default search action
Jeong-Nyeo Kim
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j25]Jiseok Bang, Jeong-Nyeo Kim, Seungkwang Lee:
Entropy Sharing in Ransomware: Bypassing Entropy-Based Detection of Cryptographic Operations. Sensors 24(5): 1446 (2024) - [j24]Seungkwang Lee, Jeong-Nyeo Kim:
Balanced Encoding of Near-Zero Correlation for an AES Implementation. IEEE Trans. Inf. Forensics Secur. 19: 6589-6603 (2024) - 2022
- [c36]Kyeong Tae Kim, Jae-Deok Lim, Jeong-Nyeo Kim:
An IoT Device-trusted Remote Attestation Framework. ICACT 2022: 218-223 - [i2]Seungkwang Lee, Jeong-Nyeo Kim:
Balanced Encoding of Near-Zero Correlation for an AES Implementation. CoRR abs/2207.13559 (2022) - 2021
- [j23]Song-Yi Hwang, Jeong-Nyeo Kim:
A Malware Distribution Simulator for the Verification of Network Threat Prevention Tools. Sensors 21(21): 6983 (2021) - 2020
- [j22]Minkyung Park, Jeongnyeo Kim, Youngho Kim, Eunsang Cho, Soobin Park, Sungmin Sohn, Minhyeok Kang, Ted Taekyoung Kwon:
An SGX-Based Key Management Framework for Data Centric Networking. IEEE Access 8: 45198-45210 (2020) - [j21]Eunsang Cho, Jeongnyeo Kim, Minkyung Park, Hyeonmin Lee, Chorom Hamm, Soobin Park, Sungmin Sohn, Minhyeok Kang, Ted Taekyoung Kwon:
TwinPeaks: An approach for certificateless public key distribution for the internet and internet of things. Comput. Networks 175: 107268 (2020) - [c35]Yun-kyung Lee, Jeong-Nyeo Kim:
Hierarchical Access Control for SDP-IoT. ICTC 2020: 1742-1744 - [c34]Jae-Deok Lim, Seongyoung Sohn, Jeongnyeo Kim:
Proposal of Smart Segmentation Framework for preventing threats from spreading in IoT. ICTC 2020: 1745-1747
2010 – 2019
- 2019
- [j20]Daemin Shin, Keon Yun, Jiyoon Kim, Philip Virgil Astillo, Jeong-Nyeo Kim, Ilsun You:
A Security Protocol for Route Optimization in DMM-Based Smart Home IoT Networks. IEEE Access 7: 142531-142550 (2019) - [c33]Minkyung Park, Jeongnyeo Kim, Youngho Kim, Eunsang Cho, Soobin Park, Sungmin Sohn, Minhyeok Kang, Ted "Taekyoung" Kwon:
An SGX-Based Key Management Framework for Data Centric Networking. WISA 2019: 370-382 - 2018
- [j19]Sung Ryoung Kim, Jeong-Nyeo Kim, Sung Tae Kim, Sunwoo Shin, Jeong Hyun Yi:
Anti-reversible dynamic tamper detection scheme using distributed image steganography for IoT applications. J. Supercomput. 74(9): 4261-4280 (2018) - [j18]Yun-kyung Lee, Jeong-Nyeo Kim, Kyung-Soo Lim, Hyunsoo Yoon:
Secure mobile device structure for trust IoT. J. Supercomput. 74(12): 6646-6664 (2018) - [c32]Youngho Kim, Yun-kyung Lee, Jeongnyeo Kim:
RIPPLE: Adaptive fine-grained access control in multi-hop LLNs. ICOIN 2018: 863-868 - [c31]Kyeong Tae Kim, Jeongnyeo Kim:
An Energy Efficient Real-Time MAC Protocol. ICTC 2018: 1180-1184 - [c30]Yun-kyung Lee, Youngho Kim, Jeong-Nyeo Kim:
Implementation of TLS and DTLS on Zephyr OS for IoT Devices. ICTC 2018: 1292-1294 - [i1]Vishal Sharma, Gaurav Choudhary, Ilsun You, Jae-Deok Lim, Jeong-Nyeo Kim:
Self-enforcing Game Theory-based Resource Allocation for LoRaWAN Assisted Public Safety Communications. CoRR abs/1804.07204 (2018) - 2017
- [j17]Sangdon Kim, Hyung-Woo Lee, Jae-Deok Lim, Jeong-Nyeo Kim:
Detection of metamorphic malicious mobile code on android-based smartphones. Int. J. Adv. Media Commun. 7(1): 56-75 (2017) - [j16]Vishal Sharma, Jae-Deok Lim, Jeong-Nyeo Kim, Ilsun You:
SACA: Self-Aware Communication Architecture for IoT Using Mobile Fog Servers. Mob. Inf. Syst. 2017: 3273917:1-3273917:17 (2017) - [j15]Meejoung Kim, Eenjun Hwang, Jeong-Nyeo Kim:
Analysis of eavesdropping attack in mmWave-based WPANs with directional antennas. Wirel. Networks 23(2): 355-369 (2017) - [c29]Seungyong Yoon, Jeongnyeo Kim:
Remote security management server for IoT devices. ICTC 2017: 1162-1164 - 2016
- [j14]Geonlyang Kim, Jae-Deok Lim, Jeong-Nyeo Kim:
Secure user authentication based on the trusted platform for mobile devices. EURASIP J. Wirel. Commun. Netw. 2016: 233 (2016) - [j13]Ilsun You, Jae-Deok Lim, Jeong-Nyeo Kim, Hyobeom Ahn, Chang Choi:
Adaptive authentication scheme for mobile devices in proxy MIPv6 networks. IET Commun. 10(17): 2319-2327 (2016) - [j12]Su-Wan Park, Jeong-Nyeo Kim, Deok-Gyu Lee:
SecureDom: secure mobile-sensitive information protection with domain separation. J. Supercomput. 72(7): 2682-2702 (2016) - [c28]Su-Wan Park, Jeong-Nyeo Kim:
A Scheme for Controlling Functionality of Mobile Device Using Specialized Codes. DASC/PiCom/DataCom/CyberSciTech 2016: 75-82 - 2015
- [j11]Su-Wan Park, Jae-Deok Lim, Jeong-Nyeo Kim:
A Secure Storage System for Sensitive Data Protection Based on Mobile Virtualization. Int. J. Distributed Sens. Networks 11: 929380:1-929380:8 (2015) - [j10]Youngho Kim, Tae Hwan Oh, Jeong-Nyeo Kim:
Analyzing User Awareness of Privacy Data Leak in Mobile Applications. Mob. Inf. Syst. 2015: 369489:1-369489:12 (2015) - [j9]Hongil Ju, Youngsae Kim, Yong-Sung Jeon, Jeongnyeo Kim:
Implementation of a hardware security chip for mobile devices. IEEE Trans. Consumer Electron. 61(4): 500-506 (2015) - [c27]Geonlyang Kim, Yong-Sung Jeon, Jeong-Nyeo Kim:
The Secure Urgent Situation Propagation System using the Mobile Security Solution. CSCESM 2015: 109-114 - [c26]Yun-kyung Lee, Jae-Deok Lim, Yong-seong Jeon, Jeong-Nyeo Kim:
Technology trends of access control in IoT and requirements analysis. ICTC 2015: 1031-1033 - [c25]Seungyong Yoon, Yong-Sung Jeon, Jeongnyeo Kim:
Mobile security technology for smart devices. ICTC 2015: 1171-1173 - [c24]Daewon Kim, Yong-Sung Jeon, Jeongnyeo Kim:
A method based on platform integrity verification for activating a mobile trusted module. ICTC 2015: 1174-1176 - [c23]Hyeokchan Kwon, Kwangil Lee, Gaeil An, Byung-Ho Chung, Jeong-Nyeo Kim:
Detection of Rogue Devices in WLAN by Analyzing RF Features and Indoor Location of the Device. WISA 2015: 54-61 - 2014
- [j8]Daesung Moon, Yongwha Chung, Chang-Ho Seo, Sung-Young Kim, Jeong-Nyeo Kim:
A practical implementation of fuzzy fingerprint vault for smart cards. J. Intell. Manuf. 25(2): 293-302 (2014) - [j7]Jong-Yeon Park, Dong-Guk Han, Okyeon Yi, Jeong-Nyeo Kim:
An improved side channel attack using event information of subtraction. J. Netw. Comput. Appl. 38: 99-105 (2014) - [j6]Jae-Deok Lim, Jeong-Nyeo Kim, Young-Giu Jung, Young-Doo Yoon, Cheol-Hoon Lee:
Improving performance of X-rated video classification with the optimized repeated curve-like spectrum feature and the skip-and-analysis processing. Multim. Tools Appl. 71(2): 717-740 (2014) - [j5]Su-Wan Park, Jeong-Nyeo Kim, Sang-Uk Shin:
Efficient DRM mechanism of scalable contents based on H.264/SVC in convergence environment. Multim. Tools Appl. 73(2): 841-855 (2014) - [j4]Su-Wan Park, Deok-Gyu Lee, Jong Wook Han, Jeong-Nyeo Kim:
Automated and coupled services of advanced smart surveillance systems toward green IT: tracking, retrieval and digital evidence. J. Supercomput. 69(3): 1215-1234 (2014) - [c22]Seungyong Yoon, Jeongnyeo Kim, Hyunsook Cho:
Detection of SMS mobile malware. ICEIC 2014: 1-2 - [c21]Su-Wan Park, Jeong-Nyeo Kim:
Smart Network Services Using Ticket Issuance in the TSM (Trusted Software Monitor) System. FCC 2014: 279-287 - [c20]Yong-Sung Jeon, Youngsae Kim, Jeongnyeo Kim:
Implementation of a video streaming security system for smart device. ICCE 2014: 97-100 - [c19]Daewon Kim, YongSung Jeon, Jeongnyeo Kim:
A secure channel establishment method on a hardware security module. ICTC 2014: 555-556 - [c18]Yun-kyung Lee, Jae-Deok Lim, Yong-Sung Jeon, Jeong-Nyeo Kim:
Protection method from APP repackaging attack on mobile device with separated domain. ICTC 2014: 667-668 - [c17]Hwashin Moon, YongSung Jeon, Jeongnyeo Kim:
Reducing the impact of repackaged app on Android. ICTC 2014: 800-801 - [c16]Bo-Heung Chung, Youngsung Jeon, Jeongnyeo Kim:
User-defined privilege restriction mechanism for secure execution environments on Android. ICTC 2014: 815-816 - 2013
- [j3]Junho Choi, Chang Choi, Kangbin Yim, Jeongnyeo Kim, Pankoo Kim:
Intelligent Reconfigurable Method of Cloud Computing Resources for Multimedia Data Delivery. Informatica 24(3): 381-394 (2013) - [j2]Yong-Hyuk Moon, Jeong-Nyeo Kim, Chan-Hyun Youn:
Churn-aware optimal layer scheduling scheme for scalable video distribution in super-peer overlay networks. J. Supercomput. 66(2): 700-720 (2013) - [c15]Daewon Kim, Jeongnyeo Kim, Hyunsook Cho:
An integrity-based mechanism for accessing keys in a mobile trusted module. ICTC 2013: 780-782 - [c14]You Joung Ham, Hyung-Woo Lee, Jae-Deok Lim, Jeong-Nyeo Kim:
DroidVulMon - Android Based Mobile Device Vulnerability Analysis and Monitoring System. NGMAST 2013: 26-31 - 2012
- [c13]Daewon Kim, Byoung-Koo Kim, Ikkyun Kim, Jeongnyeo Kim, Hyunsook Cho:
Endpoint Mitigation of DDoS Attacks Based on Dynamic Thresholding. ICICS 2012: 381-391 - [c12]Hongil Ju, Jeong-Nyeo Kim:
Security architecture for smart devices. ICTC 2012: 94-95 - 2010
- [c11]Hansung Lee, Yunsu Chung, Jeongnyeo Kim, Daihee Park:
Face Image Retrieval Using Sparse Representation Classifier with Gabor-LBP Histogram. WISA 2010: 273-280
2000 – 2009
- 2008
- [c10]Yun-kyung Lee, Deok-Gyu Lee, Jong Wook Han, Jeong-Nyeo Kim:
The home device authentication system construction for pervasive home network. MobiQuitous 2008 - 2007
- [c9]Jae-Deok Lim, Sung-Kyong Un, Jeong-Nyeo Kim, ChoelHoon Lee:
Implementation of LSM-Based RBAC Module for Embedded System. WISA 2007: 91-101 - 2005
- [c8]Youngho Kim, Jeongnyeo Kim:
Design of Packet Filtering on Network Processor. Security and Management 2005: 213-220 - [c7]Sang-Woo Lee, Yong-Sung Jeon, Jeong-Nyeo Kim, Ki-Young Kim, Jong-Soo Jang:
Design and Implementation of a Gigabit Router using Network Processor. IMSA 2005: 32-35 - 2004
- [j1]Sun-Jin Oh, Jeong-Nyeo Kim, Yeong Rak Seong, Cheol-Hoon Lee:
Deterministic Task Scheduling for Embedded Real-Time Operating Systems. IEICE Trans. Inf. Syst. 87-D(2): 472-474 (2004) - [c6]Sang-Woo Lee, Jeong-Nyeo Kim, Jong-Soo Jang:
An Efficient Divider Architecture over GF(2m) for Elliptic Curve Cryptography. ESA/VLSI 2004: 569-576 - [c5]Jin-Ho Hwang, Ju-Dong Shin, Mi-Ra Yun, Jeong-Nyeo Kim, Sang-Su Lee, Sung Un Kim:
Fault/Attack Tolerant Recovery Mechanism Under SRLG Constraint in the Next Generation Optical VPN. ECUMN 2004: 386-396 - 2003
- [c4]Su-Hyung Jo, Jeong-Nyeo Kim, Sung Won Sohn:
Design of Policy-Based Security Management for Intrusion Detection. Security and Management 2003: 337-340 - [c3]Bo-Heung Chung, Jeong-Nyeo Kim, Sung Won Sohn:
Improve Network Security with Kernel-Level Intrusion Detection Sensor. Security and Management 2003: 409-414 - [c2]Jae-Deok Lim, Joon-Suk Yu, Jeong-Nyeo Kim:
A study of the method of providing secure network channel among secure OSs. ISICT 2003: 345-350 - 2002
- [c1]Jae-Deok Lim, Joon-Suk Yu, Jeong-Nyeo Kim:
ICFS: Integrated Crypto-FileSystem into Vnode Layer using Access Control. IMSA 2002: 97-101
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-03 20:12 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint