2008 |
19 | EE | Younho Lee,
Heeyoul Kim,
Yongsu Park,
Hyunsoo Yoon:
An efficient delegation protocol with delegation traceability in the X.509 proxy certificate environment for computational grids.
Inf. Sci. 178(14): 2968-2982 (2008) |
2007 |
18 | EE | Seok-Lae Lee,
Yongsu Park,
Joo-Seok Song:
An Improvement of Park-Chung-Cho's Stream Authentication Scheme by Using Information Dispersal Algorithm.
ISNN (1) 2007: 1045-1053 |
17 | EE | Younho Lee,
Junbeom Hur,
Heeyoul Kim,
Yongsu Park,
Hyunsoo Yoon:
A New Binary Image Authentication Scheme with Small Distortion and Low False Negative Rates.
IEICE Transactions 90-B(11): 3259-3262 (2007) |
16 | EE | Heeyoul Kim,
Younho Lee,
Yongsu Park,
Hyunsoo Yoon:
Reactive Key Management Scheme for Access Control in Group Communications.
IEICE Transactions 90-B(4): 982-986 (2007) |
2006 |
15 | EE | Younho Lee,
Heeyoul Kim,
Yongsu Park,
Hyunsoo Yoon:
A New Proxy Signature Scheme Providing Self-delegation.
ICISC 2006: 328-342 |
14 | EE | Eul-Gyu Im,
Jung-Taek Seo,
Dong-Soo Kim,
Yong Ho Song,
Yongsu Park:
Hybrid Modeling for Large-Scale Worm Propagation Simulations.
ISI 2006: 572-577 |
13 | EE | Yongsu Park,
Yong Ho Song,
Eul-Gyu Im:
Design of a Reliable Hardware Stack to Defend Against Frame Pointer Overwrite Attacks.
ISI 2006: 731-732 |
12 | EE | Yong Ho Song,
Jung Min Park,
Yongsu Park,
Eul-Gyu Im:
A New Methodology of Analyzing Security Vulnerability for Network Services.
ISI 2006: 737-738 |
11 | EE | Yongsu Park,
Younho Lee,
Heeyoul Kim,
Gil-Joo Lee,
Il-Hee Kim:
Hardware Stack Design: Towards an Effective Defence Against Frame Pointer Overwrite Attacks.
IWSEC 2006: 268-277 |
10 | EE | Younho Lee,
Yongsu Park,
Heeyoul Kim,
Seong-Min Hong,
Hyunsoo Yoon:
Rogue Public Key Registration Attack and the Importance of 'Proof of Possession' in the PKI Environment.
IEICE Transactions 89-D(8): 2452-2455 (2006) |
9 | EE | Yongsu Park,
Yookun Cho:
Efficient One-time Signature Schemes for Stream Authentication.
J. Inf. Sci. Eng. 22(3): 611-624 (2006) |
2005 |
8 | EE | JaeYong Jeong,
Yongsu Park,
Yookun Cho:
Efficient DoS Resistant Multicast Authentication Schemes.
ICCSA (2) 2005: 353-362 |
7 | EE | JaeYong Jeong,
Yongsu Park,
Yookun Cho:
An Efficient Mobile Code Authentication Scheme that Permits Overlapping of Execution and Downloading.
IEICE Transactions 88-D(5): 1077-1081 (2005) |
2004 |
6 | EE | Yongsu Park,
Jaeheung Lee,
Yookun Cho:
Intrusion Detection Using Noisy Training Data.
ICCSA (1) 2004: 547-556 |
5 | EE | Yongsu Park,
Yookun Cho:
Fair Certified E-mail Protocols with Delivery Deadline Agreement.
ICCSA (1) 2004: 978-987 |
4 | EE | Yongsu Park,
Yookun Cho:
The eSAIDA Stream Authentication Scheme.
ICCSA (4) 2004: 799-807 |
3 | EE | Yongsu Park,
Yookun Cho:
An Efficient Pointer Protection Scheme to Defend Buffer Overflow Attacks.
PARA 2004: 1025-1030 |
2 | EE | Yongsu Park,
Yookun Cho:
On Minimizing Distortion in Secure Data-Hiding for Binary Images.
PCM (1) 2004: 572-577 |
2003 |
1 | EE | Yongsu Park,
Tae-Sun Chung,
Yookun Cho:
An efficient stream authentication scheme using tree chaining.
Inf. Process. Lett. 86(1): 1-8 (2003) |