The SCEAS System
Navigation Menu

Search the dblp DataBase


Yongsu Park: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. JaeYong Jeong, Yongsu Park, Yookun Cho
    Efficient DoS Resistant Multicast Authentication Schemes. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:353-362 [Conf]
  2. Yongsu Park, Yookun Cho
    Fair Certified E-mail Protocols with Delivery Deadline Agreement. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:978-987 [Conf]
  3. Yongsu Park, Yookun Cho
    The eSAIDA Stream Authentication Scheme. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:799-807 [Conf]
  4. Yongsu Park, Jaeheung Lee, Yookun Cho
    Intrusion Detection Using Noisy Training Data. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:547-556 [Conf]
  5. Younho Lee, Heeyoul Kim, Yongsu Park, Hyunsoo Yoon
    A New Proxy Signature Scheme Providing Self-delegation. [Citation Graph (0, 0)][DBLP]
    ICISC, 2006, pp:328-342 [Conf]
  6. Eul-Gyu Im, Jung-Taek Seo, Dong-Soo Kim, Yong Ho Song, Yongsu Park
    Hybrid Modeling for Large-Scale Worm Propagation Simulations. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:572-577 [Conf]
  7. Yongsu Park, Yong Ho Song, Eul-Gyu Im
    Design of a Reliable Hardware Stack to Defend Against Frame Pointer Overwrite Attacks. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:731-732 [Conf]
  8. Yong Ho Song, Jung Min Park, Yongsu Park, Eul-Gyu Im
    A New Methodology of Analyzing Security Vulnerability for Network Services. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:737-738 [Conf]
  9. Yongsu Park, Younho Lee, Heeyoul Kim, Gil-Joo Lee, Il-Hee Kim
    Hardware Stack Design: Towards an Effective Defence Against Frame Pointer Overwrite Attacks. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2006, pp:268-277 [Conf]
  10. Yongsu Park, Yookun Cho
    An Efficient Pointer Protection Scheme to Defend Buffer Overflow Attacks. [Citation Graph (0, 0)][DBLP]
    PARA, 2004, pp:1025-1030 [Conf]
  11. Yongsu Park, Yookun Cho
    On Minimizing Distortion in Secure Data-Hiding for Binary Images. [Citation Graph (0, 0)][DBLP]
    PCM (1), 2004, pp:572-577 [Conf]
  12. Yongsu Park, Tae-Sun Chung, Yookun Cho
    An efficient stream authentication scheme using tree chaining. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2003, v:86, n:1, pp:1-8 [Journal]
  13. Yongsu Park, Yookun Cho
    Efficient One-time Signature Schemes for Stream Authentication. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 2006, v:22, n:3, pp:611-624 [Journal]
  14. Seok-Lae Lee, Yongsu Park, Joo-Seok Song
    An Improvement of Park-Chung-Cho's Stream Authentication Scheme by Using Information Dispersal Algorithm. [Citation Graph (0, 0)][DBLP]
    ISNN (1), 2007, pp:1045-1053 [Conf]

  15. Framework Design and Performance Analysis on Pairwise Key Establishment. [Citation Graph (, )][DBLP]

Search in 0.014secs, Finished in 0.015secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002