!-->!-->!-->
Contents
Publication
2012
- ½Å¿µÁÖ, ±è±¤Á¶ "Ŭ¶ó¿ìµå ½ºÅ丮Áö¿¡¼ ¾ÏÈ£ÈµÈ µ¥ÀÌÅÍÀÇ ¼ÒÀ¯±Ç Áõ¸í ±â¹ý", 2012 Á¤º¸º¸È£Çмú¹ßǥȸ³í¹®Áý ÃæûÁöºÎ, pp.117-125, 2012.11.2. Çѳ²´ëÇб³, ´ëÀü.
- ÀÌÇö·Ï, ±è±¤Á¶ "WLAN »ó¿¡¼ÀÇ ºÐ»ê °¡»ó Àç¸Ó °ø°Ý", 2012 Á¤º¸º¸È£Çмú¹ßǥȸ³í¹®Áý ÃæûÁöºÎ, pp.134-143, 2012.11.2. Çѳ²´ëÇб³, ´ëÀü. - [¿ì¼ö³í¹®]
2011
2010
- ÀÓÁØÇö, ÇѱԼ®, ±è±¤Á¶, "ZigBee WPAN¿¡¼ÀÇ ¾ÈÀüÇÑ Å° °ü¸®±â¹ý°ú ÀÎÁõ ÇÁ·ÎÅäÄÝ", CISC-S'10 Proceedings, pp.249-254, 2010.6.18, POSTECH, Æ÷Ç×.
- ±èÁø, ±è±¤Á¶, "Li µîÀÇ ID±â¹Ý ¹æ¼ÛÇü Signcryption±â¹ýÀÇ ¾ÈÀü¼º ºÐ¼®", CISC-S'10 Proceedings, pp.11-13, 2010.6.18, POSTECH, Æ÷Ç×.
- Made Harta Dwijaksara and Kwangjo Kim, "Detecting DDoS Attack in Mobile Ad Hoc Network Based on Network Density Awareness", CISC-S'10 Proceedings, pp.199-203, 2010.6.18, POSTECH, Æ÷Ç×.
- Divyan M. Konidala and Kwangjo Kim, "Light-weight Security for RFID Tag-Reader Communication", CISC-S'10 Proceedings, pp.212-215, 2010.6.18, POSTECH, Æ÷Ç×.
2009
- À¯¸íÇÑ, ±è±¤Á¶, "(Im)Possibility of Denial-of-Service Attacks on Network Layer in Wireless Mesh Networks", CISC-W'09 Proceedings, pp.77-81, 2009.12.5, ¿¬¼¼´ëÇб³, ¼¿ï.
- ÃÖÀÓ¼º, ±èÁø, ±è±¤Á¶, "¹«¼±¼¾¼ ³×Æ®¿öÅ©¿¡¼ ¾ÈÀüÇÏ°í È¿À²ÀûÀÎ ¹æ¼ÛÇü ÀÎÁõ ±â¹ý ¿¬±¸, CISC-W'09 Proceedings, pp.206-213, 2009.12.5, ¿¬¼¼´ëÇб³, ¼¿ï. -[¿ì¼ö³í¹®]
- ½Å½Â¸ñ, À̱â¿, ±è±¤Á¶, "¸ð¹ÙÀÏȯ°æÀ» À§ÇØ ¼öÁ¤µÈ TPMÀÌ ÀåÂøµÈ µð¹ÙÀ̽ºÀÇ ¿ø°Ý À͸í ÀÔÁõ ÇÁ·ÎÅäÄÝ", CISC-W'09 Proceedings, pp.382-386, 2009.12.5, ¿¬¼¼´ëÇб³, ¼¿ï.
- Dang Nguyen Duc and Kwangjo Kim, "Grouping-Proof Protocol for RFID Tags: Security Definition and Scalable Construction", CISC-W'09 Proceedings, pp.222-226, 2009.12.5, ¿¬¼¼´ëÇб³, ¼¿ï. -[¿ì¼ö³í¹®]
- ¹ÚÇý¿ø, Asano Tomoyuki, ±è±¤Á¶, "³»ºÎÀÚ¿¡ ÀÇÇÑ À§Àå °ø°ÝÀ» ¹æÁöÇÏ´Â °³¼±µÈ ID ±â¹Ý ±×·ì ÀÎÁõ ¹× Å° ÇÕÀÇ ÇÁ·ÎÅäÄÝ", Çѱ¹Á¤º¸º¸È£ÇÐȸ³í¹®Áö, pp.25-34, 2009.10.31.
- ¹ÚÇý¿ø, ¹®Çý¶õ, ÀÓÁØÇö, ±è±¤Á¶, "¾Öµå Ȥ³×Æ®¿öÅ©¿¡¼ÀÇ º¹¼ö ±×·ìÀ» °í·ÁÇÑ ID ±â¹Ý ±×·ìÅ° ÇÕÀÇ ÇÁ·ÎÅäÄÝ",CISC-S'09 Proceedings, pp.123-128, 2009.6.19, °¿ø´ëÇб³, »ïô.
- À¯¸íÇÑ, ±èÀ强, ±è±¤Á¶, "Áß¿ä ȯ°æ °¨½Ã¸ñÀûÀÇ ¿¡³ÊÁö º¸À¯·®À» °í·ÁÇÑ ¶ó¿ìÆà ÇÁ·ÎÅäÄÝ¿¡¼ÀÇ ¾ÈÀüÇÑ Å¬·¯½ºÅÍ Çü¼º±â¹ý", CISC-S'09 Proceedings,pp.135-149, 2009.6.19, °¿ø´ëÇб³, »ïô.
- ½Å½Â¸ñ, ±è±¤Á¶, "¾Æ¸¶Á¸ S3¸¦ ÅëÇØ º» Ŭ¶ó¿ìµå ÄÄÇ»Æà ȯ°æ¿¡¼ÀÇ ½ºÅ丮Áö º¸¾È", CISC-S'09 Proceedings, pp.147-151, 2009.6.19, °¿ø´ëÇб³, »ïô.
- ±èÀ强, À¯¸íÇÑ, ±è±¤Á¶, "u-City¿¡¼ ¼¾¼³×Æ®¿öÅ©¿¡ ±â¹ÝÀ» µÐ ÀÚ³à ¾È½É¼ºñ½ºÀÇ º¸¾È¿ä±¸»çÇ× ºÐ¼® ¹× ½Ã½ºÅÛ Á¦¾È", CISC-S'09 Proceedings, pp.374-380, 2009.6.19, °¿ø´ëÇб³, »ïô.
- Dang Nguyen Duc and Kwangjo Kim, "O-FRAP+: Enhancing Security of a Forward secure RFID Authentication Protocol", CISC-S'09 Proceedings, pp.406-410, 2009.6.19, °¿ø´ëÇб³, »ïô.
2008
- °û¹ÎÇý, ±è±¤Á¶, "Ãë¾à¼º ºÐ¼®À» ÅëÇÑ °æ·® RFID ÀÎÁõ ÇÁ·ÎÅäÄÝ °íÂû", CISC-W'08 Proceedings, pp.201-208, 2008.12.6, °í·Á´ëÇб³, ¼¿ï.
- ½Å½Â¸ñ, ±è±¤Á¶, "¼öÁß À½Çâ ¼¾¼ ³×Æ®¿öÅ©¸¦ À§ÇÑ ¾ÈÀüÇÑ ½Ã°£ µ¿±âÈ ±â¹ý ¿¬±¸", CISC-W'08 Proceedings, pp.191-196, 2008.12.6, °í·Á´ëÇб³, ¼¿ï.
- ¹®Çý¶õ, ÇѱԼ®, ±è±¤Á¶, "3G-WLAN »óÈ£¿¬µ¿: EAP-AKA¿¡ ±â¹ÝÀ» µÐ »õ·Î¿î ÀÎÁõ ¹× Å° ÇÕÀÇ ÇÁ·ÎÅäÄÝ", CISC-W'08 Proceedings, pp.99-103, 2008.12.6, °í·Á´ëÇб³, ¼¿ï.
- ³ëÇÑ¿µ, ±èÀ强, ±è±¤Á¶, "Æ÷·»½ÄÀ» °í·ÁÇÑ ÈÞ´ëÆù °³ÀÎÁ¤º¸ º¸È£ ±â¹ý", CISC-W'08 Proceedings, pp.66-69, 2008.12.6, °í·Á´ëÇб³, ¼¿ï.
- ¹ÚÇý¿ø, ±è±¤Á¶, "ÀÏÁ¤ÇÑ ¼öÀÇ ¶ó¿îµå¸¦ °¡Áö´Â ±×·ì Å° ÇÕÀÇ ÇÁ·ÎÅäÄÝÀÇ Á¶»ç ºÐ¼®", 2008³âµµ Çѱ¹Á¤º¸º¸È£ÇÐȸ ÃæûÁöºÎ Çмú¹ßǥȸ ³í¹®Áý, pp.151-164, 2008.10.17, ¹èÀç´ëÇб³,´ëÀü.
- ÃÖÀÓ¼º, ±èÁø, ±è±¤Á¶, "¹«¼± ¼¾¼ ³×Æ®¿öÅ©¿¡¼ ¾ÈÀüÇÑ Å¬·¯½ºÅ͸µ ÇÁ·ÎÅäÄݵéÀÇ ¾ÈÀü¼º ºÐ¼®", 2008³âµµ Çѱ¹Á¤º¸º¸È£ÇÐȸ ÃæûÁöºÎ Çмú¹ßǥȸ ³í¹®Áý, pp.85-91, 2008.10.17, ¹èÀç´ëÇб³, ´ëÀü.
- ±èÀ强, ±Ç¹Ì¿µ, ±èÀÌÇü, °û¹ÎÇý, ÇѱԼ®, ±è±¤Á¶, " °¨½ÃÁ¤Âû ¼¾¼³×Æ®¿öÅ© ¹× ÁÖ¿ä ½Ã¼³¹° °ü¸®¿¡¼ÀÇ Å° °ü¸® ±â¹ý ºñ±³",2008³âµµ Çѱ¹Á¤º¸º¸È£ÇÐȸ ÃæûÁöºÎ Çмú¹ßǥȸ ³í¹®Áý, pp.75-83, 2008.10.17, ¹èÀç´ëÇб³,´ëÀü.
- ÇѱԼ®, À±Âù¿±, ±è±¤Á¶, "Çã°¡µÈ ¹üÀ§ ¿ÜÀÇ µµÃ»À» ¹æÁöÇÏ´Â ¾ÏÈ£ Åë½Å º¹È£È Å° Á¦°ø ¹æ½Ä", CISC-S'08 Proceedings, pp.212-215, 2008.6.26,¼øõÇâ´ëÇб³, õ¾È.
- ³ëÇÑ¿µ, ±è±¤Á¶, "¿ÀŽÁö Á¤È®µµ¸¦ °³¼±ÇÑ ½ÇÇà¾ÐÃà ÆÇ´Ü ±â¹ý ¿¬±¸", CISC-S'08 Proceedings, pp.384-387, 2008.6.26, ¼øõÇâ´ëÇб³, õ¾È.
- °û¹ÎÇý, ±è±¤Á¶, "Á¤¼ö¿¬»ê¹æ½ÄÀ» Àû¿ëÇÑ Àú°¡ ÀüÀÚű×ÀÇ °æ·® ÀÎÁõ±â¹ý ¿¬±¸", CISC-S'08 Proceedings, pp.157-161, 2008.6.26, ¼øõÇâ´ëÇб³, õ¾È.
- ½Å½Â¸ñ, ÃÖÀÓ¼º, ±è±¤Á¶, "¹«¼± ¼¾¼ ³×Æ®¿öÅ©¿¡¼ÀÇ ¾ÈÀüÇÑ ³×Æ®¿öÅ© ÀçÇÁ·Î±×·¡¹Ö ±â¹ý", CISC-S'08 Proceedings, pp.162-167, 2008.6.26, ¼øõÇâ´ëÇб³, õ¾È.
- ½Å½Â¸ñ, ÀÌÇö·Ï, Divyan M Konidala, ±è±¤Á¶, "ºñÆ® ½ºÅ©·¥ºíÀ» ÅëÇØ °³¼±µÈ RFIDsec07ÀÇ »óÈ£ ÀÎÁõ ÇÁ·ÎÅäÄÝ ", 2008³âµµ Çѱ¹Á¤º¸º¸È£ÇÐȸ ¿µ³²ÁöºÎ Çмú¹ßǥȸ ³í¹®Áý, pp.89-93, 2008.2.20, µ¿¼´ëÇб³, ºÎ»ê.
2007
- Dang Nguyen Duc and Kwangjo Kim, "A Lightweight Key Agreement Protocol Based on LPN Problem", CISC-W'07 Proceedings, pp.709-712, 2007.12.1, »ó¸í´ëÇб³, ¼¿ï.
- Duc-Liem Vo and Kwangjo Kim, "Impersonation Attack of a Mutual Authentication Scheme Using Smart Card and its Improvement", CISC-W'07 Proceedings, pp.697-700, 2007.12.1, »ó¸í´ëÇб³, ¼¿ï.
- Divyan M Konidala, Zeen Kim, Chan Yeob Yeun, Jin Li, and Kwangjo Kim, "Secure Approach to Deploy RFID-based Applications in Smart Home Environment", CISC-W'07 Proceedings , pp.717-720, 2007.12.1,»ó¸í´ëÇб³, ¼¿ï.
- Áö¼º¹è, ±è±¤Á¶, " ICAO ±Ô°Ý ÀüÀÚ¿©±ÇÀÇ º¸¾È ¹®Á¦ Á¶»ç ºÐ¼® ", CISC-W'07 Proceedings, pp.449-452, 2007.12.1, »ó¸í´ëÇб³, ¼¿ï.
- ±èÁø, ±èÀ强, °¿µµÎ, Á¤ÃæÈñ, ±è±¤Á¶, " ¿øÀÚ·Â ¹ßÀü¼Ò µðÁöÅÐ ½Ã½ºÅÛÀÇ º¸¾È ¿ä±¸ »çÇ× ", CISC-W'07 Proceedings, pp.248-251, 2007.12.1, »ó¸í´ëÇб³, ¼¿ï.
- À±¼ºÁØ, ÀÌÇö·Ï, ±è±¤Á¶, " ÀÌÁ¾¸ÁÀ» °í·ÁÇÑ ¹«¼±¼¾¼³×Æ®¿öÅ©¿¡¼ÀÇ ´ÙÁß »ç¿ëÀÚ ¹æ¼ÛÇü ÀÎÁõ ±â¹ý", CISC-W'07 Proceedings, pp.173-176, 2007.12.1, »ó¸í´ëÇб³, ¼¿ï.
- ÀÌÇö·Ï, ³ëÇÑ¿µ, ¹ÚÀç¹ü, ±è±¤Á¶, " ³µ¶È ¼¹ö¸¦ ÀÌ¿ëÇÑ ¼ÒÇÁÆ®¿þ¾î º¸È£¹æ½Ä ", CISC-W'07 Proceedings, pp.410-413, 2007.12.1, »ó¸í´ëÇб³, ¼¿ï.
- ÇѱԼ®, Áö¼º¹è, ±è±¤Á¶, "ID ±â¹Ý ¾ÏÈ£ ±â¼úÀ» ÀÌ¿ëÇÑ VoIP º¸¾È ¼ºñ½º ¼³°è ¹× ±¸Çö", CISC-W'07 Proceedings, pp.540-543, 2007.12.1,»ó¸í´ëÇб³, ¼¿ï.
- Zeen Kim, Jangseong Kim, Youngdoo Kang, Kwangjo Kim, Dai I. Kim and Choongheui Jeong, "Guideline of Cyber Security Policy for Digitial I&C Systems in Nuclear Power Plant", in Transactions of the Korean Nuclear Society Autumn Meeting, Oct. 25-26, 2007, PyeongChang, Korea.
- À±¼ºÁØ, ÀÌÇö·Ï, ±è±¤Á¶, "¹«¼± ¼¾¼ ³×Æ®¿öÅ©¿¡ Àû¿ëµÇ´Â ¹æ¼ÛÇü ÀÎÁõ ±â¹ýÀÇ Á¶»ç ºÐ¼®", 2007³âµµ Á¤º¸º¸È£Çмú¹ßǥȸ³í¹®Áý, pp.211-219, 2007. 10.12, Çѱ¹±â¼ú±³À°´ëÇб³ Á¦ 4°øÇаü.
- Áö¼º¹è, ÀÌÇö·Ï, À±¼ºÁØ, ±è±¤Á¶, " ÀüÀÚÅÂ±× ½Ã½ºÅÛÀ» À§ÇÑ ÀÎÁõ ÇÁ·¹ÀÓ¿öÅ©ÀÇ ¿ä±¸ »çÇ×", 2007³âµµ Á¤º¸º¸È£Çмú¹ßǥȸ³í¹®Áý, pp.63-70, 2007. 10.12, Çѱ¹±â¼ú±³À°´ëÇб³ Á¦ 4°øÇаü.
- ³ëÇÑ¿µ, ÀÌÇö·Ï, ±è±¤Á¶, "Çϵå¿þ¾î °íÀ¯ ¹øÈ£ ±â¹Ý ¼ÒÇÁÆ®¿þ¾î º¸È£ ¹æ½Ä", CISC-S'07 Proceedings, pp.385-390, 2007. 6.22, ´Ü±¹´ëÇб³ õ¾ÈÄ·ÆÛ½º Á¦3°úÇаü.
- ÇѱԼ®, ±è±¤Á¶, "Á¢±Ù ±ÇÇÑÀÌ ÀÖ´Â ³»ºÎ »ç¿ëÀÚ¿¡ ÀÇÇÑ Á¤º¸ À¯Ãâ ¹æÁö¸¦ À§ÇÑ ±â¼úÀû º¸¾È ¹æ¾È ¿¬±¸", CISC-S'07 Proceedings, pp. 487-490, 2007. 6.22, ´Ü±¹´ëÇб³ õ¾ÈÄ·ÆÛ½º Á¦3°úÇаü.
- Áö¼º¹è, ÀÌÇö·Ï, ±è±¤Á¶, "´ëÇÐ ¹«¼± ·£¿¡ Àû¿ëµÇ´Â »õ·Î¿î È®Àå °¡´É ÀÎÁõ ÇÁ·ÎÅäÄÝ", 2007³âµµ Á¤º¸º¸È£ÇÐȸ ¿µ³²ÁöºÎ Çмú¹ßǥȸ³í¹®Áý, pp. 149-156, 2007. 2.23, ´ë±¸ÇÑÀÇ´ë ¹ÙÀÌ¿À¼¾ÅÍ, ´ë±¸.
- À±¼ºÁØ, ÀÌÇö·Ï, ±è±¤Á¶, "¼¾¼ ³ëµå¿¡¼ÀÇ È¿À²ÀûÀÎ NTRUEncrypt", 2007³âµµ Á¤º¸º¸È£ÇÐȸ ¿µ³²ÁöºÎ Çмú¹ßǥȸ³í¹®Áý, pp. 26-31, 2007. 2.23, ´ë±¸ÇÑÀÇ´ë ¹ÙÀÌ¿À¼¾ÅÍ, ´ë±¸.
2006
- ÀÌÇö·Ï, ¼¿µÁØ, ±è¿Ï½Ä, ±è±¤Á¶, "SLRRP ±â¹ÝÀÇ ¾ÈÀüÇÑ RFID ¸®´õ ÇÁ·ÎÅäÄÝ ¿¬±¸", CISC-W'06 Proceedings, pp. 301-305, 2006. 12.9, ¼¼Á¾´ëÇб³, ¼¿ï.
- Dang Nguyen Duc and Kwangjo Kim, "Secure HB+ against Man-in-the-middle Attacks", CISC-W'06 Proceedings, pp. 265-272, 2006. 12.9, ¼¼Á¾´ëÇб³, ¼¿ï.
- ¼¿µÁØ, ÀÌÇö·Ï, ±è±¤Á¶, "A Lightweight Authentication Protocol based on Universal Re-encryption of RFID Tags", CISC-W'06 Proceedings, pp. 207-212, 2006. 12.9, ¼¼Á¾´ëÇб³, ¼¿ï.
- Duc-Liem Vo and Kwangjo Kim, "An Enhanced Secure Key Issuing Protocol", CISC-W'06 Proceedings, pp. 21-26, 2006. 12.9, ¼¼Á¾´ëÇб³, ¼¿ï.
- ±èÁø, ±èÁ߸¸, ±è±¤Á¶, "VOIP Å°º¹±¸ ½Ã½ºÅÛÀÇ º¸¾È ¿ä±¸»çÇ×",2006³âµµ Á¤º¸º¸È£Çмú¹ßǥȸ³í¹®Áý, pp. 127-133, 2006. 9.29-30, ¸ñ¿ø´ëÇб³, ´ëÀü.
- Divyan M. Konidala and Kwangjo Kim, "Light-weight RFID Tag-Reader Mutual Authentication Scheme", 2006³âµµ Á¤º¸º¸È£Çмú¹ßǥȸ³í¹®Áý, pp. 179-194, 2006. 9.29-30, ¸ñ¿ø´ëÇб³, ´ëÀü.
- ÇѱԼ®, ¼¿µÁØ, À±¼ºÁØ, ±è±¤Á¶, "Enhancing Security for Vertical Handoff in SARAH under the Heterogeneous Networks", 2006³âµµ Á¤º¸º¸È£Çмú¹ßǥȸ³í¹®Áý, pp. 159-166, 2006.9.29-30, ¸ñ¿ø´ëÇб³, ´ëÀü.
- ÇѱԼ®, ±è±¤Á¶, "½Å·Ú ±â°üÀ» ÅëÇÑ À§Ä¡ Á¤º¸ ±â¹Ý ¼ºñ½ºÀÇ ÇÁ¶óÀ̹ö½Ã º¸È£ ¹× ÀÎÁõ ±â¹ý", CISC-S'06 Proceedings vol.16, no.1, p.623-p.626, 2006.6.30-7.1, ºÎ°æ´ëÇб³, ºÎ»ê.
- ÀÌÇö·Ï, ±è±¤Á¶, "Auto-ID LabÀ» ÅëÇÑ RFID º¸¾È±â¼ú ¿¬±¸µ¿Çâ ", 2006³âÇѱ¹Á¤º¸º¸È£ÇÐȸ ¿µ³²ÁöºÎ Çмú´ëȸ ³í¹®Áý, pp.151-157, 2006.2.23, ºÎ»ê´ëÇб³, ºÎ»ê.
- Ç㼺ö, ±è±¤Á¶, "µ¿Àû±×·ìÀ» À§ÇÑ °³¼±µÈ ±×·ì ÀÎÁõÅ° ÇÕÀÇ ÇÁ·ÎÅäÄÝ ", 2006³â Çѱ¹Á¤º¸º¸È£ÇÐȸ ¿µ³²ÁöºÎ Çмú´ëȸ ³í¹®Áý, pp.67-74, 2006.2.23, ºÎ»ê´ëÇб³, ºÎ»ê.
2005
- ÀÌ»ó½Å, ±èÁø, ±è±¤Á¶, "Àú°¡Çü RFID¸¦ À§ÇÑ È¿À²ÀûÀÎ ÇÁ¶óÀ̹ö½Ã º¸È£ ±â¹ý", 2005³â Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÏ°èÁ¤º¸º¸È£Çмú´ëȸ ³í¹®Áý, pp.569-573, 2005.6.3, Á¶¼±´ëÇб³, ±¤ÁÖ.
- ¹ÚÀç¹Î, ±èÁø, ±è±¤Á¶, "State-Based Random Key Pre-Distribution Scheme for Wireless Sensor Networks", 2005³â Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÏ°èÁ¤º¸º¸È£Çмú´ëȸ ³í¹®Áý, pp.37-42, 2005.6.3, Á¶¼±´ëÇб³, ±¤ÁÖ.
- ¹ÚÀç¹Î, Dang Nguyen Duc, Vo Duc Liem, ¼¿µÁØ, ±è±¤Á¶, "2¼¼´ë EPCglobal RFID ±Ô°ÝÀÇ º¸¾È Ãë¾à¼º °ËÅä ¹× °³¼± ¹æ¾È ¿¬±¸", 2005³âµµ ÃæûÁöºÎ Çмú´ëȸ ³í¹®Áý, pp.207-220, 2005.8.7, ³ª»ç·¿´ëÇб³, õ¾È.
- Duc-Liem Vo and Kwangjo Kim, "Efficient Forward Secure Signature from Bilinear Pairings", 2005³â Çѱ¹Á¤º¸º¸È£ÇÐȸ µ¿°èÁ¤º¸º¸È£Çмú´ëȸ ³í¹®Áý, pp.32-38, 2005.12.3, ¼¿ï´ëÇб³, ¼¿ï.
- Dang Nguyen Duc, Jaemin Park, Hyunrok Lee, and Kwangjo Kim, "A Simple Secure Communication Protocol for RFID Devices", 2005³â Çѱ¹Á¤º¸º¸È£ÇÐȸ µ¿°èÁ¤º¸º¸È£Çмú´ëȸ ³í¹®Áý, pp.254-259, 2005.12.3, ¼¿ï´ëÇб³, ¼¿ï.
- ÀÌ»ó½Å, Tomoyuki Asano, ±è±¤Á¶, "»óÈ£ÀÎÁõÀ» ÅëÇÑ RFID ÇÁ¶óÀ̹ö½Ã º¸È£ ±â¹ý", 2005³â Çѱ¹Á¤º¸º¸È£ÇÐȸ µ¿°èÁ¤º¸º¸È£Çмú´ëȸ ³í¹®Áý, pp.241-245, 2005.12.3, ¼¿ï´ëÇб³, ¼¿ï.
2004
- ÇѱԼ®, À̼ۿø, ±è±¤Á¶, ÀμҶõ, "On the design of secure DRM in ubiquitous environment", 2004³â Çѱ¹Á¤º¸º¸È£ÇÐȸ ¿µ³²ÁöºÎ Çмú´ëȸ, 2004.2.20, °æÀÏ´ëÇб³, °æ»ê.
- À±Âù¿±, ±è±¤Á¶, ÀμҶõ, "À¯ºñÄõÅͽº »çȸÀÇ º¸¾È ¿ä±¸ ±â¼ú", 2004³âÇѱ¹Á¤º¸º¸È£ÇÐȸ ¿µ³²ÁöºÎ Çмú´ëȸ, 2004.2.20, °æÀÏ´ëÇб³, °æ»ê.
- Divyan M. Konidala, Dang N. Duc, Dongman Lee, and Kwangjo Kim, "A Capability-based Privacy-preserving Scheme for Pervasive Computing Environments", 2004³âµµ Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÏ°èÁ¤º¸º¸È£Çмú´ëȸ, 2004.6.24-26, °æµ¿´ëÇб³, ¼ÓÃÊ.
- Ping Wang, Xiaofeng Chen, and Kwangjo Kim, "On the Security of Zhang-Wu-Wang's Forward-Secure Group Signature Scheme in ICICS'03",2004³âµµ Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÏ°èÁ¤º¸º¸È£Çмú´ëȸ, 2004.6.24-26, °æµ¿´ëÇб³, ¼ÓÃÊ.
- ¾çÁ¤±Ô, ±è±¤Á¶, ǥö½Ä, "Àú°¡ÀÇ RFID¿¡ °üÇÑ Á¤º¸º¸È£ ±â¹ý¿¬±¸", 2004³âµµ Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÏ°èÁ¤º¸º¸È£Çмú´ëȸ, Vol.14, No.1,pp.605-609, 2004.6.24-26, °æµ¿´ëÇб³, ¼ÓÃÊ.
- °¼®±Ô, ±è±¤Á¶, "µðÁöÅÐ ÄÁÅÙÃ÷ °Å·¡¿¡¼ÀÇ »ç¿ëÀÚ ÀÍ¸í¼º º¸Àå±â¹ý", 2004³âµµ Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÏ°èÁ¤º¸º¸È£Çмú´ëȸ, Vol.14, No.1, pp.615-618, 2004.6.24-26, °æµ¿´ëÇб³, ¼ÓÃÊ.
- Ping Wang and Kwangjo Kim, "A Proposed Software Protection Scheme", 2004³âµµ Çѱ¹Á¤º¸º¸È£ÇÐȸ ÃæûÁöºÎÇмú´ëȸ, 2004.10.8-9, °øÁÖ´ëÇб³, °øÁÖ.
- ¾çÁ¤±Ô, Kui Ren, ÃÖ¼ö±æ, ±è±¤Á¶, "Privacy Preserving Mutual Authentication Protocol for Low-cost RFID", 2004³âµµ Çѱ¹Á¤º¸º¸È£ÇÐȸ ÃæûÁöºÎÇмú´ëȸ, 2004.10.8-9, °øÁÖ´ëÇб³, °øÁÖ.
- °¼®±Ô, Tomoyuki Asano, ±è±¤Á¶, "Unlinkability between Customer Profile and ID for Preserving Privacy in Digital Content Transactions", 2004³âµµ Çѱ¹Á¤º¸º¸È£ÇÐȸ ÃæûÁöºÎÇмú´ëȸ, 2004.10.8-9, °øÁÖ´ëÇб³, °øÁÖ.
2003
- Yan Xie, Fangguo Zhang, and Kwangjo Kim, "ID-Based Distributed 'Magic Ink' Signature" , 2003³âµµ Çѱ¹Á¤º¸º¸È£ÇÐȸ¿µ³²ÁöºÎ, pp.19-23, 2003.2.21. Æ÷Ç×°ø´ë, Æ÷Ç×.
- Hyungki Choi, Fangguo Zhang, and Kwangjo Kim, " Electronic Cash System Based on Group Signatures with Revokable Anonymity", 2003³âµµ Çѱ¹Á¤º¸º¸È£ÇÐȸ¿µ³²ÁöºÎ,pp.29-34, 2003.2.21. Æ÷Ç×°ø´ë, Æ÷Ç×.
- ±èÁø, ÀÌ»ó¿ø, ÃÖöÁØ, ±è±¤Á¶, "IPsec¿ë Â÷¼¼´ë Å°°ü¸® ÇÁ·ÎÅäÄÝÀÇ µ¿Çâ ¹× ºÐ¼®", 2003³âµµ Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÏ°èÁ¤º¸º¸È£Çмú´ëȸ, pp.272-275, 2003.7.4, ¹èÀç´ë, ´ëÀü.
- ±èº´°ï, ±è±¤Á¶, "VSS¿Í Àº´Ð¼¸í¿¡ ±â¹ÝÇÑ °øÁ¤ÇÑ ÃßÀû ¹æ½Ä", 2003³âµµ Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÏ°èÁ¤º¸º¸È£Çмú´ëȸ, pp.53-56, 2003.7.4. ¹èÀç´ë, ´ëÀü.
- À̼ۿø, ±è±¤Á¶, "·Î¹Ö À¯Àú¸¦ À§ÇÑ Æнº¿öµå-±â¹Ý ÀÎÁõ ÇÁ·ÎÅäÄÝ¿¡ °üÇÑ ¿¬±¸", 2003³âµµ Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÏ°èÁ¤º¸º¸È£Çмú´ëȸ, pp.289-292, 2003.7.4. ¹èÀç´ë, ´ëÀü.
- ÀÌ»ó¿ø, ±èÁø, ±è±¤Á¶, "Æ®¸® ±â¹Ý ±×·ìÅ° ÀÎÁõ ¹× ÇÕÀÇ ÇÁ·ÎÅäÄÝ", 2003³âµµ Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÏ°èÁ¤º¸º¸È£Çмú´ëȸ, pp.17-20, 2003.7.4. ¹èÀç´ë, ´ëÀü.
- Àåȼ±, ±è±¤Á¶, "AES¿¡ ´ëÇÑ ¿À·ù±â¹Ý °ø°Ý", 2003³âµµ Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÏ°èÁ¤º¸º¸È£Çмú´ëȸ, pp.138-141, 2003.7.4. ¹èÀç´ë, ´ëÀü.
- ¹ÚÀçÇõ, ±è±¤Á¶, "±×·ì»óÈ£¹èÁ¦ ±â¹ÝÀÇ ¾ÈÀüÇÑ ºÐ»êÇÁ·ÎÅäÄÝ", 2003³âµµ Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÏ°èÁ¤º¸º¸È£Çмú´ëȸ, pp.283-288, 2003.7.4. ¹èÀç´ë, ´ëÀü.
- Hyungki Choi and Kwangjo Kim, "Analysis on Popescu's Group Signature Scheme for Large Groups", 2003³âµµ Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÏ°èÁ¤º¸º¸È£Çмú´ëȸ, pp.43-46, 2003.7.4. ¹èÀç´ë, ´ëÀü.
- Duc-Liem Vo and Kwangjo Kim, "Design of Threshold Blind Signature Scheme", 2003³âµµ Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÏ°èÁ¤º¸º¸È£Çмú´ëȸ, pp.37-42, 2003.7.4. ¹èÀç´ë, ´ëÀü.
- Dang Nguyen Duc, Jung Hee Cheon, and Kwangjo Kim, "Forward-Secure Blind Signature Scheme Based on the Strong RSA Assumption", 2003³âµµ Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÏ°èÁ¤º¸º¸È£Çмú´ëȸ, pp.21-25, 2003.7.4. ¹èÀç´ë, ´ëÀü.
- Àåȼ±, ±è±¤Á¶, "AES¿¡ ´ëÇÑ DPA ´ëÀÀ¹æ¾È °³¼±", 2003³âµµ Çѱ¹Á¤º¸º¸È£ÇÐȸ ÃæûÁöºÎÇмú´ëȸ, pp.3-10, 2003.8.22. ÃæºÏ´ëÇб³, ûÁÖ.
- JaeHyrk Park, Kwangjo Kim, Taehwan Ryu, and Kyeongsoo Han, "EPONÀÇ º¸¾È¿ä±¸»çÇ×°ú QoSSÀÇ Àû¿ë", 2003³âµµ Çѱ¹Á¤º¸º¸È£ÇÐȸ ÃæûÁöºÎÇмú´ëȸ, pp.251-259, 2003.8.22. ÃæºÏ´ëÇб³,ûÁÖ.
- Xiaofeng Chen, Fangguo Zhang, and Kwangjo Kim, "ID-Based Multi-Proxy Signature and Blind Multisignature from Bilinear Pairings", 2003³âµµ Çѱ¹Á¤º¸º¸È£ÇÐȸ ÃæûÁöºÎÇмú´ëȸ, pp.11-19, 2003.8.22. ÃæºÏ´ëÇб³, ûÁÖ.
- Àåȼ±, ¹Ú»ó¹è, ±è±¤Á¶, "SEEDÀÇ Â÷ºÐÀü·Â°ø°Ý¿¡ ´ëÇÑ °È ¹æ¾È", 2003³âµµ Çѱ¹Á¤º¸º¸È£ÇÐȸ µ¿°èÇмú´ëȸ, pp.274-280, 2003.12.6 ÇѾç´ëÇб³, ¼¿ï.
- ±èº´°ï, ±è±¤Á¶, "VSS¸¦ ÀÌ¿ëÇÑ ½Å·Ú±â°ü ¾ø´Â °øÁ¤ÇÑ ÃßÀû¹æ½Ä", 2003³âµµ Çѱ¹Á¤º¸º¸È£ÇÐȸ µ¿°èÇмú´ëȸ, pp.291-295, 2003.12.6 ÇѾç´ëÇб³, ¼¿ï.
- SungJun Min, Kwangjo Kim, and Go Yamamoto, "Analysis of NTRUSign signature scheme"2003³âµµ Çѱ¹Á¤º¸º¸È£ÇÐȸ µ¿°èÇмú´ëȸ, pp.399-405, 2003.12.6 ÇѾç´ëÇб³, ¼¿ï.
- ±èÁø, ±è±¤Á¶, "¶¦ÀÓ±º¿¡¼ÀÇ °³Àνĺ°±â¹ýÀÇ Á¦¾È", 2003³âµµ Çѱ¹Á¤º¸º¸È£ÇÐȸ µ¿°èÇмú´ëȸ, pp.417-421, 2003.12.6 ÇѾç´ëÇб³, ¼¿ï.
- ±èÁ߸¸, ±è±¤Á¶, "¾ÈÀüÇÑ ºñ¹ÐÅ° °»½ÅÀÌ °¡´ÉÇÑ SchnorrÇü ¼¸í±â¹ý", 2003³âµµ Çѱ¹Á¤º¸º¸È£ÇÐȸ µ¿°èÇмú´ëȸ, pp.422-427, 2003.12.6 ÇѾç´ëÇб³, ¼¿ï.
- ÃÖöÁØ, ±è±¤Á¶, "Å° Àü°³ ¹æ½Ä Àü¹æº¸¾È ¼¸í±â¹ý", 2003³âµµ Çѱ¹Á¤º¸º¸È£ÇÐȸ µ¿°èÇмú´ëȸ, pp.428-433, 2003.12.6 ÇѾç´ëÇб³, ¼¿ï.
- À̼ۿø, ±è±¤Á¶, "°ã¼±Çü ½ÖÀ» ÀÌ¿ëÇÑ Threshold Æнº¿öµå-ÀÎÁõ Å° Retrieval ÇÁ·ÎÅäÄÝ", 2003³âµµ Çѱ¹Á¤º¸º¸È£ÇÐȸ µ¿°èÇмú´ëȸ,pp.463-468, 2003.12.6 ÇѾç´ëÇб³, ¼¿ï.
- Konidala M. Divyan and Kwangjo Kim, "A Secure Location-Based Service Reservation Protocol in Pervasive Computing Environment", 2003³âµµ Çѱ¹Á¤º¸º¸È£ÇÐȸ µ¿°èÇмú´ëȸ, pp.669-685, 2003.12.6 ÇѾç´ëÇб³, ¼¿ï.
2002
- õÁ¤Èñ, ±è±¤Á¶, ÀÌö¼ö, "ICU Á¤º¸º¸È£ ¼®/¹Ú»ç °úÁ¤À» À§ÇÑ ±³°ú°úÁ¤ ¿¬±¸", Á¤º¸º¸È£±³À°¿öÅ©¼¥, pp.99-108, 2002.6.28. ´Ü±¹´ë, ¼¿ï.
- JaeHyrk Park, Kwangjo Kim, and Yushifumi Manabe, "Quorum based algorithms using group choice", 2002³âµµ Çѱ¹Á¤º¸º¸È£ÇÐȸ Çмú´ëȸ, pp. 53-56, 2002.11.16, Ç×°ø´ë, Çѱ¹.
- Hyungki Choi, Fangguo Zhang, and Kwangjo Kim, "Revealing the Linkability of Popescue ID-based Group Signature Scheme", 2002³âµµ Çѱ¹Á¤º¸º¸È£ÇÐȸ Çмú´ëȸ, pp. 81-83, 2002.11.16, Ç×°ø´ë, Çѱ¹.
- Fangguo Zhang and Kwangjo Kim " Cryptanalysis of Kim et al's Traitor tracing scheme on ACISP02" 2002³âµµ Çѱ¹Á¤º¸º¸È£ÇÐȸ Çмú´ëȸ, pp. 99-101, 2002.11.16, Ç×°ø´ë, Çѱ¹.
- Wooseok Ham and Kwangjo Kim, "A Secure On-line Lottery using Bank as a notary", 2002³âµµ Çѱ¹Á¤º¸º¸È£ÇÐȸ Çмú´ëȸ, pp. 121-124, 2002.11.16, Ç×°ø´ë, Çѱ¹.
- Kwangjo Kim, "Result of the 1st Worldwide Internet Voting System", 2002³âµµ Çѱ¹Á¤º¸º¸È£ÇÐȸ Çмú´ëȸ, pp. 219-224, 2002.11.16, Ç×°ø´ë, Çѱ¹.
- Hyunrok Lee, Duc Liem Vo, and Kwangjo Kim, " Extension of Votopia to Mobile Voting", 2002³âµµ Çѱ¹Á¤º¸º¸È£ÇÐȸ Çмú´ëȸ, pp. 225-229, 2002.11.16, Ç×°ø´ë, Çѱ¹.
- Yan Xie, Fangguo Zhang, and Kwangjo Kim, " New Revocable E-cash based on the limited power of TTP", 2002³âµµ Çѱ¹Á¤º¸º¸È£ÇÐȸ Çмú´ëȸ, pp. 266-269, 2002.11.16, Ç×°ø´ë, Çѱ¹.
- ÇÔ¿ì¼®,±èÁ¾½Â,À̼ۿø,¹ÚÀçÇõ,ÃÖ¼ö±æ,±è±¤Á¶,±è¼÷¿¬,³²Åÿë, "QoSSÀÇ ¿¬±¸ µ¿Çâ°ú Àû¿ë", 2002³âµµ Çѱ¹Á¤º¸º¸È£ÇÐȸ Çмú´ëȸ, pp. 352-355, 2002.11.16, Ç×°ø´ë, Çѱ¹.
- Jongseung Kim and Kwangjo Kim, "Comparison of Anonymous Authentication Protocols", 2002³âµµ Çѱ¹Á¤º¸º¸È£ÇÐȸ Çмú´ëȸ, pp. 369-372, 2002.11.16, Ç×°ø´ë, Çѱ¹.
- Sugil Choi, Masayuki Abe, and Kwangjo Kim, " Access Control of Visiting Mobile Node on the Foreign Domain Network in Mobile IPv6", 2002³âµµ Çѱ¹Á¤º¸º¸È£ÇÐȸ Çмú´ëȸ, pp. 495-498, 2002.11.16, Ç×°ø´ë, Çѱ¹.
2001
- õÁ¤Èñ, ±è¹®ÁÖ, ±è±¤Á¶, ÀÌÁ¤¿¬, "Rijndael°ú CryptonÀÇ Çâ»óµÈ ºÒ´É Â÷ºÐ °ø°Ý", Proc. of WISC2001, pp. 85-93, 2001. 9.5 - 9.7, õ¾È, Çѱ¹.
- ±èÁøÈ£,±è±¤Á¶, "°ø°³Å° ±â¹Ý±¸Á¶ ÇÏ¿¡¼ÀÇ ¾ÈÀüÇÑ ÀÎÅÍ³Ý ÀüÀÚ ÅõÇ¥ ÇÁ·ÎÅäÄÝ ¼³°è", 2001³âµµ Çѱ¹Á¤º¸º¸È£ÇÐȸ ÃæûÁöºÎ Çмú ¹ßÇ¥´ëȸ, pp.160-172, 2001.10.26 -27, õ¾È´ë, Çѱ¹.
- ¹ÚÀç°ü, ±è±¤Á¶, "Àüü ÀÎÁõ°æ·Î¸¦ ¾Ë ¼ö ÀÖ´Â ÀÎÁõ¼ ÀϷùøÈ£ ºÎ°ú ¹æ¹ý", 2001³âµµ Çѱ¹Á¤º¸º¸È£ÇÐȸ ÃæûÁöºÎ Çмú ¹ßÇ¥´ëȸ, pp.292-301, 2001.10.26 -27, õ¾È´ë, Çѱ¹.
- ±èÁøÈ£, ±è±¤Á¶, "¹®ÅÎ Àº´Ð ¼¸íÀ» ÀÌ¿ëÇÑ ÀüÀÚÅõÇ¥ ÇÁ·ÎÅäÄÝ", 2001³âµµ Çѱ¹Á¤º¸º¸È£ÇÐȸ Á¾ÇÕÇмú ¹ßÇ¥´ëȸ, pp.309-312, 2001.11.24, ¼¿ï´ë, Çѱ¹.
- ±èÁøÈ£, ±è±¤Á¶, ÀÌ º´Ãµ, "Applying PKI for Internet Voting System", 2001³âµµ Çѱ¹Á¤º¸º¸È£ÇÐȸ Á¾ÇÕÇмú ¹ßÇ¥´ëȸ, pp.318-321, 2001.11.24, ¼¿ï´ë, Çѱ¹.
- ¹ÚÀç°ü, ±è±¤Á¶, "½Ç½Ã°£ ÀÎÁõ¼ °ËÁõ ÇÁ·ÎÅäÄÝ", 2001³âµµ Çѱ¹Á¤º¸º¸È£ÇÐȸ Á¾ÇÕÇмú ¹ßÇ¥´ëȸ, pp.258-261, 2001.11.24, ¼¿ï´ë, Çѱ¹.
- À̸¸È£, ±è±¤Á¶, "À̵¿ÄÄÇ»Æà ȯ°æÀ» À§ÇÑ ¼Ò¾×ÁöºÒ½Ã½ºÅÛ", 2001³âµµ Çѱ¹Á¤º¸º¸È£ÇÐȸ Á¾ÇÕÇмú ¹ßÇ¥´ëȸ, pp.181-184, 2001.11.24, ¼¿ï´ë, Çѱ¹.
- ±è¸í¼±, ±èÁ¾½Â, ÀÌÁ¤¿¬, ±è±¤Á¶, "A Securely Transferable Ebooks using Public-Key Infrastructure", 2001³âµµ Çѱ¹Á¤º¸º¸È£ÇÐȸ Á¾ÇÕÇмú ¹ßÇ¥´ëȸ, pp.371-374, 2001.11.24, ¼¿ï´ë, Çѱ¹.
2000
- Çã¿ø±Ù, ±èÈñ¼±, ±è±¤Á¶, "ÀüÀÚ ÅõÇ¥ ÇÁ·ÎÅäÄÝÀÇ ¿ä±¸ »çÇ× ¿¬±¸", KIISC ÇÐȸÁö, Á¦10±Ç, Á¦1È£, pp.63-69, 2000.3.
- ±è±¤Á¶, ¹éÁØ»ó, ÀÌÁ¾ÅÂ, "Â÷¼¼´ë ÀÎÅͳÝÀÇ º¸¾È ±â¼ú(Security Technology for Next Generation Internet)", Telecommunications Review, Á¦10±Ç, 3È£, pp.537-546, SKT, 2000.
- ±èÈñ¼±, ¹éÁØ»ó, ±è±¤Á¶, "Ÿ¿ø°î¼± »ó¿¡¼ÀÇ ÀÍ¸í¼º öȸ °¡´ÉÇÑ ÀüÀÚÈÆó ½Ã½ºÅÛ ¼³°è (Design of revocable electronic cash system over elliptic curve)", Proc. of WISC2000, 9.5 - 9.7. õ¾È »ó·Ï È£ÅÚ.
- ¼Ûº¸¿¬, ±è±¤Á¶, "Å° °øÀ¯ È®ÀÎÀÌ °¡´ÉÇÑ »õ·Î¿î Å° ÇÕÀÇ ÇÁ·ÎÅäÄÝ (2-pass Unilateral Authenticated Key agreement protocol with Key confirmation)", Proc. of WISC2000, 9.5-9.7 õ¾È »ó·Ï È£ÅÚ.
- ±è±¤Á¶, "±â¹Ð¼º°ú ÀÎÁõ¼ºÀ» º¸ÀåÇÏ´Â ¾ÏÈ£ ±â¼ú(Recent Cryptographic Techniques preserving Confidentiality and Authentication)", ¹æ¼Û°øÇÐȸƯÁý, '00.9.
- À̺´Ãµ, ±è±¤Á¶, "¾ÈÀüÇÑ ÀüÀÚÁ߸ŠÇÁ·ÎÅäÄÝ(Secure Match-Making Protocol)", 2000 Çѱ¹Á¤º¸Ã³¸®ÇÐȸ(KIPS) Ãß°è Çмú¹ßÇ¥ ³í¹®Áý, Vol 7, No 2, pp781-784, Oct. 13-14, 2000, ICU.
- ¼Ûº¸¿¬, ±è±¤Á¶, "Ÿ¿ø°î¼± »ó¿¡¼ Diffie-Hellman¹®Á¦¿¡ ±â¹ÝÇÑ Å° ÇÕÀÇ ÇÁ·ÎÅäÄÝ(Key Agreement Protocol based on Diffie-Hellman Problem over Elliptic Curve)", 2000 Çѱ¹Á¤º¸Ã³¸®ÇÐȸ(KIPS) Ãß°è Çмú¹ßÇ¥ ³í¹®Áý, Vol 7, No 2, pp785-788. Oct. 13-14, 2000, ICU.
- °íÀç½Â, ±è±¤Á¶, "À̵¿Åë½Å ¹«¼±Á¢¼Ó±¸°£¿¡¼ ÀÌ¿ëÀÚ ÀÍ¸í¼ºÀ» º¸ÀåÇÏ´Â ÀÎÁõ ¹× Å° ÇÕÀÇ ÇÁ·ÎÅäÄÝ (Authentication and key exchange protocol assuring user anonymity over wireless link in mobile communications)", 2000 Çѱ¹Á¤º¸Ã³¸®ÇÐȸ(KIPS) Ãß°è Çмú¹ßÇ¥ ³í¹®Áý, Vol 7, No 2, pp789-792, Oct. 13-14, 2000, ICU.
- À̺´Ãµ, ¹éÁØ»ó, ¼¹®¼®, Çã¿ø±Ù, ±è±¤Á¶, "PKI¿¡¼ ÀÎÁõÆ®¸® °ËÁõÀÇ È¿À²¼º Çâ»ó ±â¹ý", KIISC ÃæûÁöºÎ 2000³â Á¤º¸º¸È£Çмú³í¹®¹ßǥȸ, pp.255-261, Nov. 3-4, 2000, ¼øõÇâ´ëÇб³,
- Hye-Joo Lee, Yun-Hee Oh, Ji-Hwan Park, and Kwangjo Kim, "Fragile Watermarking to detect change of small range on image", Çѱ¹¸ÖƼ¹Ìµð¾îÇÐȸ Á¦6ȸ Ãß°èÇмú¹ßÇ¥´ëȸ, 2000.11.17. - 11.18, ¿¬¼¼´ëÇб³.
- ¹ÚÇöö, ±è±¤Á¶, "Fragile Watermarking±â¹ýÀ» ÀÌ¿ëÇÑ ¼¸íµÈ À̹ÌÁöÀÇ À¯È¿¼º °ËÁõ ¹æ½Ä", KIISC Á¾ÇÕÇмú¹ßǥȸ(CISC2000), Á¾ÇÕ Çмú¹ßÇ¥ ³í¹®Áý, Vol. 10, No. 1, pp. 606-617, Nov. 25, 2000, ¼º±Õ°ü´ëÇб³.
- ¼Ûº¸¿¬, ±è±¤Á¶, "Comparison of Existing Key Establishment Protocols", KIISC Á¾ÇÕÇмú¹ßǥȸ(CISC2000), Á¾ÇÕ Çмú¹ßÇ¥ ³í¹®Áý, Vol. 10, No. 1, pp. 677-690, Nov. 25, 2000, ¼º±Õ°ü´ëÇб³.
- À̺´Ãµ, ±è±¤Á¶, "Self-Certificate: PKI using Self-Certified Key", KIISC Á¾ÇÕÇмú¹ßǥȸ(CISC2000), Á¾ÇÕ Çмú¹ßÇ¥ ³í¹®Áý, Vol. 10, No. 1, pp. 65-73, Nov. 25, 2000, ¼º±Õ°ü´ëÇб³.
- ±èÈñ¼±, ¹éÁØ»ó, À̺´Ãµ, ±è±¤Á¶, "´ë¸®¼¸íÀ» ÀÌ¿ëÇÑ ¸ð¹ÙÀÏ ¿¡ÀÌÀüÆ®ÀÇ ¾ÈÀü¼º °È ¹æ¹ý (Enhancing Security of Mobile Agent using Proxy Signature)", KIISC Á¾ÇÕÇмú¹ßǥȸ(CISC2000), Á¾ÇÕ Çмú¹ßÇ¥ ³í¹®Áý, Vol. 10, No. 1, pp. 424-437, Nov. 25, 2000, ¼º±Õ°ü´ëÇб³.
- °íÀç½Â, ±è±¤Á¶, "Â÷¼¼´ë À̵¿Åë½Å½Ã½ºÅÛ¿¡ Àû¿ëµÇ´Â º¸¾È ÇÁ·ÎÅäÄÝÀÇ ±¸¼º ¹æ½Ä(Constructing security protocols suitable for next generation mobile system)", KIISC Á¾ÇÕÇмú¹ßǥȸ(CISC2000), Á¾ÇÕ Çмú¹ßÇ¥ ³í¹®Áý, Vol. 10, No. 1, pp. 172-186, Nov. 25, 2000, ¼º±Õ°ü´ëÇб³.
- ¾È±¹È¯, ±è±¤Á¶, "Linux¿¡¼ Tapping Alert ProtocolÀÇ È®Àå (Extending Tapping Alert Protocol for Linux)", KIISC Á¾ÇÕÇмú¹ßǥȸ(CISC2000), Á¾ÇÕ Çмú¹ßÇ¥ ³í¹®Áý, Vol. 10, No. 1, pp. 713-720, Nov. 25, 2000, ¼º±Õ°ü´ëÇб³.
1999
- ±è±¤Á¶, "SCIS'99¸¦ ÅëÇÑ ÀϺ»ÀÇ Á¤º¸º¸È£±â¼ú ¿¬±¸ µ¿Çâ", KIISC ÇÐȸÁö,pp.17-31, Vol.9, No.2, 1999.
- ±è±¤Á¶, "°øÁ¤ÇÑ ÀüÀÚ Çö±Ý ÇÁ·ÎÅäÄÝ", NETSEC-KR99, '99.5.20.~5.21. Çѱ¹°úÇбâ¼úȸ°ü.
- ±è±¤Á¶, "PKC99 ³í¹® ¹ßÇ¥ µ¿Çâ", Åë½ÅÁ¤º¸º¸È£ ±â¼ú ¿öÅ©¼¥, ETRI, '99.5.28.
- ±èÈñ¼±, ¼¹®¼®, ¹éÁØ»ó, ±è±¤Á¶, "ÀüÀÚÇö±Ý ÇÁ·ÎÅäÄÝÀÇ ¿ä±¸ »çÇ×°ú ºñ±³ ºÐ¼®", Proc. of WISC99, . '99.9.1 - 9.3, õ¾È »ó·ÏÈ£ÅÚ.
- ¼¹®¼®, ±è±¤Á¶ À±ÀÌÁß,"±ÝÀ¶ ȯ°æÀ» À§ÇÑ °ø°³Å° ±â¹Ý ±¸Á¶ ¹× ÀÀ¿ë¿¡ °üÇÑ ¿¬±¸", Proc. of WISC99, '99.9.1 - 9.3. õ¾È »ó·ÏÈ£ÅÚ.
- ±è±¤Á¶, "ÀüÀÚ Çö±Ý ÇÁ·ÎÅäÄÝÀÇ ¿ä¼Ò ±â¼ú", ´ëÇÑÀüÀÚ°øÇÐȸ ȸÁö Á¦36±Ç 8¿ùÈ£,'99.8 .
- Ȳ±Ô¹ü, ±è±¤Á¶, ¾Èö¼ö, "CIH¹ÙÀÌ·¯½º ºÐ¼® ¹× ´ëÃ¥", KIISC ³í¹®Áö Åõ°í('99.8), äÅÃ.
- Ȳ±Ô¹ü, ±è±¤Á¶, ¾Èö¼ö, "ÄÄÇ»ÅÍ ¹ÙÀÌ·¯½ºÀÇ ±â¹ý ºÐ¼®(I)", KIISC ÃæûÁöºÎ 99³â Á¤º¸º¸È£Çмú¹ßǥȸ, 1999.10.29. - 10.30. Çѳ²´ë, pp.175-181, 1999. 10.29-30.
- À̺´Ãµ, ±è±¤Á¶, "»ç¿ëÀÚ À§ÁÖÀÇ »õ·Î¿î °ø°³Å° ±â¹Ý ±¸Á¶ Á¦¾È", KIISC Á¾ÇÕÇмú¹ßǥȸ ³í¹®Áý (CISC'99), Vol.9, No.1, pp.47-59, 1999. 11.6.
- ¼¹®¼®, ±è±¤Á¶, "KCDSA ¹× EC-KCDSA¿¡ ±Ù°£ÇÑ Àº´Ð ¼¸í", KIISC Á¾ÇÕÇмú¹ßǥȸ ³í¹®Áý (CISC'99), Vol.9, No.1, pp.141-150, 1999. 11.6.
- ¹éÁØ»ó, ±è±¤Á¶, "¾ÏÈ£ ½Ã½ºÅÛÀÇ Áõ¸í °¡´É ¾ÈÀü¼º¿¡ °üÇÑ °íÂû", KIISC Á¾ÇÕÇмú¹ßǥȸ ³í¹®Áý (CISC'99), Vol.9, No.1, pp.162-172, 1999. 11.6.
- Ȳ±Ô¹ü, ±è±¤Á¶, ¾Èö¼ö, "¾Ç¼ºÄÚµåÀÇ ±â¹ý ºÐ¼® ¹× µ¿Çâ(I)", KIISC Á¾ÇÕÇмú¹ßǥȸ ³í¹®Áý (CISC'99), Vol.9, No.1, pp.202-215, 1999. 11.6.
- ¼¹®¼®, À̺´Ãµ, ¹éÁØ»ó, ±è±¤Á¶, ±è»óÁ¤, À̰汸, "ºÎÀÎ ¹æÁö Ç¥ÁØ ¸ÞÄ¿´ÏÁòÀÇ ºÐ¼®", KIISC Á¾ÇÕÇмú¹ßǥȸ ³í¹®Áý (CISC'99), Vol.9, No.1, pp.228-240, 1999. 11.6.
- Çã¿ø±Ù, ±è±¤Á¶, "PVSS¸¦ ÀÌ¿ëÇÑ °ËÁõ °¡´ÉÇÑ ´ÙÁß ÀüÀÚ ¼±°Å¿Í °ËÁõ¼ºÀ» Á¦ÇÑÇÑ ¸ÅÇ¥ ¹æÁö ´ÙÁß ÀüÀÚ ¼±°Å", KIISC Á¾ÇÕÇмú¹ßǥȸ ³í¹®Áý (CISC'99), Vol.9, No.1, pp.312-322, 1999. 11.6.
- ¼¹®¼®, ±è±¤Á¶, "Domain-verifiable Signcryption ±â¹ýÀ» ÀÌ¿ëÇÑ ÀüÀÚ ÀÚ±Ý ÀÌü ÇÁ·ÎÅäÄÝ", KIISC Á¾ÇÕÇмú¹ßǥȸ ³í¹®Áý (CISC'99), Vol.9, No.1, pp.483-495, 1999. 11.6.
1998
- ±è±¤Á¶, "ÀϺ»ÀÇ Á¤º¸º¸È£±â¼ú ÃÖ±Ù¿¬±¸ µ¿Çâ- SCIS'98 Âü°¡ °á°ú", KIISC ÇÐȸÁö, Vol.8, No.1, pp.113-142, 1998. 3.
- ±è±¤Á¶, "Á¤º¸º¸È£ÀÌ·Ð", '98.4.15.-6.24.(11ÁÖ), ETRI Àü¹® ±³À°.
- ±è±¤Á¶, "¾ÏÈ£ ÀÌ·Ð", NETSEC-KR'98, °úÇбâ¼úȸ°ü, '98.6.30.
- ±è±¤Á¶, "ºñ¹ÐÅ° ¾ÏÈ£ ¹æ½Ä", Çѱ¹Åë½ÅÁ¤º¸º¸È£ÇÐȸ ÁÖ°ü Á¤º¸º¸È£ ¹× µðÁöÅÐ Åë½Å ´Ü±â °ÁÂ, '98.7.23. °í·Á´ë ÀÚ¿¬´ë.
- ±è±¤Á¶, "Crypto API ¿¬±¸ µ¿Çâ", Á¦6ȸ °³¹æÇü ½Ã½ºÅÛ ¹× ¼Ö·ç¼Ç Àü½Ãȸ (OPCS'98) '98.7.10., KOEX 4Ãþ ±¹Á¦È¸ÀǽÇ.
- ±è±¤Á¶, "Á¤º¸º¸È£ À̷аú ÀÀ¿ë", WISC'98 Tutorial, '98.9.2. õ¾È»ó·Ï ¸®Á¶Æ®.
- ±è±¤Á¶, "¾ÏÈ£ ¹× ÀÎÁõ ±â¼úÀÇ ÀÀ¿ë", Á¦4ȸ Á¤º¸º¸¾È±â¼úÇ¥ÁØÈ ¿öÅ©¼¥ (SWIST'98), '98.9.11. - 9.12, ¼¿ï KAIST(È«´É) ´ë°´ç.
- ±è±¤Á¶, "ÀüÀÚ ¿ìÆí º¸¾È ¹× Ç¥ÁØÈ", '98.10.14. ION'98.
- À̺´Ãµ, Àӽſµ, ±è±¤Á¶, "°ø°³Å° ±â¹Ý ±¸Á¶¸¦ ÀÌ¿ëÇÑ ¼ÒÆ®ÇÁ¿þ¾îÀÇ ÀúÀ۱Ǻ¸È£", Çѱ¹Åë½ÅÁ¤º¸º¸È£ÇÐȸ 1998³âÇмú´ëȸ, '98.12.18-19, ÀÎÅÍÄÜƼ³ÙÅ» È£ÅÚ, ¼¿ï.
1997
- ¹Ú»óÁØ, ±è±¤Á¶, ¿øµ¿È£, "Zhou-Gollman ºÎÀκÀ¼â ÇÁ·ÎÅäÄÝ ºÐ¼® ¹× °³¼±", KIISC ³í¹®Áö, Vol.7, No.3, pp.41-52, 1997.9.
- ±è±¤Á¶, ±èÀ¯Çö, "ÀÎÀ§ÀûÀÎ H/W ¿À·ù¸¦ ÀÌ¿ëÇÑ IC Ä«µåÀÇ °ø°Ý ¹æ½Ä", WISC'97 ³í¹®Áý, ¿Â¾ç, pp.147-162, 1997.9.3.-9.5.
- õÁ¤Èñ, Áö¼ºÅÃ, ±è±¤Á¶, "Ÿ¿ø °î¼± ¾ÏÈ£ ¼Ò°³", WISC'97 ³í¹®Áý, ¿Â¾ç, pp.336-348, 1997.9.3.-9.5.
- ±è¹Ì¶ó, ¹ÚÁöȯ, ¹Ú»ó¿ì, ±è±¤Á¶, "½Ã°¢¾ÏÈ£¿¡ ÀÇÇÑ ºñ¹ÐºÐ»ê¹ý", KIISC ³í¹®Áö, Vol.7, No.4, pp. 37-50, 1997.12.
- ¼º¼öÇÐ, õÁ¤Èñ, Áö¼ºÅÃ, ±è±¤Á¶, "±ÕÇüÀÎ ºÎ¿ïÇÔ¼öÀÇ ´ë¿ªÈ®»êƯ¼º", KIISC ³í¹®Áö, Vol.7, No.4, Dec, 1997, pp.51-5.
1996
- ±è±¤Á¶, "Á¤º¸º¸È£ ±â¼úÀÇ ÃÖ±Ù µ¿Çâ°ú ¹ßÀü Àü¸Á", Á¤º¸°úÇÐȸÁö, Vol.14, No.3, pp.50-60, 1996.3.
- ±è±¤Á¶, "º¸¾È ½Ã½ºÅÛÀÇ ÃÖ±Ù ±â¼ú µ¿Çâ", Á¦2ȸ Çѱ¹Àü»ê¸Á º¸¾È±â¼ú¿öÅ©¼¥(NETSEC-KR'96) ¹ßÇ¥ ÀÚ·áÁý, pp.177-199, 1996.5.28.-5.29.
- ¹Ú»óÁØ, ±è¿ë´ë, ±è±¤Á¶, "Lin-Chang-Lee °ø°³Å° ¾ÏÈ£ ½Ã½ºÅÛÀÇ ºÐ¼®", KIISC³í¹®Áö, Vol.6, No.2, pp.41-52, 1996. 6.
- ¹Ú»ó¿ì, ±è±¤Á¶, "Çؽ¬ ÇÔ¼ö¸¦ ÀÌ¿ëÇÑ MAC ¾Ë°í¸®Áò ¼³°è¿¡ °üÇÑ ¿¬±¸", WISC'96 ³í¹®Áý, À¯¼º, pp. 135-143, 1996.9.3.-9.5.
- ±è±¤Á¶, "Á¤º¸º¸È£ ½Ã½ºÅÛÀÇ ÃÖ±Ù ±â¼ú µ¿Çâ", 96³âµµ ±ÝÀ¶Àü»ê ¿öÅ©¼¥, ±ÝÀ¶°áÁ¦¿ø, pp. 3-26, 1996.7.4.-7.6.
- ¹Ú»ó¿ì, Áö¼ºÅÃ, ±è±¤Á¶, "SUCÀÇ È®Àå ¹× ¹ü¿ë À¯»ç º¥Æ® ÇÔ¼ö¿¡ ´ëÇÑ °íÂû", KIISCÇÐȸÁö, Vol.6, No.3, pp.49-56, 1996.9.
- ¼º¼öÇÐ, Áö¼ºÅÃ, ÀÌ»óÁø, ±è±¤Á¶, "»ó°ü ¸é¿ª ÇÔ¼ö¿Í ºñ¼±ÇüÄ¡", KIISC ³í¹®Áö, Vol.6, No.2, pp.11-22, 1996.9.
- ¹Ú»ó¿ì, Áö¼ºÅÃ, ±è±¤Á¶, "Semi-bent ÇÔ¼öÀÇ ÀϹÝÈ¿Í ±¸¼º ¹æ¹ý", KIISC ³í¹®Áö, Vol.6, No.3, pp.31-30, 1996.9.
- ¹Ú»ó¿ì, ¹ÚÃá½Ä, ±è±¤Á¶, "Çؽ¬ÇÔ¼öÀÇ ÀÀ¿ë¹æ¹ý - Time stamping, membership testing, MAC ¾Ë°í¸®Áò ¼³°è - ¿¡ °üÇÑ °íÂû", KIISC ÇÐȸÁö, Vol.6, No.4, pp.91-104, 1996.12.
- ¹Ú»ó¿ì, ±è±¤Á¶, "À¯ÇÑü »óÀÇ Áö¼ö ÇÔ¼öÀÇ ºÐ·ù¿Í ¾ÏÈ£Çп¡ÀÇ ÀÀ¿ë", KIISC ³í¹®Áö, Vol.6, No.4, 1996.12.
1995
- ±è±¤Á¶, "Asiacrypt'94¸¦ ÅëÇÑ ÃÖ±Ù ¾ÏÈ£ÇÐÀÇ ¿¬±¸ µ¿Çâ", KIISC ÇÐȸÁö, Vol.5, No.2, pp.102-110, 1995.6.
- ¹Ú»ó¿ì, Áö¼ºÅÃ, ±è±¤Á¶, "¾ÈÀüÇÑ Çؽ¬ ÇÔ¼öÀÇ ¼³°è Á¶°Ç ¹× Ç¥ÁØÈ µ¿Çâ", WISC'93, µµ°í, pp.140-152, 1995.10.14-15.
- Áö¼ºÅÃ, ÀÌ»óÁø, ±è±¤Á¶, "È®´ë Àç»ý¼ºµÈ ºÎ¿ï ÇÔ¼öÀÇ ¼ºÁú", KIISC ³í¹®Áö, Vol.5, No.1, pp.3-16, 1995.3.
- ÀÌ°¼ö, ÀÌÁø¼®, ±è±¤Á¶, "ÆäÆ®¸®³ÝÀ» ÀÌ¿ëÇÑ ¾ÏÈ£ ÇÁ·ÎÅäÄÝ »ç¾ç ¸ðÇü", Çѱ¹Á¤º¸°úÇÐȸ ³í¹®Áö, Vol.22, No.7, pp.1110-1123, 1995.7.
- ¹Ú»ó¿ì, ±è±¤Á¶, "Á¤º¸ ÀÎÁõÀ» À§ÇÑ Çؽ¬ÇÔ¼ö", ¿¬¼¼´ë ÀüÀÚ Á¤º¸ ¿¬±¸¼Ò³í¹®Áý, Vol.2, No.1, pp.120-130, 1995.
- ±è¿ë´ë, ¹Ú»óÁØ, ¹ÚÃá½Ä, ±è±¤Á¶, "µðÁöÅÐ ¼¸íÀÇ ºÐ·ù¿Í ÀÀ¿ë", WISC'95 ³í¹®Áý, pp.109-124, ¼ö¾Èº¸, 1995,10.25-10.27.
- ¹Ú»ó¿ì, ¹ÚÃá½Ä, ±è±¤Á¶, "À̵¿Åë½Å¿ë Å°ºÐ¹è ¹æ½Ä °íÂû", WISC'95 ³í¹®Áý, pp. 147-154, ¼ö¾Èº¸, 1995,10.25.-10.27.
- ±è±¤Á¶, "ÃÊ°í¼Ó Á¤º¸ Åë½Å¸Á°ú Á¤º¸º¸È£ ±â¼ú", WISC'95ÆгÎÅä·ÐÁý, pp.67-78, 1995.10.25. -10.27.
- ¹ÚÃá½Ä, ±è±¤Á¶, "ÁßÀç ¼¸í ¹æ½Ä¿¡ °üÇÑ ¿¬±¸", KIISC ³í¹®Áö, Vol.5, No.3, pp.29-38, '95.12.
1994
- ±è±¤Á¶, "DESÀÇ ¼±Çü Çص¶¹ý¿¡ °üÇÑ Çؼ³(III)", KIISC ÇÐȸÁö,Vol.4, No.1, pp. 30-43, 1994.
- ±è±¤Á¶, ±èö, "Á¤º¸º¸È£ ÀÌ·ÐÀÇ ¹ßÀü", ÀüÀÚ°øÇÐȸÁö, Vol.21, No.5, pp.443-456,1994.
- ±è¿ë´ë, ¹Ú»óÁØ, ±è±¤Á¶, "Fair PKCÀÇ ¼Ò°³", Çѱ¹Á¤º¸°úÇÐȸ ÄÄÇ»ÅÍ ÀÌ·Ð ¿¬±¸È¸Áö, SIGTCS News, Vol.5, No.3, pp.18-25, Oct, 1994.
- ¹Ú»ó¿ì, Áö¼ºÅÃ, ¹Ú»óÁØ, ±è±¤Á¶, "ºí·° ¾ÏÈ£ ¾Ë°í¸®ÁòÀÇ ¾ÈÀü¼º Æò°¡ ¹æ¹ý", WISC'94 ³í¹®Áý, ¿Â¾ç, pp.3-15, 1994.10.19-21.
- ±è¿ë´ë, ±è±¤Á¶, "ºí·° ¾ÏÈ£ ¾Ë°í¸®Áò¿¡ °üÇÑ Á¶»ç ºÐ¼®", WISC'94 ³í¹®Áý, pp.213-233, 1994 10.19-21, ¿Â¾ç.
1993
- ±è±¤Á¶, "DESÀÇ ¼±ÇüÇص¶¹ý¿¡ °üÇÑ Çؼ³(I)", KIISC ÇÐȸÁö. Vol.3, No.3, pp.7-22, 1993.
- ±è±¤Á¶, "DESÀÇ ¼±Çü Çص¶¹ý¿¡ °üÇÑ Çؼ³(II)", KIISC ÇÐȸÁö, Vol. 3, No.4. pp.16-26, 1993.
- ±è¿ë´ë, ÀÌ»óÁø, ¹Ú»óÁØ, °í½Âö, ±è±¤Á¶, "BRM ¼ö¿ÀÇ »ó°ü °ø°Ý ¹æ½Ä", KIISC Á¾ÇÕÇмú¹ßǥȸ ³í¹®Áý, Vol.3, No.1, pp.41-47, 1993.11.20, ¼¿ï.
- ±è±¤Á¶, "2000³â´ëÀÇ Á¤º¸º¸È£ ±â¼ú ¹× ¿¬±¸ ¹æÇâ", WISC'93 ÆгΠÅä·Ð ÀÚ·áÁý, pp.47-61, 1993.10.14.-15, µµ°í.
1992
- Áö¼ºÅÃ, ¹Ú»ó¿ì, ±è±¤Á¶, "°³Àνĺ° ¹æ½Ä¿¡ °üÇÑ °íÂû", WISC'92, No.4, pp.16-28. 1992.10.21-23, ¿Â¾ç.
- ±è±¤Á¶, "ASIACRYPT'91¿¡¼ º» ¾ÏÈ£ÇÐÀÇ ÃÖ±Ù ¿¬±¸ µ¿Çâ", Åë½ÅÁ¤º¸º¸È£ÇÐȸÁö. Vol.2, No.1, pp. 52-62, 1992.3.
- ±è±¤Á¶, "¾ÏÈ£ÇÐÀÇ ÃÖ±Ù ¿¬±¸ µ¿Çâ - Eurocrypt'92¸¦ Áß½ÉÀ¸·Î", WISC'92 ³í¹®Áý, No.4, pp.109-118, 1992.10.21.-23, ¿Â¾ç.
1991
- ±è±¤Á¶, "Bent ÇÔ¼öÀÇ ¾ÏÈ£ÇÐÀû ¼ºÁú¿¡ °üÇÑ °íÂû", KIISC ³í¹®Áö, Vol.1, No.1, pp.85-90,1991.
- ±è±¤Á¶, ¸¶¾²¸ðÅä ÂêÅ乫, À̸¶ÀÌ È÷µ¥Å°, ¹ÚÇѱÔ, "¾ÏÈ£ÇÔ¼öÀÇ ±¸¼º ¹æ¹ý¿¡ °üÇÑ ¿¬±¸", Çѱ¹Åë½ÅÇÐȸ ³í¹®Áö, Vol.16, No.1, pp.101-114, 1991.