Method and system for performing distributed verification with respect to measurement data in sensor network EA Kim, JH Yi, A Fomin, A Afanasyeva, S Bezzateev US Patent 8,255,689, 2012 | 229 | 2012 |
On the utility of distributed cryptography in P2P and MANETs: the case of membership control M Narasimha, G Tsudik, JH Yi 11th IEEE International Conference on Network Protocols, 2003. Proceedings …, 2003 | 173 | 2003 |
Admission control in peer-to-peer: design and performance evaluation N Saxena, G Tsudik, JH Yi Proceedings of the 1st ACM workshop on Security of ad hoc and sensor …, 2003 | 120 | 2003 |
Repackaging attack on android banking applications and its countermeasures JH Jung, JY Kim, HC Lee, JH Yi Wireless Personal Communications 73, 1421-1437, 2013 | 118 | 2013 |
Identity-based access control for ad hoc groups N Saxena, G Tsudik, JH Yi Information Security and Cryptology–ICISC 2004: 7th International Conference …, 2005 | 81 | 2005 |
MAPAS: a practical deep learning-based android malware detection system J Kim, Y Ban, E Ko, H Cho, JH Yi International Journal of Information Security 21 (4), 725-738, 2022 | 79 | 2022 |
Efficient node admission for short-lived mobile ad hoc networks N Saxena, G Tsudik, JH Yi 13TH IEEE International Conference on Network Protocols (ICNP'05), 10 pp.-278, 2005 | 79 | 2005 |
Threshold cryptography in P2P and MANETs: The case of access control N Saxena, G Tsudik, JH Yi Computer Networks 51 (12), 3632-3649, 2007 | 76 | 2007 |
Fast batch verification of multiple signatures JH Cheon, JH Yi Public Key Cryptography–PKC 2007: 10th International Conference on Practice …, 2007 | 66 | 2007 |
An attack on the proactive RSA signature scheme in the URSA ad hoc network access control protocol S Jarecki, N Saxena, JH Yi Proceedings of the 2nd ACM Workshop on Security of ad hoc and Sensor …, 2004 | 64 | 2004 |
Efficient node admission and certificateless secure communication in short-lived MANETs N Saxena, G Tsudik, JH Yi IEEE Transactions on Parallel and Distributed Systems 20 (2), 158-170, 2008 | 52 | 2008 |
Server‐based code obfuscation scheme for APK tamper detection Y Piao, JH Jung, JH Yi Security and Communication Networks 9 (6), 457-467, 2016 | 43 | 2016 |
Security assessment of code obfuscation based on dynamic monitoring in android things T Cho, H Kim, JH Yi Ieee Access 5, 6361-6371, 2017 | 41 | 2017 |
Method of sharing a session key between wireless communication terminals using a variable-length authentication code JH Yi, GI Ma, HC Lee US Patent 9,078,126, 2015 | 38 | 2015 |
Method and apparatus for authenticating password of user terminal JH Yi, GI Ma, HY Yi, SW Kim US Patent 9,038,166, 2015 | 36 | 2015 |
Self-configurable key pre-distribution in mobile ad hoc networks C Castelluccia, N Saxena, JH Yi NETWORKING 2005. Networking Technologies, Services, and Protocols …, 2005 | 35 | 2005 |
Access control in ad hoc groups N Saxena, G Tsudik, JH Yi 2004 International Workshop on Hot Topics in Peer-to-Peer Systems, 2-7, 2004 | 34 | 2004 |
Smartphone remote lock and wipe system with integrity checking of SMS notification K Park, GI Ma, JH Yi, Y Cho, S Cho, S Park 2011 IEEE International Conference on Consumer Electronics (ICCE), 263-264, 2011 | 33 | 2011 |
Method and node for generating distributed Rivest Shamir Adleman signature in ad-hoc network JH Yi, E Kim, A Afanaseva, A Fomin, S Bezzateev US Patent 8,645,698, 2014 | 32 | 2014 |
Anti-debugging scheme for protecting mobile apps on android platform H Cho, J Lim, H Kim, JH Yi the Journal of Supercomputing 72, 232-246, 2016 | 30 | 2016 |