Follow
Jeong Hyun Yi
Jeong Hyun Yi
Soongsil University
Verified email at csec.kr - Homepage
Title
Cited by
Cited by
Year
Method and system for performing distributed verification with respect to measurement data in sensor network
EA Kim, JH Yi, A Fomin, A Afanasyeva, S Bezzateev
US Patent 8,255,689, 2012
2252012
On the utility of distributed cryptography in P2P and MANETs: the case of membership control
M Narasimha, G Tsudik, JH Yi
11th IEEE International Conference on Network Protocols, 2003. Proceedings …, 2003
1712003
Admission control in peer-to-peer: design and performance evaluation
N Saxena, G Tsudik, JH Yi
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor …, 2003
1202003
Repackaging attack on android banking applications and its countermeasures
JH Jung, JY Kim, HC Lee, JH Yi
Wireless Personal Communications 73, 1421-1437, 2013
1192013
Identity-based access control for ad hoc groups
N Saxena, G Tsudik, JH Yi
Information Security and Cryptology–ICISC 2004: 7th International Conference …, 2005
812005
Efficient node admission for short-lived mobile ad hoc networks
N Saxena, G Tsudik, JH Yi
13TH IEEE International Conference on Network Protocols (ICNP'05), 10 pp.-278, 2005
792005
Threshold cryptography in P2P and MANETs: The case of access control
N Saxena, G Tsudik, JH Yi
Computer Networks 51 (12), 3632-3649, 2007
762007
MAPAS: a practical deep learning-based android malware detection system
J Kim, Y Ban, E Ko, H Cho, JH Yi
International Journal of Information Security 21 (4), 725-738, 2022
662022
Fast batch verification of multiple signatures
JH Cheon, JH Yi
Public Key Cryptography–PKC 2007: 10th International Conference on Practice …, 2007
662007
An attack on the proactive RSA signature scheme in the URSA ad hoc network access control protocol
S Jarecki, N Saxena, JH Yi
Proceedings of the 2nd ACM Workshop on Security of ad hoc and Sensor …, 2004
632004
Efficient node admission and certificateless secure communication in short-lived MANETs
N Saxena, G Tsudik, JH Yi
IEEE Transactions on Parallel and Distributed Systems 20 (2), 158-170, 2008
532008
Security assessment of code obfuscation based on dynamic monitoring in android things
T Cho, H Kim, JH Yi
Ieee Access 5, 6361-6371, 2017
412017
Server‐based code obfuscation scheme for APK tamper detection
Y Piao, JH Jung, JH Yi
Security and Communication Networks 9 (6), 457-467, 2016
412016
Method of sharing a session key between wireless communication terminals using a variable-length authentication code
JH Yi, GI Ma, HC Lee
US Patent 9,078,126, 2015
362015
Method and apparatus for authenticating password of user terminal
JH Yi, GI Ma, HY Yi, SW Kim
US Patent 9,038,166, 2015
362015
Self-configurable key pre-distribution in mobile ad hoc networks
C Castelluccia, N Saxena, JH Yi
NETWORKING 2005. Networking Technologies, Services, and Protocols …, 2005
342005
Access control in ad hoc groups
N Saxena, G Tsudik, JH Yi
2004 International Workshop on Hot Topics in Peer-to-Peer Systems, 2-7, 2004
342004
Method and node for generating distributed Rivest Shamir Adleman signature in ad-hoc network
JH Yi, E Kim, A Afanaseva, A Fomin, S Bezzateev
US Patent 8,645,698, 2014
312014
Anti-debugging scheme for protecting mobile apps on android platform
H Cho, J Lim, H Kim, JH Yi
the Journal of Supercomputing 72, 232-246, 2016
292016
Structural and functional analyses of proguard obfuscation tool
Y Piao, J Jung, JH Yi
The Journal of Korean Institute of Communications and Information Sciences …, 2013
292013
The system can't perform the operation now. Try again later.
Articles 1–20