Search Results - "JaeCheol Ryou"
-
1
Digital Authentication System in Avatar Using DID and SBT
Published in Mathematics (Basel) (01-10-2023)“…Anonymity forms the basis of decentralized ecosystems, leading to an increase in criminal activities such as money laundering and illegal currency trading…”
Get full text
Journal Article -
2
Smart Contract Data Feed Framework for Privacy-Preserving Oracle System on Blockchain
Published in Computers (Basel) (01-01-2021)“…As blockchain-based applications and research such as cryptocurrency increase, an oracle problem to bring external data in the blockchain is emerging. Among…”
Get full text
Journal Article -
3
Intelligent Application Protection Mechanism for Transportation in V2C Environment
Published in IEEE access (2020)“…The emergence of vehicle-to-cloud (V2C) technology is changing cloud computing and transportation ecosystems. V2C technology enables the development of smart…”
Get full text
Journal Article -
4
ID-based sensor node authentication for multi-layer sensor networks
Published in Journal of communications and networks (01-08-2014)“…Despite several years of intense research, the security and cryptography in wireless sensor networks still have a number of ongoing problems. This paper…”
Get full text
Journal Article -
5
DWroidDump: Executable Code Extraction from Android Applications for Malware Analysis
Published in International journal of distributed sensor networks (01-01-2015)“…We suggest an idea to dump executable code from memory for malicious application analysis on Android platform. Malicious applications are getting enhanced in…”
Get full text
Journal Article -
6
User authentication using mobile phones for mobile payment
Published in 2015 International Conference on Information Networking (ICOIN) (01-01-2015)“…Mobile authentication systems for mobile payment often use either the Web or mobile channel individually to confirm the identity request of a remote user. Most…”
Get full text
Conference Proceeding -
7
Optimal position searching for automated malware signature generation
Published in 2009 IEEE 13th International Symposium on Consumer Electronics (01-05-2009)“…When a new malware is found, anti-virus companies generate a signature for the malware. However, the malware analysis and signature generation are a time…”
Get full text
Conference Proceeding -
8
Hierarchical CRGK for a large-scale user group
Published in 2009 Digest of Technical Papers International Conference on Consumer Electronics (01-01-2009)“…The purpose of the group key management is to provide a secure key sharing scheme among the users in a group on a broadcast or a multicast environment. CRGK[1]…”
Get full text
Conference Proceeding -
9
Utilizing a lightweight PKI mechanism to guarantee a secure service in a cloud environment
Published in The Journal of supercomputing (01-12-2018)“…Recently, cloud computing has become popular for smart societies because it made dynamical network without building a physical network. Despite recent research…”
Get full text
Journal Article -
10
ARED: automata-based runtime estimation for distributed systems using deep learning
Published in Cluster computing (01-10-2023)“…High-performance computers are used for computation-intensive tasks. It is essential for these systems to simultaneously execute several computation-intensive…”
Get full text
Journal Article -
11
Design and implementation of user-level dynamic binary instrumentation on ARM architecture
Published in The Journal of supercomputing (01-08-2018)“…We have developed a user-level dynamic binary instrumentation (DBI) tool on ARM architecture to enable applying various analysis techniques such as performance…”
Get full text
Journal Article -
12
UMTS-WLAN Interworking Strategies for Reducing Handover Delays
Published in IEEE Vehicular Technology Conference (01-09-2006)“…During handover between heterogeneous networks such as the 3G mobile telecommunication systems and the Wireless LAN systems, a subscriber authentication, the…”
Get full text
Conference Proceeding -
13
Persistent content protection among the heterogeneous devices
Published in 2007 IEEE International Symposium on Consumer Electronics (01-06-2007)“…DRM (digital rights management) interoperability has been the barriers for seamless content consuming. Consumers suffer from being incapable of enjoying…”
Get full text
Conference Proceeding -
14
A distributed mobile cloud computing model for secure big data
Published in 2016 International Conference on Information Networking (ICOIN) (01-01-2016)“…Mobile cloud computing provides a novel e-commerce mode for organizations without any upfront investment. Since cloud computing uses distributed resources in…”
Get full text
Conference Proceeding -
15
StopBankun: Countermeasure of app replacement attack on Android
Published in 2015 Seventh International Conference on Ubiquitous and Future Networks (01-07-2015)“…The ubiquitous computing environment has been realized with the proliferation of wireless communication technologies, which has improved our lives in many…”
Get full text
Conference Proceeding -
16
Compact and unified hardware architecture for SHA-1 and SHA-256 of trusted mobile computing
Published in Personal and ubiquitous computing (01-06-2013)“…This paper presents a compact and unified hardware architecture implementing SHA-1 and SHA-256 algorithms that is suitable for the mobile trusted module (MTM),…”
Get full text
Journal Article -
17
Adult Image Detection Using Bayesian Decision Rule Weighted by SVM Probability
Published in 2009 Fourth International Conference on Computer Sciences and Convergence Information Technology (01-11-2009)“…The SVM (support vector machine) and the SCM (skin color model) are used in detection of adult contents on images. The SVM consists of multi-class learning…”
Get full text
Conference Proceeding -
18
-
19
Key sharing scheme based on one weighted threshold secret sharing
Published in 2013 15th International Conference on Advanced Communications Technology (ICACT) (01-01-2013)“…Secret sharing scheme is a cryptographic technology that safely manages password keys by dividing them into segments. Existing (k, n) threshold secret sharing…”
Get full text
Conference Proceeding -
20
A Context-aware adaptive algorithm for ambient intelligence DASH at mobile edge computing
Published in Journal of ambient intelligence and humanized computing (01-04-2020)“…Adaptive streaming has recently emerged as a technology enabling high-quality streaming at various bitrates. One of the video streaming challenges remains in…”
Get full text
Journal Article