Heeyoul Kim

Orcid: 0000-0001-6341-580X

According to our database1, Heeyoul Kim authored at least 36 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Decentralized commit-reveal scheme to defend against front-running attacks on Decentralized EXchanges.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2024

Novel Design of Blockchain based IIoT Framework for Smart Factory.
Proceedings of the 26th International Conference on Advanced Communications Technology, 2024

2023
Anomaly VAE-Transformer: A Deep Learning Approach for Anomaly Detection in Decentralized Finance.
IEEE Access, 2023

Surveillance System for Real-Time High-Precision Recognition of Criminal Faces From Wild Videos.
IEEE Access, 2023

Analysis of Olympus DAO: a popular DeFi model.
Proceedings of the 25th International Conference on Advanced Communication Technology, 2023

2020
Blockchain based Removable Storage Device Log Management System.
Proceedings of the 22nd International Conference on Advanced Communication Technology, 2020

Hybrid Blockchain-based Unification ID in Smart Environment.
Proceedings of the 22nd International Conference on Advanced Communication Technology, 2020

2019
A Probabilistic Test based Detection Scheme against Automated Attacks on Android In-app Billing Service.
KSII Trans. Internet Inf. Syst., 2019

Blockchain-based secure firmware management system in IoT environment.
Proceedings of the 21st International Conference on Advanced Communication Technology, 2019

Analysis of Bitcoin Exchange Using Relationship of Transactions and Addresses.
Proceedings of the 21st International Conference on Advanced Communication Technology, 2019

2018
A Survey of the Transmission-Power-Control Schemes in Wireless Body-Sensor Networks.
KSII Trans. Internet Inf. Syst., 2018

Estimating Resident Registration Numbers of Individuals in Korea: Revisited.
KSII Trans. Internet Inf. Syst., 2018

Efficient machine learning over encrypted data with non-interactive communication.
Comput. Stand. Interfaces, 2018

2012
A New Group Key Rekeying with Homomorphic Encryption.
Proceedings of the Computer Applications for Communication, Networking, and Digital Contents, 2012

2011
Secure Group Communication with Dynamic Membership Change in Ad Hoc Networks.
KSII Trans. Internet Inf. Syst., 2011

Sensor Node Localization by Three Mobile Anchors in the Wireless Sensor Networks.
IEICE Trans. Inf. Syst., 2011

2010
A robust and flexible digital rights management system for home networks.
J. Syst. Softw., 2010

2009
A new data hiding scheme for binary image authentication with small image distortion.
Inf. Sci., 2009

Improved batch exponentiation.
Inf. Process. Lett., 2009

2008
An efficient delegation protocol with delegation traceability in the X.509 proxy certificate environment for computational grids.
Inf. Sci., 2008

An attribute aggregation architecture with trust-based evaluation for access control.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, 2008

2007
A practical approach of ID-based cryptosystem in ad hoc networks.
Wirel. Commun. Mob. Comput., 2007

Parallelized Scalar Multiplication on Elliptic Curves Defined over Optimal Extension Field.
Int. J. Netw. Secur., 2007

A New Binary Image Authentication Scheme with Small Distortion and Low False Negative Rates.
IEICE Trans. Commun., 2007

Reactive Key Management Scheme for Access Control in Group Communications.
IEICE Trans. Commun., 2007

Weakness of the Synchro-Difference LKH Scheme for Secure Multicast.
IEEE Commun. Lett., 2007

2006
Expansion of Sliding Window Method for Finding Shorter Addition/Subtraction-Chains.
Int. J. Netw. Secur., 2006

Active Trial-and-error Attack on SASC Protocols.
Int. J. Netw. Secur., 2006

Rogue Public Key Registration Attack and the Importance of 'Proof of Possession' in the PKI Environment.
IEICE Trans. Inf. Syst., 2006

Real-time analysis of intrusion detection alerts via correlation.
Comput. Secur., 2006

Hardware Stack Design: Towards an Effective Defence Against Frame Pointer Overwrite Attacks.
Proceedings of the Advances in Information and Computer Security, 2006

A New Proxy Signature Scheme Providing Self-delegation.
Proceedings of the Information Security and Cryptology - ICISC 2006, 9th International Conference, Busan, Korea, November 30, 2006

Digital Rights Management with Right Delegation for Home Networks.
Proceedings of the Information Security and Cryptology - ICISC 2006, 9th International Conference, Busan, Korea, November 30, 2006

2005
Secure Group Communication with Multiplicative One-way Functions.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

2004
Tamper Resistant Software by Integrity-Based Encryption.
Proceedings of the Parallel and Distributed Computing: Applications and Technologies, 2004

Secure Group Communication with Low Communication Complexity.
Proceedings of the Parallel and Distributed Computing: Applications and Technologies, 2004


  Loading...