• Source: Scopus
  • Calculated based on no. of publications stored in Pure and citations from Scopus
1993 …2021

Research activity per year

If you made any changes in Pure these will be visible here soon.

Network

Jong Hwan Park

  • Sangmyung University
  • Kyung Hee University
  • Division of Computer Science, Sangmyung University
  • Korea University
  • Department of Applied Mathematics
  • Department of Computer Science, Sangmyung University
  • Ctr. for Info. Security Technologies
  • Graduate School for Information Security (GSIS)
  • Graduate School of Information Security, Korea University
  • Center for Information Security, Korea University
  • Dept. of Information Management and Security
  • Graduate School of Information Security, CIST, Korea University 1

External person

Jung Yeon Hwang

  • Electronics and Telecommunications Research Institute
  • ETRI
  • Korea University
  • Graduate School for Information Security (GSIS)
  • Graduate School of Information Security, Korea University
  • Ctr. for Info. Security Technologies
  • Cyber Security Research Department, Attached Institute of ETRI
  • Dept. of Information Management and Security
  • Center for Information Security, Korea University
  • Graduate School of Information Security, CIST, Korea University 1

External person

Kwangsu Lee

  • Columbia University
  • CIST, Korea University
  • Department of Computer Science, Columbia University
  • Korea University
  • Sejong University
  • Ctr. for Info. Security Technologies
  • Graduate School for Information Security (GSIS)
  • Graduate School of Information Security, Korea University
  • Dept. of Computer and Information Security
  • Center for Information Security, Korea University
  • Dept. of Information Management and Security
  • Graduate School of Information Security, CIST, Korea University 1

External person

Jeong Ok Kwon

  • CIST Korea University
  • Samsung Advanced Institute of Technology
  • Korea University
  • Graduate School for Information Security (GSIS)
  • Information Security Group
  • Integrated Security Consulting Group
  • Information Security Center
  • Ctr. for Info. Security Technologies
  • Department of Computer Science and Communication Engineering
  • Kyushu University
  • Dept. of Information Management and Security
  • Center for Information Security, Korea University
  • Graduate School of Information Security, CIST, Korea University 1

External person

Hwaseong Lee

  • Korean Agency for Defense Development
  • Korea University
  • Ctr. for Info. Security Technologies
  • Graduate School for Information Security (GSIS)
  • Graduate School of Information Security, Korea University
  • Center for Information Security, Korea University
  • Dept. of Information Management and Security
  • Graduate School of Information Security, CIST, Korea University 1

External person

Yong Ho Kim

  • Korea University

External person

Hyun Sook Rhee

  • Graduate School of Information Security, Korea University
  • Samsung
  • University of Wollongong
  • Korea University
  • Ctr. for Info. Security Technologies
  • Graduate School for Information Security (GSIS)
  • Centre for Computer and Information Security Research
  • Center for Information Security, Korea University
  • Dept. of Information Management and Security
  • Graduate School of Information Security, CIST, Korea University 1

External person

Jin Wook Byun

  • Pyeongtaek University
  • Korea University
  • Department of Information and Communication
  • Ctr. for Info. Security Technologies
  • Graduate School for Information Security (GSIS)
  • Department of Information and Communication
  • Pyeongtaek University
  • Center for Information Security, Korea University
  • Dept. of Information Management and Security

External person

Hyo Jin Jo

  • Center for Information Security, Korea University
  • CIST(Center for Information Security Technologies)
  • Korea University
  • Center for Information Security, Korea University
  • University of Pennsylvania
  • Ctr. for Info. Security Technologies
  • Graduate School of Information Security, Korea University
  • Hallym University
  • School of Software
  • Department of Computer and Information System
  • Graduate School of Information Security, CIST, Korea University 1
  • Department of Convergence Software
  • Soongsil University

External person

Hyun A. Park

  • University of Arizona
  • Korea University
  • Ctr. for Info. Security Technologies
  • Graduate School for Information Security (GSIS)
  • Artificial Intelligence Lab
  • Graduate School of Information Security, Korea University
  • Center for Information Security, Korea University
  • Dept. of Information Management and Security
  • Graduate School of Information Security, CIST, Korea University 1

External person

Su Mi Lee

  • Financial Security Agency
  • Korea University
  • Graduate School for Information Security (GSIS)
  • Ctr. for Info. Security Technologies
  • Dept. of Information Management and Security
  • Center for Information Security, Korea University

External person

Ji Young Chun

  • Security Korea University
  • CIST (Center for Information Security Technologies), Korea University
  • Center for Information Security Technologies (CIST), Korea University
  • CIST(Center for Information Security Technologies)
  • Korea University
  • Graduate School for Information Security (GSIS)
  • Graduate School of Information Security, Korea University
  • Ctr. for Info. Security Technologies
  • Dept. of Information Management and Security
  • Graduate School of Information Security, CIST, Korea University 1
  • Center for Information Security, Korea University

External person

Wonsuk Choi

  • Hansung University
  • Korea University

External person

Kyu Young Choi

  • Korea University
  • Graduate School for Information Security (GSIS)
  • Ctr. for Info. Security Technologies
  • Dept. of Information Management and Security
  • Center for Information Security, Korea University

External person

Kwan Tae Cho

  • Electronics and Telecommunications Research Institute
  • Graduate School of Information Security, Korea University
  • Cyber Security Research Division at Electronics and Telecommunications Research Institute
  • Graduate School of Information and Security
  • Korea University
  • Cyber Security Research Department, Attached Institute of ETRI
  • Ctr. for Info. Security Technologies
  • ICT Convergence Security Research Laboratory
  • Graduate School for Information Security (GSIS)
  • Graduate School of Information Security, CIST, Korea University 1
  • Center for Information Security, Korea University
  • Dept. of Information Management and Security

External person

Samuel Woo

  • Center for Information Security, Korea University
  • Korea University
  • Ctr. for Info. Security Technologies
  • Graduate School of Information Security, Korea University
  • Electronics and Telecommunications Research Institute
  • Network Security Research Laboratory
  • Center for Information Security, Korea University
  • Graduate School of Information Security, CIST, Korea University 1
  • Dankook University

External person

Hyoseung Kim

  • Korea University
  • Graduate School of Information Security, Korea University
  • Graduate School of Information Security, CIST, Korea University 1

External person

Bum Han Kim

  • Center for Information and Security Technologies (CIST),
  • Korea University
  • Ctr. for Info. Security Technologies
  • Graduate School for Information Security (GSIS)
  • Department of Communication Sciences and Engineering
  • Center for Information Security, Korea University
  • Dept. of Information Management and Security

External person

Eun Young Choi

  • Korea University
  • Korea Security and Internet Agency
  • Korea Information Security Agency
  • Kumho Life and Environmental Science Laboratory

External person

Jung Ha Paik

  • Center for Information Security, Korea University
  • CIST(Center for Information Security Technologies)
  • Korea University
  • Graduate School for Information Security (GSIS)
  • Ctr. for Info. Security Technologies
  • Graduate School of Information Security, Korea University
  • Information Security
  • Dept. of Information Management and Security
  • Graduate School of Information Security, CIST, Korea University 1

External person

Hyun Jeong Kim

  • Korea University
  • KU Leuven

External person

Younghan Choi

  • Attached Institute of Electronics and Telecommunications Research Institute (ETRI)
  • Telecommunications Research Institute (ETRI)
  • Yuseong Post Office
  • ETRI
  • Electronics and Telecommunications Research Institute

External person

Hyoungchun Kim

  • Attached Institute of Electronics and Telecommunications Research Institute (ETRI)
  • Telecommunications Research Institute (ETRI)
  • Yuseong Post Office
  • ETRI
  • Electronics and Telecommunications Research Institute
  • National Security Research Institute, Korea

External person

Moti Yung

  • Columbia University
  • Alphabet Inc.

External person

Young Kyung Lee

  • Korea University
  • Graduate School of Information Security, Korea University
  • Graduate School of Information Security, CIST, Korea University 1

External person

Minhye Seo

  • Korea University
  • Graduate School of Information Security, Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University
  • Graduate School of Information Security, CIST, Korea University 1
  • Duksung Women's University

External person

Justin Zhan

  • Carnegie Mellon University
  • Heinz School Carnegie Mellon University
  • Carnegie Mellon Heinz School
  • Carnegie Mellon CyLab Japan
  • SION Lab.

External person

Jae Hyuk Suk

  • Korea University
  • Graduate School of Information Security, Korea University
  • Graduate School of Information Security, CIST, Korea University 1

External person

Ae Chan Kim

  • Korea University
  • Dept. of Financial Security
  • Graduate School of Information Security, Korea University
  • Graduate School of Information Security, CIST, Korea University 1
  • Financial Security Institute

External person

Na Young Ahn

  • Graduate School of Information Security, Korea University
  • Korea University
  • Graduate School of Information Security, CIST, Korea University 1

External person

Moon Chan Park

  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University
  • Graduate School of Information Security, CIST, Korea University 1

External person

Jae Hyun Park

  • Case Western Reserve University
  • Department of Information Systems

External person

Woo Kwon Koo

  • CIST, Korea University
  • Korea University
  • Graduate School for Information Security (GSIS)
  • Dept. of Information Management and Security
  • Samsung

External person

Kouichi Sakurai

  • Kyushu University
  • Department of Computer Science and Communication Engineering
  • Computer Science and Communication Engineering
  • IEEE
  • Department of Computer Science and Communication Engineering
  • Faculty of Information Science and Electrical Engineering
  • Department of Computer Science and Communication Engineering

External person

Moti Yung

  • Columbia University
  • CertCo

External person

Changwook Kim

  • University of Oklahoma
  • School of Computer Science

External person

Jong Hyuk Park

  • Kyungnam University
  • Center for Information Security, Korea University
  • Korea University
  • Seoul National University of Science and Technology (SNUST)
  • Hanwha
  • SeoulTech
  • Igloo Security, Inc.

External person

Hak Soo Ju

  • Korea Information Security Agency

External person

Seunghwan Park

  • Korea University
  • Ctr. for Info. Security Technologies
  • Graduate School of Information Security, Korea University
  • Center for Information Security, Korea University
  • Graduate School of Information Security, CIST, Korea University 1

External person

Dowon Hong

  • Electronics and Telecommunication Research Institute
  • Electronics and Telecommunications Research Institute
  • Kongju National University
  • ETRI
  • Korea University
  • Information Security Technology Division
  • Graduate School for Information Security (GSIS)
  • Department of Applied Mathematics
  • Dept. of Information Management and Security

External person

Chanying Huang

  • Korea University
  • Nanjing University of Science and Technology
  • Nanjing University of Information Science & Technology
  • School of Computer Science and Engineering
  • Graduate School of Information Security, Korea University
  • Graduate School of Information Security, CIST, Korea University 1
  • not available

External person

Seungho Lee

  • Graduate School of Information Security, Korea University
  • Korea University
  • Graduate School of Information Security, CIST, Korea University 1

External person

Eun Su Jeong

  • Center for Information and Security Technologies (CIST),
  • Korea University
  • SK Corporation
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University

External person

Willy Susilo

  • University of Wollongong
  • Centre for Computer and Information Security Research
  • School of Computer Science and Software Engineering

External person

Byeong Ho Ahn

  • Korea University
  • Graduate School for Information Security (GSIS)
  • Dept. of Information Management and Security

External person

Hyungwoo Kang

  • Financial Supervisory Service
  • National Security Research Institute, Korea

External person

Kilsoo Chun

  • Korea Info. Security Agency (KISA)
  • Korea Information Security Agency

External person

Seil Kim

  • Security Korea University
  • Korea University
  • Graduate School for Information Security (GSIS)
  • Dept. of Information Management and Security
  • Hyundai Motor Group

External person

Kyungho Joo

  • Korea University
  • Graduate School of Information Security, CIST, Korea University 1

External person

Hongjoo Jin

  • Korea University
  • Graduate School of Information Security, CIST, Korea University 1

External person

Jae Hyung Koo

  • Daegu Gyeongbuk Institute of Science and Technology
  • Global Center for Bio-Convergence Spin System
  • Department of New Biology, DGIST
  • Dept. of Information Management and Security
  • Korea University

External person

Seok Won Jung

  • Mokpo National University
  • Department of Information Security, Mokpo National University
  • Mokpo National Univ.
  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University

External person

Chae Bogk Kim

  • Korea National University of Education
  • Korea Natl. Univ. Educ., Kangnae-M.
  • Korea Natl. University of Education
  • Department of Technology Education
  • Korea National University of Education

External person

Laurence T. Yang

  • St. Francis Xavier University
  • St Francis Xavier University
  • Southern Illinois University
  • St. Fracis Xavier University
  • Saint Francis Xavier University

External person

Ki Tak Kim

  • Korea University
  • Graduate School of Information Security, Korea University
  • Ctr. for Info. Security Technologies
  • Graduate School of Information Security, CIST, Korea University 1
  • Center for Information Security, Korea University

External person

Byung Gil Lee

  • Cyber Security Research Division at Electronics and Telecommunications Research Institute
  • Electronics and Telecommunications Research Institute
  • ICT Convergence Security Research Laboratory

External person

Seung Geol Choi

  • United States Naval Academy
  • Columbia University

External person

Jieun Eom

  • Korea University
  • Graduate School of Information Security, Korea University
  • Graduate School of Information Security, CIST, Korea University 1

External person

Chang Seop Park

  • Dankook University
  • Division of Computer Science and Electronics
  • Information Security Lab.

External person

Won Hyung Park

  • Far East University
  • Dept. Information Management
  • Department of Cyber Security

External person

JuHee Ki

  • KEIT
  • Korea Evaluation Institute of Industrial Technology (KEIT)
  • Korea Evaluation Institute of Industrial Technology (KEIT)

External person

Ji Seon Lee

  • Korea University
  • Graduate School for Information Security (GSIS)
  • Graduate School of Information Security, Korea University
  • Dept. of Information Management and Security
  • Graduate School of Information Security, CIST, Korea University 1

External person

Jeong Su Park

  • Korea University
  • Ctr. for Info. Security Technologies
  • Graduate School of Information Security, Korea University
  • Graduate School of Information Security, CIST, Korea University 1
  • Center for Information Security, Korea University

External person

Eun A. Jun

  • Graduate School of Information Security, Korea University
  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University
  • Graduate School of Information Security, CIST, Korea University 1

External person

Dae Youb Kim

  • Center for Information and Security Technologies
  • Center for Information Security Technologies
  • CIST(Center for Information Security Technologies)
  • CIST (Center for Information Security Technologies)
  • Korea University

External person

Soo Hyeon Kim

  • Attached Institute of ETRI
  • Electronics and Telecommunications Research Institute
  • Korea University

External person

Suhri Kim

  • Ctr. for Info. Security Technologies
  • Korea University
  • Graduate School of Information Security, Korea University
  • Center for Information Security, Korea University
  • Graduate School of Information Security, CIST, Korea University 1
  • Department of Cyber Security

External person

Y. Kim

  • Korea University

External person

Kedong Yan

  • Korea University
  • Nanjing University of Science and Technology
  • Department of Computer Science and Technology
  • Department of Information Management Engineering

External person

Donghyun Kim

  • North Carolina Central University
  • University of Texas at Dallas
  • Kennesaw State University
  • Department of Mathematics and Computer Science
  • Department of Computer Science
  • Department of Computer Science, University of Texas at Dallas
  • Department of Mathematics and Physics
  • Georgia State University

External person

GangShin Lee

  • Korea Information Security Agency
  • Korea Internet and Security Agency
  • Korea University
  • Internet Infra and Personal Information Protection Division
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University

External person

Soonjwa Hong

  • National Security Research Institute, Korea

External person

Jung Hee Cheon

  • Seoul National University
  • ICU (Information and Communications Univ.)
  • Korea Advanced Institute of Science and Technology
  • ISaC
  • IRIS (International Research Center for Information Security)

External person

Daewan Han

  • National Security Research Institute, Korea
  • Attached Institute of ETRI
  • Attached Institute of Electronics and Telecommunications Research Institute (ETRI)
  • Electronics and Telecommunications Research Institute

External person

Hyun Chul Jung

  • Korea Information Security Agency

External person

Songjie Wei

  • Nanjing University of Science and Technology
  • School of Computer Science and Engineering

External person

Jong Pil Yun

  • Korea University
  • Graduate School of Information Security, Korea University
  • Graduate School of Information Security, CIST, Korea University 1

External person

Park Joon Young

  • Korea University
  • Graduate School of Information Security, Korea University
  • Graduate School of Information Security, CIST, Korea University 1

External person

Jik Hyun Chang

  • Sogang University

External person

Hyung Soo Park

  • ntelia Inc.

External person

Se Young Lee

  • Graduate School of Information Security, CIST, Korea University 1
  • Korea University

External person

Seog Chung Seo

  • Attached Institute of ETRI
  • Electronics and Telecommunications Research Institute
  • Korea University
  • Ctr. for Info. Security Technologies
  • Graduate School for Information Security (GSIS)
  • Center for Information Security, Korea University
  • Dept. of Information Management and Security
  • Samsung Advanced Institute of Technology
  • Kookmin University

External person

In Hwa Hong

  • Korea Electronics Technology Institute

External person

Daehun Nyang

  • Inha University
  • Information Security Research Laboratory

External person

Young Bi Lee

  • Korea University

External person

Yunkeun Song

  • ESCRYPT
  • Escrypt GmbH

External person

Jinkeun Hong

  • Baekseok University
  • Cheonan University
  • Division of Information and Communication, Baekseok University
  • Baekseok University

External person

Ho Lee Jun

  • Korea University
  • Graduate School for Information Security (GSIS)
  • Dept. of Information Management and Security

External person

Young Choi Eun

  • Dept. of Information Management and Security
  • Korea University

External person

Hwan Jin Lee

  • Korea Internet and Security Agency (KISA)
  • Korea Information Security Agency

External person

Hyungwoo Lee

  • Hanshin University
  • Div. of Information Science
  • School of Computer Engineering
  • Hanshin University

External person

Jungho Lee

  • Korea Information Certificate Authority Inc.

External person

Jae Yung Lee

  • Korea University
  • Graduate School of Information Security, Korea University
  • Graduate School of Information Security, CIST, Korea University 1

External person

Jeom Goo Kim

  • Namseoul University
  • Department of Computer Science, Namseoul University
  • NamSeoul University
  • Namseoul University

External person

Yousik Lee

  • Escrypt GmbH

External person

Jin Hyung Park

  • Ctr. for Info. Security Technologies
  • Korea University
  • Graduate School of Information Security, Korea University
  • Graduate School of Information Security, CIST, Korea University 1
  • Center for Information Security, Korea University

External person

Beom Hwan Chang

  • ETRI
  • Electronics and Telecommunications Research Institute
  • Cyber Security Research Department, Attached Institute of ETRI

External person

Joon Sik Kim

  • Korea University
  • Graduate School of Information Security, Korea University
  • Graduate School of Information Security, CIST, Korea University 1

External person

Mitsuru Matsui

  • Mitsubishi Electric

External person

Haeryong Park

  • Korea Information Security Agency
  • KISA (Korea Information Security Agency)

External person

Md Zakirul Alam Bhuiyan

  • Department of Computer and Information Sciences
  • Fordham University

External person

Hyung Jin Yang

  • Department of Physics, Korea University
  • National Creative Research Initiative Center for Neurodynamics
  • Korea University
  • Graduate School of Information Security, Korea University
  • Graduate School for Information Security (GSIS)
  • Ctr. for Info. Security Technologies
  • Center for Cell Dynamics
  • Graduate School of Information Security, CIST, Korea University 1
  • Korea Detector Laboratory, Physics Department, Korea University
  • Dept. of Information Management and Security
  • Center for Information Security, Korea University
  • Laser Physics Laboratory

External person

Moon Jeong Kim

  • Korea University

External person

Heeran Lim

  • Ajou University
  • Internet Immune System Laboratory

External person

Young Ik Eom

  • Sungkyunkwan University
  • College of Information and Communication Eng.
  • School of Information and Communication Engineering, Sungkyunkwan University
  • School of Information and Communication Engineering

External person

Joseph K. Liu

  • The Monesh University
  • Monash University

External person

Maeng Hee Sung

  • Samsung Advanced Institute of Technology
  • Samsung Advanced Institute of Technology
  • Information Security Strategic Technology Unit

External person

Dingyi Pei

  • Guangzhou University

External person

Duong Hieu Phan

  • Université de Limoges

External person

Duncan Wong

  • CryptoBLK Limited

External person

Seung Hyun Kim

  • Electronics and Telecommunications Research Institute

External person

Jongsub Moon

  • Graduate School of Information and Security
  • Korea University
  • Information Security
  • Graduate School for Information Security (GSIS)
  • Department of Electronics and Information Engineering
  • Department of Dermatology
  • School of Electrical Engineering Department
  • Neural Network Laboratory
  • Graduate School of Information Security, Korea University
  • Graduate School of Medicine
  • Ctr. for Info. Security Technologies
  • Department of Electronic and Information Engineering
  • Department of Electronics and Information Engineering
  • Dept. of Information Management and Security
  • Graduate School of Information Security, CIST, Korea University 1
  • Division of Infection and Immunology
  • Center for Information Security, Korea University

External person

Hyungjin Yang

  • Hanyang University
  • Korea University
  • National Creative Research Initiative Center for Neurodynamics
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University
  • Korea Detector Laboratory, Physics Department, Korea University

External person

Mi Yeon Kim

  • Korea University

External person

Ilhwan Lim

  • Korea University

External person

Seil Kim

  • AhnLab, Inc.

External person

Eike Kiltz

  • Centrum voor Wiskunde en Informatica

External person

Steven Galbraith

  • The University of Auckland

External person

Javier Herranz

  • UPC
  • Polytechnic University of Catalonia
  • Dept. Matemàtica Aplicada IV

External person

Yu Yu

  • Shanghai Jiao Tong University

External person

Jong Wook Hong

  • Daegu Technopark Venture 1 Plant
  • Daegu Gyeongbuk Institute of Science and Technology
  • Public and Original Technology Research Center

External person

Hyuncheol Kim

  • Korea University

External person

Gary Blosser

  • Carnegie Mellon University
  • SION Lab.

External person

Kibom Kim

  • National Security Research Institute, Korea

External person

I. Y. Jung

  • Kyungpook National University
  • School of Electronics Engineering

External person

Yungyu Kim

  • Korea University

External person

Hyunjin Sun

  • Graduate School of Information Security, CIST, Korea University 1
  • Korea University

External person

Aram Cho

  • Hyundai Motor Group

External person

Hank Wolfe

  • University of Otago

External person

Bo Yin Yang

  • Academia Sinica Taiwan

External person

Geumsook Ryu

  • Korea University

External person

Lynn Batten

  • Deakin University

External person

Jong Hwan Park

  • Department of Computer Science, Sangmyung University
  • Sangmyung University

External person

C. Eun

  • Kyungpook National University
  • School of Electronics Engineering

External person

Seung Hyun Seo

  • IT Venture Tower
  • Financial Security Agency
  • Korea Information Security Agency
  • Purdue University
  • Department of Mathematics, Korea University Sejong Campus
  • Korea University
  • Dept. of Math.

External person

Bumhan Lee

  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University

External person

Junggab Son

  • Kennesaw State University
  • Department of Computer Science

External person

Hee Won Myeong

  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University

External person

Xuejia Lai

  • Shanghai Jiao Tong University

External person

Jian Guo

  • Nanyang Technological University

External person

Jin Soo Sohn

  • Korea Telecom
  • KT
  • Service Development Department

External person

Boo Geum Jung

  • Electronics and Telecommunications Research Institute

External person

Youngsam Kim

  • Electronics and Telecommunications Research Institute

External person

Misook Lim

  • Korea Telecom
  • KT
  • Service Development Department

External person

Bobbie L. Foote

  • University of Oklahoma
  • School of Industrial Engineering

External person

Insup Lee

  • Univ of Pennsylvania
  • University of Pennsylvania
  • Dept. of Computer and Info. Science
  • Department of Computer and Information Science
  • Department of Computer and Information Science

External person

Seung Won Ko

  • Strategic R and D Division
  • AhnLab Co.

External person

Jung Kim Il

  • Graduate School of Information Management and Security
  • Korea University
  • Graduate School for Information Security (GSIS)
  • Dept. of Information Management and Security

External person

Yu Wei

  • College of Computer and Control Engineering
  • Nankai University

External person

Seil Kim

  • Korea University

External person

Hye Young Park

  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University

External person

Eun Sun Yoo

  • Seoul National University
  • ISaC

External person

Tae Youn Won

  • Korea University
  • Graduate School for Information Security (GSIS)
  • Dept. of Information Management and Security

External person

Chaetae Im

  • Korea Information Security Agency

External person

Ed Dawson

  • Queensland University of Technology

External person

Raphaël C.W. Phan

  • Monash University Malaysia

External person

Gongxuan Zhang

  • Nanjing University of Science and Technology
  • School of Computer Science and Engineering

External person

Bo Li

  • Nankai University

External person

Hyerean Jang

  • Graduate School of Information Security, CIST, Korea University 1
  • Korea University

External person

Hyo Jin Jo

  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University

External person

Mi Yeon Kim

  • Center for Information Security Technologies (CIST), Korea University
  • Korea Telecom
  • CIST(Center for Information Security Technologies)
  • KT
  • Korea University
  • Service Development Department
  • Department of Industrial Systems and Information Engineering
  • Ctr. for Info. Security Technologies
  • Dept. Industrial Systems and Information Engineering
  • Center for Information Security, Korea University

External person

Yousik Lee

  • ESCRYPT
  • ETAS Korea
  • Korea University

External person

Chang Ho Hong

  • Center for Information Security Technologies (CIST), Korea University
  • Ctr. for Info. Security Technologies
  • CIST (Center for Information Security Technologies)
  • Korea University
  • Graduate School of Information Security, Korea University
  • Graduate School for Information Security (GSIS)
  • Graduate School of Information Security, CIST, Korea University 1
  • Center for Information Security, Korea University
  • Dept. of Information Management and Security

External person

Minho Jo

  • Sungkyunkwan University
  • Dept. of Comp. and Comm., Korea University
  • Korea University
  • Department of Computer and Information Science, Korea University
  • College of Information and Communication
  • School of Information and Communication Engineering, Sungkyunkwan University
  • School of Information and Communication, Korea University
  • School of Information and Communication Engineering
  • College of Information and Communication, Korea University
  • Dept. of Industrial and Systems Engineering
  • Lehigh University

External person

He Fei

  • Korea University

External person

Sangrae Cho

  • Electronics and Telecommunications Research Institute

External person

Tzong Chen Wu

  • National Taiwan University of Science and Technology

External person

TaeJin Lee

  • Korea Information Security Agency
  • Korea Security and Internet Agency

External person

Kwangjo Kim

  • Korea Advanced Institute of Science and Technology
  • Yokohama National University
  • Electronics and Telecommunications Research Institute
  • Coding Technology Department
  • Yonsei University

External person

Youn Lee Su

  • Baekseok College

External person

Zheli Liu

  • College of Computer and Control Engineering
  • Nankai University

External person

Hyeran Mun

  • Korea University

External person

Sanghyun Cho

  • Korea University

External person

Mohyun Park

  • Financial Security Institute

External person

Taekyoung Kwon

  • Sejong University
  • School of Computer Engineering

External person

Boyeon Song

  • Korea Institute of Science and Technology Information

External person

Sunwoo Lee

  • Center for Information Security, Korea University
  • Korea University

External person

Nam S. Jho

  • Electronics and Telecommunication Research Institute
  • Seoul National University
  • Electronics and Telecommunications Research Institute
  • ISaC

External person

T. Sohn

  • Korea University

External person

Siyi Lv

  • College of Computer and Control Engineering
  • Nankai University

External person

Zhipeng Cai

  • Georgia State University

External person

Ju Hee Ki

  • Korea University

External person

Sung A. Cho

  • Digital TV Research Laboratory, 16 Woomyeon-Dong, Seocho-Gu
  • LG Electronics
  • LG Corporation

External person

E. Kim

  • Igloo Security, Inc.

External person

Hsiao Hwa Chen

  • National Cheng Kung University

External person

Jung Taek Seo

  • Electronics and Telecommunications Research Institute
  • Soonchunhyang University

External person

Duhyeong Lee

  • Korea University

External person

Jun Eun Park

  • Korea University

External person

Huaxiong Wang

  • Nanyang Technological University

External person

Thomas Wollinger

  • Escrypt GmbH

External person

Hee Yun Jeong

  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University

External person

In Seog Seo

  • National Security Research Institute(NSRI)
  • National Security Research Institute, Korea

External person

Dong Geun Suh

  • Yonsei University, Wonju

External person

Kyusuk Han

  • LG Corporation

External person

Man Kim Bo

  • Korea University

External person

Jae Ik Cho

  • Korea University
  • Graduate School for Information Security (GSIS)
  • Ctr. for Info. Security Technologies
  • Dept. of Information Management and Security
  • Center for Information Security, Korea University

External person

Kilho Shin

  • University of Hyogo
  • Graduate School of Applied Informatics

External person

Seongkon Kim

  • Catholic University of Pusan
  • Catholic University of Pusan

External person

Jin Ho Han

  • Korea University
  • Graduate School of Information Security, Korea University
  • Graduate School of Information Security, CIST, Korea University 1

External person

Seok Man Yoo

  • Ctr. for Info. Security Technologies
  • Korea University
  • Center for Information Security, Korea University

External person

Phong Nguyen

  • The University of Tokyo

External person

Siu Ming Yiu

  • The University of Hong Kong

External person

Tae Ryung Im

  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University

External person

Jin Hyun Kim

  • Department of Computer and Information Science
  • University of Pennsylvania
  • Korea University
  • Dept. of Computer Science Educatoin
  • Aalborg University

External person

Jooyoung Park

  • Department of Control and Instrumentation, Korea University
  • Department of Control and Instrumentation Engineering, Korea University
  • Korea University

External person

Young Ho Park

  • Sejong cyber university

External person

Joon Wan Kim

  • Korea University

External person

Hyon Young Choi

  • University of Pennsylvania

External person

Hoon Kim Sung

  • Korea University

External person

Song Yi Kim

  • Korea University

External person

Yanyu Huang

  • College of Computer and Control Engineering
  • Nankai University

External person

Myung Hwan Kim

  • Seoul National University
  • ISaC

External person

Jonathan Katz

  • University of Maryland, College Park

External person

Seong Jin Park

  • Hanshin University

External person

Wonsuk Choi

  • Korea University
  • Graduate School of Information Security, Korea University
  • Graduate School of Information Security, CIST, Korea University 1

External person

Shiho Moriai

  • Nippon Telegraph and Telephone Corp.
  • Nippon Telegraph & Telephone
  • Japan National Institute of Information and Communications Technology

External person

Milyoung Kim

  • Korea University
  • Graduate School of Information Security, Korea University
  • Graduate School of Information Security, CIST, Korea University 1

External person

Daihee Park

  • Korea University
  • Department of Computer Science, College of Information and Communication
  • Department of Computer Science, Korea University
  • Dept. of Computer Science Educatoin

External person

Michel Abdalla

  • DIENS
  • Université PSL
  • Institut national de recherche en informatique et en automatique
  • Ecole Normale Supérieure-PSL Research University

External person

J. Moon

  • Kyungpook National University
  • School of Electronics Engineering

External person

Sohyun Park

  • Department of Chemistry and Research
  • Korea University
  • Korea Institute of Science and Technology

External person

Jun Ho Lee

  • Korea University

External person

Kyoung Hyun Kim

  • Korea University
  • Center for Information Security, Korea University

External person

Jong Hwa Seo

  • Coll. Sci. Technol.
  • Korea University

External person

Mu Hyun Kim

  • Korea University

External person

Manpyo Hong

  • Ajou University
  • Internet Immune System Laboratory

External person

R. N. Uma

  • North Carolina Central University

External person

Dennis Hofheinz

  • CWI
  • Centrum voor Wiskunde en Informatica

External person

Shin Kilho

  • Carnegie Mellon CyLab.
  • Carnegie Mellon CyLab Japan
  • University of Hyogo
  • Carnegie Mellon University

External person

Kihong Kim

  • Dept. of Information Management and Security
  • Korea University
  • Electronics and Telecommunications Research Institute
  • Graduate School of Information Security, CIST, Korea University 1
  • National Security Research Institute, Korea

External person

Masayuki Abe

  • Nippon Telegraph & Telephone

External person

Hee Jean Kim

  • Samsung Advanced Institute of Technology

External person

Sumin Chae

  • Korea University

External person

Hyung Jong Kim

  • Korea Information Security Agency
  • Seoul Women's University

External person

Soo Hyung Kim

  • Samsung
  • SAMSUNG Electronics Co Ltd
  • Korea University
  • Telecommunication R and D Center
  • Compiler and Microarchitecture Laboratory
  • Department of IT Convergence, Korea University
  • System LSI Team
  • Department of IT Convegence
  • Power Quality Technology
  • Electronics and Telecommunications Research Institute
  • Department of Computer Science and Engineering, Woojung College of Information and Communications, Korea University

External person

Rahman Tashakkori

  • Appalachian State University

External person

Jino Heo

  • Center for Information Security Technologies (CIST), Korea University
  • CIST (Center for Information Security Technologies)
  • Korea University
  • Graduate School of Information Security, Korea University
  • Ctr. for Info. Security Technologies
  • Graduate School for Information Security (GSIS)
  • Graduate School of Information Security, CIST, Korea University 1
  • Center for Information Security, Korea University
  • Dept. of Information Management and Security

External person

Sung Jin Kim

  • National Security Research Institute, Korea

External person

Young Ju Hwang

  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University

External person

Byung Joon Kim

  • National Security Research Institute, Korea

External person

P. Simin Pulat

  • University of Oklahoma
  • School of Industrial Engineering

External person

Han Kim Bum

  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University

External person

Moti Yung

  • Columbia University
  • Department of Computer Science, Columbia University

External person

Dongwook Shim

  • Korea University

External person

Li Kun

  • Korea University

External person

Xiu Anna

  • Korea University

External person

Jae Tark Choi

  • Korea University
  • Graduate School for Information Security (GSIS)
  • Dept. of Information Management and Security

External person

Seoung Yeop Na

  • Korea University
  • Graduate School of Information Security, Korea University
  • Graduate School of Information Security, CIST, Korea University 1

External person

Hong Ki Ko

  • ntelia Inc.

External person

Dong Guk Han

  • Kookmin University
  • Electronics and Telecommunications Research Institute
  • ETRI
  • Department of Mathematics, Kookmin University
  • Future University-Hakodate
  • IACR
  • Future University Hakodate
  • Korea University
  • Ctr. for Info. Security Technologies
  • Information Security Technology Division
  • Center for Information Security, Korea University
  • Rothamsted Research
  • IEEK
  • KIISC

External person

L. E.E. Kwangsu

  • Sejong University

External person

Paul C. Hong

  • University of Toledo

External person