Yoon-Su Jeong
Orcid: 0000-0003-3455-5947
According to our database1,
Yoon-Su Jeong
authored at least 38 papers
between 2006 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
A blockchain-based IoT data management scheme using Bernoulli distribution convergence in the mobile edge computing.
Pers. Ubiquitous Comput., 2023
2022
Secure IIoT Information Reinforcement Model Based on IIoT Information Platform Using Blockchain.
Sensors, 2022
2021
Efficient data management techniques based on hierarchical IoT privacy using block chains in cloud environments.
J. Supercomput., 2021
An efficient management scheme of blockchain-based cloud user information using probabilistic weighting.
J. Supercomput., 2021
Multi-Blockchain-Based IoT Data Processing Techniques to Ensure the Integrity of IoT Data in AIoT Edge Computing Environments.
Sensors, 2021
Hierarchical Multipath Blockchain Based IoT Information Management Techniques for Efficient Distributed Processing of Intelligent IoT Information.
Sensors, 2021
Blockchain Processing Technique Based on Multiple Hash Chains for Minimizing Integrity Errors of IoT Data in Cloud Environments.
Sensors, 2021
Multi-hash chain based multimedia search technology optimized for distributed environments using IoT devices.
Multim. Tools Appl., 2021
2019
Probabilistic Approach Processing Scheme Based on BLAST for Improving Search Speed of Bioinformatics.
Wirel. Pers. Commun., 2019
Clust. Comput., 2019
2018
Hierarchical Management Scheme of Biometric Information Through the Synchronization of Heterogeneous Devices.
Wirel. Pers. Commun., 2018
Fast Fourier transform based efficient data processing technique for big data processing speed enhancement in P2P computing environment.
Peer-to-Peer Netw. Appl., 2018
Clust. Comput., 2018
2017
Wirel. Pers. Commun., 2017
Secure information authentication protocol between patients and medical staff in a hospital environment.
J. Comput. Virol. Hacking Tech., 2017
High-dimensionality priority selection scheme of bioinformatics information using Bernoulli distribution.
Clust. Comput., 2017
2016
An Efficient Authentication Scheme to Protect User Privacy in Seamless Big Data Services.
Wirel. Pers. Commun., 2016
High-dimentional data authentication protocol based on hash chain for Hadoop systems.
Clust. Comput., 2016
2015
A token-based authentication security scheme for Hadoop distributed file system using elliptic curve cryptography.
J. Comput. Virol. Hacking Tech., 2015
2014
Access Control Protocol Based on Privacy Property of Patient in m-Healthcare Emergency.
Wirel. Pers. Commun., 2014
2013
KSII Trans. Internet Inf. Syst., 2013
2011
Design of RSSI Signal Based Transmit-Receiving Device for Preventing from Wasting Electric Power of Transmit in Sensor Network.
Proceedings of the Ubiquitous Computing and Multimedia Applications, 2011
Design of Guaranteeing System of Service Quality through the Verifying Users of Hash Chain.
Proceedings of the Ubiquitous Computing and Multimedia Applications, 2011
Proceedings of the Convergence and Hybrid Information Technology, 2011
2010
IEICE Trans. Commun., 2010
An Authentication Protocol for Mobile IPTV Users Based on an RFID-USB Convergence Technique.
Proceedings of the Communication and Networking, 2010
Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010
2009
Proceedings of the 2009 International Conference on Hybrid Information Technology, 2009
MSMAP: A Study on Robust Multiple Selection Scheme of Mobility Anchor Point in Hierarchical Mobile IPv6 Networks.
Proceedings of the Communication and Networking, 2009
2008
A Key Distribution method for Reducing Storage and Supporting High Level Security in the Large-scale WSN.
J. Digit. Content Technol. its Appl., 2008
Proceedings of the Second International Conference on Future Generation Communication and Networking, 2008
2007
Proceedings of the Ubiquitous Intelligence and Computing, 4th International Conference, 2007
Advanced Efficiency and Stability Combined Weight Based Distributed Clustering Algorithm in MANET.
Proceedings of the Future Generation Communication and Networking, 2007
2006
J. Inf. Process. Syst., 2006
Proceedings of the Computational Science, 2006
Proceedings of the Computational Intelligence and Security, International Conference, 2006
Proceedings of the Computational Intelligence and Security, International Conference, 2006
Proceedings of the Sixth International Conference on Computer and Information Technology (CIT 2006), 2006