Yoon-Su Jeong

Orcid: 0000-0003-3455-5947

According to our database1, Yoon-Su Jeong authored at least 38 papers between 2006 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A blockchain-based IoT data management scheme using Bernoulli distribution convergence in the mobile edge computing.
Pers. Ubiquitous Comput., 2023

2022
Secure IIoT Information Reinforcement Model Based on IIoT Information Platform Using Blockchain.
Sensors, 2022

2021
Efficient data management techniques based on hierarchical IoT privacy using block chains in cloud environments.
J. Supercomput., 2021

An efficient management scheme of blockchain-based cloud user information using probabilistic weighting.
J. Supercomput., 2021

Multi-Blockchain-Based IoT Data Processing Techniques to Ensure the Integrity of IoT Data in AIoT Edge Computing Environments.
Sensors, 2021

Hierarchical Multipath Blockchain Based IoT Information Management Techniques for Efficient Distributed Processing of Intelligent IoT Information.
Sensors, 2021

Blockchain Processing Technique Based on Multiple Hash Chains for Minimizing Integrity Errors of IoT Data in Cloud Environments.
Sensors, 2021

Multi-hash chain based multimedia search technology optimized for distributed environments using IoT devices.
Multim. Tools Appl., 2021

2019
Probabilistic Approach Processing Scheme Based on BLAST for Improving Search Speed of Bioinformatics.
Wirel. Pers. Commun., 2019

Bucket-size balancing locality sensitive hashing using the map reduce paradigm.
Clust. Comput., 2019

2018
Hierarchical Management Scheme of Biometric Information Through the Synchronization of Heterogeneous Devices.
Wirel. Pers. Commun., 2018

Fast Fourier transform based efficient data processing technique for big data processing speed enhancement in P2P computing environment.
Peer-to-Peer Netw. Appl., 2018

An IoT healthcare service model of a vehicle using implantable devices.
Clust. Comput., 2018

2017
An Efficient Access Reduction Scheme of Big Data Based on Total Probability Theory.
Wirel. Pers. Commun., 2017

Secure information authentication protocol between patients and medical staff in a hospital environment.
J. Comput. Virol. Hacking Tech., 2017

High-dimensionality priority selection scheme of bioinformatics information using Bernoulli distribution.
Clust. Comput., 2017

2016
An Efficient Authentication Scheme to Protect User Privacy in Seamless Big Data Services.
Wirel. Pers. Commun., 2016

High-dimentional data authentication protocol based on hash chain for Hadoop systems.
Clust. Comput., 2016

2015
A token-based authentication security scheme for Hadoop distributed file system using elliptic curve cryptography.
J. Comput. Virol. Hacking Tech., 2015

2014
Access Control Protocol Based on Privacy Property of Patient in m-Healthcare Emergency.
Wirel. Pers. Commun., 2014

2013
A Device Authentication Mechanism Reducing Performance Cost in Mobile P2P Networks.
KSII Trans. Internet Inf. Syst., 2013

2011
Design of RSSI Signal Based Transmit-Receiving Device for Preventing from Wasting Electric Power of Transmit in Sensor Network.
Proceedings of the Ubiquitous Computing and Multimedia Applications, 2011

Design of Guaranteeing System of Service Quality through the Verifying Users of Hash Chain.
Proceedings of the Ubiquitous Computing and Multimedia Applications, 2011

Enhanced Tag Identification Method for Efficient RFID System.
Proceedings of the Convergence and Hybrid Information Technology, 2011

2010
A Key Establishment Protocol for RFID User in IPTV Environment.
IEICE Trans. Commun., 2010

An Authentication Protocol for Mobile IPTV Users Based on an RFID-USB Convergence Technique.
Proceedings of the Communication and Networking, 2010

IPTV Micropayment System Based on Hash Chain Using RFID-USB Module.
Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010

2009
Design of sensor web condition using SMSC.
Proceedings of the 2009 International Conference on Hybrid Information Technology, 2009

MSMAP: A Study on Robust Multiple Selection Scheme of Mobility Anchor Point in Hierarchical Mobile IPv6 Networks.
Proceedings of the Communication and Networking, 2009

2008
A Key Distribution method for Reducing Storage and Supporting High Level Security in the Large-scale WSN.
J. Digit. Content Technol. its Appl., 2008

A Design and Implementation of USN-Based Mobile Web Services Framework.
Proceedings of the Second International Conference on Future Generation Communication and Networking, 2008

2007
Hybrid Key Establishment Protocol Based on ECC for Wireless Sensor Network.
Proceedings of the Ubiquitous Intelligence and Computing, 4th International Conference, 2007

Advanced Efficiency and Stability Combined Weight Based Distributed Clustering Algorithm in MANET.
Proceedings of the Future Generation Communication and Networking, 2007

2006
Secure Key Management Protocol in the Wireless Sensor Network.
J. Inf. Process. Syst., 2006

Efficient Unilateral Authentication Mechanism for MIPv6.
Proceedings of the Computational Science, 2006

Low-Cost Authentication Protocol of the RFID System Using Partial ID.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

An Efficient Device Authentication Protocol Using Bioinformatic.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

An Efficient Key Management Scheme for Secure Sensor Networks.
Proceedings of the Sixth International Conference on Computer and Information Technology (CIT 2006), 2006


  Loading...