default search action
Yoojae Won
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j14]Chaeho Cho, Manki Baek, Yoojae Won:
Guaranteeing the integrity and reliability of distributed personal information access records. J. Ambient Intell. Humaniz. Comput. 15(2): 1379-1386 (2024) - 2022
- [j13]Youngjun Sung, Yoojae Won:
Implementation of Quality Management System for Wild-Simulated Ginseng Using Blockchain. J. Inf. Process. Syst. 18(2): 173-187 (2022) - [j12]Youngjun Sung, Sunghyun Yu, Yoojae Won:
Blockchain Token-Based Wild-Simulated Ginseng Quality Management Method. Sensors 22(14): 5153 (2022) - 2021
- [j11]Yeon Sang Seong, Chaeho Cho, Young Pyo Jun, Yoojae Won:
Security Improvement of File System Filter Driver in Windows Embedded OS. J. Inf. Process. Syst. 17(4): 834-850 (2021) - [j10]Sunghyun Yu, Cheolmin Yeom, Yoojae Won:
Implementation of Search Engine to Minimize Traffic Using Blockchain-Based Web Usage History Management System. J. Inf. Process. Syst. 17(5): 989-1003 (2021) - 2020
- [j9]Jeonghoon Seo, Chaeho Cho, Yoojae Won:
Enhancing the Reliability of Wi-Fi Network Using Evil Twin AP Detection Method Based on Machine Learning. J. Inf. Process. Syst. 16(3): 541-556 (2020) - [j8]Jinsu Kang, Yoojae Won:
A Study on Variant Malware Detection Techniques Using Static and Dynamic Features. J. Inf. Process. Syst. 16(4): 882-895 (2020) - [j7]Yonggun Kim, Yoojae Won:
A new cost-saving and efficient method for patch management using blockchain. J. Supercomput. 76(7): 5301-5319 (2020)
2010 – 2019
- 2019
- [j6]Jinho Song, Chaeho Cho, Yoojae Won:
Analysis of operating system identification via fingerprinting and machine learning. Comput. Electr. Eng. 78: 1-10 (2019) - [j5]Youngkyung Lee, Jinho Song, Yoojae Won:
Improving personal information detection using OCR feature recognition rate. J. Supercomput. 75(4): 1941-1952 (2019) - 2018
- [j4]Sangmoon Jung, Yoojae Won:
Ransomware detection method based on context-aware entropy analysis. Soft Comput. 22(20): 6731-6740 (2018) - [j3]Jinsu Kang, Jeonghoon Seo, Yoojae Won:
Ephemeral ID Beacon-Based Improved Indoor Positioning System. Symmetry 10(11): 622 (2018) - [j2]Chaeho Cho, Kwang-Sik Chung, Yoojae Won:
Detection of damaged files and measurement of similarity to originals using entropy graph characteristics. J. Supercomput. 74(12): 6719-6728 (2018) - 2017
- [j1]JunHee Kim, Yoojae Won:
Patch Integrity Verification Method Using Dual Electronic Signatures. J. Inf. Process. Syst. 13(6): 1516-1526 (2017) - [c13]Minjae Yoo, Yoojae Won:
Study on Smart Automated Sales System with Blockchain-Based Data Storage and Management. CSA/CUTE 2017: 734-740 - [c12]SangHyong Kim, Yoojae Won:
Frame Rate Control Buffer Management Technique for High-Quality Real-Time Video Conferencing System. CSA/CUTE 2017: 777-783 - [c11]Kangsik Shin, Yoojae Won:
Study on Malicious Code Behavior Detection Using Windows Filter Driver and API Call Sequence. CSA/CUTE 2017: 938-943 - [c10]Jihoon Yoon, Kangsik Shin, Yoojae Won:
Encrypted Network Traffic Analysis Method via Secure Socket Layer Handshake Control. MUE/FutureTech 2017: 61-66 - [c9]Manki Baek, Youngkyung Lee, Yoojae Won:
Property Analysis of SMS Spam Using Text Mining. MUE/FutureTech 2017: 67-73 - [c8]JunHee Kim, MinSeok Sohn, Yoojae Won:
An Automatic Patch Management System with Improved Security. MUE/FutureTech 2017: 74-80 - [c7]Jeongmin An, Sangmoon Jung, Yoojae Won:
Study on Integrity Verification and Compatibility-Conflict Analysis for Safe Patching. MUE/FutureTech 2017: 187-192 - [c6]Jaegeun Oh, Chaeho Cho, Yoojae Won:
Patch Alarm and Collecting System. MUE/FutureTech 2017: 199-204 - 2012
- [e2]Heung Youl Youm, Yoojae Won:
7th ACM Symposium on Information, Compuer and Communications Security, ASIACCS '12, Seoul, Korea, May 2-4, 2012. ACM 2012, ISBN 978-1-4503-1648-4 [contents] - 2010
- [e1]Jin Kwak, Robert H. Deng, Yoojae Won, Guilin Wang:
Information Security, Practice and Experience, 6th International Conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010. Proceedings. Lecture Notes in Computer Science 6047, Springer 2010, ISBN 978-3-642-12826-4 [contents] - [i3]Seokung Yoon, Joongman Kim, Haeryong Park, Hyuncheol Jeong, Yoojae Won:
The SEED Cipher Algorithm and Its Use with the Secure Real-Time Transport Protocol (SRTP). RFC 5669: 1-13 (2010) - [i2]Seokung Yoon, Jongil Jeong, Hwankuk Kim, Hyuncheol Jeong, Yoojae Won:
IANA Registry Update for Support of the SEED Cipher Algorithm in Multimedia Internet KEYing (MIKEY). RFC 5748: 1-5 (2010)
2000 – 2009
- 2009
- [i1]Sang Hwan Park, Haeryong Park, Yoojae Won, Jaeil Lee, Stephen T. Kent:
Traceable Anonymous Certificate. RFC 5636: 1-31 (2009) - 2008
- [c5]Joongman Kim, Seokung Yoon, Hyuncheol Jeong, Yoojae Won:
Implementation and Evaluation of SIP-Based Secure VoIP Communication System. EUC (2) 2008: 356-360 - [c4]Jun Heo, Jong Whoi Shin, Wansuk Lee, Yoojae Won:
Risk Analysis Methodology for New Critical Information Infrastructure. ICSNC 2008: 208-211 - 2007
- [c3]Joongman Kim, Seokung Yoon, Yoojae Won, Jaeil Lee:
VoIP Secure Communication Protocol satisfying Backward Compatibility. ICSNC 2007: 43 - 2006
- [c2]Beomsoo Park, Sungjin Hong, Jaewook Oh, Heejo Lee, Yoojae Won:
One Touch Logon: Replacing Multiple Passwords with Single Fingerprint Recognition. CIT 2006: 163
1990 – 1999
- 1998
- [c1]Yoojae Won, Kyungshik Lim, Seung-Ku Hwang, Kwan-Jong Yoo:
Proxy-based Reliable Multicast Protocol. CATA 1998: 98-101
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:08 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint