On the effectiveness of pattern lock strength meters: Measuring the strength of real world pattern locks Y Song, G Cho, S Oh, H Kim, JH Huh Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing …, 2015 | 90 | 2015 |
Syspal: System-guided pattern locks for android G Cho, JH Huh, J Cho, S Oh, Y Song, H Kim 2017 IEEE Symposium on security and privacy (SP), 338-356, 2017 | 52 | 2017 |
An empirical study of click fraud in mobile advertising networks G Cho, J Cho, Y Song, H Kim 2015 10th International Conference on Availability, Reliability and Security …, 2015 | 48 | 2015 |
Combating online fraud attacks in mobile-based advertising G Cho, J Cho, Y Song, D Choi, H Kim EURASIP Journal on Information Security 2016, 1-9, 2016 | 34 | 2016 |
A private walk in the clouds: Using end-to-end encryption between cloud applications in a personal domain Y Song, H Kim, A Mohaisen Trust, Privacy, and Security in Digital Business: 11th International …, 2014 | 13 | 2014 |
On the guessability of resident registration numbers in South Korea Y Song, H Kim, JH Huh Information Security and Privacy: 21st Australasian Conference, ACISP 2016 …, 2016 | 4 | 2016 |
The trend of Smart home security technology and policy G Cho, J Kang, JS Cho, Y Song, H Kim Proceedings of the Korea Information Processing Society Conference, 445-448, 2015 | | 2015 |