Прати
Jeong Hyun Yi
Jeong Hyun Yi
Soongsil University
Верификована је имејл адреса на csec.kr - Почетна страница
Наслов
Навело
Навело
Година
Method and system for performing distributed verification with respect to measurement data in sensor network
EA Kim, JH Yi, A Fomin, A Afanasyeva, S Bezzateev
US Patent 8,255,689, 2012
2362012
On the utility of distributed cryptography in P2P and MANETs: the case of membership control
M Narasimha, G Tsudik, JH Yi
11th IEEE International Conference on Network Protocols, 2003. Proceedings …, 2003
1722003
Repackaging attack on android banking applications and its countermeasures
JH Jung, JY Kim, HC Lee, JH Yi
Wireless Personal Communications 73, 1421-1437, 2013
1252013
Admission control in peer-to-peer: design and performance evaluation
N Saxena, G Tsudik, JH Yi
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor …, 2003
1212003
MAPAS: a practical deep learning-based android malware detection system
J Kim, Y Ban, E Ko, H Cho, JH Yi
International Journal of Information Security 21 (4), 725-738, 2022
1092022
Identity-based access control for ad hoc groups
N Saxena, G Tsudik, JH Yi
Information Security and Cryptology–ICISC 2004: 7th International Conference …, 2005
832005
Efficient node admission for short-lived mobile ad hoc networks
N Saxena, G Tsudik, JH Yi
13TH IEEE International Conference on Network Protocols (ICNP'05), 10 pp.-278, 2005
782005
Threshold cryptography in P2P and MANETs: The case of access control
N Saxena, G Tsudik, JH Yi
Computer Networks 51 (12), 3632-3649, 2007
762007
Fast batch verification of multiple signatures
JH Cheon, JH Yi
Public Key Cryptography–PKC 2007: 10th International Conference on Practice …, 2007
672007
An attack on the proactive RSA signature scheme in the URSA ad hoc network access control protocol
S Jarecki, N Saxena, JH Yi
Proceedings of the 2nd ACM Workshop on Security of ad hoc and Sensor …, 2004
622004
Efficient node admission and certificateless secure communication in short-lived MANETs
N Saxena, G Tsudik, JH Yi
IEEE Transactions on Parallel and Distributed Systems 20 (2), 158-170, 2008
502008
Server‐based code obfuscation scheme for APK tamper detection
Y Piao, JH Jung, JH Yi
Security and Communication Networks 9 (6), 457-467, 2016
432016
Security assessment of code obfuscation based on dynamic monitoring in android things
T Cho, H Kim, JH Yi
Ieee Access 5, 6361-6371, 2017
422017
Method of sharing a session key between wireless communication terminals using a variable-length authentication code
JH Yi, GI Ma, HC Lee
US Patent 9,078,126, 2015
382015
Method and apparatus for authenticating password of user terminal
JH Yi, GI Ma, HY Yi, SW Kim
US Patent 9,038,166, 2015
372015
Self-configurable key pre-distribution in mobile ad hoc networks
C Castelluccia, N Saxena, JH Yi
NETWORKING 2005. Networking Technologies, Services, and Protocols …, 2005
362005
Smartphone remote lock and wipe system with integrity checking of SMS notification
K Park, GI Ma, JH Yi, Y Cho, S Cho, S Park
2011 IEEE International Conference on Consumer Electronics (ICCE), 263-264, 2011
342011
Access control in ad hoc groups
N Saxena, G Tsudik, JH Yi
2004 International Workshop on Hot Topics in Peer-to-Peer Systems, 2-7, 2004
342004
Anti-debugging scheme for protecting mobile apps on android platform
H Cho, J Lim, H Kim, JH Yi
the Journal of Supercomputing 72, 232-246, 2016
332016
Method and node for generating distributed Rivest Shamir Adleman signature in ad-hoc network
JH Yi, E Kim, A Afanaseva, A Fomin, S Bezzateev
US Patent 8,645,698, 2014
332014
Систем тренутно не може да изврши ову радњу. Пробајте поново касније.
Чланци 1–20