Yongsu Park

According to our database1, Yongsu Park authored at least 40 papers between 2003 and 2021.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2021
Hybrid emulation for bypassing anti-reversing techniques and analyzing malware.
J. Supercomput., 2021

2020
DDR-Coin: An Efficient Probabilistic Distributed Trigger Counting Algorithm.
Sensors, 2020

x64Unpack: Hybrid Emulation Unpacker for 64-bit Windows Environments and Detailed Analysis Results on VMProtect 3.4.
IEEE Access, 2020

2019
Efficient Automatic Original Entry Point Detection.
J. Inf. Sci. Eng., 2019

2018
Development of Force Observer in Series Elastic Actuator for Dynamic Control.
IEEE Trans. Ind. Electron., 2018

Enhanced Knock Code Authentication with High Security and Improved Convenience.
KSII Trans. Internet Inf. Syst., 2018

New flash memory acquisition methods based on firmware update protocols for LG Android smartphones.
Digit. Investig., 2018

2017
PCS: a parity-based personal data recovery service in cloud.
Clust. Comput., 2017

Dynamic model based microrobot control.
Proceedings of the 14th International Conference on Ubiquitous Robots and Ambient Intelligence, 2017

2016
Dynamic analysis of Reaction Force sensing Series Elastic Actuator as unlumped two mass system.
Proceedings of the IECON 2016, 2016

2015
Estimating Korean Residence Registration Numbers from Public Information on SNS.
IEICE Trans. Commun., 2015

2014
Analyzing Network Privacy Preserving Methods: A Perspective of Social Network Characteristics.
IEICE Trans. Inf. Syst., 2014

2013
An optimal distributed trigger counting algorithm for large-scale networked systems.
Simul., 2013

Improved multi-precision squaring for low-end RISC microcontrollers.
J. Syst. Softw., 2013

2012
HORSIC: An efficient one-time signature scheme for wireless sensor networks.
Inf. Process. Lett., 2012

2010
A robust and flexible digital rights management system for home networks.
J. Syst. Softw., 2010

Design and Performance Evaluation of Binary Code Packing for Protecting Embedded Software against Reverse Engineering.
Proceedings of the 13th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing, 2010

2009
A new data hiding scheme for binary image authentication with small image distortion.
Inf. Sci., 2009

Framework Design and Performance Analysis on Pairwise Key Establishment.
Proceedings of the Management Enabling the Future Internet for Changing Business and New Computing Services, 2009

2008
An efficient delegation protocol with delegation traceability in the X.509 proxy certificate environment for computational grids.
Inf. Sci., 2008

Efficient and Secure Self-Organized Public Key Management for Mobile Ad Hoc Networks.
IEICE Trans. Commun., 2008

2007
A New Binary Image Authentication Scheme with Small Distortion and Low False Negative Rates.
IEICE Trans. Commun., 2007

Reactive Key Management Scheme for Access Control in Group Communications.
IEICE Trans. Commun., 2007

Weakness of the Synchro-Difference LKH Scheme for Secure Multicast.
IEEE Commun. Lett., 2007

An Improvement of Park-Chung-Cho's Stream Authentication Scheme by Using Information Dispersal Algorithm.
Proceedings of the Advances in Neural Networks, 2007

2006
Efficient One-time Signature Schemes for Stream Authentication.
J. Inf. Sci. Eng., 2006

Rogue Public Key Registration Attack and the Importance of 'Proof of Possession' in the PKI Environment.
IEICE Trans. Inf. Syst., 2006

Hardware Stack Design: Towards an Effective Defence Against Frame Pointer Overwrite Attacks.
Proceedings of the Advances in Information and Computer Security, 2006

A New Methodology of Analyzing Security Vulnerability for Network Services.
Proceedings of the Intelligence and Security Informatics, 2006

Design of a Reliable Hardware Stack to Defend Against Frame Pointer Overwrite Attacks.
Proceedings of the Intelligence and Security Informatics, 2006

Hybrid Modeling for Large-Scale Worm Propagation Simulations.
Proceedings of the Intelligence and Security Informatics, 2006

A New Proxy Signature Scheme Providing Self-delegation.
Proceedings of the Information Security and Cryptology - ICISC 2006, 9th International Conference, Busan, Korea, November 30, 2006

2005
An Efficient Mobile Code Authentication Scheme that Permits Overlapping of Execution and Downloading.
IEICE Trans. Inf. Syst., 2005

Efficient DoS Resistant Multicast Authentication Schemes.
Proceedings of the Computational Science and Its Applications, 2005

2004
On Minimizing Distortion in Secure Data-Hiding for Binary Images.
Proceedings of the Advances in Multimedia Information Processing - PCM 2004, 5th Pacific Rim Conference on Multimedia, Tokyo, Japan, November 30, 2004

An Efficient Pointer Protection Scheme to Defend Buffer Overflow Attacks.
Proceedings of the Applied Parallel Computing, 2004

Intrusion Detection Using Noisy Training Data.
Proceedings of the Computational Science and Its Applications, 2004

The eSAIDA Stream Authentication Scheme.
Proceedings of the Computational Science and Its Applications, 2004

Fair Certified E-mail Protocols with Delivery Deadline Agreement.
Proceedings of the Computational Science and Its Applications, 2004

2003
An efficient stream authentication scheme using tree chaining.
Inf. Process. Lett., 2003


  Loading...