default search action
Jaecheol Ryou 0001
Person information
- affiliation: Chungnam National University, Daejeon, South Korea
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j23]Annas Wasim Malik, David Samuel Bhatti, Tae-Jin Park, Hafiz Usama Ishtiaq, Jae-Cheol Ryou, Ki-Il Kim:
Cloud Digital Forensics: Beyond Tools, Techniques, and Challenges. Sensors 24(2): 433 (2024) - [c48]Seunghun Han, Seong-Joong Kim, Wook Shin, Byung Joon Kim, Jae-Cheol Ryou:
Page-Oriented Programming: Subverting Control-Flow Integrity of Commodity Operating System Kernels with Non-Writable Code Pages. USENIX Security Symposium 2024 - 2023
- [j22]Hyunjoon Cheon, Jinseung Ryu, Jaecheol Ryou, Chan Yeol Park, Yo-Sub Han:
ARED: automata-based runtime estimation for distributed systems using deep learning. Clust. Comput. 26(5): 2629-2641 (2023) - 2021
- [j21]Junhoo Park, Hyekjin Kim, GeunYoung Kim, Jaecheol Ryou:
Smart Contract Data Feed Framework for Privacy-Preserving Oracle System on Blockchain. Comput. 10(1): 7 (2021) - 2020
- [j20]Hyunjin Kim, Sang Hong, Jinsul Kim, Jaecheol Ryou:
Intelligent Application Protection Mechanism for Transportation in V2C Environment. IEEE Access 8: 86777-86787 (2020) - [j19]Jinsul Kim, Yonggwan Won, Changwoo Yoon, Jin-Young Kim, Sangho Park, JaeCheol Ryou, Linh Van Ma:
A Context-aware adaptive algorithm for ambient intelligence DASH at mobile edge computing. J. Ambient Intell. Humaniz. Comput. 11(4): 1377-1385 (2020) - [c47]Dongseop Lee, Hyunjin Kim, Jaecheol Ryou:
Poisoning Attack on Show and Tell Model and Defense Using Autoencoder in Electric Factory. BigComp 2020: 538-541 - [c46]Dongseop Lee, Hyunjin Kim, Jaecheol Ryou:
Evasion Attack in Show and Tell Model. ICACT 2020: 181-184 - [c45]Hyunjin Kim, Dongseop Lee, Jaecheol Ryou:
User Authentication Method using FIDO based Password Management for Smart Energy Environment. ICDM (Workshops) 2020: 707-710
2010 – 2019
- 2018
- [j18]Hyunjin Kim, PyungKoo Park, JaeCheol Ryou:
Auto-configurable Security Mechanism for NFV. KSII Trans. Internet Inf. Syst. 12(2): 786-799 (2018) - [j17]Dongwoo Kim, Sangwho Kim, Jaecheol Ryou:
Design and implementation of user-level dynamic binary instrumentation on ARM architecture. J. Supercomput. 74(8): 3583-3595 (2018) - [j16]Sangho Park, Hyunjin Kim, JaeCheol Ryou:
Utilizing a lightweight PKI mechanism to guarantee a secure service in a cloud environment. J. Supercomput. 74(12): 6988-7002 (2018) - [c44]GeunYoung Kim, Junhoo Park, Jaecheol Ryou:
A Study on Utilization of Blockchain for Electricity Trading in Microgrid. BigComp 2018: 743-746 - 2017
- [j15]Hyeji Heo, Jaecheol Ryou:
Design and implementation of lightweight network access control technique on wireless router. Int. J. Serv. Technol. Manag. 23(1/2): 101-116 (2017) - [c43]Suhyoo Lee, Junhoo Park, Jaecheol Ryou:
Method to Modify the Hex of Android Manifest File in Android Apps for Dynamic Analysis. CSA/CUTE 2017: 784-789 - 2016
- [c42]Soonhwa Sung, Cheong Youn, Eunbae Kong, Jaecheol Ryou:
A distributed mobile cloud computing model for secure big data. ICOIN 2016: 312-316 - [c41]Je-Gyeong Jo, Jae-Cheol Ryou:
HTML and PDF fuzzing methodology in iOS. IMCOM 2016: 8:1-8:5 - 2015
- [j14]SeongMin Yoo, Jinsul Kim, Jaehyung Park, Jiseung Nam, JaeCheol Ryou:
Ownership-guaranteed security framework for the private data in the entrusted management environment. Clust. Comput. 18(3): 1251-1261 (2015) - [j13]Dongwoo Kim, Jin Kwak, Jae-Cheol Ryou:
DWroidDump: Executable Code Extraction from Android Applications for Malware Analysis. Int. J. Distributed Sens. Networks 11: 379682:1-379682:9 (2015) - [j12]PyungKoo Park, SeongMin Yoo, HoYong Ryu, Jaehyung Park, Cheol Hong Kim, Su-il Choi, JaeCheol Ryou:
A Service-oriented DDoS detection mechanism using pseudo state in a flow router. Multim. Tools Appl. 74(16): 6341-6363 (2015) - [c40]Soonhwa Sung, Cheong Youn, Eunbae Kong, Jaecheol Ryou:
User authentication using mobile phones for mobile payment. ICOIN 2015: 51-56 - [c39]Jinseung Yu, Jae-Cheol Ryou:
Prediction model to computing resources using simulation parameter and data in the web-based computational simulation environment. ICTC 2015: 930-932 - [c38]Dongwoo Kim, Chankyu Park, Jaecheol Ryou:
StopBankun: Countermeasure of app replacement attack on Android. ICUFN 2015: 603-605 - 2014
- [j11]Hark-Jin Lee, Eun-Seo Lee, Kwangil Lee, Jun-Hee Park, Jae-Cheol Ryou:
MAHI: A Multiple Stage Approach for Home Network Interoperability. IEICE Trans. Commun. 97-B(12): 2689-2697 (2014) - [j10]Soonhwa Sung, Jaecheol Ryou:
ID-based sensor node authentication for multi-layer sensor networks. J. Commun. Networks 16(4): 363-370 (2014) - [c37]Kyungsup Kim, Jaecheol Ryou, Woo-Tak Jung:
Optical Computing for Digital Signal Process in Incoherent Fiber System Using Positive Realization. FCC 2014: 95-102 - [c36]SeongMin Yoo, PyungKoo Park, JinSeop Shin, HoYong Ryu, JaeCheol Ryou:
User-Centric Security Service Model for Cloud Storage. FCC 2014: 373-382 - [c35]Dongwoo Kim, Jaecheol Ryou:
SecureSMS: prevention of SMS interception on Android platform. ICUIMC 2014: 32:1-32:6 - 2013
- [j9]Mooseop Kim, Deok-Gyu Lee, Jaecheol Ryou:
Compact and unified hardware architecture for SHA-1 and SHA-256 of trusted mobile computing. Pers. Ubiquitous Comput. 17(5): 921-932 (2013) - [c34]PyungKoo Park, SeongMin Yoo, HoYong Ryu, Cheol Hong Kim, Su-il Choi, JaeCheol Ryou, Jaehyung Park:
Service-Oriented DDoS Detection Mechanism Using Pseudo State in a Flow Router. ICISA 2013: 1-4 - [c33]SeongMin Yoo, PyungKoo Park, JinSeop Shin, JinSeok Oh, HoYong Ryu, JaeCheol Ryou:
User-Centric Key Management Scheme for Personal Cloud Storage. ICISA 2013: 1-4 - 2012
- [j8]Hark-Jin Lee, Young-Sung Son, Jun-Hee Park, Kyeong-Deok Moon, Jae-Cheol Ryou:
General Middleware Bridge to Support Device Interoperability on Different Middlewares. Inf. Media Technol. 7(3): 1238-1243 (2012) - [j7]Hark-Jin Lee, Young-Sung Son, Jun-Hee Park, Kyeong-Deok Moon, Jae-Cheol Ryou:
General Middleware Bridge to Support Device Interoperability on Different Middlewares. J. Inf. Process. 20(3): 525-530 (2012) - [c32]Kyungsup Kim, Jaecheol Ryou:
Positive Realization of Continuous Linear Systems with Order Bound. ICINCO (1) 2012: 566-569 - 2011
- [j6]Keonwoo Kim, Sang Su Lee, Dowon Hong, Jae-Cheol Ryou:
GPU-Accelerated Password Cracking of PDF Files. KSII Trans. Internet Inf. Syst. 5(11): 2235-2253 (2011) - [c31]HeeKyoung Yi, PyungKoo Park, Seungwook Min, JaeCheol Ryou:
DDoS Detection Algorithm Using the Bidirectional Session. CN 2011: 191-203 - [c30]SooHyung Lee, JaeHyuk Kim, Wontae Kim, JaeCheol Ryou:
Communication Entities Discovery in Complex CPS System. FGIT-CA/CES3 2011: 213-219 - [c29]Minho Lee, Hwa-Mook Yoon, Won-Kyung Sung, Jae-Cheol Ryou:
A Categorization and Solution of Metadata Conversion Problem on Research Paper. FGIT-UNESST 2011: 230-232 - 2010
- [j5]Jihyun Park, Jeongsu Lee, Jeonghyun Kim, Jaecheol Ryou:
Hierarchical CRGK Supporting a Secure Multicast Communication for a Large Number of Users. IEICE Trans. Commun. 93-B(4): 862-870 (2010) - [j4]Cheol-Soon Park, Jae-Cheol Ryou, Yong-Tae Park:
The ISDF Framework: Towards Secure Software Development. J. Inf. Process. Syst. 6(1): 107-120 (2010) - [c28]PyungKoo Park, HeeKyoung Yi, Sangjin Hong, Jaecheol Ryou:
An effective defense mechanism against DoS/DDoS attacks in flow-based routers. MoMM 2010: 442-446
2000 – 2009
- 2008
- [c27]Mooseop Kim, Jaecheol Ryou, Sungik Jun:
Efficient Hardware Architecture of SHA-256 Algorithm for Trusted Mobile Computing. Inscrypt 2008: 240-252 - [c26]Keonwoo Kim, Dowon Hong, Jae-Cheol Ryou:
Forensic Data Acquisition from Cell Phones using JTAG Interface. Security and Management 2008: 410-414 - [c25]Byeongcheol Choi, Jungnyeo Kim, Jaecheol Ryou:
Retrieval of Illegal and Objectionable Multimedia. NCM (2) 2008: 645-647 - [c24]Mooseop Kim, Jaecheol Ryou, Sungik Jun:
Compact Implementation of SHA-1 Hash Function for Mobile Trusted Module. WISA 2008: 292-304 - 2007
- [c23]Marie Kim, YoungJun Lee, Jaecheol Ryou:
What Are Possible Security Threats in Ubiquitous Sensor Network Environment? APNOMS 2007: 437-446 - [c22]Mooseop Kim, Youngse Kim, Jaecheol Ryou, Sungik Jun:
Efficient Implementation of the Keyed-Hash Message Authentication Code Based on SHA-1 Algorithm for Mobile Trusted Computing. ATC 2007: 410-419 - [c21]Mooseop Kim, Jaecheol Ryou:
Power Efficient Hardware Architecture of SHA-1 Algorithm for Trusted Mobile Computing. ICICS 2007: 375-385 - [c20]Yong-Seok Park, Jaehwan Ahn, Choon-Soo Kim, Jae-Cheol Ryou:
A Real Time Voice Transmission Method for Voice Privacy between CDMA Mobile Network and PSTN. MUE 2007: 1147-1152 - 2006
- [c19]Tae-Hyoung Kim, Chi-Hwa Song, Won Don Lee, Jae-Cheol Ryou:
Building a Packages Delivery Schedule Using Extended Simulated Annealing. IJCNN 2006: 2691-2695 - [c18]Youngtae Yun, Sangseo Park, Yosik Kim, Jaecheol Ryou:
A Design and Implementation of Profile Based Web Application Securing Proxy. ISPEC 2006: 248-259 - [c17]Mooseop Kim, Jaecheol Ryou, YongJe Choi, Sungik Jun:
Low Power AES Hardware Architecture for Radio Frequency Identification. IWSEC 2006: 353-363 - [c16]Junil Kim, Yeonjeong Jeong, Kisong Yoon, Jaecheol Ryou:
A trustworthy end-to-end key management scheme for digital rights management. ACM Multimedia 2006: 635-638 - [c15]Hyeyeon Kwon, Kwanghyun Ro, Aesoon Park, Jae-Cheol Ryou:
UMTS-WLAN Interworking Strategies for Reducing Handover Delays. VTC Fall 2006: 1-5 - 2005
- [j3]Kiyoung Moon, Namje Park, Kyoil Chung, Sungwon Sohn, Jaecheol Ryou:
Trusted Certificate Validation Scheme for Open LBS Application Based on XML Web Services. J. Inf. Process. Syst. 1(1): 86-95 (2005) - [c14]SangCheol Hwang, Namhoon Lee, Kouichi Sakurai, Joong Gil Park, Jaecheol Ryou:
The Improved Risk Analysis Mechanism in the Practical Risk Analysis System. ICOIN 2005: 835-842 - [c13]Yeonjeong Jeong, Junil Kim, Jihyun Park, Kisong Yoon, Jaecheol Ryou:
End-to-End Digital Rights Management on the Overall Value-Chains of Content Distribution. IMSA 2005: 294-297 - [c12]Hyeyeon Kwon, Kwang-Ryul Jung, Aesoon Park, Jae-Cheol Ryou:
Consideration of UMTS-WLAN Seamless Handover. ISM 2005: 649-656 - [c11]Kiyoung Moon, Namje Park, Kyoil Chung, Sungwon Sohn, Jaecheol Ryou:
Security Frameworks for Open LBS Based on Web Services Security Mechanism. ISPA Workshops 2005: 609-618 - 2004
- [j2]Soonjwa Hong, Seung Hyong Rhee, Jae-Cheol Ryou:
Simulation-Based Analysis of DoS Attacks in Wireless Ad Hoc Networks. IEICE Trans. Inf. Syst. 87-D(10): 2415-2418 (2004) - [j1]Yeonjeong Jeong, Kisong Yoon, Jaecheol Ryou:
MPEG-2 Streaming Protection Scheme for Digital Rights Management. IEICE Trans. Inf. Syst. 87-D(12): 2594-2601 (2004) - [c10]Junichiro Saito, Jae-Cheol Ryou, Kouichi Sakurai:
Enhancing Privacy of Universal Re-encryption Scheme for RFID Tags. EUC 2004: 879-890 - [c9]Satoshi Koga, Jae-Cheol Ryou, Kouichi Sakurai:
Pre-production Methods of a Response to Certificates with the Common Status - Design and Theoretical Evaluation. EuroPKI 2004: 85-97 - [c8]Do-Hoon Lee, Jung-Taek Seo, Jae-Cheol Ryou:
Alerts Correlation System to Enhance the Performance of the Network-Based Intrusion Detection System. GCC 2004: 333-340 - [c7]Kiyoung Moon, Namje Park, Jongsu Jang, Sungwon Sohn, Jaecheol Ryou:
An Integrated XML Security Mechanism for Mobile Grid Application. ICCSA (1) 2004: 776-783 - [c6]Kwon Il Lee, Kouichi Sakurai, Jun Seok Lee, Jae-Cheol Ryou:
A DRM Framework for Secure Distribution of Mobile Contents. ICOIN 2004: 905-914 - [c5]Kyung-Ah Han, Jae-Jin Lee, Jae-Cheol Ryou:
The VDSL Deployments and Their Associated Crosstalk with xDSL Systems. ICT 2004: 1296-1302 - [c4]SangCheol Hwang, Dong Hoon Lee, Daewan Han, Jae-Cheol Ryou:
Vulnerability of a Mobile Payment System Proposed at WISA 2002. WISA 2004: 278-285 - 2003
- [c3]Jong-hu Lee, Jae-Cheol Ryou:
Strong User Authentication in IEEE802.11 Wireless LAN. Human.Society@Internet 2003 2003: 638-643 - [c2]Seunghun Jin, Sangrae Cho, Daeseon Choi, Jae-Cheol Ryou:
New Security Paradigm for Application Security Infrastructure. ICOIN 2003: 793-802 - 2002
- [c1]Junsuk Lee, Jeonghyun Kim, Kisong Yoon, Changsoon Park, Jaecheol Ryou:
A Study on Digital Content Distribution Model Protecting Rights of Distribution's Subjects Based on Contract. ICWI 2002: 112-119
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-02 00:08 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint