Heung Youl Youm

According to our database1, Heung Youl Youm authored at least 14 papers between 1999 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Security Requirements for Fully Automated AI Systems to Exercise and Ensure the Rights of Data Subjects.
Proceedings of the 19th Asia Joint Conference on Information Security, 2024

2023
The quantum internet: A synergy of quantum information technologies and 6G networks.
IET Quantum Commun., December, 2023

A secure firmware and software update model based on blockchains for Internet of Things devices using SBOM.
Proceedings of the 18th Asia Joint Conference on Information Security, 2023

2022
Message from the General Co-Chairs: AsiaJCIS 2022.
Proceedings of the 17th Asia Joint Conference on Information Security, 2022

2020
An Overview of De-Identification Techniques and Their Standardization Directions.
IEICE Trans. Inf. Syst., 2020

2018
Trust Elevation Scheme Based on Entropy-Specific Biometric Authentication Methods for the Financial Sector.
Proceedings of the 13th Asia Joint Conference on Information Security, 2018

2017
An Overview of Security and Privacy Issues for Internet of Things.
IEICE Trans. Inf. Syst., 2017

Standards News.
IEEE Commun. Stand. Mag., 2017

2016
A study on behavior-based mobile malware analysis system against evasion techniques.
Proceedings of the 2016 International Conference on Information Networking, 2016

2015
Secure and Lightweight Authentication Protocol for NFC Tag Based Services.
Proceedings of the 10th Asia Joint Conference on Information Security, 2015

2013
Preventing Abuse of Cookies Stolen by XSS.
Proceedings of the Eighth Asia Joint Conference on Information Security, 2013

2009
Extensible Authentication Protocol Overview and Its Applications.
IEICE Trans. Inf. Syst., 2009

USN Middleware Security Model.
Proceedings of the Information Security Applications, 10th International Workshop, 2009

1999
A New Approach to Efficient Verifiable Secret Sharing for Threshold KCDSA Signature.
Proceedings of the Information Security and Cryptology, 1999


  Loading...