Jeong-Nyeo Kim

Orcid: 0000-0002-7134-0622

According to our database1, Jeong-Nyeo Kim authored at least 61 papers between 2002 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Entropy Sharing in Ransomware: Bypassing Entropy-Based Detection of Cryptographic Operations.
Sensors, March, 2024

Balanced Encoding of Near-Zero Correlation for an AES Implementation.
IEEE Trans. Inf. Forensics Secur., 2024

2022
An IoT Device-trusted Remote Attestation Framework.
Proceedings of the 24th International Conference on Advanced Communication Technology, 2022

2021
A Malware Distribution Simulator for the Verification of Network Threat Prevention Tools.
Sensors, 2021

2020
TwinPeaks: An approach for certificateless public key distribution for the internet and internet of things.
Comput. Networks, 2020

An SGX-Based Key Management Framework for Data Centric Networking.
IEEE Access, 2020

Proposal of Smart Segmentation Framework for preventing threats from spreading in IoT.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2020

Hierarchical Access Control for SDP-IoT.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2020

2019
A Security Protocol for Route Optimization in DMM-Based Smart Home IoT Networks.
IEEE Access, 2019

2018
Secure mobile device structure for trust IoT.
J. Supercomput., 2018

Anti-reversible dynamic tamper detection scheme using distributed image steganography for IoT applications.
J. Supercomput., 2018

Self-enforcing Game Theory-based Resource Allocation for LoRaWAN Assisted Public Safety Communications.
CoRR, 2018

Implementation of TLS and DTLS on Zephyr OS for IoT Devices.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2018

An Energy Efficient Real-Time MAC Protocol.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2018

RIPPLE: Adaptive fine-grained access control in multi-hop LLNs.
Proceedings of the 2018 International Conference on Information Networking, 2018

2017
Analysis of eavesdropping attack in mmWave-based WPANs with directional antennas.
Wirel. Networks, 2017

SACA: Self-Aware Communication Architecture for IoT Using Mobile Fog Servers.
Mob. Inf. Syst., 2017

Detection of metamorphic malicious mobile code on android-based smartphones.
Int. J. Adv. Media Commun., 2017

Remote security management server for IoT devices.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2017

2016
SecureDom: secure mobile-sensitive information protection with domain separation.
J. Supercomput., 2016

Adaptive authentication scheme for mobile devices in proxy MIPv6 networks.
IET Commun., 2016

Secure user authentication based on the trusted platform for mobile devices.
EURASIP J. Wirel. Commun. Netw., 2016

A Scheme for Controlling Functionality of Mobile Device Using Specialized Codes.
Proceedings of the 2016 IEEE 14th Intl Conf on Dependable, 2016

2015
Implementation of a hardware security chip for mobile devices.
IEEE Trans. Consumer Electron., 2015

Analyzing User Awareness of Privacy Data Leak in Mobile Applications.
Mob. Inf. Syst., 2015

A Secure Storage System for Sensitive Data Protection Based on Mobile Virtualization.
Int. J. Distributed Sens. Networks, 2015

Detection of Rogue Devices in WLAN by Analyzing RF Features and Indoor Location of the Device.
Proceedings of the Information Security Applications - 16th International Workshop, 2015

Mobile security technology for smart devices.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2015

Technology trends of access control in IoT and requirements analysis.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2015

A method based on platform integrity verification for activating a mobile trusted module.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2015

The Secure Urgent Situation Propagation System using the Mobile Security Solution.
Proceedings of the Second International Conference on Computer Science, 2015

2014
Automated and coupled services of advanced smart surveillance systems toward green IT: tracking, retrieval and digital evidence.
J. Supercomput., 2014

Efficient DRM mechanism of scalable contents based on H.264/SVC in convergence environment.
Multim. Tools Appl., 2014

Improving performance of X-rated video classification with the optimized repeated curve-like spectrum feature and the skip-and-analysis processing.
Multim. Tools Appl., 2014

An improved side channel attack using event information of subtraction.
J. Netw. Comput. Appl., 2014

A practical implementation of fuzzy fingerprint vault for smart cards.
J. Intell. Manuf., 2014

Reducing the impact of repackaged app on Android.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2014

Protection method from APP repackaging attack on mobile device with separated domain.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2014

A secure channel establishment method on a hardware security module.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2014

User-defined privilege restriction mechanism for secure execution environments on Android.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2014

Implementation of a video streaming security system for smart device.
Proceedings of the IEEE International Conference on Consumer Electronics, 2014

Smart Network Services Using Ticket Issuance in the TSM (Trusted Software Monitor) System.
Proceedings of the Frontier and Innovation in Future Computing and Communications, 2014

Detection of SMS mobile malware.
Proceedings of the International Conference on Electronics, Information and Communications, 2014

2013
Churn-aware optimal layer scheduling scheme for scalable video distribution in super-peer overlay networks.
J. Supercomput., 2013

Intelligent Reconfigurable Method of Cloud Computing Resources for Multimedia Data Delivery.
Informatica, 2013

DroidVulMon - Android Based Mobile Device Vulnerability Analysis and Monitoring System.
Proceedings of the Seventh International Conference on Next Generation Mobile Apps, 2013

An integrity-based mechanism for accessing keys in a mobile trusted module.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2013

2012
Security architecture for smart devices.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2012

Endpoint Mitigation of DDoS Attacks Based on Dynamic Thresholding.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

2010
Face Image Retrieval Using Sparse Representation Classifier with Gabor-LBP Histogram.
Proceedings of the Information Security Applications - 11th International Workshop, 2010

2008
The home device authentication system construction for pervasive home network.
Proceedings of the 5th Annual International Conference on Mobile and Ubiquitous Systems: Computing, 2008

2007
Implementation of LSM-Based RBAC Module for Embedded System.
Proceedings of the Information Security Applications, 8th International Workshop, 2007

2005
Design and Implementation of a Gigabit Router using Network Processor.
Proceedings of the Ninth IASTED International Conference on Internet and Multimedia Systems and Applications (IMSA 2005), 2005

Design of Packet Filtering on Network Processor.
Proceedings of The 2005 International Conference on Security and Management, 2005

2004
Deterministic Task Scheduling for Embedded Real-Time Operating Systems.
IEICE Trans. Inf. Syst., 2004

Fault/Attack Tolerant Recovery Mechanism Under SRLG Constraint in the Next Generation Optical VPN.
Proceedings of the Universal Multiservice Networks: Third European Conference, 2004

An Efficient Divider Architecture over GF(2<sup>m</sup>) for Elliptic Curve Cryptography.
Proceedings of the International Conference on Embedded Systems and Applications, 2004

2003
A study of the method of providing secure network channel among secure OSs.
Proceedings of the 1st Intenational Symposium on Information and Communication Technologies, 2003

Design of Policy-Based Security Management for Intrusion Detection.
Proceedings of the International Conference on Security and Management, 2003

Improve Network Security with Kernel-Level Intrusion Detection Sensor.
Proceedings of the International Conference on Security and Management, 2003

2002
ICFS: Integrated Crypto-FileSystem into Vnode Layer using Access Control.
Proceedings of the Internet and Multimedia Systems and Applications, 2002


  Loading...