International 문서 원본 보기
←
International
이동:
둘러보기
,
검색
문서 편집 권한이 없습니다. 다음 이유를 확인해주세요:
요청한 명령은 다음 권한을 가진 사용자에게 제한됩니다:
사용자
.
이 문서는 편집하거나 다른 명령을 할 수 없도록 보호되어 있습니다.
문서의 원본을 보거나 복사할 수 있습니다.
== '''International Journal''' == * Heeyoul Kim, Younho Lee, Yongsu Park, "A robust and flexible digital rights management system for home networks", <br /> The Journal of Systems and Software Volume 83, Issue 12, December 2010, Pages 2431-2440 (JSS2010) ---- * Daeseon Choi, Seunghun Jin, Younho Lee, Yongsu Park, "Personalized Eigen Trust with the Beta Distribution", <br /> ETRI Journal, Vol.32 No.2 ---- * Younho LEE, Yongsu PARK, Heeyoul KIM, Seong-Min HONG, Hyunsoo YOON,"Rougue Public Key Registration Attack and the Importance of 'Proof of Possession' in the PKI Environment",<br /> IEICE TRANS.INF. &SYST., Vol.E89-D, No.8, August 2006 ---- Younho Lee, Heeyoul Kim, Yongsu Park, "A new data hiding scheme for binary image authentication with small image distortion" <br /> Information Sciences 179 (2009) 3866-3884 ---- Younho Lee, Heeyoul Kim, Yongsu Park, Hyunsoo Yoon, "An Efficient Delegation Protocol with Delegation Traceability in the X.509 Proxy Certificate Environment for Computational Grids", <br /> Information Sciences, Volume 178, Issue 14, 15 July 2008, Pages 2968-2982 ---- Daeseon Choi, Younho Lee, Yongsu Park, Seung-hun Jin, Hyunsoo Yoon, "Efficient and Secure Self-organized Public Key Management for Mobile Ad Hoc Networks", <br /> IEICE Transactions on Communications, Vol.E91-B, No.11, pp.3574-3583, 2008. 11 ---- Younho LEE, Junbeom HUR, Heeyoul KIM, Yongsu PARK, Hyunsoo YOON, "A New Binary Image Authentication Scheme with Small Distortion and Low False Negative Rates", <br /> IEICE Transactions on Communications, Vol.E90-B, No.11, pp.3259-3262, 2007. 11 ---- Seok-Lae Lee, Yongsu Park, Joo-Seok Song,"An Improvement of Park-Chung-Cho’s Stream Authentication Scheme by Using Information Dispersal Algorithm" <br /> ISNN 2007, Part I, LNCS 4491, pp. 1045-1053, 2007. ---- Heeyoul KIM, Younho LEE, Yongsu PARK, Hyunsoo YOON, "Reactive Key Management Scheme for Access Control in Group Communications" <br /> IEICE TRANS. COMMUN., VOL.E90-B, NO.4 APRIL 2007 ---- Joo Seung Yoon, Hee Moon Kim, Gil Ju Lee, Il Hee Kim, Yongsu Park, "Secure distribution of neural networks in wireless sensor networks" <br /> International Journal of Security and its Applications, Vol. 1, No. 2, October, 2007 ---- Heeyoul Kim, Byungchun Chung, Younho Lee, Yongsu Park, Hyunsoo Yoon, "Weakness of the Synchro-Difference LKH Scheme for Secure Multicast" <br /> IEEE COMMUNICATIONS LETTERS, VOL. 11, NO. 9, SEPTEMBER 2007 ---- Yong Ho Song, Jung Min Park, Yongsu Park, Eul Gyu Im, "A New Methodology of Analyzing Security Vulnerability for Network Services" <br /> ISI 2006, LNCS 3975, pp. 737-738, 2006. ---- Younho Lee, Heeyoul Kim, Yongsu Park, Hyunsoo Yoon, "A New Proxy Signature Scheme Providing Self-Delegation" <br /> ICISC 2006, LNCS 4296, pp.328-342. 2006 ---- Yongsu Park, Yookun Cho, "An Efficient Pointer Protection Scheme to Defend Buffer Overflow Attacks" <br /> PARA 2004, LNCS 3732, pp. 1025-1030, 2006 ---- Yongsu Park, Yong Ho Song, Eul Gyu Im, "Design of a Reliable Hardware Stack to Defend Against Frame Pointer Overwrite Attacks " <br /> ISI 2006, LNCS 3975, pp. 731-732, 2006. ---- Yongsu Park, Yookun Cho, "Efficient One-Time Signature Schemes for Stream Authentication", <br /> Journal of Information Science and Engineering, Vol.22, No.3, (JISE 2006) ---- Yongsu Park, Younho Lee, Heeyoul Kim, Gil-Joo Lee, Il-Hee Kim, "Hardware Stack Design: Towards an Effective Defence Against Frame Pointer Overwrite Attacks", <br /> IWSEC 2006, LNCS 4266, pp. 268-277, 2006. ---- Eul Gyu Im, Jung Taek Seo, Dong-Soo Kim, Yong Ho Song, Yongsu Park, "Hybrid Modeling for Large-Scale Worm Propagation Simulations" <br /> ISI 2006, LNCS 3975, pp. 572-577, 2006. ---- JaeYong JEONG, Yongsu PARK, Yookun CHO, "An Efficient Mobile Code Authentication Scheme that Permits Overlapping of Execution and Downloading" <br /> IEICE TRANS. INF. &SYST. Vol.E88-D, No.5 May 2005 ---- JaeYong Jeong, Yongsu Park, Yookun Cho, "Efficient DoS Resistant Multicast Authentication Schemes"<br /> ICCSA 2005, LNCS 3481, pp. 353-362, 2005. ---- ---- == '''International Conference''' == Sung-Ho Kim, Hong-Jin Lee, Han-Wool Jung, Beom-Ki Maeng, Yongsu Park, "IPAP: IMPROVED PRIVACY AND AUTHENTICATION PROTOCOL FOR PASSIVE RFID TAGS", <br /> IEEE InternationalConference on Network Infrastructure and Digital Content (IC-NIDC 2010) ---- Hanwool Jeong, Yongsu Park, Sungho Cho, Yangdon Won, "A STEGANOGRAPHIC TECHNIQUE FOR ADDING NEW FUNCTIONALITIES WHILE CONFORMING TO EPCGLOBAL CLASS GENERATION 2 STANDARD", <br /> IEEE InternationalConference on Network Infrastructure and Digital Content (IC-NIDC 2009) ---- Younho Lee, Yongsu Park, "Framework Design and Performance Analysis on Pairwise Key Establishment", <br /> Proceedings of the 12th Asia-Pacific network operations and management conference on Management enabling the future internet for changing business and new computing services <br /> LNCS 5787, pp. 311–320, (APNOMS 2009) ---- Gongsoo Jang, Hanwool Jeong, Jesung Byun, Yongsu Park, "Trust Management and Privacy Protection for Mobile Digital ID Wallets", <br /> The 2nd Joint Workshop between Beijing Univ. of Posts and Telecommunications and Hanyang Univ. , (BIPTWorkshop 2009) ---- Jung Min Park, Yongsu Park, Eul Gyu Im, Yong Ho Song, "A New Methodology of Analyzing Security Vulnerability in Executable Programs", <br /> Proceedings of International Ubiquitous Convergence Conference, (IUC 2006) ---- ----
International
문서로 돌아갑니다.
둘러보기 메뉴
개인 도구
로그인
이름공간
문서
토론
변수
보기
읽기
원본 보기
역사 보기
더 보기
검색
Main
Main
Members
Professor
Students
Alumni
Projects
On-Going
Finished Project
Papers
Domestic
International
Seminar
Lab Seminar
Tutorial
Reverse Engineering
Malware Analysis
Web Security
Software Vulnerability
Links
Links
Conferences
Etc
도구
여기를 가리키는 문서
가리키는 글의 바뀜
특수 문서 목록
문서 정보