Sang-Soo Yeo

According to our database1, Sang-Soo Yeo authored at least 78 papers between 2005 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2018
Schmitt trigger-based single-ended 7T SRAM cell for Internet of Things (IoT) applications.
The Journal of Supercomputing, 2018

A general compiler for password-authenticated group key exchange protocol in the standard model.
Discrete Applied Mathematics, 2018

2017
Mobile-cloud assisted framework for selective encryption of medical images with steganography for resource-constrained devices.
Multimedia Tools Appl., 2017

DBN wavelet transform denoising method in soybean straw composition based on near-infrared rapid detection.
J. Real-Time Image Processing, 2017

2016
Unsupervised noise reduction scheme for voice-based information retrieval in mobile environments.
Multimedia Tools Appl., 2016

2015
Cloud, grid, P2P and internet computing: Recent trends and future directions.
Peer-to-Peer Networking and Applications, 2015

Pattern recognition technologies for multimedia information processing.
Multimedia Tools Appl., 2015

Advanced Service Technology and Application in Smart Sensor Networks.
IJDSN, 2015

A Study on Hash Chain-Based Hadoop Security Scheme.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

2014
Editorial of special section on Hybrid Information Security Technologies: part II.
The Journal of Supercomputing, 2014

The quality model for e-learning system with multimedia contents: a pairwise comparison approach.
Multimedia Tools Appl., 2014

Enhanced ID-Based Authentication Scheme Using OTP in Smart Grid AMI Environment.
J. Applied Mathematics, 2014

Authentication Method for Privacy Protection in Smart Grid Environment.
J. Applied Mathematics, 2014

Dynamic Access Control Model for Security Client Services in Smart Grid.
IJDSN, 2014

Secure Model against APT in m-Connected SCADA Network.
IJDSN, 2014

2013
Editorial of special section on hybrid information security technologies - part I.
The Journal of Supercomputing, 2013

Bridging the semantic gap in multimedia emotion/mood recognition for ubiquitous computing environment.
The Journal of Supercomputing, 2013

Secure D-CAS system for digital contents downloading services.
The Journal of Supercomputing, 2013

Advances in wireless sensor communications and applications for smart space.
Telecommunication Systems, 2013

Generating knowledge for the identification of device failure causes and the prediction of the times-to-failure in u-Healthcare environments.
Personal and Ubiquitous Computing, 2013

Genetic algorithm for effective open port selection for a web filter.
Personal and Ubiquitous Computing, 2013

Editorial: advances in multimedia and ubiquitous technologies for the new era.
Multimedia Tools Appl., 2013

A hybrid user authentication protocol for mobile IPTV service.
Multimedia Tools Appl., 2013

Advanced processing technologies and applications for mobile communication systems.
Int. J. Communication Systems, 2013

Serial Dictatorial Rule-Based Games for Camera Selection.
Proceedings of the Mobile, Ubiquitous, and Intelligent Computing, 2013

An Adaptive Intelligent Recommendation Scheme for Smart Learning Contents Management Systems.
Proceedings of the Multimedia and Ubiquitous Engineering, 2013

Security Considerations in Cloud Computing Virtualization Environment.
Proceedings of the Grid and Pervasive Computing - 8th International Conference, 2013

Network Anomaly Detection for M-Connected SCADA Networks.
Proceedings of the 2013 Eighth International Conference on Broadband and Wireless Computing, 2013

Known-Key Attack-Resilient Cluster Key Management.
Proceedings of the 2013 Eighth International Conference on Broadband and Wireless Computing, 2013

2012
FSH scheme for high-speed handover and anti-MITM on mobile computing.
The Journal of Supercomputing, 2012

A novel method for SQL injection attack detection based on removing SQL query attribute values.
Mathematical and Computer Modelling, 2012

Integrated inventory and transportation decision for ubiquitous supply chain management.
J. Intelligent Manufacturing, 2012

Software process certification system based on K-model for high-performance software engineering.
Concurrency and Computation: Practice and Experience, 2012

A Study on the Design of Digital Narrowband Communication System for Next Generation Group Communication.
Proceedings of the 15th International Conference on Network-Based Information Systems, 2012

Automated Security Level Conversion on Security Documents in Different Domains.
Proceedings of the 15th International Conference on Network-Based Information Systems, 2012

Related-Key Attack on the MD-64 Block Cipher Suitable for Pervasive Computing Environments.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

2011
Resilient Security Mechanism for Wireless Ad hoc Network.
Wireless Personal Communications, 2011

A GHS-Based Intelligent Management Platform with IP-Camera Security System.
Wireless Personal Communications, 2011

A novel design of variable-rate RS encoder for ubiquitous high performance multimedia service in Gbps transmission system.
The Journal of Supercomputing, 2011

Robust one-time password authentication scheme using smart card for home network environment.
Computer Communications, 2011

Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value.
Computer Communications, 2011

A Study on Automated Security Level Conversion Scheme for Multi-level Secure Documents.
Proceedings of the 14th International Conference on Network-Based Information Systems, 2011

IPTV and Secure Digital Contents Downloading.
Proceedings of the 14th International Conference on Network-Based Information Systems, 2011

A Study on the Performance of Wireless Localization System Based on AoA in WSN Environment.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

A Study on the Performance Improvement of Impulse-Radio System in Multiple Interference Environment.
Proceedings of the 2011 International Conference on Broadband, 2011

2010
Robust Deniable Authentication Protocol.
Wireless Personal Communications, 2010

Design and implementation of a framework for building distributed smart object systems.
The Journal of Supercomputing, 2010

Performance evaluation with DEVS formalism and implementation of active emergency call system for realtime location and monitoring.
Simulation Modelling Practice and Theory, 2010

A portable toolkit for supporting end-user personalization and control in context-aware applications.
Multimedia Tools Appl., 2010

A Fast Formation Flocking Scheme for a Group of Interactive Distributed Mobile Nodes in Autonomous Networks.
MONET, 2010

Multi-frame Beacon Management for constructing interference-avoided LR-WPAN.
IJAHUC, 2010

A Pervasive Secret Sharing Scheme For Embedded Visual Communication System.
Intelligent Automation & Soft Computing, 2010

Context-Aware Middleware for Multimedia Services in Heterogeneous Networks.
IEEE Intelligent Systems, 2010

An integrated parallel GNFS algorithm for integer factorization based on Linbox Montgomery block Lanczos method over GF(2).
Computers & Mathematics with Applications, 2010

Global Top-k Aggregate Queries Based on X-tuple in Uncertain Database.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010

2009
Protecting Your Privacy with a Mobile Agent Device in RFID Environment.
Wireless Personal Communications, 2009

Robust and secure routing scheme for wireless multihop network.
Personal and Ubiquitous Computing, 2009

Modeling of an Intelligent e-Consent System in a Healthcare Domain.
J. UCS, 2009

Job partition and allocation using the prediction model in non-dedicated heterogeneous wireless network environments.
IET Communications, 2009

Intelligent Decision-Making System with Green Pervasive Computing for Renewable Energy Business in Electricity Markets on Smart Grid.
EURASIP J. Wireless Comm. and Networking, 2009

Analysis and Synthesis of Spatial Parameters Using MDCT.
Proceedings of the 2009 Third International Conference on Multimedia and Ubiquitous Engineering, 2009

Adaptive Multi-channel Utilization Scheme for Coexistence of IEEE802.15.4 LR-WPAN with Other Interfering Systems.
Proceedings of the 11th IEEE International Conference on High Performance Computing and Communications, 2009

Security and Efficiency Analyses of Security Mechanisms in e-Passport Systems.
Proceedings of the 2009 International Conference on Security & Management, 2009

A Resource Management System for Fault Tolerance in Grid Computing.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

Distributed Tag Access with Collision-Avoidance among Mobile RFID Readers.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

2008
A robust and secure time-domain ICI canceller for OFDM based ubiquitous systems in time-varying multipath channels.
The Journal of Supercomputing, 2008

Time Stamp Protocol for Smart Environment Services.
Proceedings of the Ubiquitous Intelligence and Computing, 5th International Conference, 2008

Online Games and Security Issues.
Proceedings of the Second International Conference on Future Generation Communication and Networking, 2008

Enhanced Yoking Proof Protocols for RFID Tags and Tag Groups.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

2007
eMARP: Enhanced Mobile Agent for RFID Privacy Protection and Forgery Detection.
Proceedings of the Agent and Multi-Agent Systems: Technologies and Applications, 2007

Forward Secure Privacy Protection Scheme for RFID System Using Advanced Encryption Standard.
Proceedings of the Frontiers of High Performance Computing and Networking ISPA 2007 Workshops, 2007

Hybrid Tag Anti-collision Algorithms in RFID Systems.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007

An Analysis of RFID Tag Authentication Protocols Using Secret Value.
Proceedings of the Future Generation Communication and Networking, 2007

MarSelHR: A Haplotype Reconstruction System Using Linkage Disequilibrium.
Proceedings of the Frontiers in the Convergence of Bioscience and Information Technologies 2007, 2007

A Practical Proxy Device for Protecting RFID Tag's Identifier.
Proceedings of the 2007 ECSIS Symposium on Bio-inspired, 2007

2006
MARP: Mobile Agent for RFID Privacy Protection.
Proceedings of the Smart Card Research and Advanced Applications, 2006

2005
A New Scheme for the Location Information Protection in Mobile Communication Environments.
Proceedings of the Computer Network Security, 2005

Scalable and Flexible Privacy Protection Scheme for RFID Systems.
Proceedings of the Security and Privacy in Ad-hoc and Sensor Networks, 2005


  Loading...