|
Search the dblp DataBase
Yongsu Park:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- JaeYong Jeong, Yongsu Park, Yookun Cho
Efficient DoS Resistant Multicast Authentication Schemes. [Citation Graph (0, 0)][DBLP] ICCSA (2), 2005, pp:353-362 [Conf]
- Yongsu Park, Yookun Cho
Fair Certified E-mail Protocols with Delivery Deadline Agreement. [Citation Graph (0, 0)][DBLP] ICCSA (1), 2004, pp:978-987 [Conf]
- Yongsu Park, Yookun Cho
The eSAIDA Stream Authentication Scheme. [Citation Graph (0, 0)][DBLP] ICCSA (4), 2004, pp:799-807 [Conf]
- Yongsu Park, Jaeheung Lee, Yookun Cho
Intrusion Detection Using Noisy Training Data. [Citation Graph (0, 0)][DBLP] ICCSA (1), 2004, pp:547-556 [Conf]
- Younho Lee, Heeyoul Kim, Yongsu Park, Hyunsoo Yoon
A New Proxy Signature Scheme Providing Self-delegation. [Citation Graph (0, 0)][DBLP] ICISC, 2006, pp:328-342 [Conf]
- Eul-Gyu Im, Jung-Taek Seo, Dong-Soo Kim, Yong Ho Song, Yongsu Park
Hybrid Modeling for Large-Scale Worm Propagation Simulations. [Citation Graph (0, 0)][DBLP] ISI, 2006, pp:572-577 [Conf]
- Yongsu Park, Yong Ho Song, Eul-Gyu Im
Design of a Reliable Hardware Stack to Defend Against Frame Pointer Overwrite Attacks. [Citation Graph (0, 0)][DBLP] ISI, 2006, pp:731-732 [Conf]
- Yong Ho Song, Jung Min Park, Yongsu Park, Eul-Gyu Im
A New Methodology of Analyzing Security Vulnerability for Network Services. [Citation Graph (0, 0)][DBLP] ISI, 2006, pp:737-738 [Conf]
- Yongsu Park, Younho Lee, Heeyoul Kim, Gil-Joo Lee, Il-Hee Kim
Hardware Stack Design: Towards an Effective Defence Against Frame Pointer Overwrite Attacks. [Citation Graph (0, 0)][DBLP] IWSEC, 2006, pp:268-277 [Conf]
- Yongsu Park, Yookun Cho
An Efficient Pointer Protection Scheme to Defend Buffer Overflow Attacks. [Citation Graph (0, 0)][DBLP] PARA, 2004, pp:1025-1030 [Conf]
- Yongsu Park, Yookun Cho
On Minimizing Distortion in Secure Data-Hiding for Binary Images. [Citation Graph (0, 0)][DBLP] PCM (1), 2004, pp:572-577 [Conf]
- Yongsu Park, Tae-Sun Chung, Yookun Cho
An efficient stream authentication scheme using tree chaining. [Citation Graph (0, 0)][DBLP] Inf. Process. Lett., 2003, v:86, n:1, pp:1-8 [Journal]
- Yongsu Park, Yookun Cho
Efficient One-time Signature Schemes for Stream Authentication. [Citation Graph (0, 0)][DBLP] J. Inf. Sci. Eng., 2006, v:22, n:3, pp:611-624 [Journal]
- Seok-Lae Lee, Yongsu Park, Joo-Seok Song
An Improvement of Park-Chung-Cho's Stream Authentication Scheme by Using Information Dispersal Algorithm. [Citation Graph (0, 0)][DBLP] ISNN (1), 2007, pp:1045-1053 [Conf]
Framework Design and Performance Analysis on Pairwise Key Establishment. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.003secs
|