Yoojae Won

Orcid: 0000-0002-7706-5983

According to our database1, Yoojae Won authored at least 30 papers between 1998 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book  In proceedings  Article  PhD thesis  Dataset  Other 

Links

On csauthors.net:

Bibliography

2024
Guaranteeing the integrity and reliability of distributed personal information access records.
J. Ambient Intell. Humaniz. Comput., February, 2024

2022
Blockchain Token-Based Wild-Simulated Ginseng Quality Management Method.
Sensors, 2022

Implementation of Quality Management System for Wild-Simulated Ginseng Using Blockchain.
J. Inf. Process. Syst., 2022

2021
Implementation of Search Engine to Minimize Traffic Using Blockchain-Based Web Usage History Management System.
J. Inf. Process. Syst., 2021

Security Improvement of File System Filter Driver in Windows Embedded OS.
J. Inf. Process. Syst., 2021

2020
A new cost-saving and efficient method for patch management using blockchain.
J. Supercomput., 2020

Enhancing the Reliability of Wi-Fi Network Using Evil Twin AP Detection Method Based on Machine Learning.
J. Inf. Process. Syst., 2020

A Study on Variant Malware Detection Techniques Using Static and Dynamic Features.
J. Inf. Process. Syst., 2020

2019
Improving personal information detection using OCR feature recognition rate.
J. Supercomput., 2019

Analysis of operating system identification via fingerprinting and machine learning.
Comput. Electr. Eng., 2019

2018
Detection of damaged files and measurement of similarity to originals using entropy graph characteristics.
J. Supercomput., 2018

Ephemeral ID Beacon-Based Improved Indoor Positioning System.
Symmetry, 2018

Ransomware detection method based on context-aware entropy analysis.
Soft Comput., 2018

2017
Patch Integrity Verification Method Using Dual Electronic Signatures.
J. Inf. Process. Syst., 2017

Encrypted Network Traffic Analysis Method via Secure Socket Layer Handshake Control.
Proceedings of the Advanced Multimedia and Ubiquitous Engineering, 2017

Patch Alarm and Collecting System.
Proceedings of the Advanced Multimedia and Ubiquitous Engineering, 2017

An Automatic Patch Management System with Improved Security.
Proceedings of the Advanced Multimedia and Ubiquitous Engineering, 2017

Property Analysis of SMS Spam Using Text Mining.
Proceedings of the Advanced Multimedia and Ubiquitous Engineering, 2017

Study on Integrity Verification and Compatibility-Conflict Analysis for Safe Patching.
Proceedings of the Advanced Multimedia and Ubiquitous Engineering, 2017

Study on Smart Automated Sales System with Blockchain-Based Data Storage and Management.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2017

Study on Malicious Code Behavior Detection Using Windows Filter Driver and API Call Sequence.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2017

Frame Rate Control Buffer Management Technique for High-Quality Real-Time Video Conferencing System.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2017

2010
IANA Registry Update for Support of the SEED Cipher Algorithm in Multimedia Internet KEYing (MIKEY).
RFC, August, 2010

The SEED Cipher Algorithm and Its Use with the Secure Real-Time Transport Protocol (SRTP).
RFC, August, 2010

2009
Traceable Anonymous Certificate.
RFC, August, 2009

2008
Risk Analysis Methodology for New Critical Information Infrastructure.
Proceedings of the 3rd International Conference on Systems and Networks Communications, 2008

Implementation and Evaluation of SIP-Based Secure VoIP Communication System.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

2007
VoIP Secure Communication Protocol satisfying Backward Compatibility.
Proceedings of the Second International Conference on Systems and Networks Communications (ICSNC 2007), 2007

2006
One Touch Logon: Replacing Multiple Passwords with Single Fingerprint Recognition.
Proceedings of the Sixth International Conference on Computer and Information Technology (CIT 2006), 2006

1998
Proxy-based Reliable Multicast Protocol.
Proceedings of the Computers and Their Applications (CATA-98), 1998


  Loading...