Search Results - "JaeCheol Ryou"

Refine Results
  1. 1

    Digital Authentication System in Avatar Using DID and SBT by Kim, Geunyoung, Ryou, Jaecheol

    Published in Mathematics (Basel) (01-10-2023)
    “…Anonymity forms the basis of decentralized ecosystems, leading to an increase in criminal activities such as money laundering and illegal currency trading…”
    Get full text
    Journal Article
  2. 2

    Smart Contract Data Feed Framework for Privacy-Preserving Oracle System on Blockchain by Park, Junhoo, Kim, Hyekjin, Kim, Geunyoung, Ryou, Jaecheol

    Published in Computers (Basel) (01-01-2021)
    “…As blockchain-based applications and research such as cryptocurrency increase, an oracle problem to bring external data in the blockchain is emerging. Among…”
    Get full text
    Journal Article
  3. 3

    Intelligent Application Protection Mechanism for Transportation in V2C Environment by Kim, Hyunjin, Hong, Sang, Kim, Jinsul, Ryou, Jaecheol

    Published in IEEE access (2020)
    “…The emergence of vehicle-to-cloud (V2C) technology is changing cloud computing and transportation ecosystems. V2C technology enables the development of smart…”
    Get full text
    Journal Article
  4. 4

    ID-based sensor node authentication for multi-layer sensor networks by Sung, Soonhwa, Ryou, Jaecheol

    Published in Journal of communications and networks (01-08-2014)
    “…Despite several years of intense research, the security and cryptography in wireless sensor networks still have a number of ongoing problems. This paper…”
    Get full text
    Journal Article
  5. 5

    DWroidDump: Executable Code Extraction from Android Applications for Malware Analysis by Kim, Dongwoo, Kwak, Jin, Ryou, Jaecheol

    “…We suggest an idea to dump executable code from memory for malicious application analysis on Android platform. Malicious applications are getting enhanced in…”
    Get full text
    Journal Article
  6. 6

    User authentication using mobile phones for mobile payment by Soonhwa Sung, Cheong Youn, Eunbae Kong, Jaecheol Ryou

    “…Mobile authentication systems for mobile payment often use either the Web or mobile channel individually to confirm the identity request of a remote user. Most…”
    Get full text
    Conference Proceeding
  7. 7

    Optimal position searching for automated malware signature generation by Yangseo Choi, Jintae Oh, Jeonggun Lee, Jaecheol Ryou

    “…When a new malware is found, anti-virus companies generate a signature for the malware. However, the malware analysis and signature generation are a time…”
    Get full text
    Conference Proceeding
  8. 8

    Hierarchical CRGK for a large-scale user group by Jihyun Park, Kisong Yoon, Jaecheol Ryou

    “…The purpose of the group key management is to provide a secure key sharing scheme among the users in a group on a broadcast or a multicast environment. CRGK[1]…”
    Get full text
    Conference Proceeding
  9. 9

    Utilizing a lightweight PKI mechanism to guarantee a secure service in a cloud environment by Park, Sangho, Kim, Hyunjin, Ryou, Jaecheol

    Published in The Journal of supercomputing (01-12-2018)
    “…Recently, cloud computing has become popular for smart societies because it made dynamical network without building a physical network. Despite recent research…”
    Get full text
    Journal Article
  10. 10

    ARED: automata-based runtime estimation for distributed systems using deep learning by Cheon, Hyunjoon, Ryu, Jinseung, Ryou, Jaecheol, Park, Chan Yeol, Han, Yo-Sub

    Published in Cluster computing (01-10-2023)
    “…High-performance computers are used for computation-intensive tasks. It is essential for these systems to simultaneously execute several computation-intensive…”
    Get full text
    Journal Article
  11. 11

    Design and implementation of user-level dynamic binary instrumentation on ARM architecture by Kim, Dongwoo, Kim, Sangwho, Ryou, Jaecheol

    Published in The Journal of supercomputing (01-08-2018)
    “…We have developed a user-level dynamic binary instrumentation (DBI) tool on ARM architecture to enable applying various analysis techniques such as performance…”
    Get full text
    Journal Article
  12. 12

    UMTS-WLAN Interworking Strategies for Reducing Handover Delays by Hyeyeon Kwon, Kwanghyun Ro, Aesoon Park, Jaecheol Ryou

    Published in IEEE Vehicular Technology Conference (01-09-2006)
    “…During handover between heterogeneous networks such as the 3G mobile telecommunication systems and the Wireless LAN systems, a subscriber authentication, the…”
    Get full text
    Conference Proceeding
  13. 13

    Persistent content protection among the heterogeneous devices by Jihyun Park, Yeonjeong Jeong, Ki-Song Yoon, Jaecheol Ryou

    “…DRM (digital rights management) interoperability has been the barriers for seamless content consuming. Consumers suffer from being incapable of enjoying…”
    Get full text
    Conference Proceeding
  14. 14

    A distributed mobile cloud computing model for secure big data by Soonhwa Sung, Cheong Youn, Eunbae Kong, Jaecheol Ryou

    “…Mobile cloud computing provides a novel e-commerce mode for organizations without any upfront investment. Since cloud computing uses distributed resources in…”
    Get full text
    Conference Proceeding
  15. 15

    StopBankun: Countermeasure of app replacement attack on Android by Dongwoo Kim, Chankyu Park, Jaecheol Ryou

    “…The ubiquitous computing environment has been realized with the proliferation of wireless communication technologies, which has improved our lives in many…”
    Get full text
    Conference Proceeding
  16. 16

    Compact and unified hardware architecture for SHA-1 and SHA-256 of trusted mobile computing by Kim, Mooseop, Lee, Deok Gyu, Ryou, Jaecheol

    Published in Personal and ubiquitous computing (01-06-2013)
    “…This paper presents a compact and unified hardware architecture implementing SHA-1 and SHA-256 algorithms that is suitable for the mobile trusted module (MTM),…”
    Get full text
    Journal Article
  17. 17

    Adult Image Detection Using Bayesian Decision Rule Weighted by SVM Probability by Byeongcheol Choi, Byungho Chung, Jaecheol Ryou

    “…The SVM (support vector machine) and the SCM (skin color model) are used in detection of adult contents on images. The SVM consists of multi-class learning…”
    Get full text
    Conference Proceeding
  18. 18
  19. 19

    Key sharing scheme based on one weighted threshold secret sharing by SeongMin Yoo, PyungKoo Park, JinSeop Shin, JaeCheol Ryou

    “…Secret sharing scheme is a cryptographic technology that safely manages password keys by dividing them into segments. Existing (k, n) threshold secret sharing…”
    Get full text
    Conference Proceeding
  20. 20

    A Context-aware adaptive algorithm for ambient intelligence DASH at mobile edge computing by Kim, Jinsul, Won, Yonggwan, Yoon, Changwoo, Kim, Jin-Young, Park, Sangho, Ryou, JaeCheol, Van Ma, Linh

    “…Adaptive streaming has recently emerged as a technology enabling high-quality streaming at various bitrates. One of the video streaming challenges remains in…”
    Get full text
    Journal Article