• 446 Citations
  • 12 h-Index
1994 …2020

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

Filter
Conference contribution
2020

Formal modeling and verification of software-defined networking with multiple controllers

Kang, M. & Choi, J. Y., 2020 Jan 1, Testbeds and Research Infrastructures for the Development of Networks and Communications - 14th EAI International Conference, TridentCom 2019, Proceedings. Gao, H., Li, K., Yang, X. & Yin, Y. (eds.). Springer, p. 81-94 14 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 309 LNICST).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2019

Risk and avoidance strategy for blocking mechanism of SDN-based security service

Byun, M., Lee, Y. & Choi, J. Y., 2019 Apr 29, 21st International Conference on Advanced Communication Technology: ICT for 4th Industrial Revolution!, ICACT 2019 - Proceeding. Institute of Electrical and Electronics Engineers Inc., p. 187-190 4 p. 8701887. (International Conference on Advanced Communication Technology, ICACT; vol. 2019-February).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2017

MemPatrol: Reliable sideline integrity monitoring for high-performance systems

Nam, M. J., Nam, W., Choi, J. Y. & Akritidis, P., 2017, Detection of Intrusions and Malware, and Vulnerability Assessment - 14th International Conference, DIMVA 2017, 2017. Springer Verlag, Vol. 10327 LNCS. p. 48-69 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10327 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2015

Formal modeling and verification for SDN firewall application using pACSR

Kang, M., Choi, J. Y., Kwak, H. H., Kang, I., Shin, M. K. & Yi, J. H., 2015, Electronics, Communications and Networks IV - Proceedings of the 4th International Conference on Electronics, Communications and Networks, CECNet2014. CRC Press/Balkema, p. 155-161 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Verification for NFV-enabled network services

Shin, M. K., Choi, Y., Kwak, H. H., Pack, S., Kang, M. & Choi, J. Y., 2015 Dec 11, International Conference on ICT Convergence 2015: Innovations Toward the IoT, 5G, and Smart Media Era, ICTC 2015. Institute of Electrical and Electronics Engineers Inc., p. 810-815 6 p. 7354672

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Citations (Scopus)
2012

Formal specifications for software-defined networking

Kang, M., Park, J., Shin, J., Nam, K. H., Shin, M. K. & Choi, J. Y., 2012 Oct 26, Proceedings of the 7th International Conference on Future Internet Technologies, CFI'12. 1 p. (Proceedings of the 7th International Conference on Future Internet Technologies, CFI'12).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Process algebraic specification of software defined networks

Kang, M., Park, J., Choi, J. Y., Nam, K. H. & Shin, M. K., 2012 Oct 17, Proceedings - 2012 4th International Conference on Computational Intelligence, Communication Systems and Networks, CICSyN 2012. p. 359-363 5 p. 6274368

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)
2010

A method of measuring the propagation of damage to information communication system

Yoo, D. Y., Yi, W. S., Lee, G. S. & Choi, J. Y., 2010 Sep 17, 2nd International Conference on Software Engineering and Data Mining, SEDM 2010. p. 192-196 5 p. 5542928

Research output: Chapter in Book/Report/Conference proceedingConference contribution

A process algebraic framework for modeling resource demand and supply

Philippou, A., Lee, I., Sokolsky, O. & Choi, J. Y., 2010 Nov 8, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 6246 LNCS. p. 183-197 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6246 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Experiences on requirements analysis of railway signaling systems based on formal methods

Lee, J., Lee, H., Choi, J. Y. & Yoon, Y., 2010, 17th ITS World Congress. Intelligent Transport Systems (ITS)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Modeling autonomous military robots using hybrid system framework

Lee, J., Cha, R., Han, Y., Nam, W., Choi, J. Y., Kim, W. T. & Park, S. M., 2010 Dec 1, 2010 International Conference on Information and Communication Technology Convergence, ICTC 2010. p. 429-430 2 p. 5674805

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Security analysis of smart card based password authentication schemes

Kim, H. S., Seo, S. & Choi, J. Y., 2010 Oct 11, Proceedings - 3rd International Conference on Information Sciences and Interaction Sciences, ICIS 2010. p. 352-356 5 p. 5534807

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)
2009

Automatic consistency checking of use case scenarios

Min, H. & Choi, J. Y., 2009 Dec 1, Proceedings of the 13th IASTED International Conference on Software Engineering and Applications, SEA 2009. p. 166-173 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptanalysis of secure key exchange protocol between STB and Smart card in IPTV broadcasting

Lee, S. H., Park, N. S., Kim, S. K. & Choi, J. Y., 2009 Nov 9, Advances in Information Security and Assurance - Third International Conference and Workshops, ISA 2009, Proceedings. p. 797-803 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5576 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

FMIPv6 based secure binding update authentication in wireless vehicular networks

Lee, S. H., Choi, J. Y. & Park, N. S., 2009 Jan 1, 2009 4th International Symposium on Wireless and Pervasive Computing, ISWPC 2009. IEEE Computer Society, 4800584. (2009 4th International Symposium on Wireless and Pervasive Computing, ISWPC 2009).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2008

A calculus to reduce spatial and temporal complexity for specification and analysis of complex real-time systems

Choi, J., Choi, J. Y., On, J. & Lee, M., 2008 Dec 26, Proceedings - 4th International Conference on Networked Computing and Advanced Information Management, NCM 2008. Vol. 1. p. 8-13 6 p. 4623969

Research output: Chapter in Book/Report/Conference proceedingConference contribution

A lightweight protocol analysis and modification for secure RFID system

Kim, H. S. & Choi, J. Y., 2008 Dec 26, Proceedings - International Conference on Computer Communications and Networks, ICCCN. p. 958-962 5 p. 4674336

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Biometric handshake protocol on telebiometric system mechanism for national infrastructure

Shin, Y. N., Lee, Y. J., Shin, W. & Choi, J. Y., 2008 Sep 15, Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. p. 57-60 4 p. 4511534

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Designing fingerprint-recognition-based access control for electronic medical records systems

Shin, Y., Lee, Y., Shin, W. & Choi, J. Y., 2008 Sep 1, Proceedings - International Conference on Advanced Information Networking and Applications, AINA. p. 106-110 5 p. 4482898

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

Formal verification of cryptographic protocol for secure RFID system

Kim, H. S., Oh, J. H., Kim, J. B., Jeong, Y. O. & Choi, J. Y., 2008 Dec 29, Proceedings - 4th International Conference on Networked Computing and Advanced Information Management, NCM 2008. p. 470-477 8 p. 4624188. (Proceedings - 4th International Conference on Networked Computing and Advanced Information Management, NCM 2008; vol. 2).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Weaknesses analysis and countermeasure of a verifier-based key agreement protocol

Kim, H. S., Seo, S. & Choi, J. Y., 2008 Nov 24, Proceedings - 10th IEEE International Conference on High Performance Computing and Communications, HPCC 2008. p. 1015-1018 4 p. 4637818. (Proceedings - 10th IEEE International Conference on High Performance Computing and Communications, HPCC 2008).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2007

A light-weight security protocol for RFID system

Oh, J. H., Kim, H. S. & Choi, J. Y., 2007 Dec 3, IFIP International Federation for Information Processing. Vol. 245. p. 384-395 12 p. (IFIP International Federation for Information Processing; vol. 245).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

A secure communication protocol for low-cost RFID system

Oh, J. H., Kim, H. S. & Choi, J. Y., 2007 Dec 1, CIT 2007: 7th IEEE International Conference on Computer and Information Technology. p. 949-954 6 p. 4385207

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

Embedded system modeling based on resource-oriented model

Kim, J. H. & Choi, J. Y., 2007 Jun 18, Proceedings - 14th Annual IEEE International Conference and Workshops on the Engineering of Computer-Based Systems, ECBS 2007: Raising Expectations of Computer-Based Systems. p. 203-212 10 p. 4148935. (Proceedings of the International Symposium and Workshop on Engineering of Computer Based Systems).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Formal embedded operating system model based on resource-based design framework

Kim, J. H., Sim, J. H., Kim, C. J. & Choi, J. Y., 2007 Dec 1, Proceedings - International Conference on Quality Software. p. 244-249 6 p. 4385502

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Formal security policy model for a common criteria evaluation

Park, J. & Choi, J. Y., 2007 Jul 3, International Conference on Advanced Communication Technology, ICACT. Vol. 1. p. 277-281 5 p. 4195134

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Performance evaluation model for the face recognition system

Shin, Y., Kim, J., Lee, Y., Shin, W. & Choi, J. Y., 2007 Dec 1, Proceedings of the Frontiers in the Convergence of Bioscience and Information Technologies, FBIT 2007. p. 704-708 5 p. 4524191

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

RFID privacy protection scheme for secure ubiquitous computing

Kim, H. S., Oh, J. H. & Choi, J. Y., 2007 Dec 1, Proceedings of the 1st International Workshop on RFID Technology - Concepts, Applications, Challenges IWRT 2007; In Conjunction with ICEIS 2007. p. 117-124 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Security and privacy analysis of RFID authentication protocol for ubiquitous computing

Kim, H. S. & Choi, J. Y., 2007 Dec 1, Proceedings - International Conference on Computer Communications and Networks, ICCCN. p. 1359-1363 5 p. 4318010

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

The design and verification of RFID authentication protocol for ubiquitous computing

Kim, H. S. & Choi, J. Y., 2007 Dec 1, Proceedings - International Workshop on Database and Expert Systems Applications, DEXA. p. 693-697 5 p. 4312983

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)
2006

A medium access control scheme for providing reliability in wireless ad hoc networks

Lee, S. H. & Choi, J. Y., 2006 Oct 18, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4138 LNCS. p. 341-352 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4138 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Analysis of the RFID security protocol for secure smart home network

Kim, H. S., Oh, J. H. & Choi, J. Y., 2006 Dec 1, Proceedings - 2006 International Conference on Hybrid Information Technology, ICHIT 2006. Vol. 2. p. 356-363 8 p. 4021239

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Citations (Scopus)

Secrecy analysis of purchase transaction in electronic purses

Kim, I. G., Kim, H. S., Lee, J. Y., Kang, I. & Choi, J. Y., 2006 Nov 22, Proceedings - International Conference on Advanced Information Networking and Applications, AINA. Vol. 1. p. 979-984 6 p. 1620313

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Security analysis of RFID authentication for pervasive systems using model checking

Kim, H. S., Oh, J. H. & Choi, J. Y., 2006 Dec 1, Proceedings - 30th Annual International Computer Software and Applications Conference, COMPSAC 2006 - Short Papers/Workshops/Fast Abstracts/Doctoral Symposium. p. 195-202 8 p. 4020167. (Proceedings - International Computer Software and Applications Conference; vol. 2).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Security and privacy analysis of RFID systems using model checking

Kim, H. S., Kim, I. G., Han, K. H. & Choi, J. Y., 2006 Oct 31, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4208 LNCS. p. 495-504 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4208 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

The vulnerabilities analysis and design of the security protocol for RFID system

Kim, H. S., Oh, J. H., Choi, J. Y. & Kim, J. W., 2006 Dec 1, Proceedings - Sixth IEEE International Conference on Computer and Information Technology, CIT 2006. 4019943. (Proceedings - Sixth IEEE International Conference on Computer and Information Technology, CIT 2006).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Verifying software streaming systems

Nam, K. H., Park, J. K., Choi, J. Y., Lee, J. J. & Choi, W., 2006 Nov 17, 8th International Conference Advanced Communication Technology, ICACT 2006 - Proceedings. Vol. 1. p. 367-371 5 p. 1625592

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)
2005

Analysis and modification of ASK mobile security protocol

Kim, I. G., Kim, H. S., Lee, J. Y. & Choi, J. Y., 2005 Dec 1, Proceedings - 2005 Second IEEE International Workshop on Mobile Commerce and Services, WMCS'05. Vol. 2005. p. 79-83 5 p. 1581579

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Analyzing the application of e-Commerce in wireless

Kim, H. S., Kim, I. G. & Choi, J. Y., 2005 Dec 1, Proceedings - 2005 Second IEEE International Workshop on Mobile Commerce and Services, WMCS'05. Vol. 2005. p. 112-120 9 p. 1581583

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Model-based analysis of money accountability in electronic purses

Kim, I. G., Moon, Y. J., Kang, I., Lee, J. Y., Han, K. H. & Choi, J. Y., 2005 Dec 1, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 3828 LNCS. p. 346-355 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3828 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2004

Formal specification and verification of embedded system with shared resources

Bang, K. S., Choi, J. Y. & Jang, S. H., 2004, Proceedings of the International Workshop on Rapid System Prototyping. p. 8-14 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Formal verification of PAP and EAP-MD5 protocols in wireless networks: FDR model checking

Kim, I. G. & Choi, J. Y., 2004 Jul 7, Proceedings - International Conference on Advanced Information Networking and Application (AINA). Barolli, L. (ed.). Vol. 2. p. 264-269 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

17 Citations (Scopus)
2003

SSR: Statechart with shared resources

Jang, S. H., Bang, K. S. & Choi, J. Y., 2003 Dec 1, Proceedings - 2003 IEEE Symposium on Human Centric Computing Languages and Environments, HCC 2003. p. 198-200 3 p. 1260229

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)
2002

Bottleneck analysis of a gigabit network interface card: Formal verification approach

Jin, H. W., Bang, K. S., Yoo, C., Choi, J. Y. & Cha, H. J., 2002 Jan 1, Model Checking Software - 9th International SPIN Workshop, Proceedings. Springer Verlag, p. 170-186 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2318 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)
2000

A framework for embedded real-time system design

Choi, J. Y., Kwak, H. H. & Lee, I., 2000 Dec 1, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 1800 LNCS. p. 738-742 5 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1800 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

GAT(Give-And-Take): A Cooperative cache replacement policy for application-controlled file caching

Kim, G. H., Cho, J. Y., Kang, H. K., Park, M. S. & Choi, J. Y., 2000 Dec 1, Proceedings of the Fifth Joint Conference on Information Sciences, JCIS 2000, Volume 1. Wang, P. P. & Wang, P. P. (eds.). 1 ed. p. 508-511 4 p. (Proceedings of the Joint Conference on Information Sciences; vol. 5, no. 1).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

LMRU: An Efficient Buffer Management Scheme for Large Sequential and Looping Reference Pattern Applications

Cho, J. Y., Kim, G. H., Kang, H. K., Park, M. S. & Choi, J. Y., 2000 Dec 1, Proceedings of the Joint Conference on Information Sciences. Wang, P. P. & Wang, P. P. (eds.). 1 ed. Vol. 5. p. 504-507 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1999

Formal verification of RACE protocol using SSM

Kim, H., Choi, J. Y., Ki, A. & Han, W. J., 1999 Jan 1, IEEE Region 10 Annual International Conference, Proceedings/TENCON. Institute of Electrical and Electronics Engineers Inc., Vol. 2. p. 1083-1086 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)
1998

Symbolic schedulability analysis of real-time systems

Kwak, H. H., Lee, I., Philippou, A., Choi, J. Y. & Sokolsky, O., 1998 Dec 1, Proceedings - Real-Time Systems Symposium. Anon (ed.). Piscataway, NJ, United States: IEEE, p. 409-418 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

16 Citations (Scopus)
1997

Specification and verification of real-time systems using ACSR-VP

Lim, S. M. & Choi, J. Y., 1997 Dec 1, Proceedings of the International Workshop on Real-Time Computing Systems and Applications/RTCSA. Anon (ed.). Piscataway, NJ, United States: IEEE, p. 135-142 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)