Jaecheol Ryou

Orcid: 0000-0002-2374-995X

Affiliations:
  • Chungnam National University, Daejeon, South Korea


According to our database1, Jaecheol Ryou authored at least 69 papers between 2002 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Cloud Digital Forensics: Beyond Tools, Techniques, and Challenges.
Sensors, January, 2024

Page-Oriented Programming: Subverting Control-Flow Integrity of Commodity Operating System Kernels with Non-Writable Code Pages.
Proceedings of the 33rd USENIX Security Symposium, 2024

2023
ARED: automata-based runtime estimation for distributed systems using deep learning.
Clust. Comput., October, 2023

2021
Smart Contract Data Feed Framework for Privacy-Preserving Oracle System on Blockchain.
Comput., 2021

2020
A Context-aware adaptive algorithm for ambient intelligence DASH at mobile edge computing.
J. Ambient Intell. Humaniz. Comput., 2020

Intelligent Application Protection Mechanism for Transportation in V2C Environment.
IEEE Access, 2020

User Authentication Method using FIDO based Password Management for Smart Energy Environment.
Proceedings of the 20th International Conference on Data Mining Workshops, 2020

Evasion Attack in Show and Tell Model.
Proceedings of the 22nd International Conference on Advanced Communication Technology, 2020

Poisoning Attack on Show and Tell Model and Defense Using Autoencoder in Electric Factory.
Proceedings of the 2020 IEEE International Conference on Big Data and Smart Computing, 2020

2018
Utilizing a lightweight PKI mechanism to guarantee a secure service in a cloud environment.
J. Supercomput., 2018

Design and implementation of user-level dynamic binary instrumentation on ARM architecture.
J. Supercomput., 2018

Auto-configurable Security Mechanism for NFV.
KSII Trans. Internet Inf. Syst., 2018

A Study on Utilization of Blockchain for Electricity Trading in Microgrid.
Proceedings of the 2018 IEEE International Conference on Big Data and Smart Computing, 2018

2017
Design and implementation of lightweight network access control technique on wireless router.
Int. J. Serv. Technol. Manag., 2017

Method to Modify the Hex of Android Manifest File in Android Apps for Dynamic Analysis.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2017

2016
HTML and PDF fuzzing methodology in iOS.
Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication, 2016

A distributed mobile cloud computing model for secure big data.
Proceedings of the 2016 International Conference on Information Networking, 2016

2015
A Service-oriented DDoS detection mechanism using pseudo state in a flow router.
Multim. Tools Appl., 2015

DWroidDump: Executable Code Extraction from Android Applications for Malware Analysis.
Int. J. Distributed Sens. Networks, 2015

Ownership-guaranteed security framework for the private data in the entrusted management environment.
Clust. Comput., 2015

StopBankun: Countermeasure of app replacement attack on Android.
Proceedings of the Seventh International Conference on Ubiquitous and Future Networks, 2015

Prediction model to computing resources using simulation parameter and data in the web-based computational simulation environment.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2015

User authentication using mobile phones for mobile payment.
Proceedings of the 2015 International Conference on Information Networking, 2015

2014
ID-based sensor node authentication for multi-layer sensor networks.
J. Commun. Networks, 2014

MAHI: A Multiple Stage Approach for Home Network Interoperability.
IEICE Trans. Commun., 2014

SecureSMS: prevention of SMS interception on Android platform.
Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, 2014

User-Centric Security Service Model for Cloud Storage.
Proceedings of the Frontier and Innovation in Future Computing and Communications, 2014

Optical Computing for Digital Signal Process in Incoherent Fiber System Using Positive Realization.
Proceedings of the Frontier and Innovation in Future Computing and Communications, 2014

2013
Compact and unified hardware architecture for SHA-1 and SHA-256 of trusted mobile computing.
Pers. Ubiquitous Comput., 2013

User-Centric Key Management Scheme for Personal Cloud Storage.
Proceedings of the International Conference on Information Science and Applications, 2013

2012
General Middleware Bridge to Support Device Interoperability on Different Middlewares.
J. Inf. Process., 2012

Positive Realization of Continuous Linear Systems with Order Bound.
Proceedings of the ICINCO 2012 - Proceedings of the 9th International Conference on Informatics in Control, Automation and Robotics, Volume 1, Rome, Italy, 28, 2012

2011
GPU-Accelerated Password Cracking of PDF Files.
KSII Trans. Internet Inf. Syst., 2011

A Categorization and Solution of Metadata Conversion Problem on Research Paper.
Proceedings of the U- and E-Service, Science and Technology, 2011

Communication Entities Discovery in Complex CPS System.
Proceedings of the Control and Automation, and Energy System Engineering, 2011

DDoS Detection Algorithm Using the Bidirectional Session.
Proceedings of the Computer Networks - 18th Conference, 2011

2010
The ISDF Framework: Towards Secure Software Development.
J. Inf. Process. Syst., 2010

Hierarchical CRGK Supporting a Secure Multicast Communication for a Large Number of Users.
IEICE Trans. Commun., 2010

An effective defense mechanism against DoS/DDoS attacks in flow-based routers.
Proceedings of the MoMM'2010, 2010

2008
Compact Implementation of SHA-1 Hash Function for Mobile Trusted Module.
Proceedings of the Information Security Applications, 9th International Workshop, 2008

Retrieval of Illegal and Objectionable Multimedia.
Proceedings of the NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008, 2008

Forensic Data Acquisition from Cell Phones using JTAG Interface.
Proceedings of the 2008 International Conference on Security & Management, 2008

Efficient Hardware Architecture of SHA-256 Algorithm for Trusted Mobile Computing.
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008

2007
A Real Time Voice Transmission Method for Voice Privacy between CDMA Mobile Network and PSTN.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

Power Efficient Hardware Architecture of SHA-1 Algorithm for Trusted Mobile Computing.
Proceedings of the Information and Communications Security, 9th International Conference, 2007

Efficient Implementation of the Keyed-Hash Message Authentication Code Based on SHA-1 Algorithm for Mobile Trusted Computing.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007

What Are Possible Security Threats in Ubiquitous Sensor Network Environment?
Proceedings of the Managing Next Generation Networks and Services, 2007

2006
UMTS-WLAN Interworking Strategies for Reducing Handover Delays.
Proceedings of the 64th IEEE Vehicular Technology Conference, 2006

A trustworthy end-to-end key management scheme for digital rights management.
Proceedings of the 14th ACM International Conference on Multimedia, 2006

Low Power AES Hardware Architecture for Radio Frequency Identification.
Proceedings of the Advances in Information and Computer Security, 2006

A Design and Implementation of Profile Based Web Application Securing Proxy.
Proceedings of the Information Security Practice and Experience, 2006

Building a Packages Delivery Schedule Using Extended Simulated Annealing.
Proceedings of the International Joint Conference on Neural Networks, 2006

2005
Trusted Certificate Validation Scheme for Open LBS Application Based on XML Web Services.
J. Inf. Process. Syst., 2005

Security Frameworks for Open LBS Based on Web Services Security Mechanism.
Proceedings of the Parallel and Distributed Processing and Applications, 2005

Consideration of UMTS-WLAN Seamless Handover.
Proceedings of the Seventh IEEE International Symposium on Multimedia (ISM 2005), 2005

End-to-End Digital Rights Management on the Overall Value-Chains of Content Distribution.
Proceedings of the Ninth IASTED International Conference on Internet and Multimedia Systems and Applications (IMSA 2005), 2005

The Improved Risk Analysis Mechanism in the Practical Risk Analysis System.
Proceedings of the Information Networking, 2005

2004
MPEG-2 Streaming Protection Scheme for Digital Rights Management.
IEICE Trans. Inf. Syst., 2004

Simulation-Based Analysis of DoS Attacks in Wireless Ad Hoc Networks.
IEICE Trans. Inf. Syst., 2004

Vulnerability of a Mobile Payment System Proposed at WISA 2002.
Proceedings of the Information Security Applications, 5th International Workshop, 2004

The VDSL Deployments and Their Associated Crosstalk with xDSL Systems.
Proceedings of the Telecommunications and Networking, 2004

A DRM Framework for Secure Distribution of Mobile Contents.
Proceedings of the Information Networking, 2004

An Integrated XML Security Mechanism for Mobile Grid Application.
Proceedings of the Computational Science and Its Applications, 2004

Alerts Correlation System to Enhance the Performance of the Network-Based Intrusion Detection System.
Proceedings of the Grid and Cooperative Computing, 2004

Pre-production Methods of a Response to Certificates with the Common Status - Design and Theoretical Evaluation.
Proceedings of the Public Key Infrastructure, 2004

Enhancing Privacy of Universal Re-encryption Scheme for RFID Tags.
Proceedings of the Embedded and Ubiquitous Computing, 2004

2003
New Security Paradigm for Application Security Infrastructure.
Proceedings of the Information Networking, 2003

Strong User Authentication in IEEE802.11 Wireless LAN.
Proceedings of the Web Communication Technologies and Internet-Related Social Issues, 2003

2002
A Study on Digital Content Distribution Model Protecting Rights of Distribution's Subjects Based on Contract.
Proceedings of the IADIS International Conference WWW/Internet 2002, 2002


  Loading...