팔로우
Jeong Hyun Yi
Jeong Hyun Yi
Soongsil University
csec.kr의 이메일 확인됨 - 홈페이지
제목
인용
인용
연도
Method and system for performing distributed verification with respect to measurement data in sensor network
EA Kim, JH Yi, A Fomin, A Afanasyeva, S Bezzateev
US Patent 8,255,689, 2012
2362012
On the utility of distributed cryptography in P2P and MANETs: the case of membership control
M Narasimha, G Tsudik, JH Yi
11th IEEE International Conference on Network Protocols, 2003. Proceedings …, 2003
1732003
Repackaging attack on android banking applications and its countermeasures
JH Jung, JY Kim, HC Lee, JH Yi
Wireless Personal Communications 73, 1421-1437, 2013
1252013
Admission control in peer-to-peer: design and performance evaluation
N Saxena, G Tsudik, JH Yi
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor …, 2003
1212003
MAPAS: a practical deep learning-based android malware detection system
J Kim, Y Ban, E Ko, H Cho, JH Yi
International Journal of Information Security 21 (4), 725-738, 2022
1072022
Identity-based access control for ad hoc groups
N Saxena, G Tsudik, JH Yi
Information Security and Cryptology–ICISC 2004: 7th International Conference …, 2005
832005
Efficient node admission for short-lived mobile ad hoc networks
N Saxena, G Tsudik, JH Yi
13TH IEEE International Conference on Network Protocols (ICNP'05), 10 pp.-278, 2005
792005
Threshold cryptography in P2P and MANETs: The case of access control
N Saxena, G Tsudik, JH Yi
Computer Networks 51 (12), 3632-3649, 2007
782007
Fast batch verification of multiple signatures
JH Cheon, JH Yi
Public Key Cryptography–PKC 2007: 10th International Conference on Practice …, 2007
682007
An attack on the proactive RSA signature scheme in the URSA ad hoc network access control protocol
S Jarecki, N Saxena, JH Yi
Proceedings of the 2nd ACM Workshop on Security of ad hoc and Sensor …, 2004
642004
Efficient node admission and certificateless secure communication in short-lived MANETs
N Saxena, G Tsudik, JH Yi
IEEE Transactions on Parallel and Distributed Systems 20 (2), 158-170, 2008
522008
Security assessment of code obfuscation based on dynamic monitoring in android things
T Cho, H Kim, JH Yi
Ieee Access 5, 6361-6371, 2017
462017
Server‐based code obfuscation scheme for APK tamper detection
Y Piao, JH Jung, JH Yi
Security and Communication Networks 9 (6), 457-467, 2016
442016
Method of sharing a session key between wireless communication terminals using a variable-length authentication code
JH Yi, GI Ma, HC Lee
US Patent 9,078,126, 2015
382015
Method and apparatus for authenticating password of user terminal
JH Yi, GI Ma, HY Yi, SW Kim
US Patent 9,038,166, 2015
372015
Self-configurable key pre-distribution in mobile ad hoc networks
C Castelluccia, N Saxena, JH Yi
NETWORKING 2005. Networking Technologies, Services, and Protocols …, 2005
362005
Anti-debugging scheme for protecting mobile apps on android platform
H Cho, J Lim, H Kim, JH Yi
the Journal of Supercomputing 72, 232-246, 2016
342016
Access control in ad hoc groups
N Saxena, G Tsudik, JH Yi
2004 International Workshop on Hot Topics in Peer-to-Peer Systems, 2-7, 2004
342004
Method and node for generating distributed Rivest Shamir Adleman signature in ad-hoc network
JH Yi, E Kim, A Afanaseva, A Fomin, S Bezzateev
US Patent 8,645,698, 2014
332014
Smartphone remote lock and wipe system with integrity checking of SMS notification
K Park, GI Ma, JH Yi, Y Cho, S Cho, S Park
2011 IEEE International Conference on Consumer Electronics (ICCE), 263-264, 2011
332011
현재 시스템이 작동되지 않습니다. 나중에 다시 시도해 주세요.
학술자료 1–20