2008 |
11 | EE | Seongje Cho,
Hyeyoung Chang,
Yookun Cho:
Implementation of an Obfuscation Tool for C/C++ Source Code Protection on the XScale Architecture.
SEUS 2008: 406-416 |
2007 |
10 | EE | YongSuk Lee,
WoongChul Choi,
SukJoong Kang,
Seongje Cho:
Multi-channel Enhancements for IEEE 802.11-Based Multi-hop Ad-Hoc Wireless Networks.
EUC Workshops 2007: 82-92 |
9 | EE | HongGeun Kim,
JungKyu Han,
Seongje Cho:
An efficient implementation of RC4 cipher for encrypting multimedia files on mobile devices.
SAC 2007: 1171-1175 |
2006 |
8 | EE | Xuefeng Piao,
Sangchul Han,
Heeheon Kim,
Minkyu Park,
Yookun Cho,
Seongje Cho:
Predictability of Earliest Deadline Zero Laxity Algorithm for Multiprocessor Real-Time Systems.
ISORC 2006: 359-364 |
7 | EE | Seungwon Lee,
Seongje Cho,
Jongmoo Choi,
Yookun Cho:
Efficient Identification of Bad Signatures in RSA-Type Batch Signature.
IEICE Transactions 89-A(1): 74-80 (2006) |
6 | EE | Sangchul Han,
Heeheon Kim,
Xuefeng Piao,
Minkyu Park,
Seongje Cho,
Yookun Cho:
Finish Time Predictability of Earliest Deadline Zero Laxity Algorithm for Multiprocessor Real-Time Systems.
IEICE Transactions 89-D(12): 2981-2984 (2006) |
2005 |
5 | EE | Seungwon Lee,
Seongje Cho,
Jongmoo Choi,
Yookun Cho:
Batch Verification with DSA-Type Digital Signatures for Ubiquitous Computing.
CIS (2) 2005: 125-130 |
4 | EE | Seongje Cho,
Hye-Young Chang,
HongGeun Kim,
WoongChul Choi:
SoIDPS: Sensor Objects-Based Intrusion Detection and Prevention System and Its Implementation.
CIS (2) 2005: 260-266 |
3 | EE | Minkyu Park,
Sangchul Han,
Heeheon Kim,
Seongje Cho,
Yookun Cho:
Comparison of Deadline-Based Scheduling Algorithms for Periodic Real-Time Tasks on Multiprocessor.
IEICE Transactions 88-D(3): 658-661 (2005) |
2004 |
2 | EE | Minkyu Park,
Sangchul Han,
Heeheon Kim,
Seongje Cho,
Yookun Cho:
Comparison of Tie-Breaking Policies for Real-Time Scheduling on Multiprocessor.
EUC 2004: 174-182 |
2003 |
1 | EE | Seongje Cho,
Chulyean Chang,
Joonmo Kim,
Jongmoo Choi:
A Study on Monitoring and Protecting Computer System against Interception Threat.
Human.Society@Internet 2003 2003: 96-105 |