.kr\/publication\/thesis_files\/2004\/zeenkim_thesis.pdf\" target=\"_blank\" rel=\"noopener\">Probably-Secure Identification Scheme based on Conjugacy and DDH Problems<\/a>&#8220;, \uc11d\uc0ac\ud559\uc704\ub17c\ubb38<\/li>\n<\/ul>\n<ul>\n<li>\uc774\uc0c1\uc6d0, &#8220;<a href=\"http:\/\/caislab.kaist.ac.kr\/publication\/thesis_files\/2004\/ternary_paper.pdf\" target=\"_blank\" rel=\"noopener\">A New Group Key Agreement Scheme based on Ternary Tree<\/a>&#8220;, \uc11d\uc0ac\ud559\uc704\ub17c\ubb38<\/li>\n<\/ul>\n<ul>\n<li>\uae40\uc911\ub9cc, &#8220;<a href=\"http:\/\/caislab.kaist.ac.kr\/publication\/thesis_files\/2004\/Master_thesis_kjm.pdf\" target=\"_blank\" rel=\"noopener\">Intrusion-Resilient Key-Evolving Protocol under the Discrete Logarithm Problem<\/a>&#8220;, \uc11d\uc0ac\ud559\uc704\ub17c\ubb38<\/li>\n<\/ul>\n<ul>\n<li>\ubbfc\uc131\uc900, &#8220;<a href=\"http:\/\/caislab.kaist.ac.kr\/publication\/thesis_files\/2004\/w20022052.pdf\" target=\"_blank\" rel=\"noopener\">A Study on the Security of NTRUSign digital signature scheme<\/a>&#8220;, \uc11d\uc0ac\ud559\uc704\ub17c\ubb38<\/li>\n<\/ul>\n<ul>\n<li>\ucd5c\uc218\uae38, &#8220;Design of Efficient Protocol for Location Privacy in Mobile IPv6&#8221;, \uc11d\uc0ac\ud559\uc704\ub17c\ubb38<\/li>\n<\/ul>\n<ul>\n<li>\ubc15\uc7ac\ud601, &#8220;<a href=\"http:\/\/caislab.kaist.ac.kr\/publication\/thesis_files\/2004\/Thesis_jaehyrk_Park.pdf\" target=\"_blank\" rel=\"noopener\">A Study on Secure Group Mutual Exclusion Algorithm<\/a>&#8220;, \uc11d\uc0ac\ud559\uc704\ub17c\ubb38<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1537783822927{margin-bottom: 35px !important;}&#8221;][vc_column][vc_column_text el_class=&#8221;hconference_h2 &#8221; css=&#8221;.vc_custom_1538747718480{margin-bottom: 0px !important;}&#8221;]2003<\/p>\n[\/vc_column_text][vc_separator][vc_column_text el_class=&#8221;hconference_content&#8221; css=&#8221;.vc_custom_1538747828112{margin-bottom: 0px !important;}&#8221;]\n<ul>\n<li>Dang Nguyen Duc, &#8220;Forward-Secure Blind Signature Scheme Based on the Strong RSA Assumption&#8221;, \uc11d\uc0ac\ud559\uc704\ub17c\ubb38<\/li>\n<\/ul>\n<ul>\n<li><a href=\"http:\/\/caislab.kaist.ac.kr\/publication\/thesis_files\/2003\/2001824-liem.pdf\" target=\"_blank\" rel=\"noopener\">Provably Secure Threshold Blind Signature Scheme Using Pairings<\/a>&#8220;, \uc11d\uc0ac\ud559\uc704\ub17c\ubb38<\/li>\n<\/ul>\n<ul>\n<li>\ucd5c\ud615\uae30, &#8220;Design of E-cash System Using Group Signature&#8221;, \uc11d\uc0ac\ud559\uc704\ub17c\ubb38<\/li>\n<\/ul>\n<ul>\n<li>\uc774\uc0c1\uc6d0, &#8220;<a href=\"http:\/\/caislab.kaist.ac.kr\/publication\/thesis_files\/2003\/w2001807(sangwonLee).pdf\" target=\"_blank\" rel=\"noopener\">A New Group Key Agreement Scheme Based on Ternary tree<\/a>&#8220;, \uc11d\uc0ac\ud559\uc704\ub17c\ubb38<\/li>\n<\/ul>\n<ul>\n<li>\ud568\uc6b0\uc11d, &#8220;<a href=\"http:\/\/caislab.kaist.ac.kr\/publication\/thesis_files\/2003\/charlie.pdf\" target=\"_blank\" rel=\"noopener\">Design of Secure and Efficient E-commerce Protocols Using Cryptographic Primitives<\/a>&#8220;, \uc11d\uc0ac\ud559\uc704\ub17c\ubb38<\/li>\n<\/ul>\n<ul>\n<li>\uc774\ud604\ub85d, &#8220;<a href=\"http:\/\/caislab.kaist.ac.kr\/publication\/thesis_files\/2003\/Tank_Thesis.pdf\" target=\"_blank\" rel=\"noopener\">A Study on Adaptive Authentication Mechanism for Virtual Community<\/a>&#8220;, \uc11d\uc0ac\ud559\uc704\ub17c\ubb38<\/li>\n<\/ul>\n<ul>\n<li>Yan Xie, &#8220;<a href=\"http:\/\/caislab.kaist.ac.kr\/publication\/thesis_files\/2003\/thesis_yan.pdf\" target=\"_blank\" rel=\"noopener\">A study on Fair Electronic Cash System with and without TTP<\/a>&#8220;, \uc11d\uc0ac\ud559\uc704\ub17c\ubb38<\/li>\n<\/ul>\n<ul>\n<li>\uae40\uc885\uc2b9, &#8220;Provably Secure Anonymous Authentication Protocol based on Hash Chains&#8221;, \uc11d\uc0ac\ud559\uc704\ub17c\ubb38<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1537783822927{margin-bottom: 35px !important;}&#8221;][vc_column][vc_column_text el_class=&#8221;hconference_h2 &#8221; css=&#8221;.vc_custom_1538747841083{margin-bottom: 0px !important;}&#8221;]2002<\/p>\n[\/vc_column_text][vc_separator][vc_column_text el_class=&#8221;hconference_content&#8221; css=&#8221;.vc_custom_1538747940754{margin-bottom: 0px !important;}&#8221;]\n<ul>\n<li>\uc774\ub9cc\ud638, &#8220;<a href=\"http:\/\/caislab.kaist.ac.kr\/publication\/thesis_files\/2002\/mhlee.ps\" target=\"_blank\" rel=\"noopener\">A Study on Micro-payment Systems for Multiple-shopping<\/a>&#8220;, \uc11d\uc0ac\ud559\uc704\ub17c\ubb38<\/li>\n<\/ul>\n<ul>\n<li>\uae40\uc9c4\ud638, &#8220;<a href=\"http:\/\/caislab.kaist.ac.kr\/publication\/thesis_files\/2002\/kman.ps\" target=\"_blank\" rel=\"noopener\">Experimental Design of the Internet Voting System using PKI<\/a>&#8220;, \uc11d\uc0ac\ud559\uc704\ub17c\ubb38<\/li>\n<\/ul>\n<ul>\n<li>\ubc15\uc7ac\uad00, &#8220;<a href=\"http:\/\/caislab.kaist.ac.kr\/publication\/thesis_files\/2002\/rookie.ps\" target=\"_blank\" rel=\"noopener\">A Study on Certificates in PKI<\/a>&#8220;, \uc11d\uc0ac\ud559\uc704\ub17c\ubb38<\/li>\n<\/ul>\n<ul>\n<li>\uae40\uba85\uc120, &#8220;<a href=\"http:\/\/caislab.kaist.ac.kr\/publication\/thesis_files\/2002\/mskim.pdf\" target=\"_blank\" rel=\"noopener\">Provably Secure Identification Protocol based on the Bilinear Diffie-Hellman Problem<\/a>&#8220;, \uc11d\uc0ac\ud559\uc704\ub17c\ubb38<\/li>\n<\/ul>\n<ul>\n<li>\uc774\ubcd1\ucc9c, &#8220;<a href=\"http:\/\/caislab.kaist.ac.kr\/publication\/thesis_files\/2002\/phd-thesis-bclee-ICU2002.pdf\" target=\"_blank\" rel=\"noopener\">Zero-Knowledge Proofs, Digital Signature Variants, and Their Applications<\/a>&#8220;, \ubc15\uc0ac\ud559\uc704\ub17c\ubb38<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1537783822927{margin-bottom: 35px !important;}&#8221;][vc_column][vc_column_text el_class=&#8221;hconference_h2 &#8221; css=&#8221;.vc_custom_1538747996514{margin-bottom: 0px !important;}&#8221;]2000<\/p>\n[\/vc_column_text][vc_separator][vc_column_text el_class=&#8221;hconference_content&#8221; css=&#8221;.vc_custom_1538748046573{margin-bottom: 0px !important;}&#8221;]\n<ul>\n<li>\ubc31\uc900\uc0c1, &#8220;A study on provable security of public-key encryption schemes and key agreement protocols&#8221;, \uc11d\uc0ac\ud559\uc704\ub17c\ubb38<\/li>\n<\/ul>\n<ul>\n<li>\uc1a1\ubcf4\uc5f0, &#8220;<a href=\"http:\/\/caislab.kaist.ac.kr\/publication\/thesis_files\/2000\/bysong.ps\" target=\"_blank\" rel=\"noopener\">A Study on Key Agreement Protocol based on Diffie-Hellman Problem<\/a>&#8220;, \uc11d\uc0ac\ud559\uc704\ub17c\ubb38<\/li>\n<\/ul>\n<ul>\n<li>\uae40\ud76c\uc120, &#8220;Improving Security and Efficiency of Electronic Cash and Mobile Agent Applicable to Electronic Commerce&#8221;, \uc11d\uc0ac\ud559\uc704\ub17c\ubb38<\/li>\n<\/ul>\n<ul>\n<li>\uace0\uc7ac\uc2b9, &#8220;Wireless authentication Protocols Assuring U ser Anonymity and End-to-End Confidentiality&#8221;, \uc11d\uc0ac\ud559\uc704\ub17c\ubb38<\/li>\n<\/ul>\n<ul>\n<li>\ubc31\uc900\uc0c1, &#8220;A study on provable security of public-key encryption schemes and key agreement protocols&#8221;, \uc11d\uc0ac\ud559\uc704\ub17c\ubb38<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1537783822927{margin-bottom: 35px !important;}&#8221;][vc_column][vc_column_text el_class=&#8221;hconference_h2 &#8221; css=&#8221;.vc_custom_1538747977995{margin-bottom: 0px !important;}&#8221;]2001<\/p>\n[\/vc_column_text][vc_separator][vc_column_text el_class=&#8221;hconference_content&#8221; css=&#8221;.vc_custom_1538747989872{margin-bottom: 0px !important;}&#8221;]\n<ul>\n<li>\uc548\uad6d\ud658, &#8220;A Study on Design and Implementation of Tapping Alert Protocol&#8221;, \uc11d\uc0ac\ud559\uc704\ub17c\ubb38<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1537784304258{margin-bottom: 90px !important;}&#8221;][vc_column][vc_column_text el_class=&#8221;hconference_h2 &#8221; css=&#8221;.vc_custom_1538748058893{margin-bottom: 0px !important;}&#8221;]1999<\/p>\n[\/vc_column_text][vc_separator][vc_column_text el_class=&#8221;hconference_content&#8221; css=&#8221;.vc_custom_1538748110575{margin-bottom: 0px !important;}&#8221;]\n<ul>\n<li>\uc11c\ubb38\uc11d, &#8220;A study on Cryptographic Primitives for Secure Electronic Financial Services (\uc548\uc804\ud55c \uc804\uc790\uae08\uc735 \uc11c\ube44\uc2a4 \uc2e4\ud604\uc744 \uc704\ud55c \uae30\ubc18 \uc554\ud638 \uae30\uc220\uc5d0 \uad00\ud55c \uc5f0\uad6c)&#8221;, \uc11d\uc0ac\ud559\uc704\ub17c\ubb38<\/li>\n<\/ul>\n<ul>\n<li>\ud5c8\uc6d0\uadfc, &#8220;<a href=\"http:\/\/caislab.kaist.ac.kr\/publication\/thesis_files\/1999\/abcxyz.pdf\" target=\"_blank\" rel=\"noopener\">A Study on Electronic Election Protocol Using Secret Sharing Scheme and Anonymous Channels (\ube44\ubc00\uacf5\uc720 \ubc29\uc2dd\uacfc \uc775\uba85\ud1b5\uc2e0\ub85c\ub97c \uc774\uc6a9\ud55c \uc804\uc790\uc120\uac70 \ud504\ub85c\ud1a0\ucf5c\uc5d0 \uad00\ud55c \uc5f0\uad6c)<\/a>&#8220;, \uc11d\uc0ac\ud559\uc704\ub17c\ubb38<\/li>\n<\/ul>\n<ul>\n<li>\ud669\uaddc\ubc94, &#8220;Research of Computer Virus Diagostic Method (\ucef4\ud4e8\ud130 \ubc14\uc774\ub7ec\uc2a4 \uc9c4\ub2e8\ubc95 \uc5f0\uad6c)&#8221;, \uc11d\uc0ac\ud559\uc704\ub17c\ubb38<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column][\/vc_row]\n","protected":false},"excerpt":{"rendered":"<p>[vc_row fullwidth=&#8221;true&#8221; css=&#8221;.vc_custom_1537781978182{margin-bottom: 40px !important;}&#8221;][vc_column][vc_column_text align=&#8221;center&#8221; el_class=&#8221;hpagetitle_container&#8221; css=&#8221;.vc_custom_1538746421768{margin-bottom: 0px !important;}&#8221;]Publications Thesis [\/vc_column_text][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1537783822927{margin-bottom: 35px !important;}&#8221;][vc_column][vc_column_text el_class=&#8221;hconference_h2 &#8221; css=&#8221;.vc_custom_1610565022625{margin-bottom: 0px !important;}&#8221;]2021[\/vc_column_text][vc_separator][vc_column_text el_class=&#8221;hconference_content&#8221; css=&#8221;.vc_custom_1610594316196{margin-bottom: 0px !important;}&#8221;] Harry Chandra Tanuwidjaja, &#8220;Deep Abstraction for Android Malware Detection and Recent Development on Privacy-Preserving Deep Learning&#8220;, \ubc15\uc0ac\ud559\uc704\ub17c\ubb38 Edwin Ayisi Opare, &#8220;Towards Afkoin: A Distributed Ledger Technology-Based Quantum Resistant Central Bank Digital [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/caislab.kaist.ac.kr\/index.php?rest_route=\/wp\/v2\/pages\/277"}],"collection":[{"href":"https:\/\/caislab.kaist.ac.kr\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/caislab.kaist.ac.kr\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/caislab.kaist.ac.kr\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/caislab.kaist.ac.kr\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=277"}],"version-history":[{"count":16,"href":"https:\/\/caislab.kaist.ac.kr\/index.php?rest_route=\/wp\/v2\/pages\/277\/revisions"}],"predecessor-version":[{"id":679,"href":"https:\/\/caislab.kaist.ac.kr\/index.php?rest_route=\/wp\/v2\/pages\/277\/revisions\/679"}],"wp:attachment":[{"href":"https:\/\/caislab.kaist.ac.kr\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=277"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}