dblp.uni-trier.dewww.uni-trier.de

Yongsu Park

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
19EEYounho Lee, Heeyoul Kim, Yongsu Park, Hyunsoo Yoon: An efficient delegation protocol with delegation traceability in the X.509 proxy certificate environment for computational grids. Inf. Sci. 178(14): 2968-2982 (2008)
2007
18EESeok-Lae Lee, Yongsu Park, Joo-Seok Song: An Improvement of Park-Chung-Cho's Stream Authentication Scheme by Using Information Dispersal Algorithm. ISNN (1) 2007: 1045-1053
17EEYounho Lee, Junbeom Hur, Heeyoul Kim, Yongsu Park, Hyunsoo Yoon: A New Binary Image Authentication Scheme with Small Distortion and Low False Negative Rates. IEICE Transactions 90-B(11): 3259-3262 (2007)
16EEHeeyoul Kim, Younho Lee, Yongsu Park, Hyunsoo Yoon: Reactive Key Management Scheme for Access Control in Group Communications. IEICE Transactions 90-B(4): 982-986 (2007)
2006
15EEYounho Lee, Heeyoul Kim, Yongsu Park, Hyunsoo Yoon: A New Proxy Signature Scheme Providing Self-delegation. ICISC 2006: 328-342
14EEEul-Gyu Im, Jung-Taek Seo, Dong-Soo Kim, Yong Ho Song, Yongsu Park: Hybrid Modeling for Large-Scale Worm Propagation Simulations. ISI 2006: 572-577
13EEYongsu Park, Yong Ho Song, Eul-Gyu Im: Design of a Reliable Hardware Stack to Defend Against Frame Pointer Overwrite Attacks. ISI 2006: 731-732
12EEYong Ho Song, Jung Min Park, Yongsu Park, Eul-Gyu Im: A New Methodology of Analyzing Security Vulnerability for Network Services. ISI 2006: 737-738
11EEYongsu Park, Younho Lee, Heeyoul Kim, Gil-Joo Lee, Il-Hee Kim: Hardware Stack Design: Towards an Effective Defence Against Frame Pointer Overwrite Attacks. IWSEC 2006: 268-277
10EEYounho Lee, Yongsu Park, Heeyoul Kim, Seong-Min Hong, Hyunsoo Yoon: Rogue Public Key Registration Attack and the Importance of 'Proof of Possession' in the PKI Environment. IEICE Transactions 89-D(8): 2452-2455 (2006)
9EEYongsu Park, Yookun Cho: Efficient One-time Signature Schemes for Stream Authentication. J. Inf. Sci. Eng. 22(3): 611-624 (2006)
2005
8EEJaeYong Jeong, Yongsu Park, Yookun Cho: Efficient DoS Resistant Multicast Authentication Schemes. ICCSA (2) 2005: 353-362
7EEJaeYong Jeong, Yongsu Park, Yookun Cho: An Efficient Mobile Code Authentication Scheme that Permits Overlapping of Execution and Downloading. IEICE Transactions 88-D(5): 1077-1081 (2005)
2004
6EEYongsu Park, Jaeheung Lee, Yookun Cho: Intrusion Detection Using Noisy Training Data. ICCSA (1) 2004: 547-556
5EEYongsu Park, Yookun Cho: Fair Certified E-mail Protocols with Delivery Deadline Agreement. ICCSA (1) 2004: 978-987
4EEYongsu Park, Yookun Cho: The eSAIDA Stream Authentication Scheme. ICCSA (4) 2004: 799-807
3EEYongsu Park, Yookun Cho: An Efficient Pointer Protection Scheme to Defend Buffer Overflow Attacks. PARA 2004: 1025-1030
2EEYongsu Park, Yookun Cho: On Minimizing Distortion in Secure Data-Hiding for Binary Images. PCM (1) 2004: 572-577
2003
1EEYongsu Park, Tae-Sun Chung, Yookun Cho: An efficient stream authentication scheme using tree chaining. Inf. Process. Lett. 86(1): 1-8 (2003)

Coauthor Index

1Yookun Cho [1] [2] [3] [4] [5] [6] [7] [8] [9]
2Tae-Sun Chung [1]
3Seong-Min Hong [10]
4Junbeom Hur [17]
5Eul-Gyu Im [12] [13] [14]
6JaeYong Jeong [7] [8]
7Dong-Soo Kim [14]
8Heeyoul Kim [10] [11] [15] [16] [17] [19]
9Il-Hee Kim [11]
10Gil-Joo Lee [11]
11Jaeheung Lee [6]
12Seok-Lae Lee [18]
13Younho Lee [10] [11] [15] [16] [17] [19]
14Jung Min Park [12]
15Jung-Taek Seo [14]
16Joo-Seok Song [18]
17Yong Ho Song [12] [13] [14]
18Hyunsoo Yoon [10] [15] [16] [17] [19]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)