Kangbin Yim

According to our database1, Kangbin Yim authored at least 105 papers between 1996 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Byzantine-resilient dual gossip membership management in clouds.
Soft Comput., 2018

Intrusion Detection Systems for Networked Unmanned Aerial Vehicles: A Survey.
CoRR, 2018

A framework for mitigating zero-day attacks in IoT.
CoRR, 2018

Ransomware prevention technique using key backup.
Concurrency and Computation: Practice and Experience, 2018

TRNG (True Random Number Generator) Method Using Visible Spectrum for Secure Communication on 5G Network.
IEEE Access, 2018

Vulnerability analysis of secure USB: based on the fingerprint authentication of product B.
Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems, 2018

Intrusion Detection Systems for Networked Unmanned Aerial Vehicles: A Survey.
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018

Vulnerability Analysis on the Image-Based Authentication Through the PS/2 Interface.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2018

Detecting and Extracting Hidden Information from Stego-Images Based on JPG File on StegoMagic.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2018

Study on Signature Verification Process for the Firmware of an Android Platform.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2018

2017
A Consensus Framework for Reliability and Mitigation of Zero-Day Attacks in IoT.
Security and Communication Networks, 2017

Real threats using GTP protocol and countermeasures on a 4G mobile grid computing environment.
IJWGS, 2017

A Protection Technique for Screen Image-Based Authentication Protocols Utilizing the SetCursorPos Function.
Proceedings of the Information Security Applications - 18th International Conference, 2017

Security Assessment of the Image-Based Authentication Using Screen-Capture Tools.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2017

Vulnerability Analysis of Secure Disk: Based on Backup Feature of Product A.
Proceedings of the Advances on Broad-Band Wireless Computing, 2017

2016
Innovative security technologies against insider threats and data leakage.
Int. J. Comput. Math., 2016

An anonymous authentication scheme in data-link layer for VANETs.
IJAHUC, 2016

An Access Authentication Scheme Based on Hierarchical IBS for Proxy Mobile IPV6 Network.
Intelligent Automation & Soft Computing, 2016

An efficient key management solution for privacy masking, restoring and user authentication for video surveillance servers.
Computer Standards & Interfaces, 2016

Secure Mobile Instant Messaging key exchanging protocol with One-Time-Pad substitution transposition cryptosystem.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016

Analysis on the Key Storage Mechanism of the CNG Library.
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016

A Brief Review on JTAG Security.
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016

Analysis on Manipulation of the MAC Address and Consequent Security Threats.
Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, 2016

Error Performance of Successive Interference Cancellation Schemes in MIMO Systems.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

Security Assessment of Keyboard Data Based on Kaspersky Product.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

Security Assessment on the Mouse Data using Mouse Loggers.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

Cognitive Countermeasures against BAD USB.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

2015
Precise Exposure Control for Efficient Eye Tracking.
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015

Soliciting Unexpected Traffic Flows into VoLTE.
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015

Compromising Ad-Hoc Networks by Attacking Weakly Connected Dominating Set.
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015

Vulnerability Analysis on the CNG Crypto Library.
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015

Cyber Threats to Industrial Control Systems.
Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, 2015

Security Threats to the Platform Identification.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015

Proxy Based Resource Management Scheme in IoT Environment.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015

Event-Driven Gait Recognition Method Based on Dynamic Temporal Segmentation.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015

An Indoor Positioning System Using Bluetooth RSSI with an Accelerometer and a Barometer on a Smartphone.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015

Implementation of an Eye Gaze Tracking System for the Disabled People.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015

Fuzzing CAN Packets into Automobiles.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015

Novel Approaches to Protecting Block Ciphers by Distributing Round Keys.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015

2014
New quasi-Newton iterative learning control scheme based on rank-one update for nonlinear systems.
The Journal of Supercomputing, 2014

A dynamic trust model exploiting the time slice in WSNs.
Soft Comput., 2014

Detecting mobile malware threats to homeland security through static analysis.
J. Network and Computer Applications, 2014

Privacy-Preserving Predicate Proof of Attributes with CL-Anonymous Credential.
J. Internet Serv. Inf. Secur., 2014

Prosperity of IT security technologies in homeland defense.
J. Ambient Intelligence and Humanized Computing, 2014

Secure and distributed video surveillance via portable devices.
J. Ambient Intelligence and Humanized Computing, 2014

An efficient wormhole attack detection method in wireless sensor networks.
Comput. Sci. Inf. Syst., 2014

PPS: A privacy-preserving security scheme for multi-operator wireless mesh networks with enhanced user experience.
Comput. Sci. Inf. Syst., 2014

Anti-theft Solusions for In-Vehicle Electronic Devices.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014

Anonymous Credential-Based Privacy-Preserving Identity Verification for Business Processes.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014

A Real-Time Intrusion Detection and Protection System at System Call Level under the Assistance of a Grid.
Proceedings of the Information and Communication Technology, 2014

Survey on distributed mobility management schemes for Proxy mobile IPv6.
Proceedings of the 11th IEEE Consumer Communications and Networking Conference, 2014

A random wrapping encryption method.
Proceedings of the 11th IEEE Consumer Communications and Networking Conference, 2014

2013
LEAS: Localized efficient authentication scheme for multi-operator wireless mesh network with identity-based proxy signature.
Mathematical and Computer Modelling, 2013

DGA-Based Botnet Detection Using DNS Traffic.
J. Internet Serv. Inf. Secur., 2013

Vulnerability to Flash Controller for Secure USB Drives.
J. Internet Serv. Inf. Secur., 2013

Intelligent Reconfigurable Method of Cloud Computing Resources for Multimedia Data Delivery.
Informatica, Lith. Acad. Sci., 2013

An investigation on the unwillingness of nodes to participate in mobile delay tolerant network routing.
Int J. Information Management, 2013

A hybrid approach to secure hierarchical mobile IPv6 networks.
Comput. Sci. Inf. Syst., 2013

Database Security System for Applying Sophisticated Access Control via Database Firewall Server.
Computing and Informatics, 2013

GEESE: A Cognitive USN Platform.
Proceedings of the 16th International Conference on Network-Based Information Systems, 2013

Aggregate Signature-Based Efficient Attributes Proof with Pairing-Based Anonymous Credential.
Proceedings of the 16th International Conference on Network-Based Information Systems, 2013

Biometrics-based Data Link Layer Anonymous Authentication in VANETs.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

Privacy Preserving Secure Communication Protocol for Vehicular Ad Hoc Networks.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

Security Assessment on User Authentication by an HttpSendRequest Hooking in an HTTP Client.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

Security Issues on the CNG Cryptography Library (Cryptography API: Next Generation).
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

Anonymity Scheme with Unlinkability Property in Wireless Mesh Networks.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

2012
Reverse-safe authentication protocol for secure USB memories.
Security and Communication Networks, 2012

Advances in Network-based Information Systems.
Mobile Information Systems, 2012

Extraction of Platform-unique Information as an Identifier.
JoWUA, 2012

Frontiers in Insider Threats and Data Leakage Prevention.
JoWUA, 2012

Information Leakage Prevention in Emerging Technologies (MIST 2012 Volume 2).
J. Internet Serv. Inf. Secur., 2012

A Brief Survey on Rootkit Techniques in Malicious Codes.
J. Internet Serv. Inf. Secur., 2012

A secure solution with a password recovery feature for USB flash drives.
Comput. Syst. Sci. Eng., 2012

A new iterative learning control scheme using the geometric rotation for discrete time systems.
Comput. Syst. Sci. Eng., 2012

A secure framework of the surveillance video network integrating heterogeneous video formats and protocols.
Computers & Mathematics with Applications, 2012

Analysis on Maliciousness for Mobile Applications.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

An Analysis of Strategies for Preventing Selfish Behavior in Mobile Delay Tolerant Networks.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

A Novel Search System for Protecting Search Word.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

A New Iterative Learning Control Scheme Based on Damped Newton Method for Nonlinear Systems.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

Delegation-Based Mutual Authentication Scheme for Multi-operator Wireless Mesh Network.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

A Privacy Preserving Model for Personal Information in Search Engine.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

A Secure Secondary Backup Storage with an Isolated Authentication.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

Improved AODV Routing Protocol to Cope with High Overhead in High Mobility MANETs.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

Improving security level of LTE authentication and key agreement procedure.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2012

Mobile Malware Threats and Defenses for Homeland Security.
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012

How to Forge a Digital Alibi on Mac OS X.
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012

2011
A handover security mechanism employing the Diffie-Hellman key exchange approach for the IEEE802.16e wireless networks.
Mobile Information Systems, 2011

Service Oriented Multimedia Delivery System in Pervasive Environments.
J. UCS, 2011

Insider Threats are Getting Worse within Industries: Isolated Secondary Backup Required.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

Architecture to Support Heterogeneous Devices for Video Surveillance System.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

Keyboard Security: A Technological Review.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

Reversability Assessment on Secure USB Memories.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

IT Issues on Homeland Security and Defense.
Proceedings of the Availability, Reliability and Security for Business, Enterprise and Health Information Systems, 2011

2010
Guest Editorial: Advances in Trust Management.
JoWUA, 2010

Safe Authentication Protocol for Secure USB Memories.
JoWUA, 2010

A Secure Solution for USB Flash Drives Using FAT File System Structure.
Proceedings of the 13th International Conference on Network-Based Information Systems, 2010

A New Noise Mingling Approach to Protect the Authentication Password.
Proceedings of the CISIS 2010, 2010

Malware Obfuscation Techniques: A Brief Survey.
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010

A Solution to Protecting USB Keyboard Data.
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010

An Authentication and Authorization Protocol Using Ticket in Pervasive Environment.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010

2003
An on-line frame scheduling algorithm for the Internet video conferencing.
IEEE Trans. Consumer Electronics, 2003

2002
Analysis of Packet Size on VOIP Performance.
Proceedings of the International Conference on Internet Computing, 2002

2000
Popularity-Independent Multimedia-on-Demand Server Model.
Proceedings of the 24th International Computer Software and Applications Conference (COMPSAC 2000), 2000

1999
Design issues on a popularity-independent video-on-demand server.
IEEE Trans. Consumer Electronics, 1999

1996
An Imprecise DCT Computation Model for Real-Time Applications.
Multimedia Technology and Applications, 1996


  Loading...