Sang-Soo Yeo
Sang-Soo Yeo
Mokwon University
Verified email at - Homepage
Cited by
Cited by
Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value
JS Cho, SS Yeo, SK Kim
Computer communications 34 (3), 391-397, 2011
A novel method for SQL injection attack detection based on removing SQL query attribute values
I Lee, S Jeong, S Yeo, J Moon
Mathematical and Computer Modelling 55 (1-2), 58-68, 2012
Robust one-time password authentication scheme using smart card for home network environment
B Vaidya, JH Park, SS Yeo, JJPC Rodrigues
Computer Communications 34 (3), 326-336, 2011
Context-aware middleware for multimedia services in heterogeneous networks
L Zhou, N Xiong, L Shu, A Vasilakos, SS Yeo
IEEE Intelligent Systems 25 (2), 40-47, 2010
Mobile-cloud assisted framework for selective encryption of medical images with steganography for resource-constrained devices
M Sajjad, K Muhammad, SW Baik, S Rho, Z Jan, SS Yeo, I Mehmood
Multimedia Tools and Applications 76, 3519-3536, 2017
Scalable and flexible privacy protection scheme for RFID systems
SS Yeo, SK Kim
European Workshop on Security in Ad-hoc and Sensor Networks, 153-163, 2005
Enhanced yoking proof protocols for RFID tags and tag groups
JS Cho, SS Yeo, S Hwang, SY Rhee, SK Kim
22nd International Conference on Advanced Information Networking and …, 2008
IT Security Strategies for SME’s
JY Park, RJ Robles, CH Hong, SS Yeo, T Kim
International journal of software engineering and its applications 2 (3), 91-98, 2008
Design and implementation of a framework for building distributed smart object systems
F Kawsar, T Nakajima, JH Park, SS Yeo
The Journal of Supercomputing 54, 4-28, 2010
The quality model for e-learning system with multimedia contents: a pairwise comparison approach
HY Jeong, SS Yeo
Multimedia Tools and Applications 73, 887-900, 2014
MARP: Mobile agent for RFID privacy protection
SC Kim, SS Yeo, SK Kim
International Conference on Smart Card Research and Advanced Applications …, 2006
Hybrid tag anti-collision algorithms in RFID systems
JD Shin, SS Yeo, TH Kim, SK Kim
International Conference on Computational Science, 693-700, 2007
Robust and secure routing scheme for wireless multihop network
B Vaidya, SS Yeo, DY Choi, SJ Han
Personal and Ubiquitous Computing 13, 457-469, 2009
Bridging the semantic gap in multimedia emotion/mood recognition for ubiquitous computing environment.
S Rho, SS Yeo
The Journal of Supercomputing 65 (1), 274-286, 2013
A resource management system for fault tolerance in grid computing
HM Lee, DS Park, M Hong, SS Yeo, SK Kim, SH Kim
2009 International Conference on Computational Science and Engineering 2 …, 2009
Vulnerabilities in SCADA and critical infrastructure systems
RJ Robles, MK Choi, ES Cho, SS Kim, GC Park, SS Yeo
International Journal of Future Generation Communication and Networking 1 (1 …, 2008
Analysis and synthesis of spatial parameters using MDCT
S Chen, R Hu, JH Park, N Xiong, SS Yeo
2009 Third International Conference on Multimedia and Ubiquitous Engineering …, 2009
Adaptive multi-channel utilization scheme for coexistence of IEEE802. 15.4 LR-WPAN with other interfering systems
K Hwang, SS Yeo, JH Park
2009 11th IEEE International Conference on High Performance Computing and …, 2009
Application of role-based access control for web environment
RJ Robles, MK Choi, SS Yeo, T Kim
2008 International Symposium on Ubiquitous Multimedia Computing, 171-174, 2008
Ubiquitous information technologies and applications
YH Han, DS Park, W Jia, SS Yeo
Lecture Notes in Electrical Engineering 214, 2013
The system can't perform the operation now. Try again later.
Articles 1–20