• Source: Scopus
  • Calculated based on no. of publications stored in Pure and citations from Scopus
19952020

Research output per year

If you made any changes in Pure these will be visible here soon.

Network

Jaechul Sung

  • University of Seoul
  • Department of MathematicsUniversity of Seoul
  • Korea Information Security Agency
  • Center for Information Security Technologies (CIST)
  • Korea University
  • Ctr. for Info. Security Technologies
  • Cryptographic Technology Team
  • Center for Information Security, Korea University

External person

Hyung Jin Yang

  • Department of Physics, Korea University
  • National Creative Research Initiative Center for Neurodynamics
  • Korea University
  • Graduate School of Information Security, Korea University
  • Graduate School for Information Security (GSIS)
  • Ctr. for Info. Security Technologies
  • Center for Cell Dynamics
  • Graduate School of Information Security, CIST, Korea University 1
  • Korea Detector Laboratory, Physics Department, Korea University
  • Dept. of Information Management and Security
  • Center for Information Security, Korea University
  • Laser Physics Laboratory

External person

Young Ho Park

  • Sejong cyber university
  • Korea University
  • Department of Information Security, Sejong Cyber University
  • School of Computer Engineering

External person

Dong Guk Han

  • Kookmin University
  • Electronics and Telecommunications Research Institute
  • ETRI
  • Department of Mathematics, Kookmin University
  • Future University-Hakodate
  • IACR
  • Future University Hakodate
  • Korea University
  • Ctr. for Info. Security Technologies
  • Information Security Technology Division
  • Center for Information Security, Korea University
  • Rothamsted Research
  • IEEK
  • KIISC

External person

Chang Ho Hong

  • Center for Information Security Technologies (CIST), Korea University
  • Ctr. for Info. Security Technologies
  • CIST (Center for Information Security Technologies)
  • Korea University
  • Graduate School of Information Security, Korea University
  • Graduate School for Information Security (GSIS)
  • Graduate School of Information Security, CIST, Korea University 1
  • Center for Information Security, Korea University
  • Dept. of Information Management and Security

External person

Okyeon Yi

  • Kookmin University
  • Department of Methematics
  • Electronics and Telecommunications Research Institute
  • Department of Mathematics, Kookmin University
  • Information Security Technology Division

External person

Jino Heo

  • Center for Information Security Technologies (CIST), Korea University
  • CIST (Center for Information Security Technologies)
  • Korea University
  • Graduate School of Information Security, Korea University
  • Ctr. for Info. Security Technologies
  • Graduate School for Information Security (GSIS)
  • Graduate School of Information Security, CIST, Korea University 1
  • Center for Information Security, Korea University
  • Dept. of Information Management and Security

External person

Chang Han Kim

  • Semyung University
  • Semyeong University
  • Semyung Univ.
  • Dept. of Information Security
  • Department of Compter-Aided Mathematical Information Science
  • Dept. Of CAMIS
  • Dept. of Information and Security
  • Semyung University

External person

Deukjo Hong

  • Attacked Institute of ETRI
  • K.U. Leuven
  • Electronics and Telecommunications Research Institute
  • ETRI
  • KU Leuven
  • Korea University
  • Jeonbuk National University
  • Ctr. for Info. Security Technologies
  • Research Center CIST
  • System RandD Division
  • Department of Information Technology and Engineering
  • Center for Information Security, Korea University
  • Dept. ESAT/SCD-COSIC

External person

Taek Young Youn

  • Electronics and Telecommunications Research Institute
  • Korea University
  • Ctr. for Info. Security Technologies
  • Graduate School for Information Security (GSIS)
  • Center for Information Security, Korea University
  • Dept. of Information Management and Security
  • Graduate School of Information Security, CIST, Korea University 1

External person

Jinkeun Hong

  • Baekseok University
  • Cheonan University
  • Division of Information and Communication, Baekseok University
  • Baekseok University

External person

Soo Hak Sung

  • Paichai University
  • Pai Chai University
  • Electronics and Telecom. Res. Inst.
  • Beajea University
  • Electronics and Telecommunications Research Institute
  • Department of Applied Mathematics
  • Section 0710
  • Department of Computing Information and Mathematics

External person

Jin Wook Byun

  • Pyeongtaek University
  • Korea University
  • Department of Information and Communication
  • Ctr. for Info. Security Technologies
  • Graduate School for Information Security (GSIS)
  • Department of Information and Communication
  • Pyeongtaek University
  • Center for Information Security, Korea University
  • Dept. of Information Management and Security

External person

Jongsung Kim

  • KU Leuven
  • Center for Information Security, Korea University
  • Korea University
  • Kyungnam University

External person

Sun Hee Lim

  • Sch. of Civil. Environmental and Architecture Engineering, Coll. of Engineering, Korea Univ.
  • Diaplay and Nanosystem Lab.
  • Korea University
  • Graduate School for Information Security (GSIS)
  • Ctr. for Info. Security Technologies
  • Display and Nanosystem Laboratory, College of Engineering, Korea University
  • Dept. of Information Management and Security
  • Center for Information Security, Korea University
  • Research Institute of Engineering and Technology, College of Engineering, Korea University

External person

Tae Hyun Kim

  • Dept. of Information Management and Security
  • Korea University
  • Center for Information Security, Korea University
  • Electronics and Telecommunications Research Institute
  • Telecommunications Technology Association

External person

Jongsub Moon

  • Graduate School of Information and Security
  • Korea University
  • Information Security
  • Graduate School for Information Security (GSIS)
  • Department of Electronics and Information Engineering
  • Department of Dermatology
  • School of Electrical Engineering Department
  • Neural Network Laboratory
  • Graduate School of Information Security, Korea University
  • Graduate School of Medicine
  • Ctr. for Info. Security Technologies
  • Department of Electronic and Information Engineering
  • Department of Electronics and Information Engineering
  • Dept. of Information Management and Security
  • Graduate School of Information Security, CIST, Korea University 1
  • Division of Infection and Immunology
  • Center for Information Security, Korea University

External person

Howon Kim

  • ETRI
  • Electronics and Telecommunications Research Institute
  • Korea University
  • Center for Cell Dynamics
  • National Creative Research Initiative Center for Neurodynamics
  • Information Security Technology Division
  • Laser Physics Laboratory
  • Korea Detector Laboratory, Physics Department, Korea University

External person

Seok Won Jung

  • Mokpo National University
  • Department of Information Security, Mokpo National University
  • Mokpo National Univ.
  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University

External person

Kihong Kim

  • Dept. of Information Management and Security
  • Korea University
  • Electronics and Telecommunications Research Institute
  • Graduate School of Information Security, CIST, Korea University 1
  • National Security Research Institute, Korea

External person

Wonil Lee

  • Kyushu University
  • Korea University
  • Ctr. for Info. Security Technologies
  • Faculty of Information Science and Electrical Engineering
  • Center for Information Security, Korea University

External person

Young G. Kim

  • Catholic University of Daegu
  • School of Information Technology, Catholic University of Daegu
  • Korea University
  • Sejong University
  • Department of Computer Science, College of Information and Communication
  • Natural Language Processing Lab.
  • Graduate School for Information Security (GSIS)
  • College of Information and Communication
  • Dept. of Computer and Information Security
  • Department of Computer Science and Engineering, Korea University, Anam Campus
  • Ctr. for Info. Security Technologies
  • Dept. of Software Engineering
  • Department of Computer Science, Korea University
  • Internet Computing Lab.
  • Dept. of Computer Science Educatoin
  • Software System Laboratory
  • Dept. of Information Management and Security
  • School of Information and Communication, Korea University
  • College of Information and Communication, Korea University
  • Department of Computer Science and Engineering, Woojung College of Information and Communications, Korea University
  • Center for Information Security, Korea University

External person

Jung Yeon Hwang

  • Electronics and Telecommunications Research Institute
  • ETRI
  • Korea University
  • Graduate School for Information Security (GSIS)
  • Graduate School of Information Security, Korea University
  • Ctr. for Info. Security Technologies
  • Cyber Security Research Department, Attached Institute of ETRI
  • Dept. of Information Management and Security
  • Center for Information Security, Korea University
  • Graduate School of Information Security, CIST, Korea University 1

External person

Donghoon Chang

  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University

External person

Kitae Jeong

  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University

External person

Yong Ho Kim

  • Korea University

External person

Kwangsoo Lee

  • Center for Information Security, Korea University
  • Korea University

External person

Yeog Kim

  • Center for Information Security Technologies (CIST
  • Korea University
  • Ctr. for Info. Security Technologies
  • Graduate School for Information Security (GSIS)
  • Center for Information Security, Korea University
  • Dept. of Information Management and Security

External person

Chang Hoon Lee

  • School of Computer Engineering
  • Chosun University
  • College of Pharmacy
  • Hanshin University
  • Seoul National University of Science and Technology(SeoulTech)
  • Seoul National University
  • University of Science and Technology UST
  • Korea University
  • Ctr. for Info. Security Technologies
  • Department of Polymer Science and Engineering
  • Molecular Opto-Electronics Laboratory
  • Department of Polymer Science and Engineering
  • Department of Chemical and Biological Engineering, College of Engineering, Korea University
  • Department of Computer Science and Engineering, Seoul National University of Science and Technology
  • Department of Polymer Science and Engineering
  • Center for Information Security, Korea University
  • Hanshin University
  • Dept. of Chemical and Biological Engineering, Korea University
  • Seoul National University of Science and Technology (SNUST)

External person

Min Sung Kang

  • Center for Information Security Technologies (CIST), Korea University
  • CIST (Center for Information Security Technologies)
  • Graduate School of Information Security, Korea University
  • Korea University
  • Ctr. for Info. Security Technologies
  • Graduate School of Information Security, CIST, Korea University 1
  • Center for Information Security, Korea University

External person

Seunghwan Yun

  • Korea University
  • Graduate School for Information Security (GSIS)
  • Ctr. for Info. Security Technologies
  • Dept. of Information Management and Security
  • Center for Information Security, Korea University

External person

Kwon, Yoo Jin

  • Korea Electric Power
  • Korea University
  • Graduate School of Information Security, Korea University
  • Distribution Laboratory
  • Graduate School of Information Security, CIST, Korea University 1

External person

Seongtaek Chee

  • National Security Research Institute, Korea
  • Electronics and Telecommunications Research Institute
  • Coding Technology Department
  • Sogang University
  • Coding Technology Department

External person

Dong Hyeon Cheon

  • Graduate School of Biotechnology
  • Korea University
  • Ctr. for Info. Security Technologies
  • Natl. Creative Res. Initiative C.
  • College of Life Science
  • Center for Information Security, Korea University
  • Lab. of Cell./Molecular Biochemistry

External person

Lim, Yong Hun

  • Korea Electric Power
  • Distribution Laboratory

External person

Hyejoung Yoo

  • Korea University
  • Sparxcom corporation
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University

External person

Kouichi Sakurai

  • Kyushu University
  • Department of Computer Science and Communication Engineering
  • Computer Science and Communication Engineering
  • IEEE
  • Department of Computer Science and Communication Engineering
  • Faculty of Information Science and Electrical Engineering
  • Department of Computer Science and Communication Engineering

External person

Nam Su Chang

  • Sejong Cyber University
  • Korea Univ.
  • Sejong cyber university
  • Korea University
  • Ctr. for Info. Security Technologies
  • Department of Information Security, Sejong Cyber University
  • Center for Information Security, Korea University

External person

Sung Jae Lee

  • Korea Internet and Security Agency
  • Korea Information Security Agency

External person

Changho Jung

  • Korea University

External person

Kilsoo Chun

  • Korea Info. Security Agency (KISA)
  • Korea Information Security Agency

External person

Jung Hwan Song

  • Hanyang University
  • Department of Mathematics, College of Natural Sciences, Hanyang University

External person

Sangwoo Park

  • National Security Research Institute, Korea

External person

Seokhee Lee

  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Infonnation Security Technologies
  • Digital Forensics Research Center (DFRC)
  • Center for Information Security, Korea University

External person

Changhoon Lee

  • Seoul National University of Science and Technology(SeoulTech)
  • Seoul National University of Science and Technology
  • Department of Computer Science and Engineering, Seoul National University of Science and Technology
  • Hanshin University
  • Department of Computer Science and Engineering, Seoul National University of Science and Technology (SeoulTech)
  • University of Science and Technology UST
  • Seoul National University of Science and Technology (SNUST)
  • Seoul National University of Science and Technology(SeoulTech)
  • School of Computer Engineering
  • Hanshin University
  • Korea University

External person

Tsuyoshi Takagi

  • Future University Hakodate
  • Future University-Hakodate
  • School of Systems Information Science

External person

Laurence T. Yang

  • St. Francis Xavier University
  • St Francis Xavier University
  • Southern Illinois University
  • St. Fracis Xavier University
  • Saint Francis Xavier University

External person

Jong Hyuk Park

  • Kyungnam University
  • Center for Information Security, Korea University
  • Korea University
  • Seoul National University of Science and Technology (SNUST)
  • Hanwha
  • SeoulTech

External person

Hak Soo Ju

  • Korea Information Security Agency

External person

Antonio Savoldi

  • University of Brescia
  • University of Brescia
  • Department for Electronics for Automation
  • Department for Electronicrror Automation
  • Department of Information Engineering

External person

Hyun Jeong Kim

  • Korea University
  • KU Leuven

External person

Eun A. Jun

  • Graduate School of Information Security, Korea University
  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University
  • Graduate School of Information Security, CIST, Korea University 1

External person

Choonsik Park

  • ETRI
  • Electronics and Telecommunications Research Institute
  • National Security Research Institute
  • Section 0710

External person

Jewan Bang

  • Korea University
  • Ctr. for Info. Security Technologies
  • Digital Forensics Research Center (DFRC)
  • Center for Information Security, Korea University

External person

Kyo I.L. Chung

  • Electronics and Telecommunications Research Institute

External person

Ju Sung Kang

  • ETRI
  • Electronics and Telecommunications Research Institute
  • Korea University
  • Information Security Technology Division
  • Dept. of Math.
  • Section 0710

External person

Sung Kyoung Kim

  • Samsung
  • Korea University
  • Graduate School for Information Security (GSIS)
  • Smart Card Development Team
  • Dept. of Information Management and Security

External person

Eunjin Lee

  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University

External person

Hyung Jun Kim

  • Department of Electronics Engineering
  • Korea University
  • Department of Electrical Engineering

External person

Hwayean Lee

  • Universität Wien
  • Ctr. for Info. Security Technologies
  • University of Vienna
  • Institut für Experimentalphysik
  • Korea University
  • Center for Information Security, Korea University

External person

Jae Deok Ji

  • KISA
  • Korea Internet and Security Agency
  • Korea Information Security Agency
  • Information Security Technology Division
  • Information Technology Team

External person

Seungjo Baek

  • Korea University
  • Graduate School of Information Security, Korea University
  • Graduate School for Information Security (GSIS)
  • Graduate School of Information Security, CIST, Korea University 1
  • Dept. of Information Management and Security

External person

Katsuyuki Okeya

  • Systems Development Laboratory, Hitachi, Ltd.
  • Systems Development Laboratory
  • Hitachi

External person

Hee Seok Kim

  • University of Science and Technology UST
  • Dept. of Advanced KREONET Security Service
  • Korea Institute of Science and Technology Information
  • Department of Cyber Security
  • Korea University
  • Information Security
  • Dept. of Information Management and Security
  • Center for Information Security, Korea University

External person

In Hwa Hong

  • Korea Electronics Technology Institute

External person

Kyungdeok Hwang

  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University

External person

Daehun Nyang

  • Inha University
  • Information Security Research Laboratory

External person

Lee, Kyung Bok

  • Korea University
  • Graduate School of Information Security, Korea University
  • Graduate School of Information Security, CIST, Korea University 1

External person

Kim, Hwankuk

  • Korea Information Security Agency

External person

Jae Ik Cho

  • Korea University
  • Graduate School for Information Security (GSIS)
  • Ctr. for Info. Security Technologies
  • Dept. of Information Management and Security
  • Center for Information Security, Korea University

External person

Hwaseong Lee

  • Korean Agency for Defense Development
  • Korea University
  • Ctr. for Info. Security Technologies
  • Graduate School for Information Security (GSIS)
  • Graduate School of Information Security, Korea University
  • Center for Information Security, Korea University
  • Dept. of Information Management and Security
  • Graduate School of Information Security, CIST, Korea University 1

External person

Sang Hyun Cho

  • Institute of Mine Reclamation Technology
  • Mine Reclamation Corp.
  • Korea University
  • Graduate School for Information Security (GSIS)
  • Dept. of Civil, Environmental and Architectural Engineering
  • Institute of Mine Reclamation Technology, Mine Reclamation Corporation (MIRECO)
  • Ctr. for Info. Security Technologies
  • Dept. of Information Management and Security
  • Department of Civil, Environmental and Architectural Engineering, Korea University
  • Center for Information Security, Korea University
  • Korea Advanced Institute of Science and Technology
  • Portal Service Security Team
  • NHN Corporation

External person

Shiho Moriai

  • Nippon Telegraph and Telephone Corp.
  • Nippon Telegraph & Telephone
  • Japan National Institute of Information and Communications Technology

External person

Kwangho Kim

  • Korea University
  • National Security Research Institute, Korea
  • Graduate School for Information Security (GSIS)
  • Dept. of Information Management and Security

External person

Sung, Maenghee

  • Korea Information Security Agency

External person

Jesang Lee

  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University

External person

Sangho Oh

  • Graduate School of Biotechnology
  • Graduate School of Biotechnology Bldg.
  • Korea University
  • Natl. Creative Res. Initiative C.
  • College of Life Science
  • Lab. of Cell./Molecular Biochemistry

External person

Hyun Sook Rhee

  • Graduate School of Information Security, Korea University
  • Samsung
  • University of Wollongong
  • Korea University
  • Ctr. for Info. Security Technologies
  • Graduate School for Information Security (GSIS)
  • Centre for Computer and Information Security Research
  • Center for Information Security, Korea University
  • Dept. of Information Management and Security
  • Graduate School of Information Security, CIST, Korea University 1

External person

JuHee Ki

  • KEIT
  • Korea Evaluation Institute of Industrial Technology (KEIT)
  • Korea Evaluation Institute of Industrial Technology (KEIT)

External person

Sangtae Jeong

  • Seoul National University
  • Department of Mathematics, Seoul National University

External person

Dae Youb Kim

  • Center for Information and Security Technologies
  • Center for Information Security Technologies
  • CIST(Center for Information Security Technologies)
  • CIST (Center for Information Security Technologies)
  • Korea University

External person

Dong Jin Yang

  • Korea Univ.
  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University

External person

Beom Hwan Chang

  • ETRI
  • Electronics and Telecommunications Research Institute
  • Cyber Security Research Department, Attached Institute of ETRI

External person

Haeryong Park

  • Korea Information Security Agency
  • KISA (Korea Information Security Agency)

External person

Yoo, Heajoung

  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University

External person

Hyun Seung Park

  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University

External person

Jong Hwan Park

  • Sangmyung University
  • Kyung Hee University
  • Division of Computer Science, Sangmyung University
  • Korea University
  • Department of Applied Mathematics
  • Department of Computer Science, Sangmyung University
  • Ctr. for Info. Security Technologies
  • Graduate School for Information Security (GSIS)
  • Graduate School of Information Security, Korea University
  • Center for Information Security, Korea University
  • Dept. of Information Management and Security
  • Graduate School of Information Security, CIST, Korea University 1

External person

S. K. Hong

  • National Creative Research Initiative Center for Neurodynamics
  • Korea University
  • Korea Detector Laboratory, Physics Department, Korea University

External person

Inho Cho

  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University

External person

Min Sik Kim

  • National Security Research Institute, Korea

External person

Jin Woong Cho

  • Korea Electronics Technology Institute

External person

Hyungjin Yang

  • Hanyang University
  • Korea University
  • National Creative Research Initiative Center for Neurodynamics
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University
  • Korea Detector Laboratory, Physics Department, Korea University

External person

Jong Kyu Kim

  • National Security Research Institute, Korea

External person

King, Ralph

  • Cyber Security Research Lab
  • Electric Power Research Institute (EPRI)

External person

Ji-Young, Kong

  • Information Security
  • Korea University

External person

Yoon, Sang Pil

  • Graduate School of Information Security, Korea University
  • Korea University
  • Graduate School of Information Security, CIST, Korea University 1

External person

In Jung Kim

  • National Security Research Institute, Korea

External person

Jinho Yoo

  • Sangmyung University

External person

Yoon, Chun Seok

  • National Creative Research Initiative Center for Neurodynamics
  • Korea University
  • Graduate School of Information Security, Korea University
  • Ctr. for Info. Security Technologies
  • Graduate School of Information Security, CIST, Korea University 1
  • Center for Information Security, Korea University
  • Korea Detector Laboratory, Physics Department, Korea University

External person

Hyung Geun Oh

  • National Security Research Institute, Korea
  • Information Security
  • Korea University

External person

Sangdon Park

  • National Security Research Institute, Korea

External person

Hyukdon Kwon

  • Korea University

External person

Daesung Kwon

  • National Security Research Institute, Korea
  • Attacked Institute of ETRI
  • ETRI
  • Electronics and Telecommunications Research Institute

External person

Dong Hee Kim

  • National Security Research Institute, Korea

External person

Robert H. Deng

  • Singapore Management University
  • Agency for Science, Technology and Research

External person

Mina Shim

  • Korea University

External person

Hyunsang Kim

  • Korea University

External person

Kisik Chang

  • Institute for Infocomm Research(I2R)
  • Agency for Science, Technology and Research
  • InfoComm Service Division(ICSD)
  • Service and Applications
  • Korean National Police Agency

External person

Joo, Moon Ho

  • Graduate School of Information Security, Korea University
  • Korea University
  • Graduate School of Information Security, CIST, Korea University 1

External person

Jinhyun Cho

  • Graduate School of Information Security, CIST, Korea University 1
  • Korea University

External person

Lee, Sang Hwa

  • Department of Information and Communication Engineering
  • Kongju National University

External person

Eun Young Choi

  • Korea University
  • Korea Information Security Agency
  • Kumho Life and Environmental Science Laboratory

External person

Changho Seo

  • Korea University

External person

Changhan Kim

  • Semyeong University
  • Semyung University
  • School of Computer Engineering
  • Semyung University

External person

Yongtae Kim

  • Gwangju National University of Education

External person

Koumadi, Koudjo M.

  • Korea Electric Power
  • Distribution Laboratory

External person

Ki Soon Yoon

  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University

External person

Dukjae Moon

  • Sansung Public Coporation
  • National Security Research Institute, Korea
  • Korea University
  • Ctr. for Info. Security Technologies
  • Graduate School for Information Security (GSIS)
  • Center for Information Security, Korea University
  • Dept. of Information Management and Security

External person

Sosun Kim

  • Softforum Co.

External person

Jae Yoon Lim

  • Korea University

External person

Kyoung Gon, Kim

  • Information Security
  • Korea University

External person

Oh, Sangho

  • Korea University

External person

Manhyun Jung

  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University

External person

G. L. Khym

  • Korea University
  • Center for Cell Dynamics
  • National Creative Research Initiative Center for Neurodynamics
  • Laser Physics Laboratory
  • Korea Detector Laboratory, Physics Department, Korea University

External person

Donghyuk Yim

  • Korea University
  • Graduate School for Information Security (GSIS)
  • Dept. of Information Management and Security

External person

Sunmi Yun

  • Korea University

External person

GuTaek Lee

  • Korea University

External person

Jongsung Lee

  • Korea University

External person

Bong Gyou Lee

  • Yonsei University

External person

Kim Yeog

  • Korea University

External person

Seongtaek Chee

  • ETRI
  • National Security Research Institute, Korea
  • Coding Technology Department
  • National Security Research Institute (NSRI)
  • Electronics and Telecommunications Research Institute
  • Sogang University
  • Section 0711

External person

Jung Je Son

  • Samsung
  • Global Standards and Research Team
  • Korea University

External person

Kim, Dong Hee

  • Korea University
  • Graduate School of Information Security, Korea University
  • Graduate School of Information Security, CIST, Korea University 1

External person

Shin, Hoon

  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University

External person

Jong Su Kim

  • Korea Research Institute of Standards and Science
  • Korea University
  • Cwangju Institute of Science and Technology
  • Dept. of Mat. Sci. and Engineering
  • Ctr. for Info. Security Technologies
  • Div. of Mat. Science and Engineering
  • Advanced Photonics Research Institute
  • Advanced Photonics Research Institute
  • Gwangju Institute of Science and Technology
  • Yeungnam University
  • Center for Information Security, Korea University
  • Div. of Materials Science and Eng.

External person

Ji Yeon Cho

  • Yonsei University

External person

Hye Young Kim

  • Hongik University

External person

Dong Won Jeong

  • Korea University
  • Kunsan National University
  • Department of Statistics and Computer Science, Kunsan National University
  • Software System Lab.
  • Software System Laboratory
  • Department of Informatics and Statistics
  • Dept. of Information Sciences
  • Department of Computer Science and Engineering, Woojung College of Information and Communications, Korea University

External person

Kim, Myung Sup

  • Korea University
  • Department of Computer and Information Science, Korea University

External person

Soonhak Kwon

  • Sungkyunkwan University

External person

Kyuhyung Cho

  • Korea University
  • Ctr. for Info. Security Technologies

External person

Dongho Song

  • Korea University
  • Graduate School for Information Security (GSIS)
  • Dept. of Information Management and Security

External person

Hyun A. Park

  • University of Arizona
  • Korea University
  • Ctr. for Info. Security Technologies
  • Graduate School for Information Security (GSIS)
  • Artificial Intelligence Lab
  • Graduate School of Information Security, Korea University
  • Center for Information Security, Korea University
  • Dept. of Information Management and Security
  • Graduate School of Information Security, CIST, Korea University 1
  • Eller College of Management

External person

Hyewon Lee

  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University

External person

Taekyoung Kwon

  • Sejong University
  • School of Computer Engineering

External person

Seungchul Seo

  • Sparxcom corporation

External person

Sooyoung Chae

  • Attached Institute of ETRI
  • Electronics and Telecommunications Research Institute

External person

T. Sohn

  • Korea University

External person

Hosub Lee

  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University

External person

Kim, Geun Hye

  • Korea University

External person

Jeong Choon Ryoo

  • Korea University
  • Graduate School for Information Security (GSIS)
  • Dept. of Information Management and Security

External person

Jung Taek Seo

  • Electronics and Telecommunications Research Institute
  • Soonchunhyang University

External person

Won Gue Lim

  • Sungkyunkwan University
  • Department of Computer Science Education

External person

Hee Yun Jeong

  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University

External person

Ki Seok Bang

  • Department of Computer Science and Engineering, Korea University
  • Korea Univerity
  • Department of Computer Science and Engineering, Korea University, Anam Campus
  • Korea University
  • Natural Language Processing Lab.
  • IEEE
  • Internet Computing Lab.
  • Department of Computer Science and Engineering, Woojung College of Information and Communications, Korea University
  • Software System Laboratory
  • Hallym University
  • College of Information and Electronic

External person

Hyunsang Kim

  • Center for Information Security, Korea University
  • Korea University

External person

Park, Kwang Cheol

  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University

External person

Jea Doek Ji

  • Korea Internet and Security Agency
  • Korea Information Security Agency

External person

Hyeon Seung Kim

  • Korea University

External person

Jung Keun Lee

  • National Security Research Institute, Korea
  • ETRI Network and Communication Security Division
  • Electronics and Telecommunications Research Institute

External person

Jung Youp Lee

  • Korea University
  • Graduate School for Information Security (GSIS)
  • Dept. of Information Management and Security

External person

Ji In Kim

  • Korea University
  • Center for Cell Dynamics
  • Laser Physics Laboratory

External person

Hyungwoo Lee

  • Hanshin University
  • Div. of Information Science
  • School of Computer Engineering
  • Hanshin University

External person

Hyun Kim

  • Korea Information Security Agency

External person

Bon Seok Koo

  • Attached Institute of ETRI
  • National Security Research Institute, Korea
  • Electronics and Telecommunications Research Institute
  • Korea University
  • Network and Communication Security Division

External person

Hichun Eun

  • Korea University

External person

Ahyeon Ju Park

  • Korea University
  • Graduate School of Information Security, Korea University
  • Graduate School of Information Security, CIST, Korea University 1

External person

Kihong Kim

  • Korea University
  • Graduate School for Information Security (GSIS)
  • Dept. of Information Management and Security

External person

Mridul Nandi

  • Indian Statistical Institute
  • CINVESTAV-IPN
  • University of Waterloo
  • Cryptology Research Group (CRG
  • CINVESTAV-IPN
  • Applied Statistics Unit

External person

Jung Yeong Hwang

  • ETRI
  • Electronics and Telecommunications Research Institute
  • Knowledge-based Information Security Department

External person

Seonhee Yoon

  • Korea Info. Security Agency (KISA)
  • Korea Information Security Agency

External person

Hyungchul Kang

  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University

External person

Bao Feng

  • Agency for Science, Technology and Research

External person

Sangjoon Park

  • National Security Research Institute, Korea

External person

Jeongseon Seol

  • Korea Telecommunications Operators Association
  • Samsung Advanced Institute of Technology

External person

Hong, Ic Pyo

  • Department of Information and Communication Engineering
  • Kongju National University

External person

Hong Su Cho

  • Korea University
  • Graduate School for Information Security (GSIS)
  • Dept. of Information Management and Security

External person

Jeom Goo Kim

  • Namseoul University
  • Department of Computer Science, Namseoul University
  • NamSeoul University
  • Namseoul University

External person

Su Mi Lee

  • Financial Security Agency
  • Korea University
  • Graduate School for Information Security (GSIS)
  • Ctr. for Info. Security Technologies
  • Dept. of Information Management and Security
  • Center for Information Security, Korea University

External person

Won Hyung Park

  • Far East University
  • Dept. Information Management
  • Department of Cyber Security

External person

Jaemin Choi

  • Korea University
  • Ctr. for Info. Security Technologies
  • Digital Forensics Research Center (DFRC)
  • Center for Information Security, Korea University

External person

Lee, Keun Young

  • Graduate School of Information Security, Korea University
  • Korea University
  • Graduate School of Information Security, CIST, Korea University 1

External person

Kihong Kim

  • National Security Research Institute, Korea

External person

Taehyoung Park

  • Korea University
  • Graduate School for Information Security (GSIS)
  • Dept. of Information Management and Security

External person

Young Ju Hwang

  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University

External person

Ho Kim Yong

  • Korea University
  • Graduate School for Information Security (GSIS)
  • Dept. of Information Management and Security

External person

Lee, Sangyoum

  • Korea Electric Power

External person

Chang Hyi Lee

  • Samsung Advanced Institute of Technology

External person

Lee, Seonhee

  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University

External person

Kyu Young Choi

  • Korea University
  • Graduate School for Information Security (GSIS)
  • Ctr. for Info. Security Technologies
  • Dept. of Information Management and Security
  • Center for Information Security, Korea University

External person

Soo Hyun Park

  • Ltd
  • Kookmin University
  • DongEui University
  • LG Info. and Communications, Ltd.
  • Kookmin Univ.
  • LGIC Information & Communication, Ltd
  • Dongeui University
  • Graduate School of Business IT, Kookmim University
  • Kookmim University
  • Dongeui University
  • Central Research Center
  • LG Corporation
  • Korea University
  • School of Business IT
  • Natural Language Processing Lab.
  • School of Business
  • Internet Computing Lab.
  • Software System Laboratory

External person

Young Chun Ji

  • Korea University
  • Graduate School for Information Security (GSIS)
  • Dept. of Information Management and Security

External person

Youngdai Ko

  • LG CNS
  • Information Security Team
  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University
  • LG Corporation

External person

E. Joong Yoon

  • National Security Research Institute, Korea

External person

Guil Kim

  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University

External person

Jung Hyun Lee

  • College of Information and Communications, Korea University
  • Coll. of Info. and Communication
  • Korea University
  • Department of Computer Science and Engineering, Korea University, Anam Campus
  • College of Information and Communication
  • Department of Computer Science and Engineering, Woojung College of Information and Communications, Korea University
  • College of Information and Communication, Korea University
  • School of Information and Communication, Korea University
  • Dept. of Information Management and Security

External person