Kangbin Yim

According to our database1, Kangbin Yim authored at least 128 papers between 1996 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
A Certificateless Aggregate Arbitrated Signature Scheme for IoT Environments.
Sensors, 2020

Vulnerability analysis on the image-based authentication: Through the WM_INPUT message.
Concurr. Comput. Pract. Exp., 2020

Vestiges of Past Generation: Threats to 5G Core Network.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2020

Group Delegated ID-Based Proxy Re-encryption for PHR.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2020

Analysis on Account Hijacking and Remote Dos Vulnerability in the CODESYS-Based PLC Runtime.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2020

Design and Implementation of a Novel Testbed for Automotive Security Analysis.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2020

A Study on Access Control Scheme Based on ABE Using Searchable Encryption in Cloud Environment.
Proceedings of the Advances in Internet, 2020

Cyber Attack Scenarios in Cooperative Automated Driving.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2020

ICS Testbed Implementation Considering Dataset Collection Environment.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2020

2019
A Novel Message-Preserving Scheme with Format-Preserving Encryption for Connected Cars in Multi-Access Edge Computing.
Sensors, 2019

BRIoT: Behavior Rule Specification-Based Misbehavior Detection for IoT-Embedded Cyber-Physical Systems.
IEEE Access, 2019

Machine Learning Based File Entropy Analysis for Ransomware Detection in Backup Systems.
IEEE Access, 2019

Effective Ransomware Detection Using Entropy Estimation of Files for Cloud Services.
Proceedings of the Pervasive Systems, Algorithms and Networks, 2019

Unintended Certificate Installation into Remote IoT Nodes.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2019

Novel Encryption Method of GPS Information in Image File Using Format-Preserving Encryption.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2019

A Survey on Attack Cases Exploiting Computer Architectural Vulnerabilities.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2019

A Technical Survey on Methods for Detecting Rogue Access Points.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2019

Individually Separated Wireless Access Point to Protect User's Private Information.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2019

2018
Byzantine-resilient dual gossip membership management in clouds.
Soft Comput., 2018

A Study on a Secure USB Mechanism That Prevents the Exposure of Authentication Information for Smart Human Care Services.
J. Sensors, 2018

A framework for mitigating zero-day attacks in IoT.
CoRR, 2018

Ransomware prevention technique using key backup.
Concurr. Comput. Pract. Exp., 2018

TRNG (True Random Number Generator) Method Using Visible Spectrum for Secure Communication on 5G Network.
IEEE Access, 2018

Vulnerability analysis of secure USB: based on the fingerprint authentication of product B.
Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems, 2018

On IoT Misbehavior Detection in Cyber Physical Systems.
Proceedings of the 23rd IEEE Pacific Rim International Symposium on Dependable Computing, 2018

Intrusion Detection Systems for Networked Unmanned Aerial Vehicles: A Survey.
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018

Vulnerability Analysis on the Image-Based Authentication Through the PS/2 Interface.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2018

Detecting and Extracting Hidden Information from Stego-Images Based on JPG File on StegoMagic.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2018

Study on Signature Verification Process for the Firmware of an Android Platform.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2018

Misbehavior Detection of Embedded IoT Devices in Medical Cyber Physical Systems.
Proceedings of the Third IEEE/ACM International Conference on Connected Health: Applications, 2018

Vulnerability Analysis on a Secure USB: Based on a Commercial Product A.
Proceedings of the Advances on Broadband and Wireless Computing, 2018

2017
A Consensus Framework for Reliability and Mitigation of Zero-Day Attacks in IoT.
Secur. Commun. Networks, 2017

Real threats using GTP protocol and countermeasures on a 4G mobile grid computing environment.
Int. J. Web Grid Serv., 2017

A Protection Technique for Screen Image-Based Authentication Protocols Utilizing the SetCursorPos Function.
Proceedings of the Information Security Applications - 18th International Conference, 2017

Security Assessment of the Image-Based Authentication Using Screen-Capture Tools.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2017

Vulnerability Analysis of Secure Disk: Based on Backup Feature of Product A.
Proceedings of the Advances on Broad-Band Wireless Computing, 2017

Study on the Transaction Linkage Technique Combining the Designated Terminal.
Proceedings of the Big Data Technologies and Applications - 8th International Conference, 2017

2016
Innovative security technologies against insider threats and data leakage.
Int. J. Comput. Math., 2016

An anonymous authentication scheme in data-link layer for VANETs.
Int. J. Ad Hoc Ubiquitous Comput., 2016

An Access Authentication Scheme Based on Hierarchical IBS for Proxy Mobile IPV6 Network.
Intell. Autom. Soft Comput., 2016

An efficient key management solution for privacy masking, restoring and user authentication for video surveillance servers.
Comput. Stand. Interfaces, 2016

Secure Mobile Instant Messaging key exchanging protocol with One-Time-Pad substitution transposition cryptosystem.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016

Analysis on the Key Storage Mechanism of the CNG Library.
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016

A Brief Review on JTAG Security.
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016

Analysis on Manipulation of the MAC Address and Consequent Security Threats.
Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, 2016

Error Performance of Successive Interference Cancellation Schemes in MIMO Systems.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

Security Assessment of Keyboard Data Based on Kaspersky Product.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

Security Assessment on the Mouse Data using Mouse Loggers.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

Cognitive Countermeasures against BAD USB.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

Ransomware-Prevention Technique Using Key Backup.
Proceedings of the Big Data Technologies and Applications - 7th International Conference, 2016

2015
Precise Exposure Control for Efficient Eye Tracking.
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015

Soliciting Unexpected Traffic Flows into VoLTE.
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015

Compromising Ad-Hoc Networks by Attacking Weakly Connected Dominating Set.
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015

Vulnerability Analysis on the CNG Crypto Library.
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015

Cyber Threats to Industrial Control Systems.
Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, 2015

Security Threats to the Platform Identification.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015

Proxy Based Resource Management Scheme in IoT Environment.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015

Event-Driven Gait Recognition Method Based on Dynamic Temporal Segmentation.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015

An Indoor Positioning System Using Bluetooth RSSI with an Accelerometer and a Barometer on a Smartphone.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015

Implementation of an Eye Gaze Tracking System for the Disabled People.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015

Fuzzing CAN Packets into Automobiles.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015

Novel Approaches to Protecting Block Ciphers by Distributing Round Keys.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015

2014
New quasi-Newton iterative learning control scheme based on rank-one update for nonlinear systems.
J. Supercomput., 2014

A dynamic trust model exploiting the time slice in WSNs.
Soft Comput., 2014

Detecting mobile malware threats to homeland security through static analysis.
J. Netw. Comput. Appl., 2014

Privacy-Preserving Predicate Proof of Attributes with CL-Anonymous Credential.
J. Internet Serv. Inf. Secur., 2014

Prosperity of IT security technologies in homeland defense.
J. Ambient Intell. Humaniz. Comput., 2014

Secure and distributed video surveillance via portable devices.
J. Ambient Intell. Humaniz. Comput., 2014

An efficient wormhole attack detection method in wireless sensor networks.
Comput. Sci. Inf. Syst., 2014

PPS: A privacy-preserving security scheme for multi-operator wireless mesh networks with enhanced user experience.
Comput. Sci. Inf. Syst., 2014

Anti-theft Solusions for In-Vehicle Electronic Devices.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014

Anonymous Credential-Based Privacy-Preserving Identity Verification for Business Processes.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014

A Real-Time Intrusion Detection and Protection System at System Call Level under the Assistance of a Grid.
Proceedings of the Information and Communication Technology, 2014

Survey on distributed mobility management schemes for Proxy mobile IPv6.
Proceedings of the 11th IEEE Consumer Communications and Networking Conference, 2014

A random wrapping encryption method.
Proceedings of the 11th IEEE Consumer Communications and Networking Conference, 2014

2013
LEAS: Localized efficient authentication scheme for multi-operator wireless mesh network with identity-based proxy signature.
Math. Comput. Model., 2013

DGA-Based Botnet Detection Using DNS Traffic.
J. Internet Serv. Inf. Secur., 2013

Vulnerability to Flash Controller for Secure USB Drives.
J. Internet Serv. Inf. Secur., 2013

Intelligent Reconfigurable Method of Cloud Computing Resources for Multimedia Data Delivery.
Informatica, 2013

An investigation on the unwillingness of nodes to participate in mobile delay tolerant network routing.
Int. J. Inf. Manag., 2013

A hybrid approach to secure hierarchical mobile IPv6 networks.
Comput. Sci. Inf. Syst., 2013

Database Security System for Applying Sophisticated Access Control via Database Firewall Server.
Comput. Informatics, 2013

GEESE: A Cognitive USN Platform.
Proceedings of the 16th International Conference on Network-Based Information Systems, 2013

Aggregate Signature-Based Efficient Attributes Proof with Pairing-Based Anonymous Credential.
Proceedings of the 16th International Conference on Network-Based Information Systems, 2013

Biometrics-based Data Link Layer Anonymous Authentication in VANETs.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

Privacy Preserving Secure Communication Protocol for Vehicular Ad Hoc Networks.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

Security Assessment on User Authentication by an HttpSendRequest Hooking in an HTTP Client.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

Security Issues on the CNG Cryptography Library (Cryptography API: Next Generation).
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

Anonymity Scheme with Unlinkability Property in Wireless Mesh Networks.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

2012
Reverse-safe authentication protocol for secure USB memories.
Secur. Commun. Networks, 2012

Advances in Network-based Information Systems.
Mob. Inf. Syst., 2012

Extraction of Platform-unique Information as an Identifier.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2012

Frontiers in Insider Threats and Data Leakage Prevention.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2012

Information Leakage Prevention in Emerging Technologies (MIST 2012 Volume 2).
J. Internet Serv. Inf. Secur., 2012

A Brief Survey on Rootkit Techniques in Malicious Codes.
J. Internet Serv. Inf. Secur., 2012

A secure solution with a password recovery feature for USB flash drives.
Comput. Syst. Sci. Eng., 2012

A new iterative learning control scheme using the geometric rotation for discrete time systems.
Comput. Syst. Sci. Eng., 2012

A secure framework of the surveillance video network integrating heterogeneous video formats and protocols.
Comput. Math. Appl., 2012

Analysis on Maliciousness for Mobile Applications.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

An Analysis of Strategies for Preventing Selfish Behavior in Mobile Delay Tolerant Networks.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

A Novel Search System for Protecting Search Word.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

A New Iterative Learning Control Scheme Based on Damped Newton Method for Nonlinear Systems.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

Delegation-Based Mutual Authentication Scheme for Multi-operator Wireless Mesh Network.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

A Privacy Preserving Model for Personal Information in Search Engine.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

A Secure Secondary Backup Storage with an Isolated Authentication.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

Improved AODV Routing Protocol to Cope with High Overhead in High Mobility MANETs.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

Improving security level of LTE authentication and key agreement procedure.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2012

Mobile Malware Threats and Defenses for Homeland Security.
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012

How to Forge a Digital Alibi on Mac OS X.
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012

2011
A handover security mechanism employing the Diffie-Hellman key exchange approach for the IEEE802.16e wireless networks.
Mob. Inf. Syst., 2011

Service Oriented Multimedia Delivery System in Pervasive Environments.
J. Univers. Comput. Sci., 2011

Insider Threats are Getting Worse within Industries: Isolated Secondary Backup Required.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

Architecture to Support Heterogeneous Devices for Video Surveillance System.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

Keyboard Security: A Technological Review.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

Reversability Assessment on Secure USB Memories.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

IT Issues on Homeland Security and Defense.
Proceedings of the Availability, Reliability and Security for Business, Enterprise and Health Information Systems, 2011

2010
Guest Editorial: Advances in Trust Management.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2010

Safe Authentication Protocol for Secure USB Memories.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2010

A Secure Solution for USB Flash Drives Using FAT File System Structure.
Proceedings of the 13th International Conference on Network-Based Information Systems, 2010

A New Noise Mingling Approach to Protect the Authentication Password.
Proceedings of the CISIS 2010, 2010

Malware Obfuscation Techniques: A Brief Survey.
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010

A Solution to Protecting USB Keyboard Data.
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010

An Authentication and Authorization Protocol Using Ticket in Pervasive Environment.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010

2003
An on-line frame scheduling algorithm for the Internet video conferencing.
IEEE Trans. Consumer Electron., 2003

2002
Analysis of Packet Size on VOIP Performance.
Proceedings of the International Conference on Internet Computing, 2002

2000
Popularity-Independent Multimedia-on-Demand Server Model.
Proceedings of the 24th International Computer Software and Applications Conference (COMPSAC 2000), 2000

1999
Design issues on a popularity-independent video-on-demand server.
IEEE Trans. Consumer Electron., 1999

1996
An Imprecise DCT Computation Model for Real-Time Applications.
Proceedings of the Multimedia Technology and Applications, 1996


  Loading...