"International"의 두 판 사이의 차이

Cslab
이동: 둘러보기, 검색
(International Journal)
1번째 줄: 1번째 줄:
 
== '''International Journal''' ==
 
== '''International Journal''' ==
 +
* Duck-Ho BAE, Jong-Min LEE, Sang-Wook KIM, Youngjoon WON, Yongsu PARK, "Analyzing Network Privacy Preserving Methods: A Perspective of Social Network Characteristics", <br />
 +
IEICE TRANSACTIONS on Information and Systems Vol.E97-D, No.6, pp.1664-1667, 2014
 +
----
 
* Seokhyun Kim, Jaeheung Lee, Yongsu Park, Yookun Cho, "An optimal distributed trigger counting algorithm for large-scale networked systems", <br />
 
* Seokhyun Kim, Jaeheung Lee, Yongsu Park, Yookun Cho, "An optimal distributed trigger counting algorithm for large-scale networked systems", <br />
 
SIMULATION: Transactions of The Society for Modeling and Simulation International Volume 89, Number 7, pages 846-859, Junly 2013
 
SIMULATION: Transactions of The Society for Modeling and Simulation International Volume 89, Number 7, pages 846-859, Junly 2013

2016년 8월 1일 (월) 14:40 판

International Journal

  • Duck-Ho BAE, Jong-Min LEE, Sang-Wook KIM, Youngjoon WON, Yongsu PARK, "Analyzing Network Privacy Preserving Methods: A Perspective of Social Network Characteristics",

IEICE TRANSACTIONS on Information and Systems Vol.E97-D, No.6, pp.1664-1667, 2014


  • Seokhyun Kim, Jaeheung Lee, Yongsu Park, Yookun Cho, "An optimal distributed trigger counting algorithm for large-scale networked systems",

SIMULATION: Transactions of The Society for Modeling and Simulation International Volume 89, Number 7, pages 846-859, Junly 2013


  • Younho Lee, Ill-Hee Kim, Yongsu Park, "Improved multi-precision squaring for low-end RISC microcontrollers",

Journal of Systems and Software Volume 86, Issue 1, January 2013, Pages 60–71


  • Yongsu Park, "A New RFID Mutual Authentication Protocol using Light-Weight Hash Functions",

INFORMATION: An International Interdisciplinary Journal Volume 16, Number 6, pages 3479-3485, 2013


  • Jinyoung Lee, Hyeyoung Chang, Seong-Je Cho, Seong Baeg Kim, Yongsu Park, WoongChul Choi, "Integration of Software Protection Mechanisms against Reverse Engineering Attacks",

INFORMATION: An International Interdisciplinary Journal Volume 15, Number 4, pages 1569-1578, 2012


  • Jaeheung Lee, Seokhyun Kim, Yookun Cho, Yoojin Chung, Yongsu Park, "A Hierarchical Clustering-Based Spatial Cloaking Algorithm for Location-Based Services",

Journal of Internet Technology, Vol. 13 No. 4, PP. 645-654, 7 2012


  • Jaeheung Lee, Seokhyun Kim, Yookun Cho, Yoojin Chung, Yongsu Park, "HORSIC: An efficient one-time signature scheme for wireless sensor networks",

Information Processing Letters Volume 112, Issue 20, 31 October 2012, Pages 783–787


  • Seok-Ho Yoon, Suk-Soon Song, Sang-Wook Kim, YongSu Park, "Post Recommendation in a Blogosphere",

INFORMATION: An International Interdisciplinary Journal Volume 14, Number 8, pages 2857-2864, 2011


  • Heeyoul Kim, Younho Lee, Yongsu Park, "A robust and flexible digital rights management system for home networks",

The Journal of Systems and Software Volume 83, Issue 12, December 2010, Pages 2431-2440 (JSS2010)


  • Daeseon Choi, Seunghun Jin, Younho Lee, Yongsu Park, "Personalized Eigen Trust with the Beta Distribution",

ETRI Journal, Vol.32 No.2


  • Younho LEE, Yongsu PARK, Heeyoul KIM, Seong-Min HONG, Hyunsoo YOON,"Rougue Public Key Registration Attack and the Importance of 'Proof of Possession' in the PKI Environment",

IEICE TRANS.INF. &SYST., Vol.E89-D, No.8, August 2006


  • Younho Lee, Heeyoul Kim, Yongsu Park, "A new data hiding scheme for binary image authentication with small image distortion"

Information Sciences 179 (2009) 3866-3884


  • Younho Lee, Heeyoul Kim, Yongsu Park, Hyunsoo Yoon, "An Efficient Delegation Protocol with Delegation Traceability in the X.509 Proxy Certificate Environment for Computational Grids",

Information Sciences, Volume 178, Issue 14, 15 July 2008, Pages 2968-2982


  • Daeseon Choi, Younho Lee, Yongsu Park, Seung-hun Jin, Hyunsoo Yoon, "Efficient and Secure Self-organized Public Key Management for Mobile Ad Hoc Networks",

IEICE Transactions on Communications, Vol.E91-B, No.11, pp.3574-3583, 2008. 11


  • Younho LEE, Junbeom HUR, Heeyoul KIM, Yongsu PARK, Hyunsoo YOON, "A New Binary Image Authentication Scheme with Small Distortion and Low False Negative Rates",

IEICE Transactions on Communications, Vol.E90-B, No.11, pp.3259-3262, 2007. 11


  • Seok-Lae Lee, Yongsu Park, Joo-Seok Song,"An Improvement of Park-Chung-Cho’s Stream Authentication Scheme by Using Information Dispersal Algorithm"

ISNN 2007, Part I, LNCS 4491, pp. 1045-1053, 2007.


  • Heeyoul KIM, Younho LEE, Yongsu PARK, Hyunsoo YOON, "Reactive Key Management Scheme for Access Control in Group Communications"

IEICE TRANS. COMMUN., VOL.E90-B, NO.4 APRIL 2007


  • Joo Seung Yoon, Hee Moon Kim, Gil Ju Lee, Il Hee Kim, Yongsu Park, "Secure distribution of neural networks in wireless sensor networks"

International Journal of Security and its Applications, Vol. 1, No. 2, October, 2007


  • Heeyoul Kim, Byungchun Chung, Younho Lee, Yongsu Park, Hyunsoo Yoon, "Weakness of the Synchro-Difference LKH Scheme for Secure Multicast"

IEEE COMMUNICATIONS LETTERS, VOL. 11, NO. 9, SEPTEMBER 2007


  • Yong Ho Song, Jung Min Park, Yongsu Park, Eul Gyu Im, "A New Methodology of Analyzing Security Vulnerability for Network Services"

ISI 2006, LNCS 3975, pp. 737-738, 2006.


  • Younho Lee, Heeyoul Kim, Yongsu Park, Hyunsoo Yoon, "A New Proxy Signature Scheme Providing Self-Delegation"

ICISC 2006, LNCS 4296, pp.328-342. 2006


  • Yongsu Park, Yookun Cho, "An Efficient Pointer Protection Scheme to Defend Buffer Overflow Attacks"

PARA 2004, LNCS 3732, pp. 1025-1030, 2006


  • Yongsu Park, Yong Ho Song, Eul Gyu Im, "Design of a Reliable Hardware Stack to Defend Against Frame Pointer Overwrite Attacks "

ISI 2006, LNCS 3975, pp. 731-732, 2006.


  • Yongsu Park, Yookun Cho, "Efficient One-Time Signature Schemes for Stream Authentication",

Journal of Information Science and Engineering, Vol.22, No.3, (JISE 2006)


  • Yongsu Park, Younho Lee, Heeyoul Kim, Gil-Joo Lee, Il-Hee Kim, "Hardware Stack Design: Towards an Effective Defence Against Frame Pointer Overwrite Attacks",

IWSEC 2006, LNCS 4266, pp. 268-277, 2006.


  • Eul Gyu Im, Jung Taek Seo, Dong-Soo Kim, Yong Ho Song, Yongsu Park, "Hybrid Modeling for Large-Scale Worm Propagation Simulations"

ISI 2006, LNCS 3975, pp. 572-577, 2006.


  • JaeYong JEONG, Yongsu PARK, Yookun CHO, "An Efficient Mobile Code Authentication Scheme that Permits Overlapping of Execution and Downloading"

IEICE TRANS. INF. &SYST. Vol.E88-D, No.5 May 2005


  • JaeYong Jeong, Yongsu Park, Yookun Cho, "Efficient DoS Resistant Multicast Authentication Schemes"

ICCSA 2005, LNCS 3481, pp. 353-362, 2005.



International Conference

  • Sungho Kim, Sungbea Ji, Yongsu Park, "Automatic Malware Analysis Using Pin tool",

The 4th Joint Workshop between HYU and BUPT (2011)


  • Sung-Ho Kim, Hong-Jin Lee, Han-Wool Jung, Beom-Ki Maeng, Yongsu Park, "IPAP: IMPROVED PRIVACY AND AUTHENTICATION PROTOCOL FOR PASSIVE RFID TAGS",

IEEE InternationalConference on Network Infrastructure and Digital Content (IC-NIDC 2010)


  • Hanwool Jeong, Yongsu Park, Sungho Cho, Yangdon Won, "A STEGANOGRAPHIC TECHNIQUE FOR ADDING NEW FUNCTIONALITIES WHILE CONFORMING TO EPCGLOBAL CLASS GENERATION 2 STANDARD",

IEEE InternationalConference on Network Infrastructure and Digital Content (IC-NIDC 2009)


  • Younho Lee, Yongsu Park, "Framework Design and Performance Analysis on Pairwise Key Establishment",

Proceedings of the 12th Asia-Pacific network operations and management conference on Management enabling the future internet for changing business and new computing services
LNCS 5787, pp. 311–320, (APNOMS 2009)


  • Gongsoo Jang, Hanwool Jeong, Jesung Byun, Yongsu Park, "Trust Management and Privacy Protection for Mobile Digital ID Wallets",

The 2nd Joint Workshop between Beijing Univ. of Posts and Telecommunications and Hanyang Univ. , (BIPTWorkshop 2009)


  • Jung Min Park, Yongsu Park, Eul Gyu Im, Yong Ho Song, "A New Methodology of Analyzing Security Vulnerability in Executable Programs",

Proceedings of International Ubiquitous Convergence Conference, (IUC 2006)