Calculated based on number of publications stored in Pure and citations from Scopus
1995 …2024

Research activity per year

Network

Jaechul Sung

  • University of Seoul
  • Department of MathematicsUniversity of Seoul
  • Korea Information Security Agency
  • Center for Information Security Technologies (CIST)
  • Korea University
  • Ctr. for Info. Security Technologies
  • Cryptographic Technology Team
  • Center for Information Security, Korea University

External person

Changhoon Lee

  • Seoul National University of Science and Technology(SeoulTech)
  • Seoul National University of Science and Technology
  • Department of Computer Science and Engineering, Seoul National University of Science and Technology
  • Hanshin University
  • Department of Computer Science and Engineering, Seoul National University of Science and Technology (SeoulTech)
  • University of Science and Technology UST
  • Seoul National University of Science and Technology (SNUST)
  • Seoul National University of Science and Technology(SeoulTech)
  • School of Computer Engineering
  • Hanshin University
  • Korea University
  • University of La Laguna

External person

Jongsung Kim

  • KU Leuven
  • Center for Information Security, Korea University
  • Korea University
  • Kyungnam University
  • Kookmin University

External person

Jong Hyuk Park

  • Seoul National University of Science and Technology (SNUST)
  • Samsung Advanced Institute of Technology
  • HANWHA S and C Co. Ltd.
  • Department of Computer Science and Engineering, Seoul National University of Science and Technology
  • Kyungnam University
  • R and D Institute Hanwha S and C Co., Ltd.
  • Seoul National University of Science and Technology
  • University of Science and Technology UST
  • Korea University
  • Igloo Security, Inc.
  • School of Computer Engineering
  • Hanwha
  • Ctr. for Info. Security Technologies
  • R and D Institute
  • Center for Information Security, Korea University
  • Seoul National University

External person

Jewan Bang

  • Korea University
  • Ctr. for Info. Security Technologies
  • Digital Forensics Research Center (DFRC)
  • Center for Information Security, Korea University
  • Korean National Police Agency

External person

Keun G. Lee

  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Infonnation Security Technologies
  • Digital Forensics Research Center (DFRC)
  • Center for Information Security, Korea University

External person

Wonil Lee

  • Kyushu University
  • Korea University
  • Ctr. for Info. Security Technologies
  • Faculty of Information Science and Electrical Engineering
  • Center for Information Security, Korea University

External person

Deukjo Hong

  • Attacked Institute of ETRI
  • K.U. Leuven
  • Electronics and Telecommunications Research Institute
  • ETRI
  • KU Leuven
  • Korea University
  • Jeonbuk National University
  • Ctr. for Info. Security Technologies
  • Research Center CIST
  • System RandD Division
  • Department of Information Technology and Engineering
  • Center for Information Security, Korea University
  • Dept. ESAT/SCD-COSIC

External person

Hyunji Chung

  • Center for Information Security Technologies, Korea University
  • CIST(Center for Information Security Technologies)
  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University
  • National Institute of Standards and Technology

External person

Kyung Soo Lim

  • Center for Information Security Technologies
  • Digital Forensic Research Center, Center for Information Security Technologies, Korea University
  • Digital Forensics Research Center (DFRC)
  • CIST(Center for Information Security Technologies)
  • Ctr. for Info. and Security Technol.
  • Korea University
  • Computer Network Lab.
  • Ctr. for Info. Security Technologies
  • Optoelectronics Lab.
  • Center for Infonnation Security Technologies
  • Faculty of Electronics and Electrical Eng.
  • Dept. of the Electronics Engineering
  • Cyber Security Research Department, Attached Institute of ETRI
  • Electronics and Telecommunications Research Institute
  • Electrical and Computer Engineering, Korea University
  • Center for Information Security, Korea University
  • Department of Electrical Engineering

External person

Doowon Jeong

  • Korea University
  • Ctr. for Info. Security Technologies
  • Digital Forensics Research Center (DFRC)
  • Center for Information Security, Korea University
  • Dongguk University

External person

Donghoon Chang

  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University
  • Indraprastha Institute of Information Technology Delhi
  • National Institute of Standards and Technology

External person

Soo Hak Sung

  • Paichai University
  • Pai Chai University
  • Electronics and Telecom. Res. Inst.
  • Beajea University
  • Electronics and Telecommunications Research Institute
  • Department of Applied Mathematics
  • Section 0710
  • Department of Computing Information and Mathematics

External person

Seokhee Lee

  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Infonnation Security Technologies
  • Digital Forensics Research Center (DFRC)
  • Center for Information Security, Korea University

External person

Yeog Kim

  • Center for Information Security Technologies (CIST
  • Korea University
  • Ctr. for Info. Security Technologies
  • Graduate School for Information Security (GSIS)
  • Center for Information Security, Korea University
  • Dept. of Information Management and Security

External person

Byeongyeong Yoo

  • Korea University
  • Digital Forensics Research Center (DFRC)
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University

External person

Antonio Savoldi

  • University of Brescia
  • University of Brescia
  • Department for Electronics for Automation
  • Department for Electronicrror Automation
  • Department of Information Engineering

External person

Kwangsoo Lee

  • Center for Information Security, Korea University
  • Korea University

External person

Okyeon Yi

  • Kookmin University
  • Department of Methematics
  • Electronics and Telecommunications Research Institute
  • Department of Mathematics, Kookmin University
  • Information Security Technology Division

External person

Seongtaek Chee

  • National Security Research Institute, Korea
  • Electronics and Telecommunications Research Institute
  • Coding Technology Department
  • Sogang University
  • Coding Technology Department

External person

Dohyun Kim

  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University
  • Electronics and Telecommunications Research Institute

External person

Sung Jae Lee

  • Korea Internet and Security Agency
  • Korea Information Security Agency

External person

Mridul Nandi

  • Indian Statistical Institute
  • CINVESTAV-IPN
  • University of Waterloo
  • Cryptology Research Group (CRG
  • Centro de Investigacion y de Estudios Avanzados del Instituto Polit├ęcnico Nacional
  • Applied Statistics Unit

External person

Junghoon Oh

  • Korea University
  • A-FIRST AhnLab
  • Digital Forensics Research Center (DFRC)
  • Electronics and Telecommunications Research Institute

External person

Dukjae Moon

  • Sansung Public Coporation
  • National Security Research Institute, Korea
  • Korea University
  • Ctr. for Info. Security Technologies
  • Graduate School for Information Security (GSIS)
  • Center for Information Security, Korea University
  • Dept. of Information Management and Security

External person

Changho Jung

  • Korea University

External person

N. V. Son

  • Korea University
  • Ctr. for Info. Security Technologies
  • Dept. of Civil, Environmental and Architectural Engineering
  • Center for Information Security, Korea University
  • Department of Civil, Environmental and Architectural Engineering, Korea University

External person

Sangjun Jeon

  • Korea University
  • Ctr. for Info. Security Technologies
  • Digital Forensics Research Center (DFRC)
  • Center for Information Security, Korea University

External person

Byoung Soo Koh

  • Jinjoo Bldg.
  • DigiCAPS Co., Ltd
  • DigiCAPS Co. Ltd.
  • Digicaps Co., Ltd., Jinjoo Bldg
  • DigiCAPs Co., Ltd., Jinjoo Bldg.
  • DigiCAPS Co., Ltd., Jinjoo Bldg.

External person

Jaemin Choi

  • Korea University
  • Ctr. for Info. Security Technologies
  • Digital Forensics Research Center (DFRC)
  • Center for Information Security, Korea University

External person

KeunDuck Byun

  • Korea University
  • Ctr. for Info. Security Technologies
  • Digital Forensics Research Center (DFRC)
  • Graduate School for Information Security (GSIS)
  • Center for Information Security, Korea University
  • Dept. of Information Management and Security

External person

Youngdai Ko

  • LG CNS
  • Information Security Team
  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University
  • LG Corporation

External person

Dong Guk Han

  • Kookmin University
  • Electronics and Telecommunications Research Institute
  • ETRI
  • Department of Mathematics, Kookmin University
  • Future University-Hakodate
  • IACR
  • Future University Hakodate
  • Korea University
  • Ctr. for Info. Security Technologies
  • Information Security Technology Division
  • Center for Information Security, Korea University
  • Rothamsted Research
  • IEEK
  • KIISC

External person

Kouichi Sakurai

  • Kyushu University
  • Department of Computer Science and Communication Engineering
  • Computer Science and Communication Engineering
  • IEEE
  • Department of Computer Science and Communication Engineering
  • Faculty of Information Science and Electrical Engineering
  • Department of Computer Science and Communication Engineering

External person

Sungsu Lim

  • Korea University
  • Digital Forensics Research Center (DFRC)
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University

External person

Kisik Chang

  • Institute for Infocomm Research(I2R)
  • Agency for Science, Technology and Research, Singapore
  • InfoComm Service Division(ICSD)
  • Service and Applications
  • Korean National Police Agency

External person

Jaehyeok Han

  • Institute of Cyber Security and Privacy (ICSP)
  • Korea University
  • Graduate School of Information Security, Korea University
  • Graduate School of Information Security, CIST, Korea University 1

External person

Jung Hwan Song

  • Hanyang University
  • Department of Mathematics, College of Natural Sciences, Hanyang University

External person

In Hwa Hong

  • Korea Electronics Technology Institute

External person

Seung Bong Lee

  • Financial Security Agency
  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University

External person

Jun Choi

  • Sansung Public Coporation
  • The 2nd branch, Defense Security Institute
  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University
  • Defense Security Institute

External person

Hyung Jun Kim

  • Korea University
  • Hansei University

External person

Guil Kim

  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University

External person

Choonsik Park

  • ETRI
  • Electronics and Telecommunications Research Institute
  • National Security Research Institute
  • Section 0710

External person

Dong Hyeon Cheon

  • Graduate School of Biotechnology
  • Korea University
  • Ctr. for Info. Security Technologies
  • Natl. Creative Res. Initiative C.
  • College of Life Science
  • Center for Information Security, Korea University
  • Lab. of Cell./Molecular Biochemistry

External person

Hyejoung Yoo

  • Korea University
  • Sparxcom corporation
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University

External person

Jungwoo Seo

  • Graduate School of Information Security, Korea University
  • Korea University
  • Graduate School of Information Security, CIST, Korea University 1

External person

Cheulhoon Kang

  • Supreme Prosecutor's Office
  • Supreme Prosecutors' Office
  • Supreme Prosecutors' Office
  • Supreme Prosecutor's Office
  • Digital Forensic Center

External person

Ju Sung Kang

  • ETRI
  • Electronics and Telecommunications Research Institute
  • Korea University
  • Information Security Technology Division
  • Dept. of Math.
  • Section 0710

External person

Honggoo Kang

  • Korea University
  • Defense Security Support Command

External person

Paolo Gubian

  • University of Brescia
  • University of Brescia
  • Department for Electronics for Automation

External person

Kwangjo Kim

  • Korea Advanced Institute of Science and Technology
  • Yokohama National University
  • Electronics and Telecommunications Research Institute
  • Coding Technology Department
  • Yonsei University

External person

Bart Preneel

  • KU Leuven
  • Dept. ESAT/SCD-COSIC

External person

Hyunuk Hwang

  • Electronics and Telecommunications Research Institute

External person

Laurence T. Yang

  • St. Francis Xavier University
  • St Francis Xavier University
  • Southern Illinois University
  • St. Fracis Xavier University
  • Saint Francis Xavier University

External person

Jong Hyun Choi

  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University
  • Institute of Cyber Security and Privacy (ICSP)

External person

Bon Seok Koo

  • Attached Institute of ETRI
  • National Security Research Institute, Korea
  • Electronics and Telecommunications Research Institute
  • Korea University
  • Network and Communication Security Division

External person

Jihun Joun

  • Korea University

External person

Seonhee Yoon

  • Korea Info. Security Agency (KISA)
  • Korea Information Security Agency

External person

Joonho Choi

  • Center for Information Security, Korea University
  • Korea University

External person

Chorong Jeong

  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University

External person

Ilyoung Hong

  • Supreme Prosecutors' Office
  • Ctr. for Info. Security Technologies
  • Korea University
  • Center for Information Security, Korea University
  • Supreme Prosecutors' Office

External person

Sungwook Kang

  • Korea University
  • NCSoft
  • Graduate School of Information Security, Korea University
  • Graduate School of Information Security, CIST, Korea University 1

External person

Jieon Kim

  • Korea University

External person

Jongsub Moon

  • Graduate School of Information and Security
  • Korea University
  • Information Security
  • Graduate School for Information Security (GSIS)
  • Department of Electronics and Information Engineering
  • Department of Dermatology
  • School of Electrical Engineering Department
  • Neural Network Laboratory
  • Graduate School of Information Security, Korea University
  • Graduate School of Medicine
  • Ctr. for Info. Security Technologies
  • Department of Electronic and Information Engineering
  • Department of Electronics and Information Engineering
  • Dept. of Information Management and Security
  • Graduate School of Information Security, CIST, Korea University 1
  • Division of Infection and Immunology
  • Center for Information Security, Korea University

External person

Hyungjin Yang

  • Hanyang University
  • Korea University
  • National Creative Research Initiative Center for Neurodynamics
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University
  • Korea Detector Laboratory, Physics Department, Korea University

External person

Kitae Jeong

  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University

External person

Bora Park

  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University

External person

Robert H. Deng

  • Singapore Management University
  • Agency for Science, Technology and Research, Singapore

External person

Jeong Jae Yu

  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University

External person

Sung Mo Park

  • Pai Chai University
  • Paichai University
  • Electronics and Telecommunications Research Institute
  • Department of Applied Mathematics
  • Section 0710

External person

Jisung Choi

  • Korea University

External person

Chang Hoon Lee

  • School of Computer Engineering
  • Chosun University
  • College of Pharmacy
  • Hanshin University
  • Seoul National University of Science and Technology(SeoulTech)
  • Seoul National University
  • University of Science and Technology UST
  • Korea University
  • Ctr. for Info. Security Technologies
  • Department of Polymer Science and Engineering
  • Molecular Opto-Electronics Laboratory
  • Department of Polymer Science and Engineering
  • Department of Chemical and Biological Engineering, College of Engineering, Korea University
  • Department of Computer Science and Engineering, Seoul National University of Science and Technology
  • Department of Polymer Science and Engineering
  • Center for Information Security, Korea University
  • Hanshin University
  • Dept. of Chemical and Biological Engineering, Korea University
  • Seoul National University of Science and Technology (SNUST)

External person

Jongseong Yoon

  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University

External person

Sunmi Yun

  • Korea University

External person

GuTaek Lee

  • Korea University

External person

Yirang Lim

  • Korea University

External person

Hoyong Choi

  • Korea University

External person

Andreas Westfeld

  • Institute for System Architecture
  • Technische Universit├Ąt Dresden

External person

Gwonho Ryu

  • Attached Institute of ETRI
  • National Security Research Institute, Korea
  • Electronics and Telecommunications Research Institute
  • Network and Communication Security Division

External person

Kukheon Lee

  • Korea University

External person

Kyungdeok Hwang

  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University

External person

Hyewon Lee

  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University

External person

Sangwoo Park

  • National Security Research Institute, Korea

External person

Young Ho Park

  • Sejong cyber university

External person

Deok Gyu Lee

  • ETRI
  • Soonchunhyang University
  • Electronics and Telecommunications Research Institute
  • Division of Information Technology Engineering

External person

Shiho Moriai

  • Nippon Telegraph and Telephone Corp.
  • Nippon Telegraph & Telephone
  • Japan National Institute of Information and Communications Technology

External person

Sooyoung Park

  • CIST(Center for Information Security Technologies)
  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University

External person

Palash Sarkar

  • Indian Statistical Instute
  • Indian Statistical Institute
  • Applied Statistics Unit

External person

Lee Yunho Lee

  • Korea University
  • Environmental Science and Ecological Engineering, College of Life Sciences and Biotechnology, Korea University
  • Laboratory of Molecular Environmental Microbiology, Department of Environmental Science and Ecological Engineering, Korea University
  • Department of Environmental Science and Ecological Engineering, Graduate School, Korea University

External person

Bao Feng

  • Agency for Science, Technology and Research, Singapore

External person

Min A. Youn

  • Korea University

External person

Maenghee Sung

  • Korea Information Security Agency

External person

Jesang Lee

  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University

External person

Dowon Hong

  • Electronics and Telecommunication Research Institute
  • Electronics and Telecommunications Research Institute
  • Kongju National University
  • ETRI
  • Korea University
  • Information Security Technology Division
  • Graduate School for Information Security (GSIS)
  • Department of Applied Mathematics
  • Dept. of Information Management and Security

External person

Dooho Choi

  • Electronics and Telecommunications Research Institute
  • Information Security Technology Division

External person

Heajoung Yoo

  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University

External person

Hyun Seung Park

  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University

External person

Bum Han Kim

  • Center for Information and Security Technologies (CIST),
  • Korea University
  • Ctr. for Info. Security Technologies
  • Graduate School for Information Security (GSIS)
  • Department of Communication Sciences and Engineering
  • Center for Information Security, Korea University
  • Dept. of Information Management and Security

External person

Hyung Jin Yang

  • Department of Physics, Korea University
  • National Creative Research Initiative Center for Neurodynamics
  • Korea University
  • Graduate School of Information Security, Korea University
  • Graduate School for Information Security (GSIS)
  • Ctr. for Info. Security Technologies
  • Center for Cell Dynamics
  • Graduate School of Information Security, CIST, Korea University 1
  • Korea Detector Laboratory, Physics Department, Korea University
  • Dept. of Information Management and Security
  • Center for Information Security, Korea University
  • Laser Physics Laboratory

External person

Hwa Min Lee

  • Soonchunhyang University
  • Korean Intellectual Property Office
  • Korea University
  • Dept. of Computer Software Engineering, Soonchunhyang University
  • Division of Computer Science and Engineering
  • Department of Computer Science Education, Korea University

External person

Seokwon Jung

  • Korea University

External person

Inho Cho

  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University

External person

Joshua I. James

  • University College Dublin
  • UCD Digital Forensic Investigation Research Group (DigitalFIRE)

External person

Jeonghyeon Kim

  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University

External person

Sang Uk Shin

  • Pukyong National University
  • Department of Computer Science

External person

Michaela Iorga

  • National Institute of Standards and Technology

External person

Sang Joon Park

  • Electronics and Telecommunications Research Institute
  • Sungkyunkwan University
  • Information Security Group
  • BCQRE Co., Ltd

External person

Kwangwon Choi

  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University

External person

Jin Hong

  • National Security Research Institute, Korea

External person

Young Ho Park

  • Sejong cyber university
  • Korea University
  • Department of Information Security, Sejong Cyber University
  • School of Computer Engineering

External person

Kyungho Son

  • Korea Information Security Agency

External person

Moti Yung

  • Columbia University
  • CertCo

External person

Hyungjoon Koo

  • Sungkyunkwan University

External person

Ahreum Kim

  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University

External person

Moti Yung

  • Columbia University
  • Alphabet Inc.

External person

Sang Hyuk An

  • Korea University

External person

Yunho Lee

  • Ctr. for Info. Security Technologies
  • Korea University
  • Center for Information Security, Korea University

External person

Jeffrey Voas

  • National Institute of Standards and Technology

External person

Nam Su Chang

  • Sejong Cyber University
  • Korea Univ.
  • Sejong cyber university
  • Korea University
  • Ctr. for Info. Security Technologies
  • Department of Information Security, Sejong Cyber University
  • Center for Information Security, Korea University

External person

Hoonjae Lee

  • Department of Electronics and Computer Engineering
  • Korea University
  • Department of Electronic Engineering
  • Robotics Laboratory
  • Compiler and Microarchitecture Laboratory
  • Computer Network Lab.
  • School of Electrical Eng.
  • Biomedical Imaging and Engineering Laboratory
  • School of Electrical Engineering, Korea University
  • Power Quality Technology
  • School of Electrical and Engineering, Korea University
  • Nanoelectronics Laboratory
  • Dept. of Brain and Cognitive Eng.
  • School of Electrical, Engineering Korea University
  • Electrical and Computer Engineering, Korea University
  • Institute for Basic Science

External person

Hyukdon Kwon

  • Korea University

External person

Daesung Kwon

  • National Security Research Institute, Korea
  • Attacked Institute of ETRI
  • ETRI
  • Electronics and Telecommunications Research Institute

External person

Jaeheon Kim

  • National Security Research Institute, Korea
  • National Security Research Institute (NSRI)

External person

Geunyeong Choi

  • Korea University

External person

Keunhee Han

  • Electronics and Telecommunications Research Institute
  • Coding Technology Section

External person

Eunjin Kim

  • Kyonggi University
  • San 94-6, Iui-dong, Yeongtong-gu
  • Department of International Industrial Information

External person

Jae Hyuk Jang

  • Daejon University
  • Daejeon University

External person

Jisung Han

  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University

External person

Hyunsang Kim

  • Korea University

External person

Taekeon Lee

  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University

External person

Yuseop Lee

  • Korea University
  • Ctr. for Info. Security Technologies
  • Graduate School for Information Security (GSIS)
  • Center for Information Security, Korea University
  • Dept. of Information Management and Security

External person

Sung Kyoung Kim

  • Samsung
  • Korea University
  • Graduate School for Information Security (GSIS)
  • Smart Card Development Team
  • Dept. of Information Management and Security

External person

Yong Seok Choi

  • Korea Forest Research Institute, Seoul
  • Department of Forest Products
  • Department of Environmental Science and Ecological Engineering, Graduate School, Korea University
  • Korea University
  • National Institute of Forest Sciences
  • National Institute of Forest Science
  • National Institute of Forest Science
  • University College London
  • Korea Institute of Science and Technology
  • Dankook University
  • National Institute of Forest Science

External person

Jungsuk Song

  • R and D Institute Hanwha S and C Co., Ltd.
  • Samsung Advanced Institute of Technology
  • Hanwha

External person

Sajid Hussain

  • Acadia University
  • Jodrey School of Computer Science

External person

Jung Kyu Park

  • Korea University
  • Graduate School of Information Security, Korea University
  • Graduate School of Information Security, CIST, Korea University 1

External person

Wonkyung Kim

  • Korea University

External person

Kangyoun Seo

  • Korea University

External person

Minji Um

  • Korea University

External person

Graeme Horsman

  • Teesside University

External person

Sangho Oh

  • Korea University

External person

Daewan Han

  • National Security Research Institute, Korea
  • Attached Institute of ETRI
  • Attached Institute of Electronics and Telecommunications Research Institute (ETRI)
  • Electronics and Telecommunications Research Institute

External person

Jinwon Sung

  • Korea University
  • Graduate School for Information Security (GSIS)
  • Dept. of Information Management and Security

External person

Jae Deok Ji

  • KISA
  • Korea Internet and Security Agency
  • Korea Information Security Agency
  • Information Security Technology Division
  • Information Technology Team

External person

Hye Young Park

  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University

External person

Kwang Su Lee

  • Center for Information Security, Korea University
  • Korea University

External person

O. Seung Cheol

  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University

External person

Jaeung Namgung

  • Center for Information Security Technologies, Korea University
  • CIST(Center for Information Security Technologies)
  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University

External person

Seongtaek Chee

  • ETRI
  • National Security Research Institute, Korea
  • Coding Technology Department
  • National Security Research Institute (NSRI)
  • Electronics and Telecommunications Research Institute
  • Sogang University
  • Section 0711

External person

Kilsoo Chun

  • Korea Info. Security Agency (KISA)
  • Korea Information Security Agency

External person

Jihyeok Yang

  • Korea University

External person

Chan Youn Lee

  • Center for Information Security Technologies (CIST), Korea University
  • CIST(Center for Information Security Technologies)
  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University

External person

Il Hwan Park

  • National Security Research Institute, Korea

External person

Jong Su Kim

  • Korea Research Institute of Standards and Science
  • Korea University
  • Cwangju Institute of Science and Technology
  • Dept. of Mat. Sci. and Engineering
  • Ctr. for Info. Security Technologies
  • Div. of Mat. Science and Engineering
  • Advanced Photonics Research Institute
  • Advanced Photonics Research Institute
  • Gwangju Institute of Science and Technology
  • Yeungnam University
  • Center for Information Security, Korea University
  • Div. of Materials Science and Eng.

External person

Kyounga Shin

  • Korea University

External person

Mun Kyu Lee

  • Inha University
  • School of Computer and Information Engineering

External person

Ji Soo Park

  • SeoulTech
  • Seoul National University of Science and Technology (SNUST)

External person

Kyung Hwan Park

  • Korea Information Security Agency

External person

Yongseok Choi

  • Korea University

External person

Dong Chun Lee

  • Howon University

External person

Seog Chung Seo

  • Attached Institute of ETRI
  • Electronics and Telecommunications Research Institute
  • Korea University
  • Ctr. for Info. Security Technologies
  • Graduate School for Information Security (GSIS)
  • Center for Information Security, Korea University
  • Dept. of Information Management and Security
  • Samsung Advanced Institute of Technology
  • Kookmin University

External person

Yeoulouk Sung

  • Kongju National University
  • Department of Applied Mathematics

External person

Dongwook Lee

  • National Security Research Institute, Korea

External person

Seunghwan Yun

  • Korea University
  • Graduate School for Information Security (GSIS)
  • Ctr. for Info. Security Technologies
  • Dept. of Information Management and Security
  • Center for Information Security, Korea University

External person

Hanjun Shin

  • Korea University
  • Department of Computer Science and Engineering, Korea University, Anam Campus
  • Natural Language Processing Lab.
  • Department of Computer Science, College of Information and Communication
  • Internet Computing Lab.
  • Department of Computer Science, Korea University
  • Department of Computer Science and Engineering, Woojung College of Information and Communications, Korea University
  • Software System Laboratory
  • Dept. of Computer Science Educatoin

External person

Jinhyung Jung

  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University

External person

Dongchan Lee

  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University

External person

Jaesung Kim

  • International Science Culture Institute

External person

Sungha Park

  • Seoul National University

External person

Namjun Kim

  • Sejong University

External person

Seungchul Seo

  • Sparxcom corporation

External person

T. Sohn

  • Korea University

External person

Philgeun Jin

  • Korea University

External person

Sung Yeon Ji

  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University

External person

Seok Won Jung

  • Mokpo National University
  • Department of Information Security, Mokpo National University
  • Mokpo National Univ.
  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University

External person

Yonghwi Kwon

  • University of Virginia

External person

Jeong Choon Ryoo

  • Korea University
  • Graduate School for Information Security (GSIS)
  • Dept. of Information Management and Security

External person

Chang Wook Park

  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University

External person

Hyeon Yu

  • Korea Police Investigation Academy
  • Ctr. for Info. Security Technologies
  • Korea University
  • Center for Information Security, Korea University

External person

Jung Taek Seo

  • Electronics and Telecommunications Research Institute
  • Soonchunhyang University
  • National Security Research Institute, Korea

External person

Seonho Lee

  • The Affiliated Institute of ETRI
  • Electronics and Telecommunications Research Institute

External person

Yaekwon Sohn

  • International Science Culture Institute

External person

Youn Kyoung Park

  • Korea University
  • Graduate School for Information Security (GSIS)
  • Dept. of Information Management and Security

External person

Hwajong Oh

  • Korea University
  • Center for Information Security, Korea University

External person

Jaewon Lee

  • International Science Culture Institute

External person

Jae Seong Lee

  • Hanyang University

External person

Sangchoon Kim

  • Electronics and Telecommunications Research Institute
  • Coding Technology Section

External person

Yongsup Shin

  • Ministry of Information and Communications(MIC)
  • Ministry of Information and Communication Republic of Korea

External person

Jeehee Lee

  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University

External person

Wooil Yang

  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University

External person

Seo Kimin

  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University

External person

Hongkyun Kwon

  • Korea University

External person

Taejoo Chang

  • National Security Research Institute, Korea

External person

Daesung Lim

  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University

External person

Sangjoon Park

  • Sungkyunkwan University
  • Hanyang University
  • Electronics and Telecommunications Research Institute
  • Information Security Group
  • Center for Edge Plasma Science

External person

Kimin Seo

  • Korean National Police Agency
  • Cyber Terror Response Center

External person

Jong Hyun Choi

  • Korea University

External person

Jungsoo Ahn

  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University

External person

Seungyoung Lee

  • The Affiliated Institute of ETRI
  • Electronics and Telecommunications Research Institute

External person

Dae Hyun Ryu

  • Electronics and Telecommunications Research Institute
  • Coding Technology Section

External person

Taejoo Chang

  • Attached Institute of ETRI
  • Electronics and Telecommunications Research Institute
  • Network and Communication Security Division

External person

Hye Ung Park

  • LG I and S Blg. 184-1
  • LG Corporation
  • LG Investment and Securities Co., Ltd.

External person

Kwon Youp Kim

  • Center for Information Security, Korea University
  • Korea University

External person

Kyung Hyune Rhee

  • Pukyong National University
  • Department of Computer Science

External person

Dong Kyue Kim

  • Hanyang University
  • School of Electrical and Computer Engineering

External person

Hyungwoo Lee

  • Hanshin University
  • Div. of Information Science
  • School of Computer Engineering
  • Hanshin University

External person

Daiki Lee

  • Electronics and Telecommunications Research Institute

External person

Changho Seo

  • Kongju National University

External person

Hyun Kim

  • Korea Information Security Agency

External person

Jongin Elm

  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University

External person

Elena Tsomko

  • CIST
  • Korea University
  • Graduate School for Information Security (GSIS)
  • Ctr. for Info. Security Technologies
  • Namseoul University
  • Department of Multimedia
  • Department of Information Management Engineering
  • Dept. of Information Management and Security
  • Center for Information Security, Korea University
  • Namseoul University

External person

Ah Reum Kang

  • Graduate School of Information Security, Korea University
  • Graduate School of Information and Security
  • Korea University
  • SUNY Buffalo
  • Department of Computer Science and Engineering
  • Ctr. for Info. Security Technologies
  • Graduate School of Information Security, CIST, Korea University 1
  • Center for Information Security, Korea University

External person

Jungho Lim

  • Korea University

External person

Ji Sook Park

  • Korea University

External person

Sangjoon Park

  • National Security Research Institute, Korea

External person

Seungwon Han

  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University

External person

Aran Park

  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University

External person

Eunju Baek

  • Korea University
  • Graduate School for Information Security (GSIS)
  • Dept. of Information Management and Security

External person

Soo Hyung Kim

  • Samsung
  • SAMSUNG Electronics Co Ltd
  • Korea University
  • Telecommunication R and D Center
  • Compiler and Microarchitecture Laboratory
  • Department of IT Convergence, Korea University
  • System LSI Team
  • Department of IT Convegence
  • Power Quality Technology
  • Electronics and Telecommunications Research Institute
  • Department of Computer Science and Engineering, Woojung College of Information and Communications, Korea University
  • Samsung Advanced Institute of Technology

External person

Alex Biryukov

  • KU Leuven
  • University of Luxembourg

External person

Sun Hee Lim

  • Sch. of Civil. Environmental and Architecture Engineering, Coll. of Engineering, Korea Univ.
  • Diaplay and Nanosystem Lab.
  • Korea University
  • Graduate School for Information Security (GSIS)
  • Ctr. for Info. Security Technologies
  • Display and Nanosystem Laboratory, College of Engineering, Korea University
  • Dept. of Information Management and Security
  • Center for Information Security, Korea University
  • Research Institute of Engineering and Technology, College of Engineering, Korea University

External person

Sangkyo Oh

  • Center for Information Security Technologies, Korea University
  • Center for Information Security Technologies (CIST), Korea University
  • CIST(Center for Information Security Technologies)
  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University

External person

Lee Dong-chan

  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University

External person

Junho Kim

  • Korea University

External person

Hyun Cheol Jeong

  • Korea Internet and Security Agency Seoul
  • Korea Information Security Agency

External person

Seonhee Lee

  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University

External person

Himchan Kim

  • Korea University
  • Department of Computer Science and Engineering, Korea University, Anam Campus
  • Computer Network Lab.
  • Natural Language Processing Lab.
  • Internet Computing Lab.
  • Department of Computer Science and Engineering, Woojung College of Information and Communications, Korea University
  • Electrical and Computer Engineering, Korea University
  • Software System Laboratory

External person

Mee Lan Han

  • Korea University
  • Graduate School of Information Security, Korea University
  • Graduate School of Information Security, CIST, Korea University 1

External person

Seung Cheol Goh

  • Electronics and Telecommunications Research Institute

External person

Yucheol Cho

  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University

External person

E. Joong Yoon

  • National Security Research Institute, Korea

External person

Sung Hee Hong

  • Korea Electronics Technology Institute

External person

Seok K. Yoon

  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University

External person

Yongjin Yeom

  • National Security Research Institute, Korea

External person

Chang Han Kim

  • Semyung University
  • Semyeong University
  • Semyung Univ.
  • Dept. of Information Security
  • Department of Compter-Aided Mathematical Information Science
  • Dept. Of CAMIS
  • Dept. of Information and Security
  • Semyung University

External person

Jungtaek Seo

  • National Security Research Institute, Korea

External person

DaeMin Shin

  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University

External person

Jae Won Han

  • Korea University
  • Ctr. for Info. Security Technologies
  • Center for Information Security, Korea University

External person