Jeong-Nyeo Kim

Learn More
To model a layered video streaming system in super-peer overlay networks that faces with heterogeneity and volatility of peers, we formulate a layer scheduling problem from understanding some constraints such as layer dependency, transmission rule, and bandwidth heterogeneity. To solve this problem, we propose a new layer scheduling algorithm using a(More)
Recently, the number of Internet banking transactions and e-financial services based on the public authentication certificate of smart-phones has rapidly increased. When using e-financial services by using the Android OS-based smart-phones, it is possible to experience the kind of problem related to the easy exposure of the user's personal information saved(More)
Hacking method of decomposing a well-known apps, reverse engineering, inserting malicious code, repackaging of it, and then redistributing it accounts for the majority of Android apps hacking. It is related to the fact that Android App consists of JAVA language and it is easy to apply reverse engineering. We propose a protection solution for this hacking(More)