Ilsun YOU (Ph.D.)

IET Fellow/ IEEE Senior Member IFIP WG8.4 member (http://ifip84.sba-research.org/)

Department Chair/ Associate Professor Dept. of Information Security Engineering Soonchunhyang University

646 Eupnae-ri, Sinchang-myeon -si, Chungcheongnam-do, Republic of Korea (31538) Voice: +82-(0)41-530-3099 Fax: +82-(0)41-530-1640 E-mail: isyou at sch.ac.kr or [email protected]

Research Interests

l Security for Mobile Networks l IoT Security l Authentication and Access Control l Formal Security Analysis l Insider Threats and Information Leakage Prevention l Digital Rights Management and Code Protection

Education

l March 2012: Ph.D. Kyushu University, Japan (supported by JSPS-NRF Dissertation Doctor Program) - Ph.D. Thesis: “Design and analysis of mobile internet security protocol by using formal verification methodology” - Advisor: Prof. Kouichi SAKURAI (Kyushu University, Japan) l Feb. 2002: Ph.D. Computer Science, Dankook University, Republic of Korea (GPA: 95.3/100) - Ph.D. Thesis: “An Improved Detection System for the Network Vulnerability Scan Attacks” - Advisor: Prof. Kyungsan CHO (Dankook University, Republic of Korea l Feb. 1997: M.S. Computer Science, Dankook University, Republic of Korea (GPA: 95.6/100) l Feb. 1995: B.S. Computer Science, Dankook University, Republic of Korea (GPA: 4.23/4.5)

Work Experience

l Aug. 2015 ~ : Associate Professor at Soonchunhyang University, Republic of Korea l March 2013 ~ Aug. 2015 : Associate Professor at Korean Bible University, Republic of Korea l March 2008 ~ Feb. 2013: Assistant Professor at Korean Bible University, Republic of Korea l March 2005 ~ Feb. 2008: Full-time Lecturer at Korean Bible University, Republic of Korea l Sept. 2004 ~ Dec. 2004: Senior Researcher at THINmultimedia, Inc., Republic of Korea l April 2000 ~ Sept. 2004: Assistant Researcher at Internet Security Co., Ltd., Republic of Korea l March 1997 ~ April 2000: Assistant Manager at Hanjo Engineering Co., Ltd., Republic of Korea

Research Project

l PI, “An Adaptive Security Protocol for Fast and Secure Handover in 5G HetNet based Distributed IP Mobility Management Environments,” National Research Foundation of Korea (NRF), Nov. 2016 ~ Oct. 2019 (3 years) l PI, “Study on Securing Mobile Xhaul Wireless Link,” Electronics and Telecommunications Research Institute (ETRI), Aug. 1, 2016 ~ Mar. 31, 2017 (8 months) l PI, “Study on a Secure and Effective Route Optimization Protocol between a Mobile Device and a Home IoT Device in Smart Home Environments,” Electronics and Telecommunications Research Institute (ETRI), Sept. 1, 2016 ~ Mar. 31, 2017 (7 months) l PI, “Study on Defending against Bypass Attacks in Mobile Environments,” Electronics and Telecommunications Research Institute (ETRI), Oct. 1, 2015 ~ Jan. 31, 2016 (4 months) l PI, “Study on an Efficient and Secure Binding Update Authentication Scheme for Smart Homes in PMIPv6 Networks,” Industry Academy Cooperation Foundation of Soonchunhyang University, Sept. 1, 2015 ~ Aug. 31, 2016 (1 year) l PI, “Study on security for fast and seamless handover in PMIPv6 with cross-layer approach based on IEEE,” National Research Foundation of Korea (NRF), May 2015 ~ April 2017 (3 years)

Professional Activities

Journal Editor-in-Chief

l Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), Scopus - http://www.jowua.org - ISSN (print): 2093-5374, ISSN (on-line): 2093-5382 l Journal of Internet Services and Information Security (JISIS) - http://www.jisis.org - ISSN (print): 2182-2069, ISSN (on-line): 2182-2077

Journal Editorial Board

l Associate Editor Information Sciences (INS), SCI / 2015 IF = 3.364 - http://www.journals.elsevier.com/information-sciences/ - ISSN: 0020-0255 l Associate Editor Journal of Network and Computer Applications (JNCA), SCIE / 2015 IF: 2.331 - http://www.journals.elsevier.com/journal-of-network-and-computer-applications/ - ISSN: 1084-8045 l Associate Editor IEEE Access, SCIE/2015 IF: 1.270 - http://ieeeaccess.ieee.org/learn-more-about-ieee-access/ - ISSN: 2169-3536 l Associate Editor International Journal of Ad Hoc and Ubiquitous Computing (IJAHUC), SCIE - http://www.inderscience.com/jhome.php?jcode=IJAHUC - ISSN (print): 1743-8233, ISSN (on-line): 1743-8225 l Associate Editor Intelligent Automation & Soft Computing, SCIE / IF: 0.218 - http://www.tandfonline.com/toc/tasj20/current - ISSN: 1079-8587 l Associate Editor COMPUTING AND INFORMATICS (CAI), SCIE - http://www.cai.sk/ojs/ - ISSN (print): 1335-9150 l Editorial Board Member Journal of High Speed Networks (JHSN), Scopus - http://www.iospress.nl/journal/journal-of-high-speed-networks/ - ISSN: 0926-6801

Guest Editor

l Ilsun You, Jin Li, "Special issue on security and privacy techniques in mobile cloud computing," Journal of Ambient Intelligence and Humanized Computing, Vol. 7, Issue 5, pp 607–609, October 2016 l Ilsun You, Gansen Zhao, and Ram Krishnan, "Special Section on Advanced Technologies for Homeland and Cyber Defense," Intelligent Automation & Soft Computing, Vol. 22, No. 3, pp. 343- 344, 2016, http://dx.doi.org/10.1080/10798587.2016.1146504 l Ilsun You, Marek R. Ogiela, and Fang-Yie Leu, “Special Issue on Natural and Secure Computing in Modern Soft Computing Application,” Soft Computing, Vol. 20, Issue 5, pp 1667-1669, May 2016 http://dx.doi.org/ 10.1007/s00500-016-2109-y l Ilsun You, Fang-Yie Leu, "Guest Editorial: Applied Cryptography and Its Practical Applications to Secure Internet Services," Journal of Internet Technology, Vol. 17 No. 2, PP. 263-266, 2016 l Ilsun You, Xianglin Wei, Chunfu Jia “Emerging Security Threats and Defense Technologies in Mobile Computing and Networking,” International Journal of Mobile Computing and Multimedia Communications, Vol. 6, No. 4, pp. iv-vi, October-December 2014 l Ilsun You, Marek R. Ogiela, Isaac Woungang, and Kangbin Yim , “Innovative security technologies against insider threats and data leakage,” International Journal of Computer Mathematics, Vol. 93, No. 2, pp. 236-238, [SCIE] http://dx.doi.org/10.1080/00207160.2015.1044784 l MarekR.Ogiela, Ilsun You, Fang-Yie Leu, and Yu-Chee Tseng, “Secure ubiquitous computing,” Pervasive and Mobile Computing, Vol. 24, pp. 1-3, Dec. 2015 [SCIE, IF: 2.079] http://dx.doi.org/10.1016/j.pmcj.2015.09.005 l Ilsun You, Xianglin Wei, and Chunfu Jia, “Emerging Security Threats and Defense Technologies in Mobile Computing and Networking,” International Journal of Mobile Computing and Multimedia Communications, Vol. 6, No. 4, 2014 [Scopus/EI] l Ilsun You, Marek R. Ogiela, “Innovative Security Technologies against Insider Threats and Data Leakage,” International Journal of Computer Mathematics [SCIE] l Ilsun You, Marek R. Ogiela, Myunggwon Hwang, “Intelligent technologies and applications for big data analytics,” Software - Practice and Experience, Vol. 45, No. 8, pp. 1019-1021, August 2015 http://dx.doi.org/10.1002/spe.2331 l Ilsun You, Francesco PALMIERI, and Leonard BAROLL, “Innovative Mobile Internet Services and Applications,” Mobile Information Systems, Vol. 2015, Article ID 280275, 2 pages, 2015 [SCIE, 2015 IF: 0.872] http://dx.doi.org/10.1155/2015/280275 l Ilsun You, Fang-Yie Leu and Leonard Baroli , “Mobile Internet Technologies and Services,” Computer Systems Science & Engineering, Vol. 29, No. 6, pp. 379- 381, November 2014 (SCIE) l Aniello Castiglione, Marek R. Ogiela, Ilsun You , “Soft Computing for Security Services in Smart and Ubiquitous Environments,” Soft Computing, Vol. 18, Issue 9, September 2014 l Kangbin Yim, Aniello Castiglione, Ilsun You, “Prosperity of IT security technologies in homeland defense,” Journal of Ambient Intelligence and Humanized Computing, Vol. 5, No. 2, pp 205-213, April 2014 (Scopus) l Ilsun You, “SPECIAL SECTION ON ADVANCES IN IT CONVERGENCE TECHNOLOGIES,” Intelligent Automation and Soft Computing, Vol. 20, No. 1, pp. 1~2, 2014 http://dx.doi.org/10.1080/10798587.2014.886816 [SCIE, IF: 0.189 – 2013] l Ilsun You, Karl Andersson, Laurence T. Yang, “Editorial: Special Issue on Mobility and Intelligence Management Technologies for Wireless and Mobile Networks,” Wireless Personal Communications, Volume 76, Issue 4, pp. 657-660, June 2014 at http://dx.doi.org/10.1007/s11277-014-1749-4 l Ilsun You, Marek R. Ogiela, A Min Tjoa and Dongwan Shin, “Advanced Technologies for Homeland Defense and Security,” Journal of Network and Computer Applications, Vol. 38, pp. 1~2, February 2014 (SCIE, 2015 IF: 2.331, Q1, < 10%) l Ilsun You and Edgar Weippl, “Information Security,” Journal of Universal Computer Science, vol. 19, no. 16, pp. 2347-2348, 2013 (SCIE, IF: 0.762) l Marek R. Ogiela, Ilsun You, Fang-Yie Leu, Makoto Takizawa, “Modern cognitive and ubiquitous computing,” Neurocomputing, Vol. 122, pp. 1-2, December 2013 (SCIE, IF: 1.634) l Marek R. Ogiela, Ilsun You, Makoto Takizawa, Fang-Yie Leu, “Special Issue on Advances in mobile, ubiquitous and cognitive computing,” Mathematical and Computer Modeling, Vol. 58, No. 5–6, September 2013 (SCIE, IF: 1.420) l Ilsun You, Marek R. Ogiela, Yuh-Shyan Chen and Qingfeng Huang, “Special Issue on Mobile and internet services in ubiquitous and pervasive computing environments,” Information Sciences, Vol. 230, May 2013 (SCI, IF: 3.364) l Marek R. Ogiela and Ilsun You, “Special Section on Cognitive and Secure computing in Information Management,” International Journal of Information Management , Vol. 33, No. 2, pp. 243-244, April 2013 (SCIE, IF: 1.532) l Carly L. Huth, David W. Chadwick, William Claycomb, and Ilsun You (Corresponding) “Special Section on Security Management and Technologies for Protecting Against Internal Data Leakages,” Information Systems Frontiers, Vol. 15, No. 1, pp. 1-4, March 2013 (SCIE, IF=0.912) l Ilsun You and JinShu Su, “Innovative Internet Technologies and Security,” International Journal of Computer Systems Science & Engineering, Vol. 27, No. 6, pp. 151-152, November 2012 (SCIE, IF=0.371) l Ilsun You, Kangbin Yim, and Leonard Barolli “Special Issue on Advances in Network-based Information Systems,” Mobile Information Systems, Vol. 8, No. 3, pp. 173-175, Sept. 2012 [SCIE, 2015 IF: 0.872] l Ilsun You, Leonard Barolli, and Feilong Tang, “Advances in Ubiquitous Computing, Wireless and Mobile Networking, and Applications,” International Journal of Computer Systems Science & Engineering, Vol. 27, No. 5, pp. 151-152, Sept. 2012 (SCIE, IF=0.371) l Kangbin Yim and Ilsun You (Corresponding), “Guest Editorial: Advances in Homeland Defense Technologies,” Journal of Internet Technology, Vol. 13, No. 4, 2012 (SCIE, 2015 IF = 0.533, Q4) l Ilsun You and Witold Pedrycz, “Special Issue on Advanced intelligent and security services in mobile and ubiquitous computing,” Journal of Intelligent Manufacturing, Vol. 23, No. 4, pp.1257-1258, August 2012 (SCIE, IF = 0.859) l Ilsun You, Gabriele Lenzini, Marek R. Ogiela, and Elisa Bertino, “Special Issue on Defending against insider threats and internal data leakage,” Security and Communication Networks, Vol. 5, No. 8, pp. 831-833, August 2012 (SCIE, IF = 0.414) l Ilsun You, Fang-Yie Leu and Leonard Barolli, “Special Issue on Advanced Technologies and Applications in Ad Hoc and Sensor Wireless Networks,” Ad Hoc & Sensor Wireless Networks, Vol. 15, No. 1, pp. 1-3, 2012 (SCIE, IF=0.309) l Marek R. Ogiela, Ilsun You, Fatos Xhafa, Hoon Ko, “Towards context, cognitive, and secure computing ,” Computers and Mathematics with Applications, Vol. 63, No. 2, pp. 337-338, Jan. 2011 (SCI, IF=2.069-Q1) l Ilsun You, Tei-Wei Kuo, and Fatos Xhafa “Introduction to Special Section on Complex, Intelligent and Software Intensive Systems,” Computing and Informatics, Vol. 30, No. 6, pp. 1061-1065, 2011 (SCIE, IF=0.239) l Ilsun You and Yuh-Shyan Chen, “Advances in Mobile IPv6 and Network-based Localized Mobility Management,” Wireless Personal Communications, Vol. 61, No. 4, pp. 587-589, December 2011 (SCIE, IF=0.458) l Fang-Yie Leu, Ilsun You and Feilong Tang, “Emerging Wireless and Mobile Technologies,” Mobile Information Systems, Vol. 7, No. 3, pp. 165–167, 2011 [SCIE, 2015 IF: 0.872] l Ilsun You, Youn-Hee Han, Yuh-Shyan Chen and Han-Chieh Chao, “Special Issue on Next Generation Mobility Management, Wireless Communications and Mobile Computing,” Vol. 11, No. 4, pp. 443- 445, 2011 (SCIE, IF=0.884) l Ilsun You, “Special Issue on Security and Intelligence in Pervasive Computing Environment,” Journal of Universal Computer Science, Vol. 17, No. 6, pp. 830, 2011 (SCIE. IF=0.669) l Ilsun You, Bonam Kim, Hui-Huang Hsu, and Seong-Moo Yoo, “Special Issue on Forthcoming Multimedia & Intelligent Services in Ubiquitous and Pervasive Computing, Intelligent Automation & Soft Computing,” Vol. 16, No. 4, pp. 491-493, 2010 (SCIE, IF=0.116) l Ilsun You and Takahiro Hara, “Special Issue on Mobile and Wireless Networks,” Mobile Information System, Vol. 6, No. 1, 2010 [SCIE, 2015 IF: 0.872] l Hai Jin, Ilsun You, Minyi Guo, and Deok Gyu Lee, “Special Issue on Interactive Multimedia & Intelligent Services in Mobile and Ubiquitous Computing,” Computing and Informatics, Vol. 27, No. 5, pp. 1001-1005, December 2008 (SCIE, IF=0.239)

Volume Editor

l Ilsun You and Elisa Bertino, Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, MIST 2016, Vienna, Austria, October 24 - 28, 2016, ISBN: 978-1-4503-4571-2 http://dl.acm.org/citation.cfm?id=2995959 l Ilsun You and Elisa Bertino, Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, MIST 2015, Denver, Colorado, USA, October 16, 2015. ACM 2015, ISBN: 978-1-4503-3824-0 http://dx.doi.org/10.1145/2810103.2812622 l Ismail Khalil, Erich Neuhold, A Min Tjoa, Li Da Xu, Ilsun You (Eds.), Third IFIP TC 5/8 International Conference, ICT-EurAsia 2015, and 9th IFIP WG 8.9 Working Conference, CONFENIS 2015, Held as Part of WCC 2015, Daejeon, Korea, October 4–7, 2015, Proceedings, Lecture Notes in Computer Science, Volume 9357, 2015 http://doi.org/10.1007/978-3-319-24315-3 ISBN: 978-3-319-24314-6 (Print) 978-3-319-24315-3 (Online) l Stephanie Teufel, Tjoa A Min, IlsunYou, and Edgar Weippl (Eds.), Availability, Reliability, and Security in Information Systems – Prof. of IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, (CD-ARES 2014) and 4th International Workshop on Security and Cognitive Informatics for Homeland Defense (SeCIHD 2014), Lecture Notes in Computer Science 8708, Springer 2014, http://dx.doi.org/10.1007/978-3-319-10975-6 ISBN 978-3-319-10974-9 l Linawati, Made Sudiana Mahendra, Erich J. Neuhold, A Min Tjoa, Ilsun You (Eds.), Information and Communication Technology - Second IFIP TC5/8 International Conference, ICT-EurAsia 2014, Bali, Indonesia, April 14-17, 2014. Proceedings. Lecture Notes in Computer Science 8407, Springer 2014, ISBN 978-3-642-55031-7 l Leonard Barolli, Ilsun You, Fatos Xhafa, Fang-Yie Leu, Hsing-Chung Chen (Eds.), Proc. of the 7th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2013, IEEE, Taichung, Taiwan, July 3-5, 2013, l Khabib Mustofa, Erich J. Neuhold, A Min Tjoa, Edgar Weippl, and Ilsun You (Eds.), Proc. of Information and Communicatiaon Technology - ICT-EurAsia 2013, Springer LNCS, Vol. 7804, Yogyakarta, Indonesia, March 25-29, 2013, http://dx.doi.org/10.1007/978-3-642-36818-9 l Gerald Quirchmayr, Josef Basl, Ilsun You, Lida Xu, and Edgar Weippl (Eds.), Proc. of Multidisciplinary Research and Practice for Information Systems - IFIP WG 8.4, 8.9/TC 5 International Cross-Domain Conference and Workshop on Availability, Reliability, and Security, CD- ARES 2012, Springer LNCS, Vol. 7465, Prague, Czech Republic, August 2012, http://dx.doi.org/10.1007/978-3-642-32498-7 l Ilsun You, Leonard Barolli, Antonio Gentile, Hae-Duck Joshua Jeong, Marek R. Ogiela, Fatos Xhafa (Eds.), Proc. of the 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012, IEEE, Palermo, Italy, July 4-6, 2012 l A Min Tjoa, Gerald Quirchmayr, Ilsun You, Lida Xu (Eds.), Proc. of Availability, Reliability and Security for Business, Enterprise and Health Information Systems - IFIP WG 8.4/8.9 International Cross Domain Conference and Workshop, ARES 2011, Springer LNCS, Vol. 6908, Vienna, Austria, August 22-26, 2011, http://dx.doi.org/10.1007/978-3-642-23300-5 l Ilsun You, Leonard Barolli, Feilong Tang, Fatos Xhafa (Eds.), Proc. of the 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2011, IEEE, , Korea, June 30-July 02, 2011 l David Chadwick, Ilsun You and Hang Bae Chang (Eds.), Proc. of the 1st International Workshop on Managing Insider Threats (MIST 2009), CEUR-WS Proceedings, Vol. 469, Purdue University, West Lafayette, USA , June 15-19, 2009

Founders or Chairs of Research Events

l Founder of International Workshop on Mobility Management in the Networks of the Future World (MobiWorld) - General Chair: MobiWorld 2016 (in conjunction with INFOCOM 2016), San Francisco, CA USA 10-15 April 2016 - General Chair: MobiWorld 2015 (in conjunction with INFOCOM 2015), Hong Kong, April 27, 2015 - General Chair: MobiWorld 2014 (in conjunction with CCNC 2014), Las Vegas, Nevada, USA, January 10, 2014 - General Chair: MobiWorld 2012 (in conjunction with GLOBECOM 2012), California, USA, December 3, 2012 - General Chair: MobiWorld 2011 (in conjunction with INFOCOM 2011), Shanghai, China, April 10, 2011 - General Chair: MobiWorld 2010 (in conjunction with CCNC 2010), Las Vegas, Nevada, USA, January 9, 2010

l Founder of International Workshop on Managing Insider Security Threats (MIST) - General Chair: MIST 2015 (in conjunction with ACM CCS 2015), USA, October 12-16, 2015 - General Chair: MIST 2014, Seoul, , November 21-22, 2014 - General Chair: MIST 2013, Busan, South Korea, October 24-25, 2013 - General Chair: MIST 2012, Fukuoka, Japan, November 8-9, 2012 - General Chair: MIST 2011 (in conjunction with INCoS 2011), Fukuoka, Japan, December 1-2, 2011 - General Chair: MIST 2010 (in conjunction with IFIPTM 2010), Morioka, Japan, June 14-15, 2010 - General Chair: MIST 2010 (in conjunction with IFIPTM 2009), Purdue Univ., USA, June 16, 2009 l Founder of The Asian Conference on Availability, Reliability and Security - Program Chair Person: AsiaARES 2015 (in conjunction with ICT-EurAsia 2015), Daejeon, Korea, October 4-7, 2015 - Program Chair Person: AsiaARES 2014 (in conjunction with ICT-EurAsia 2014), Bali, Indonesia, April 14-17, 2014 - Program Chair Person: AsiaARES 2013 (in conjunction with ICT-EurAsia 2013), Gadjah Mada University, Indonesia, March 25-29, 2013 l Founder of International Workshop on Security and Cognitive Informatics for Homeland Defense (SeCIHD) - General Chair: SeCIHD 2014 (in conjunction with ARES 2014), University of Fribourg, Switzerland | September 8th - 12th, 2014 - General Chair: SeCIHD 2013 (in conjunction with ARES 2013), University of Regensburg, Germany, September 2-6, 2013 - General Chair: SeCIHD 2012 (in conjunction with ARES 2012), Prague, Czech Republic, August 20-21, 2012 - General Chair: SeCIHD 2011 (in conjunction with ARES 2011), Vienna, Austria, August 22-26, 2011 l Founder of International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS) - General Chair: IMIS 2014 (in conjunction with CISIS 2014), Birmingham, UK, July 2-4, 2014 - General Chair: IMIS 2013 (in conjunction with CISIS 2013), Taichung, Taiwan, July 4-5, 2013 - General Chair: IMIS 2012 (in conjunction with CISIS 2012), Palermo, Italy, July 4-6, 2012 - General Chair: IMIS 2011 (in conjunction with CISIS 2011), Seoul, Korea, June 30-July 2, 2011 - General Chair: IMIS 2010 (in conjunction with CISIS 2010), Krakow, Poland, February 15-18, 2010 - General Chair: IMIS 2009 (in conjunction with CISIS 2009), Fukuoka, Japan, March 16-19, 2009 - General Chair: IMIS 2008 (in conjunction with MUE 2008), Busan, Korea, April 24-26, 2008 - General Chair: IMIS 2007 (in conjunction with MUE 2007), Seoul, Korea, April 26-28, 2007 l Program Co-Chair of 5th International Conference on Broadband, Wireless Computing, Communication and Applications (BWCCA 2010), Nov 4-6, 2010, Fukuoka, Japan l Program Co-Chair of 5th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS 2011), June 30th-July 2nd, 2011 Korean Bible University (KBU), Seoul, Korea l Program Co-Chair of 14th International Conference on Network-Based Information Systems (NBiS 2011), Tirana, Albania, September 7-9, 2011 l Workshop Co-Chair 6th International Conference on Availability, Reliability, and Security (ARES 2011), Vienna, Austria, August 20-24, 2011 l Track Chair the 29th Annual ACM Symposium on Applied Computing (SAC), Track on Service-Oriented Architectures and Programming (ACM SOAP’14), Gyeongju, Korea, March 2014 l Special Issue Chair the 3rd Workshop on Research for Insider Threat (WRIT’14) in conjunction with IEEE S&P 2014, San Jose, CA, USA, May 18, 2014

l PC member the 4th Workshop on Research for Insider Threat (WRIT’16) in conjunction with IEEE S&P 2016, May 26, 2016, Fairmont San Jose Hotel, San Jose, CA USA http://writ2016.compute.dtu.dk/WRIT2016-CFP.pdf

l Honorary Chair The 7th International Symposium on Intelligence Computation and Applications November 21-22, 2015, Guangzhou, China

l Publicity Chair The 14th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC-2016) in Auckland, New Zealand, August 8-12, 2016

Publications

Journal Papers

1. Yesol Kim, Seong-je Cho, Sangchul Han, and Ilsun You, “A software classification scheme using binary-level characteristics for efficient software filtering,” online published to Soft Computing (SCIE, 2015 IF: 1.630, Q2) http://dx.doi.org/10.1007/s00500-016-2357-x 2. Vishal Sharma, Ilsun You (Corresponding Author), Rajesh Kumar, Varun Chauhan , “CFRP: Optimized Fruit Fly Based Congestion Free Routing Protocol For UAVs Guided Ad Hoc Networks,” finally accepted to International Journal of Ad Hoc and Ubiquitous Computing (SCIE, 2015 IF: 0.489, Q3) 3. Ilsun You and Fang-Yi Leu, “Comments on “SPAM: A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks”,” finally accepted, IEEE Systems Journal (SCIE, 2015 IF: 2.114, Q1) http://dx.doi.org/10.1109/JSYST.2015.2477415 [SCH] 4. Jianfeng Guan, Qi Chu, and Ilsun You (Corresponding Author), “The Social Relationship Based Adaptive Multi-Spray-and-Wait Routing Algorithm for Disruption Tolerant Network,” Mobile Information Systems, Volume 2017, Article ID 1819495, Jan. 2017 (SCIE, 2015 IF: 1.462, Q2) https://doi.org/10.1155/2017/1819495 5. Yinghui Zhang, Xiaofeng Chen, Jin Li, Duncan S. Wong, Hui Li, Ilsun You (Corresponding Author), “Ensuring Attribute Privacy Protection and Fast Decryption for Outsourced Data Security in Mobile Cloud Computing,” Information Sciences, vol. 379, pp. 42-61, Feb. 2017 (SCI, 2015 IF = 3.364, < 10%) http://dx.doi.org/10.1016/j.ins.2016.04.015 6. Ilsun You, Vishal Sharma, Mohammed Atiquzzaman, Kim-Kwang Raymond Choo, “GDTN: Genome-Based Delay Tolerant Network Formation in Heterogeneous 5G Using Inter-UA Collaboration,” Plos One, vol. 11, no. 12, pp. e0167913 :1- e0167913:37, 2016 (SCIE, 2015 IF: 3.057, Q1, 11/63) http://dx.doi.org/10.1371/journal.pone.0167913 7. Yutong Zhou, Wei Shi, Fei Song, and Ilsun You (Corresponding Author), “Designing Efficient Mobile Gateway for Impoverished Regions Based on Self-Learning Strategy,” Mobile Information Systems, Volume 2016, Article ID 4718474, 2016 (SCIE, 2015 IF: 1.462, Q2) http://dx.doi.org/10.1155/2016/4718474 8. Ilsun You, Jae Deok Lim, Jeong Nyeo Kim, Hyobeom Ahn, and Chang Choi, “An Adaptive Authentication Scheme for Mobile Consumer Devices in Proxy MIPv6 Networks,” IET Communications, vol. 10, no. 17, pp. 2319–2327, Nov. 2016 (SCI, 2015, IF: 0.624, Q4) http://dx.doi.org/10.1049/iet-com.2016.0480 9. Kun-Lin TSAI, Yi-Li HUANG, Fang-Yie LEU, and Ilsun YOU (Corresponding Author), “TTP based High efficient MultiKey Exchange Protocol,” IEEE Access, vol. 4, pp. 6261-6271, September 2016 (SCIE, IF: 1.249, Q2) http://dx.doi.org/10.1109/ACCESS.2016.2613442 10. Peixin Chen, Jinshu Su, Baokang Zhao, Xiaofeng Wang, Ilsun You (Corresponding Author), “An Escrow-Free Online/Offline HIBS Scheme for Privacy Protection of People-Centric Sensing,” Security and Communication Networks vol. 9, no. 14, pp. 2302–2312, September 2016 (SCIE, 2015 IF: 0.806, Q3) http://dx.doi.org/10.1002/sec.1492 11. Tao Lei, Shangguang Wang , Jinlin Li, Ilsun You, Fangchun Yang , “Detecting and preventing selfish behaviour in mobile ad hoc network,” The Journal of Supercomputing, vol. 72, no. 8, pp 3156–3168, August 2016 (SCI. 2015 IF: 1.088, Q2), http://dx.doi.org/10.1007/s11227-015-1561-2 12. Baokang Zhao, Bo Liu, Chunqing Wu, Wanrong Yu, Jinshu Su, Ilsun You (Corresponding Author), and Francesco Palmieri, “A Novel NTT-based Authentication Scheme for 10 GHz Quantum Key Distribution Systems,” IEEE Transactions on Industrial Electronics, vol. 63, no. 8, pp. 5101-5108, August 2016 (SCI, 2015 IF: 6.383, Q1 – ranking 1) http://dx.doi.org/10.1109/TIE.2016.2552152 13. Kun-Lin Tsai, Fang-Yie Leu, and Ilsun You (Corresponding Author), “Residence Energy Control System based on Wireless Smart Socket and IoT,” IEEE Access, Volume 4, Issue 1, pp. 2885-2894 (SCIE, IF: 1.249, Q2) http://dx.doi.org/10.1109/ACCESS.2016.2574199 14. Vishal Sharma, Ilsun You (Corresponding Author), Rajesh kumar, “Energy Efficient Data Dissemination in Multi-UAV Coordinated Wireless Sensor Networks,” Mobile Information Systems, Volume 2016, Article ID 8475820, June 2016, http://dx.doi.org/10.1155/2016/8475820 (SCIE, 2015 IF: 1.462, Q2) 15. Feilong Tang, Jie Li, Ilsun You, Minyi Guo, “Long-term location privacy protection for location- based services in mobile cloud computing,” Soft Computing, vol. 20, no. 5, pp 1735-1747, 2016 May http://dx.doi.org/10.1007/s00500-015-1703-8 (SCIE, 2015 IF: 1.630, Q2) [KBU] [업적평가 인정] 16. Joonsang BAEK and Ilsun YOU, “Efficient Subversion of Symmetric Encryption with Random Initialization Vector,” IEICE TRANSACTIONS on Information and Systems, Vol.E99-D, No.4, pp.1251-1254, April 2016 (SCIE, 2015 IF: 0.226) 17. Jianfeng Guan, Ilsun You (Corresponding author), Changqiao Xu, and Hongke Zhang, “The PMIPv6-based Group Binding Update for IoT Devices,” Mobile Information Systems, Volume 2016, Article ID 7853219, 2016, http://dx.doi.org/10.1155/2016/7853219 (SCIE, 2015 IF: 1.462, Q2) 18. Qian He, Baokang Zhao, Liang Chang, Jinshu Su, and Ilsun You (Corresponding author), “PSSRC: A Web Service Registration Cloud based on Structured P2P and Semantics,” Volume 12 , Issue 2, pp. 21-38, March 08, 2016, International Journal of Data Warehousing and Mining (SCIE, 2015 IF: 0.625) [SCH] 19. Fuu-Cheng Jiang, Fang-Yi Leu, and Ilsun You, “Approaching Green Sensor Field Using Queue-based Optimization Technique,” Journal of Network and Computer Applications, volume 66, pp. 128-136, May 2016 http://dx.doi.org/10.1016/j.jnca.2015.11.010 (SCIE, 2015 IF: 2.331, Q1, < 10%)) 20. Zheli Liu, Xiaofeng Chen, Jun Yang, Chunfu Jia, Ilsun You (Corresponding author), “New Order Preserving Encryption Model for Outsourced Databases in Cloud Environments,” Journal of Network and Computer Applications, volume 59, pp. 198-207, January 2016 http://dx.doi.org/10.1016/j.jnca.2014.07.001 (SCIE, 2015 IF: 2.331, Q1, < 10%) [KBU] [업적평가 인정] 21. Hsing-Chung Chen (Jack Chen), Ilsun You, Chien-Erh Weng, Chia-Hsin Cheng, Yung-Fa Huang, “A Security Gateway Application for End-to-End M2M Communications,” Computer Standards & Interfaces, Volume 44, February 2016, Pages 85–93 (SCIE , 2015 IF: 1.268, Q2) http://dx.doi.org/10.1016/j.csi.2015.09.001 [SCH] 22. Jianfeng Wang, Xiaofeng Chen, Xinyi Huang, Ilsun You, and Yang Xiang , “Verifiable Auditing for Outsourced Database in Cloud Computing,” IEEE Transactions on Computers, Volume 61, Issue 11, pp. 3293-3303, November 2015 (SCIE, 2015 IF: 1.723, Q1) http://dx.doi.org/10.1109/TC.2015.2401036 [SCH] 23. Xingjun Zhang, Yan Yang, Endong Wang, Ilsun You (Corresponding author), and Xiaoshe Dong, "Modeling Software Fault Management with Runtime Verification," International Journal of Ad Hoc and Ubiquitous Computing, Vol. 20, No. 1, pp. 26-38, September 2015 (SCIE, 2015 IF: 0.489, Q3) http://dx.doi.org/10.1504/IJAHUC.2015.071660 [SCH]

24. Fei Song, Yige Zhang, Zhaoxu An, Huachun Zhou, Ilsun You (Corresponding author), “The Correlation Study for Parameters in Four Tuples,” International Journal of Ad Hoc and Ubiquitous Computing, Vol. 19, No. 1/2, pp. 38-49, 2015 (SCIE, 2015 IF: 0.489, Q3) 25. Feilong Tang, Ilsun You, Can Tang, Shui Yu, “A profiling based task scheduling approach for multicore network processors,” Concurrency and Computation: Practice and Experience, vol. 27, issue 4, pp. 855–869, March 2015, http://dx.doi.org/10.1002/cpe.2846 (SCIE, IF: 0.784 - 2013) 26. Junho Choi, Chang Choi, Ilsun You, and Pankoo Kim, “Polymorphic Malicious JavaScript Code Detection for APT Attack Defence,” vol. 21, no. 3, pp. 369-383, 2015, Journal of Universal Computer Science (SCIE). 27. Meixia Miao, Tao Jiang, Ilsun You (Corresponding author), “Payment-Based Incentive Mechanism for Secure Cloud Deduplication,” International Journal of Information Management, vol. 35, no. 3, pp. 379-386, June 2015, http://dx.doi.org/10.1016/j.ijinfomgt.2014.12.006 (SSCI, 2015 IF: 2.692, Q1 - <10%) 28. Yi-Li Huang, Cheng-Ru Dai, Ilsun You (Corresponding Author), Fang-Yie Leu , “Secure Data Encryption Method Employing a Sequential-Logic Style Mechanism, Three-Dimensional Operation and Dynamic Transition Box for a Cloud System,” International Journal of Web and Grid Services (IJWGS), Vol. 11, No. 1, pp. 102-124, Jan. 2015 (SCIE: 2015 IF = 1.229, Q2) 29. Bohao Feng, Huachun Zhou, Shuai Gao and Ilsun You, “An exploration of cache collaboration in information-centric network,” International Journal of Communication Systems, volume 27, issue 9, pp. 1243-1267, September 2014, http://dx.doi.org/10.1002/dac.2773 (SCIE, IF: 1.106 - 2013, Q3) 30. Ilsun YOU, Junho Choi , Chang Choi, and Pankoo Kim, “Intelligent healthcare service based on context inference using smart device,” Soft Computing, Vol. 18 , Issue 12, pp. 2577-2586, December 2014. (SCIE, 2015 IF: 1.630, Q2) 31. Taenam Cho, Seung-Hyun Seo, and Ilsun You (Corresponding Author), “A Remote Control System for Cloud-based Smart Homes Supporting Dynamic User Management,” Journal of Internet Technology, Vol.15, No.6, pp. 1069-1081, November 2014, http://dx.doi.org/10.6138/JIT.2014.15.6.18 (SCIE, 2015 IF = 0.533, Q4) 32. Mao Yang, Yong Li, Depeng Jin, Jian Yuan, Ilsun You (Corresponding Author), Lieguang Zeng, “Opportunistic sharing scheme for spectrum allocation in wireless virtualization,” Soft Computing, Vol. 18, Issue 9, pp. 1685-1969, September 2014, http://dx.doi.org/10.1007/s00500-014-1267-z (SCIE, 2015 IF: 1.630, Q2) 33. Ilsun You, Yi-Li Huang, Fang-Yie Leu, Jung-chun Liu, Lih-Jiun Lo “A Secure Wireless Communication System Integrating PRNG and Diffie-Hellman PKDS by Using a Data Connection Core,” Journal of Internet Technology, Vol.15, No.5, pp. 713-725, September 2014 (SCIE, 2015 IF = 0.533, Q4) 34. Jeong, H. J., Ye, S., Lim, J., You, I., Hyun, W.: A Computer Remote Control System Based on Speech Recognition Technologies of Mobile Devices and Wireless Communication Technologies. Computer Science and Information Systems, Vol. 11, No. 3, 1001–1016. (2014) (SCIE, IF: 0.575 - 2013) 35. Fei Song, Daochao Huang, Huachun Zhou, Hongke Zhang, Ilsun You (Corresponding Author), "An Optimization-based scheme for Efficient Virtual Machine Placement," International Journal of Parallel Programming, vol. 42, no. 5, pp. 853-872, October 2014 http://dx.doi.org/10.1007/s10766-013-0274-5 (SCIE, IF: 0.5 - 2013, Q4) 36. Xiaoqian Li, Huachun Zhou, Feng Qiu, Hongke Zhang, Ilsun You , “A Lease Algorithm to Maintain Strong Mapping Cache Consistency,” Wireless Personal Communications, Vol. 76, Issue 4, pp 713- 730 , June 2014 (SCIE, IF: 0.979 – 2013, Q3) 37. Xin Li, Zhuzhong Qian, Ilsun You (Corresponding Author), and Sanglu Lu , “Towards Cost Efficient Mobile Service and Information Management in Ubiquitous Environment with Cloud Resource Scheduling,” International Journal of Information Management, Vol. 34, pp. 319-328, June 2014, http://dx.doi.org/10.1016/j.ijinfomgt.2013.11.007 (SSCI, 2015 IF: 2.692-Q1 - <10%) 38. Pietro Albano et al., “Secure and distributed video surveillance via portable devices,” Journal of Ambient Intelligence and Humanized Computing, Vol. 5, No. 2, pp 205-213, April 2014 (SCIE) 39. Yi-Li Huang, Fang-Yie Leu, Ilsun You, Yao-Kuo Sun, Cheng-Chung Chu , “A secure wireless communication system integrating RSA, Diffie–Hellman PKDS, intelligent protection-key chains and a Data Connection Core in a 4G environment,” Journal of Supercomputing, Vol. 67, No. 3, pp. 635- 652, March 2014 (SCI, 2015 IF: 1.088, Q2) 40. Jinshu Su, Dan Cao, Baokang Zhao, Xiaofeng Wang, Ilsun You (Corresponding Author), “ePASS: An expressive attribute-based signature scheme with privacy and an unforgeability guarantee for the Internet of Things,” Future Generation Computer Systems, Vol. 33, pp. 11–18, 2014 (SCIE, 2015 IF: 2.430, Q1 < 11%) 41. Xiaoqian Li, Huachun Zhou, Hongbin Luo, Hongke Zhang, Feng Qiu, and Ilsun You, "HMS: A hierarchical mapping system for the locator/ID separation system,” Computing and Informatics, Vol. 32, No. 6, pp. 1229-1255, December 2013 (SCIE, IF = 0.319 – 2013, Q4) 42. Chang Choi, Junho Choi, Eunji Lee, Ilsun You, Pankoo Kim “Probabilistic spatio-temporal inference for motion event understanding,” Neurocomputing, Vol. 122, pp. 24-32, December 2013 (SCIE, 2015 IF: 2.392, Q1) 43. Xiaoxiao Yua, Wenzhu Zhang, Lin Zhang, Victor O.K. Li, Jian Yuan, Ilsun You, “Understanding urban dynamics based on pervasive sensing: An experimental study on traffic density and air pollution,” Mathematical and Computer Modelling, Vol. 58, Issues 5–6, pp. 1328–1339, September 2013 (SCIE, 2015 IF: 1.366, Q1) 44. Yujia Zhai, Yue Wang, Jian Yuan, Yong Ren, Ilsun You (Corresponding Author), “Hierarchical DHT and proportional replication based mobility management for large-scale mobile Internet,” Mathematical and Computer Modelling, Vol. 57, Issues 11–12, pp. 2846–2862, June 2013 (SCIE, 2015 IF: 1.366, Q1) 45. Feilong Tang, Ilsun You, Can Tang, Minyi Guo, “An efficient classification approach for large-scale mobile ubiquitous computing,” Information Sciences, Vol. 232, pp. 419-436, May 2013 (SCI, 2015 IF: 3.364) 46. Huali Cui, Depei Qian, Xingjun Zhang, Ilsun You, and Xiaoshe Dong, “Optimizing the Joint Source/Network Coding for Video Streaming over Multi-hop Wireless Networks,” KSII Transactions on Internet and Information Systems, Vol. 7, No. 4, pp. 800-818, April 2013 (SCIE, IF: 0.345) 47. Jinhai Huo, Bowen Deng, Shuhang Wu, Jian Yuan, and Ilsun You (Corresponding Author), “A topographic-awareness and situational-perception based mobility model with artificial bee colony algorithm for tactical MANET,” Computer Science and Information Systems, Vol. 10, No. 2, pp. 725- 746, April 2013 (SCIE, IF: 0.549) 48. Fei Song, Huachun Zhou, Sidong Zhang, Hongke Zhang, and Ilsun You, “The throughput critical condition study for reliable multipath transport,” Computer Science and Information Systems, Vol. 10, No. 2, pp. 567-587, April 2013 (SCIE, IF: 0.549) 49. Jong-Hyouk Lee, Jean-Marie Bonnin, Ilsun You, Tai-Myoung Chung, “Comparative Handover Performance Analysis of IPv6 Mobility Management Protocols,” IEEE Transactions on Industrial Electronics, Vol. 60, No. 3, pp. 1077-1088, March 2013 (SCI, 2015 IF: 6.383, Q1 – ranking 1) 50. Jingbo Sun, Hongbo Si, Yue Wang, Jian Yuan, Xiuming Shan, Ilsun You (Corresponding Author), “Field architecture for traffic and mobility modelling in mobility management,” International Journal of Ad Hoc and Ubiquitous Computing, Vol. 10, No. 4, pp. 241-251, Sept. 2012 (SCIE, 2015 IF: 0.489, Q3) 51. Feilong Tang, Ilsun You, Shui Yu, Huakang Li and Cho-Li Wang, “Grid transaction management and an efficient development kit,” Computer Systems Science & Engineering, Vol. 27, No. 5, pp. 219-233, Sept. 2012 (SCIE, IF=0.371) 52. Feilong Tang, Ilsun You, Song Guo, Minyi Guo, Yonggong Ma , “A chain-cluster based routing algorithm for wireless sensor networks,” Journal of Intelligent Manufacturing, Vol. 23, Issue 4, pp 1305-1313, August 2012 (SCIE, IF = 1.278) 53. Ilsun You, Jong-Hyouk Lee, Kouichi Sakurai “DSSH: Digital signature based secure handover for network-based mobility management,” Computer Systems Science & Engineering, Vol. 27, No. 3, pp. 183-193, May 2012 (SCIE, IF=0.371) 54. Feilong Tang, Ilsun You, Shui Yu, Cho-Li Wang, Minyi Guo, Wenlong Liu, “An efficient deadlock prevention approach for service oriented transaction processing,” Computers and Mathematics with Applications, Vol. 63, No. 2, pp. 458-468, Jan. 2012 (SCI, 2015 IF= 1.298, Q1) 55. Zhuzhong Qian, Ce Chen, Ilsun You (Corresponding Author), Sanglu Lu, “ACSP: A novel security protocol against counting attack for UHF RFID systems,” Computers and Mathematics with Applications, Vol. 63, No. 2, pp. 492-500, Jan. 2012 (SCI, 2015 IF= 1.298, Q1) 56. Zhuzhong Qian, Ilsun You (Corresponding Author), Youyou Lu, Sanglu Lu, “A tree-based hierarchy data storage framework in a pervasive space,” Computing and Informatics, Vol. 30, No. 6, pp. 1001- 1018, 2011 (SCIE, IF=0.239) 57. Jong-Hyouk Lee, Zhiwei Yan, and Ilsun You, “Enhancing QoS of Mobile Devices by a New Handover Process in PMIPv6 Networks,” Wireless Personal Communications, Vol. 61, No. 4, pp. 591-602, December 2011 (SCIE, IF=0.458) 58. Ilsun You, Jong-Hyouk Lee, Yoshiaki Hori, and Kouichi Sakurai, “Enhancing MISP with Fast Mobile IPv6 Security,” Mobile Information System (MIS), Vol. 7, No. 4, pp. 271-283, September 2011 (SCIE, 2015 IF: 1.462, Q2) 59. Ilsun You, Yoshiaki Hori, and Kouichi Sakurai, “Enhancing SVO Logic for Mobile IPv6 Security Protocols,” Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), Vol. 2, No. 3, pp. 26-52, 2011 (Scopus) 60. Ruozi Sun, Jian Yuan, Ilsun You, Xiuming Shan and Yong Ren, “Energy-aware Weighted Graph Based Dynamic Topology Control Algorithm,” Simulation Modelling Practice and Theory, Vol. 19, No. 8, pp. 1773-1781, September 2011 (SCIE, IF = 0.969) 61. Yuh-Shyan Chen, Ching-Hsiung Cho, Ilsun You, and Han-Chieh Chao, “A Cross-Layer Protocol of Spectrum Mobility and Handover in Cognitive LTE Networks,” Simulation Modelling Practice and Theory, Vol. 19, No. 8, pp. 1723-1744, September 2011 (SCIE, IF = 0.969) 62. Feilong Tang, Ilsun You, Li Li, Cho-Li Wang, Zixue Cheng and Song Guo, “A pipeline-based approach for long transaction processing in web service environments,” International Journal of Web and Grid Services (IJWGS), Vol. 7, No. 2, pp. 190-207, May 2011 (SCIE, IF=1.919) 63. Fang-Yie Leu, Ilsun You and Yao-Tien Huang, “A Coordinated Multiple Channel Assignment Scheme and AP Deployment for Channel Reuse in Metropolitan Scale Wireless Networks,” Journal of Network and Computer Applications, Vol. 34, No. 2, pp. 632-643, March 2011 (SCIE, 2015 IF: 2.331, Q1, < 10%) 64. Ilsun You, Yoshiaki Hori, Kouichi Sakurai, “Toward Formal Analysis of Wireless LAN Security with MIS protocol,” International Journal of Ad Hoc and Ubiquitous Computing, Vol. 7, No. 2, pp. 112-120, March 2011 (SCIE, 2015 IF: 0.489, Q3) 65. Feilong Tang, Ilsun You, Minyi Guo, Song Guo, “Context-aware workflow management for intelligent navigation applications in pervasive environments,” Intelligent Automation and Soft Computing, Vol. 16, No. 4, pp. 605-619, December 2010 (SCIE, 2015 IF: 1.630, Q2) 66. Ilsun You, Jong-Hyouk Lee, and Bonam Kim, “caTBUA: A Context-Aware Ticket-based Binding Update Authentication Protocol for Trust-enabled Mobile Networks”, International Journal of Communication Systems, Vol. 23, No. 11, pp. 1382-1404, November 2010 (SCIE, IF=0.406) 67. Ilsun You, Jong-Hyouk Lee, Kouichi Sakurai, Yoshiaki Hori, “ESS-FH: Enhanced Security Scheme for Fast Handover in Hierarchical Mobile IPv6 ,” IEICE Transaction on Information & Systems, Vol.E93-D, No.5, pp. 1096-1105, May 2010 (SCIE, IF=0.178) 68. Feilong Tang, Ilsun You (Corresponding Author), Minyi Guo, Song Guo and Long Zheng, “Balanced bipartite graph based register allocation for network processors in mobile and wireless networks,” Mobile Information System (MIS), Vol. 6, No. 1, pp. 65-83, 2010 [SCIE, 2015 IF: 0.872] 69. Jong-Hyouk Lee, Sangheon Pack, Ilsun You, Tai-Myoung Chung, “Enabling a Paging Mechanism in Network-Based Localized Mobility Management Networks,” Journal of Internet Technology, Vol. 10, No. 5, pp. 597-606, 2009 (SCIE, 2015 IF = 0.533, Q4) 70. Ilsun You, Kouichi Sakurai, Yoshiaki Hori, “An Enhanced Security Protocol for Fast Mobile IPv6,” IEICE Transaction on Information & Systems, Vol. E92-D, No.10, pp. 1979-1982, October 2009 (SCIE, IF=0.178) 71. Ilsun You, Kouichi Sakurai, Yoshiaki Hori, “A Security Analysis on Kempf-Koodli's Security Scheme for Fast Mobile IPv6,” IEICE Transaction on Communications, Vol. E92-B, No.06, pp. 2287-2290, June 2009 (SCI, IF=0.254) 72. Feilong Tang, Minyi Guo, Minglu Li, Ilsun You, “An Adaptive Context-Aware Transaction Model For Mobile And Ubiquitous Computing,” Computing and Informatics, Vol. 27, No. 5, pp. 785-798, December 2008 (SCIE, 2015 IF=0.524) 73. Ilsun You and Kyungsan Cho, “Comments on YEH-SHEN-HWANG's One-Time Password Authentication Scheme,” IEICE Transaction on Communications, Vol. E88-B, No. 2, pp. 751-753, February 2005 (SCI, IF=0.254)

Conference Papers

1. Fei Song, Wei Quan, Tianming Zhao, Hongke Zhang, Ziwei Hu, and Ilsun You, “Ports Distribution Management for Privacy Protection Inside Local Domain Name System,” Proc. of ACM CCS Workshop MIST 2016, October 28 2016, Vienna, Austria 2. Yi-Li Huang, Fang-Yie Leu, Ilsun You, Hsing-Chung Chen, Chishyan Liaw, and Jung-Chun Liu, “Random Cladding with Feedback Mechanism for encrypting mobile messages,” Proc. of the IEEE INFOCOM Workshops 2016, pp. 970-975, San Francisco, California, USA, April 2016. 3. Peixin Chen, Xiaofeng Wang, Baokang Zhao, Hao Sun, Jinshu Su, Ilsun You, “An Escrow-Free Hierarchical Identity-Based Signature Scheme from Composite Order Bilinear Groups,” Proc. of the 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA), pp. 364-369, Krakow, Poland, November 4-6, 2015, IEEE 4. Baokang Zhao, Bo Liu, Chunqing Wu, Wanrong Yu, and Ilsun You , “A Tutorial on Quantum Key Distribution,” Proc. of the 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA), pp. 370-374, Krakow, Poland, November 4-6, 2015, IEEE 5. Peixin Chen , Xiaofeng Wang, Baokang Zhao, Jinshu Su, Ilsun You , “Removing Key Escrow from the LW-HIBE Scheme,” Volume 9532 of the series Lecture Notes in Computer Science pp 593-605, Proc. of the ICA3PP International Workshops and Symposiums, Zhangjiajie, China, November 18-20, 2015, Springer International Publishing 6. Bo Liu, Baokang Zhao, Chunqing Wu, Wanrong Yu, Ilsun You, “Efficient Almost Strongly Universal Hash Function for Quantum Key Distribution - Extended Abstract,” In Information and Communication Technology – the 3rd IFIP TC 5/8 International Conference, ICT-EurAsia 2015, and the 9th IFIP WG 8.9 Working Conference, CONFENIS 2015, Held as Part of WCC 2015, Daejeon, Korea, LNCS, Lecture Notes in Computer Science, volume 9357, Springer , pp. 282-285, September 2015 7. Baokang Zhao, Ziling Wei, Bo Liu, Jinshu Su, Ilsun You, “Providing adaptive quality of security in quantum networks,” In Proc. of the 11th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (QSHINE’15), Taipei, Taiwan, IEEE, pp. 440-445, August 2015 8. Yongwoo Kwon, Inhyeok Jeon, WooSeok Hyun, Jiyoung Lim, Ilsun You, Hae-Duck Joshua Jeong, “An Enhanced Java-Based Mobile Device Theft Response System,” In Proc. of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS’15), Santa Cantarina, Brazil, IEEE, pp. 41-46, July 2015 9. Kyungroul Lee, Ilsun You, Kangbin Yim , “Vulnerability Analysis on the CNG Crypto Library,” In Proc. of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS’15), Santa Cantarina, Brazil, IEEE, pp. 221-224, July 2015 10. Chin-Yu Liu, Fang-Yie Leu, Ilsun You, Aniello Castiglione, Francesco Palmieri, "The untrusted handover security of the S-PMIPv6 on LTE-A," In Proc. of the 2015 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Hong Kong, pp. 161-166, April-May 1 2015 11. Guohong Zhao, Shuhui Chen, Baokang Zhao, Ilsun You, Jinshu Su, and Wanrong Yu, “A High-Speed Network Content Filtering System,” In Proc. of the IFIP WG 8.4, 8.9, TC 5 International Cross- Domain Conference (CD-ARES 2014) and the 4th International Workshop on Security and Cognitive Informatics for Homeland Defense (SeCIHD 2014), Springer LNCS 8708, pp. 257-269, Fribourg, Switzerland, September 8-12, 2014 12. Yi-Li Huang, Fang-Yie Leu, Ilsun You, and Jing-Hao Yang, “Building an Initialization Cipher Block with Two-Dimensional Operation and Random Parameters,” In Proc. of the IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference (CD-ARES 2014) and the 4th International Workshop on Security and Cognitive Informatics for Homeland Defense (SeCIHD 2014), Springer LNCS 8708, pp. 166-171, Fribourg, Switzerland, September 8-12, 2014 13. He Qian, Zhao Baokang, Long Yunjian, Su Jinshu, and Ilsun You, “A Structure P2P Based Web Services Registry with Access and Control,” In Proc. of the IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference (CD-ARES 2014) and the 4th International Workshop on Security and Cognitive Informatics for Homeland Defense (SeCIHD 2014), Springer LNCS 8708, pp. 286-297, Fribourg, Switzerland, September 8-12, 2014 14. Fang-Yie Leu, Yi-Ting Hsiao, Kangbin Yim, Ilsun You, “A Real-Time Intrusion Detection and Protection System at System Call Level under the Assistance of a Grid,” Proc. of ICT-EurAsia 2014, Springer LNCS 8407, Vol. pp. 375-385, Bali, Indonesia, April 2014 http://dx.doi.org/10.1007/978-3-642-55032-4_37 15. Huijin Jeong, Junho Choi, Chang Choi, Ilsun You, PanKoo Kim, “A Design of Web Log Integration Framework Using NoSQL,” Proc. of ICT-EurAsia 2014, Springer LNCS, Vol. 8407, pp. 438-445, Bali, Indonesia, April 2014 http://dx.doi.org/10.1007/978-3-642-55032-4_44 16. Jung-Chun Liu, Yi-Li Huang, Fang-Yie Leu, Ilsun You, Feng-Ching Chiang, Chao-Tung Yang, William Cheng-Chung Chu, “A Multiple-Key Management Scheme in Wireless Sensor Networks,” Proc. of the 3rd IFIP International Workshop on Security and Cognitive Informatics for Homeland Defense (SeCIHD'13), Springer LNCS, Vol. 3128, pp. 337-344, University of Regensburg, Germany, September 2013 http://dx.doi.org/10.1007/978-3-642-40588-4_23 17. Yuxing Wu, Xingjun Zhang, Song Cen, Xiaoshe Dong, Ilsun You, “A Novel Approach to Joint Source-Channel Coding for Scalable Video Transmission,” Proc. of the 7th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS’13), IEEE, pp. 59-63, Taichung, Taiwan, July 2013 18. Xin Zhao, Chunxiao Jiang, Yue Wang, Jian Yuan, Ilsun You, “Inter-cluster Topology Control: An Evolutionary Game Perspective,” Proc. of the 7th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS’13), IEEE, pp. 76-82, Taichung, Taiwan, July 2013 19. Yangyang Gao, Fei Song, Yajuan Qin, Ilsun You, “On Performance Evaluation of Various Traffic Combination Based on Network Calculus,” Proc. of the 7th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS’13), IEEE, pp. 381-386, Taichung, Taiwan, July 2013 20. Hae-Duck Joshua Jeong, Sang-Kug Ye, Jiyoung Lim, Ilsun You, WooSeok Hyun, Hee-Kyoung Song, “A Remote Computer Control System Using Speech Recognition Technologies of Mobile Devices,” Proc. of the 7th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS’13), IEEE, pp. 595-600, Taichung, Taiwan, July 2013 21. Kyungroul Lee, Youngjun Lee, Junyoung Park, Kangbin Yim, Ilsun You, “Security Issues on the CNG Cryptography Library (Cryptography API: Next Generation),” Proc. of the 7th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS’13), IEEE, pp. 709-713, Taichung, Taiwan, July 2013 22. JongCheon Choi, Yongman Han, Seongje Cho, Haeyoung Yoo, Minkyu Park, Sangchul Han, Ilsun You, Inshik Song, “A Survey of Feature Extraction Techniques to Detect the Theft of Windows Applications,” Proc. of the 7th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS’13), IEEE, pp. 723-728, Taichung, Taiwan, July 2013 23. Dongjin Choi, Ilsun You, and PanKoo Kim, “Syntactic Analysis for Monitoring Personal Information Leakage on Social Network Services: A Case Study on Twitter,” Proc. of ICT-EurAsia 2013, Springer LNCS, Vol. 7804, pp. 253-260, Yogyakarta, Indonesia, March 2013 24. Bo Liu, Bo Liu, Baokang Zhao, Dingjie Zou, Chunqing Wu, Wanrong Yu, and Ilsun You, “A Real- Time Privacy Amplification Scheme in Quantum Key Distribution,” Proc. of ICT-EurAsia 2013, Springer LNCS, Vol. 7804, pp. 453-458, Yogyakarta, Indonesia, March 2013 25. Alessandro Armando, Aniello Castiglione, Gabriele Costa, Ugo Fiore, Alessio Merlo, Luca Verderame, and Ilsun You, “Trustworthy Opportunistic Access to the Internet of Services,” Proc. of ICT-EurAsia 2013, Springer LNCS, Vol. 7804, pp. 469-478, Yogyakarta, Indonesia, March 2013 26. Xiaoqian Li, Feng Qiu, Huachun Zhou, Hongke Zhang, and Ilsun You, “Maintaining strong consistency for the identifier-to-locator mapping cache,” Proc. of IEEE GLOBECOM Workshops 2012, pp. 986-991, Anaheim, California, USA , December 2012 27. Fang-Yie Leu, Ilsun You, Yi-Li Huang, Kangbin Yim, and Cheng-Ru Dai, “Improving security level of LTE authentication and key agreement procedure,” Proc. of IEEE GLOBECOM Workshops 2012, pp. 1032-1036, Anaheim, California, USA , December 2012 28. Hae-Duck Joshua Jeong, WooSeok Hyun, Jiyoung Lim, and Ilsun You, “Anomaly Teletraffic Intrusion Detection Systems on Hadoop-Based Platforms : A Survey of Some Problems and Solutions,” Proc. of the 15th International Conference on Network-Based Information Systems (NBiS’12), IEEE, pp. 766- 770, Melbourne, , September 2012 29. Pietro Albano, Andrea Bruno, Bruno Carpentieri, Aniello Castiglione, Arcangelo Castiglione, Francesco Palmieri, Raffaele Pizzolante, and Ilsun You, “A Secure Distributed Video Surveillance System Based on Portable Devices,” Proc. of CD-ARES 2012, Springer LNCS, Vol. 7465, pp. 403- 415, Prague, Czech Republic, August 2012 30. Seung-Hyun Seo, Kangbin Yim, and Ilsun You, “Mobile Malware Threats and Defenses for Homeland Security,” Proc. of CD-ARES 2012, Springer LNCS, Vol. 7465, pp. 516-524, Prague, Czech Republic, August 2012 31. Wenzhu Zhang, Bing Zhu, Lin Zhang, Jian Yuan, and Ilsun You, “Exploring Urban Dynamics Based on Pervasive Sensing: Correlation Analysis of Traffic Density and Air Quality,” Proc. of the 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS’12), IEEE, pp. 9-16, Palermo, Italy, July 2012 32. Kwangjin Bae, Ilsun You, Kangbin Yim, and Taeho Son, “A Secure Secondary Backup Storage with an Isolated Authentication,” Proc. of the 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS’12), IEEE, pp. 122-125, Palermo, Italy, July 2012 33. Fei Song, Huachun Zhou, Sidong Zhang, Hongke Zhang, and Ilsun You, “Performance Analysis of Reliable Transmission on Multiple Paths and Single Path,” Proc. of the 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS’12), IEEE, pp. 185-190, Palermo, Italy, July 2012 34. Fei Song, Daochao Huang, Huachun Zhou, and Ilsun You, “Application-Aware Virtual Machine Placement in Data Centers,” Proc. of the 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS’12), IEEE, pp. 191-196, Palermo, Italy, July 2012 35. Longteng Yi, Yujia Zhai, Yue Wang, Jian Yuan, and Ilsun You, “Impacts of Internal Network Contexts on Performance of MANET Routing Protocols: A Case Study,” Proc. of the 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS’12), IEEE, pp. 231-236, Palermo, Italy, July 2012 36. Bowen Deng, Yujia Zhai, Yue Wang, Jinhai Huo, Jian Yuan, and Ilsun You, “A Terrain-Awareness Based Mobility Model with Markov Random Disturbance for Tactical MANET,” Proc. of the 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS’12), IEEE, pp. 237-243, Palermo, Italy, July 2012 37. Jianfeng Guan, Ilsun You, Changqiao Xu, Huachun Zhou, and Hongke Zhang, “Survey on Route Optimization Schemes for Proxy Mobile IPv6,” Proc. of the 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS’12), IEEE, pp. 541-546, Palermo, Italy, July 2012 38. Qian Wu, Feilong Tang, Li Li, Leonard Barolli, Ilsun You, Yi Luo, Huakang Li, “Recommendation of More Interests Based on Collaborative Filtering,” Proc. of the 26th IEEE International Conference on Advanced Information Networking and Applications (AINA’12), IEEE, pp. 191-198, Fukuoka Institute of Technology (FIT), Fukuoka, Japan, March 2012 39. Chang Choi, Junho Choi, Juhyun Shin, Ilsun You, and PanKoo Kim, “Extended Spatio-temporal Relations between Moving and Non-moving Objects,” Proc. of CD-ARES 2011, Springer LNCS, Vol. 6908, pp. 243-254, Vienna, Austria, August 2011 40. Kwangjin Bae, Sungjin Kim, Yongoo Lee, Ilsun You, Kangbin Yim, and Taeho Son, “Insider Threats are Getting Worse within Industries: Isolated Secondary Backup Required,” Proc. of the 3rd IEEE International Conference on Intelligent Networking and Collaborative Systems (INCoS’11), IEEE, pp. 652-655, Fukuoka, Japan, November - December 2011 41. Kangbin Yim and Ilsun You, “IT Issues on Homeland Security and Defense,” Proc. of CD-ARES 2011, Springer LNCS, Vol. 6908, pp. 243-254, Vienna, Austria, August 2011 42. Ce Chen, Zhuzhong Qian, Ilsun You, Jue Hong, and Sanglu Lu, “ACSP: A Novel Security Protocol against Counting Attack for UHF RFID Systems,” Proc. of the 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS’11), IEEE, pp. 100-105, Seoul, Korea, June-July 2011 43. Lin Lou, Feilong Tang, Ilsun You, Minyi Guo, Yao Shen, and Li Li, “An Effective Deadlock Prevention Mechanism for Distributed Transaction Management,” Proc. of the 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS’11), IEEE, pp. 120-127, Seoul, Korea, June-July 2011 44. Peng Cao, Long Zheng, Yanchao Lu, Feilong Tang, Ilsun You, and Minyi Guo, “Trying Linear Network Coding on a Network Flow Processor,” Proc. of the 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS’11), IEEE, pp. 156-163, Seoul, Korea, June-July 2011 45. Xiaopeng Yang, Hu Guan, Feilong Tang, Ilsun You, Minyi Guo, and Yao Shen, “Improvements on Sequential Minimal Optimization Algorithm for Support Vector Machine Based on Semi-sparse Algorithm,” Proc. of the 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS’11), IEEE, pp. 192-199, Seoul, Korea, June-July 2011 46. Jingxin Wang, Jian Yuan, Xiuming Shan, Zhenming Feng, Junwei Geng, and Ilsun You, “SaMob: A Social Attributes Based Mobility Model for Ad Hoc Networks,” Proc. of the 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS’11), IEEE, pp. 444-449, Seoul, Korea, June-July 2011 47. Yujia Zhai, Yue Wang, Jian Yuan, Yong Ren, Xiuming Shan, and Ilsun You, “Analysis of Optimal Query, Fairness and Replication for DHT-based Mobility Management,” Proc. of the 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS’11), IEEE, pp. 462-469, Seoul, Korea, June-July 2011 48. Yin Zhu, Feilong Tang, Ilsun You, Lin Lou, Minyi Guo, and Yao Shen, “PPMLT: A Pipeline Based Processing Model of Long Transactions,” Proc. of the 25th IEEE International Conference on Advanced Information Networking and Applications (AINA’11), IEEE, pp. 200-207, Biopolis, Singapore, March 2011 49. Ilsun You and Jong-Hyouk Lee, “Comments on a One-Way Hash Chain Based Authentication for FMIPv6,” Proc. of the 5th International Conference on Broadband, Wireless Computing, Communication and Applications (BWCCA’10), IEEE, pp. 293-296, Fukuoka, Japan, November 2010 50. Ilsun You and Kangbin Yim, “Malware Obfuscation Techniques: A Brief Survey,” Proc. of the 5th International Conference on Broadband, Wireless Computing, Communication and Applications (BWCCA’10), IEEE, pp. 297-300, Fukuoka, Japan, November 2010 51. Zhuzhong Qian, Ilsun You, Youyou Lu, and Sanglu Lu, “A Dynamic Host Selection Algorithm for Layered Data Storage Architecture in a Pervasive Space,” Proc. of the 4th International Conference on Complex, Intelligent and Software Intensive Systems (CISIS’10), IEEE, pp. 812-817, Krakow, Poland, February 2010 52. Zhiwei Yan, Sidong Zhang, Huachun Zhou, Hongke Zhang, and Ilsun You, “Network mobility support in PMIPv6 network,” Proc. of the 6th International Wireless Communications and Mobile Computing Conference (IWCMC’10), ACM, pp. 890-894, Caen, France, June-July 2010 53. Feilong Tang, Ilsun You, Yongwei Wu, Minyi Guo, Song Guo, Yin Zhu, and Lin Lou, “GridTDK: A Grid Transaction Development Kit,” Proc. of the 13th International Conference on Network-Based Information Systems (NBiS’10), IEEE, pp. 481-486, Takayama, Gifu, Japan, September 2010 54. Ilsun You, Kouichi Sakurai, Yoshiaki Hori, “Comments on Kang-Park's Security Scheme for Fast Handover in Hierarchical Mobile IPv6,” Proc. of The 4th International Conference on Frontier of Computer Science and Technology (FCST’09), pp. 351-355, Shanghai, China, December 2009 55. Hangbae Chang, Hyuk-jun Kwon, and Ilsun You, “The Study on Software Tamper Resistance for Securing a Game Service,” Proc. of the 3rd International Conference on Complex, Intelligent and Software Intensive Systems (CISIS’09), IEEE, pp. 555-558, Fukuoka, Japan, March 2009 56. Bonam Kim, Junmo Yang, and Ilsun You, “A survey of NETLMM in all-IP-based wireless networks,” Proc. of the 5th International Conference on Mobile Technology, Applications, and Systems (Mobility’08), ACM, Article No. 60, Yilan, Taiwan, September 2008 57. Ilsun You, “A Ticket Based Binding Update Authentication Method for Trusted Nodes in Mobile IPv6 Domain,” Proc. of 2007 Emerging Directions in Embedded and Ubiquitous Computing (EUC’07 Workshops), Springer LNCS, Vol. 4809, pp. 808-819, Taipei, Taiwan, December 2007 58. Junmo Yang, Bonam Kim, and Ilsun You, “Link Quality-Based (LQ-CDS) Construction in Smart Home Wireless Mesh Networks,” Proc. of the 2007 International Conference on Future Generation Communication and Networking (FGCN’07), IEEE, pp. 76-80, Jeju-Island, Korea, December 2007 59. Bonam Kim, Youngjoon Kim, InSung Lee, and Ilsun You, “Design and Implementation of a Ubiquitous ECG Monitoring System Using SIP and the Zigbee Network,” Proc. of Proc. of the 2nd International Symposium on Smart Home (SH'07), IEEE, pp. 599-604, Jeju-Island, Korea, December 2007 60. Deok-Gyu Lee, Ilsun You, Sang-Choon Kim, Yun-kyung Lee, Jong Wook Han, and Kyo-Il Chung, “Intelligent Home Network Authentication: S/Key-Based Home Device Authentication,” Proc. of ISPA 2007 International Workshops, Springer LNCS, Vol. 4743, pp. 214-223, Niagara Falls, Canada, August-September 2007 61. Ilsun You and Jiyoung Lim, “Advanced Agent-Delegated Route Optimization Protocol for Efficient Multimedia Services at Low-Battery Devices,” Proc. of the 13th International Multimedia Modeling Conference (MMM’07), Springer LNCS, Vol. 4352, pp. 479-486, Singapore, January 2007 62. Ilsun You, “A One-Time Password Authentication Scheme for Secure Remote Access in Intelligent Home Networks,” Proc. of the 10th International Conference on Knowledge-Based & Intelligent Information & Engineering Systems (KES’06), Springer LNAI, Vol. 4252, pp. 785-792, Bournemouth, UK, October 2006 63. Ilsun You, “Analysis and Extension of S/Key-Based Authentication Schemes for Digital Home Networks,” Proc. of the 2006 International Conference on Intelligent Computing (ICIC’06), Springer LNCIS, Vol. 344, pp. 1022-1033, Kunming, China, August 2006 64. Ilsun You and Chel Park, “An Analysis on the Web Technologies for Dynamically Generating Web- Based User Interfaces in Ubiquitous Spaces,” Proc. of 2006 Emerging Directions in Embedded and Ubiquitous Computing (EUC’06 Workshops), Springer LNCS, Vol. 4097, pp. 639-649, Seoul, Korea, August 2006 65. Ilsun You, “Improving the CGA-OMIPv6 Protocol for Low-Power Mobile Nodes,” Prof. of the 6th International Conference on Computational Science and Its Applications (ICCSA’06), Springer LNCS, Vol. 3983, pp. 336-343, Glasgow, UK, May 2006 66. Ilsun You and Eun-Sun Jung, “A Light Weight Authentication Protocol for Digital Home Networks,” Prof. of the 6th International Conference on Computational Science and Its Applications (ICCSA’06), Springer LNCS, Vol. 3983, pp. 416-423, Glasgow, UK, May 2006 67. Yong-Hwan Lee, Ilsun You, and Sang-Burm Rhee “Improving CAM-DH Protocol for Mobile Nodes with Constraint Computational Power,” Proc. of the 8th International Conference on Knowledge- Based Intelligent Information and Engineering Systems (KES’04), Springer LNCS, Vol. 3215, pp. 67- 73, Wellington, New Zealand, September 2004 68. Ilsun You and Kyungsan Cho, “A Security Proxy Based Protocol for Authenticating the Mobile IPv6 Binding Updates,” Proc. of the 4th International Conference on Computational Science and Its Applications (ICCSA’04), Springer LNCS, Vol. 3043, pp. 167-174, Assisi, Italy, May 2004

Domestic Journal Papers

1. Jiyoon Kim, Soonhyun Kwon, Minho Kim, Hoonyong Park, Ilsun You, “The Design and Implementation of Secured Mobile Banking Application using Wearable Device based on Transaction, Soonchunhyang Journal of Institute for Industrial Technology,” Vol. 22 No. 1, 2016, pp. 97~, August 2016 2. Kyungroul Lee, Ilsun You, and Kangbin Yim, “An Analysis of a Structure and Implementation of Error-Detection Tool of Cryptography API-Next Generation(CNG) in Microsoft,” Journal of the Korea Institute of Information Security and Cryptology, Vol. 26, No. 1, pp. 153-168, February 2016 3. Kyungroul Lee, Ilsun You, and Kangbin Yim, “An Analysis of Agility of the Cryptography API Next Generation in Microsoft: Based on Implementation Example of Applying Cryptography Algorithm HAS-160 in South Korea,” Journal of the Korea Institute of Information Security and Cryptology, Vol. 25, No. 6, pp. 1327-1339, December 2015 4. Ilsun You, Yoshiaki Hori and Kouichi Sakurai, “State of Art on Security Protocols for Fast Mobile IPv6,” Journal of The Korean Institute of Information Security & Cryptology, Vol. 20, No. 3, pp. 121- 133, June 2010 5. Ilsun You and Heung-Jun Kim, “A Formal Security Analysis on the Enhanced Route Optimization Protocol for Mobile IPv6,” The Journal of the Korean Institute of Maritime Information and Communication Sciences, Vol. 13, No 04, pp. 691-699, April 2009 6. Ilsun You, Bonam Kim, and Heung-Jun Kim, “Analysis of the Lee-Chen's One-Time Password Authentication Scheme,” The Journal of the Korean Institute of Maritime Information and Communication Sciences, Vol. 13, No 02, pp. 285-292, February 2009 7. Ilsun You, Heung-Jun Kim and Jinyoung Lee, “Improving the CGA-based HMIPv6 Security Protocol,” The Journal of the Korean Institute of Maritime Information and Communication Sciences, Vol. 13, No 01, pp. 95-102, January 2009 8. Hang Bae Chang, Ilsun You, Hyo Beom Ahn, “The Research of End to End Technology for Securing Keyboard Input Information in e-Commerce,” The Journal of Korea Information and Communications Society, Vol. 32, No. 12, pp.377-387, December 2007 9. Ilsun You and Heung-Jun Kim, “A Study on Improving the Subsequent Phase of OMIPv6 Protocol Series,” The Journal of the Korean Institute of Maritime Information and Communication Sciences, Vol. 11, No 11, pp. 2039-2046, November 2007 10. Ilsun You, “Improving the Kang-Park's Protocol for Securing Binding Update in MIPv6,” Journal of The Institute of Electronics Engineers of Korea, Vol. 44-TC, No. 10 pp.148-155, October 2007 11. Sung Kyo Choi and Ilsun You, “A Study on Secure Binding Update Protocol Supporting Mobile Nodes with Constraint Computational Power in Mobile IPv6 Environment,” Journal of Korean Society for Internet Information, Vol. 6, No. 5, pp.11-25, October 2005 12. Ilsun You and Sung Kyo Choi, “An Improvement of Mobile IPv6 Binding Update Protocol Using Address Based Keys,” Journal of The Institute of Electronics Engineers of Korea, Vol. 42-CI, No. 5, pp.21-30, September 2005 13. Ilsun You Youseuk Won and Kyungsan Cho, “An Improved Protocol for the Secure Mobile IPv6 Binding Updates,” The KIPS Transactions: Part C, Vol. 11, No. 5, pp. 605-612, 2004 14. Ilsun You and Kyungsan Cho, “S/KEY Based Secure Authentication Protocol Using Public Key Cryptography,” The KIPS Transactions: Part C, Vol. 10-C, No.6, pp. 755-762, October 2003 15. Ilsun You, Dong-Ryun Lee, Eun-Sook Oh, “Implementing an Intrusion Detection Message Exchange Library for Realtime Interaction between SDMS-RTIR and Heterogeneous Systems,” The KIPS Transactions: Part C, Vol. 10-C, No.5, pp. 565-574, October 2003 16. Ilsun You, Jongeun Kim and Kyungsan Cho, “Secure Communication Framework for the Detection System of Network Vulnerability Scan Attacks,” The KIPS Transactions: Part C, Vol. 10-C, No.1, pp.1-10, February 2003 17. Ilsun You and Kyungsan Cho, “An Improved Detection System for the Network Vulnerability Scan Attacks,” The KIPS Transactions: Part C, Vol. 8-C, No. 5, pp. 543-550, October 2001