Jaecheol Ryou
Orcid: 0000-0002-2374-995XAffiliations:
- Chungnam National University, Daejeon, South Korea
According to our database1,
Jaecheol Ryou
authored at least 69 papers
between 2002 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on scopus.com
-
on orcid.org
On csauthors.net:
Bibliography
2024
Sensors, January, 2024
Page-Oriented Programming: Subverting Control-Flow Integrity of Commodity Operating System Kernels with Non-Writable Code Pages.
Proceedings of the 33rd USENIX Security Symposium, 2024
2023
Clust. Comput., October, 2023
2021
Smart Contract Data Feed Framework for Privacy-Preserving Oracle System on Blockchain.
Comput., 2021
2020
A Context-aware adaptive algorithm for ambient intelligence DASH at mobile edge computing.
J. Ambient Intell. Humaniz. Comput., 2020
IEEE Access, 2020
User Authentication Method using FIDO based Password Management for Smart Energy Environment.
Proceedings of the 20th International Conference on Data Mining Workshops, 2020
Proceedings of the 22nd International Conference on Advanced Communication Technology, 2020
Poisoning Attack on Show and Tell Model and Defense Using Autoencoder in Electric Factory.
Proceedings of the 2020 IEEE International Conference on Big Data and Smart Computing, 2020
2018
Utilizing a lightweight PKI mechanism to guarantee a secure service in a cloud environment.
J. Supercomput., 2018
Design and implementation of user-level dynamic binary instrumentation on ARM architecture.
J. Supercomput., 2018
Proceedings of the 2018 IEEE International Conference on Big Data and Smart Computing, 2018
2017
Design and implementation of lightweight network access control technique on wireless router.
Int. J. Serv. Technol. Manag., 2017
Method to Modify the Hex of Android Manifest File in Android Apps for Dynamic Analysis.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2017
2016
Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication, 2016
Proceedings of the 2016 International Conference on Information Networking, 2016
2015
Multim. Tools Appl., 2015
DWroidDump: Executable Code Extraction from Android Applications for Malware Analysis.
Int. J. Distributed Sens. Networks, 2015
Ownership-guaranteed security framework for the private data in the entrusted management environment.
Clust. Comput., 2015
Proceedings of the Seventh International Conference on Ubiquitous and Future Networks, 2015
Prediction model to computing resources using simulation parameter and data in the web-based computational simulation environment.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2015
Proceedings of the 2015 International Conference on Information Networking, 2015
2014
J. Commun. Networks, 2014
IEICE Trans. Commun., 2014
Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, 2014
Proceedings of the Frontier and Innovation in Future Computing and Communications, 2014
Optical Computing for Digital Signal Process in Incoherent Fiber System Using Positive Realization.
Proceedings of the Frontier and Innovation in Future Computing and Communications, 2014
2013
Compact and unified hardware architecture for SHA-1 and SHA-256 of trusted mobile computing.
Pers. Ubiquitous Comput., 2013
Proceedings of the International Conference on Information Science and Applications, 2013
2012
General Middleware Bridge to Support Device Interoperability on Different Middlewares.
J. Inf. Process., 2012
Positive Realization of Continuous Linear Systems with Order Bound.
Proceedings of the ICINCO 2012 - Proceedings of the 9th International Conference on Informatics in Control, Automation and Robotics, Volume 1, Rome, Italy, 28, 2012
2011
KSII Trans. Internet Inf. Syst., 2011
Proceedings of the U- and E-Service, Science and Technology, 2011
Proceedings of the Control and Automation, and Energy System Engineering, 2011
Proceedings of the Computer Networks - 18th Conference, 2011
2010
J. Inf. Process. Syst., 2010
Hierarchical CRGK Supporting a Secure Multicast Communication for a Large Number of Users.
IEICE Trans. Commun., 2010
Proceedings of the MoMM'2010, 2010
2008
Proceedings of the Information Security Applications, 9th International Workshop, 2008
Proceedings of the NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008, 2008
Forensic Data Acquisition from Cell Phones using JTAG Interface.
Proceedings of the 2008 International Conference on Security & Management, 2008
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008
2007
A Real Time Voice Transmission Method for Voice Privacy between CDMA Mobile Network and PSTN.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007
Power Efficient Hardware Architecture of SHA-1 Algorithm for Trusted Mobile Computing.
Proceedings of the Information and Communications Security, 9th International Conference, 2007
Efficient Implementation of the Keyed-Hash Message Authentication Code Based on SHA-1 Algorithm for Mobile Trusted Computing.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007
Proceedings of the Managing Next Generation Networks and Services, 2007
2006
Proceedings of the 64th IEEE Vehicular Technology Conference, 2006
Proceedings of the 14th ACM International Conference on Multimedia, 2006
Proceedings of the Advances in Information and Computer Security, 2006
Proceedings of the Information Security Practice and Experience, 2006
Proceedings of the International Joint Conference on Neural Networks, 2006
2005
Trusted Certificate Validation Scheme for Open LBS Application Based on XML Web Services.
J. Inf. Process. Syst., 2005
Proceedings of the Parallel and Distributed Processing and Applications, 2005
Proceedings of the Seventh IEEE International Symposium on Multimedia (ISM 2005), 2005
End-to-End Digital Rights Management on the Overall Value-Chains of Content Distribution.
Proceedings of the Ninth IASTED International Conference on Internet and Multimedia Systems and Applications (IMSA 2005), 2005
Proceedings of the Information Networking, 2005
2004
IEICE Trans. Inf. Syst., 2004
IEICE Trans. Inf. Syst., 2004
Proceedings of the Information Security Applications, 5th International Workshop, 2004
Proceedings of the Telecommunications and Networking, 2004
Proceedings of the Information Networking, 2004
Proceedings of the Computational Science and Its Applications, 2004
Alerts Correlation System to Enhance the Performance of the Network-Based Intrusion Detection System.
Proceedings of the Grid and Cooperative Computing, 2004
Pre-production Methods of a Response to Certificates with the Common Status - Design and Theoretical Evaluation.
Proceedings of the Public Key Infrastructure, 2004
Proceedings of the Embedded and Ubiquitous Computing, 2004
2003
Proceedings of the Information Networking, 2003
Proceedings of the Web Communication Technologies and Internet-Related Social Issues, 2003
2002
A Study on Digital Content Distribution Model Protecting Rights of Distribution's Subjects Based on Contract.
Proceedings of the IADIS International Conference WWW/Internet 2002, 2002