Hyeokchan Kwon

Orcid: 0000-0002-4120-5999

According to our database1, Hyeokchan Kwon authored at least 20 papers between 1995 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Preliminary Study of Novel Bio-Crypto Key Generation Using Clustering-Based Binarization of ECG Features.
Sensors, March, 2024

Vaccinating Federated Learning for Robust Modulation Classification in Distributed Wireless Networks.
CoRR, 2024

A Zero-Trust Authentication Scheme With Access Control for 6G-Enabled IoT Environments.
IEEE Access, 2024

2021
ECG Authentication Based on Non-Linear Normalization under Various Physiological Conditions.
Sensors, 2021

2020
CNN training for age group prediction in an illumination condition.
ICT Express, 2020

2019
Hybrid approach of parallel implementation on CPU-GPU for high-speed ECDSA verification.
J. Supercomput., 2019

2018
OpenCL Based Implementation of ECDSA Signature Verification for V2X Communication.
Proceedings of the Advanced Multimedia and Ubiquitous Engineering, 2018

Design and Implementation on the Access Control Scheme Against V2N Connected Car Attacks.
Proceedings of the Advanced Multimedia and Ubiquitous Engineering, 2018

Design and Implementation of Security Threat Detection and Access Control System for Connected Car.
Proceedings of the Computational Science/Intelligence & Applied Informatics, 2018

2017
Secure Number Theoretic Transform and Speed Record for Ring-LWE Encryption on Embedded Processors.
Proceedings of the Information Security and Cryptology - ICISC 2017 - 20th International Conference, Seoul, South Korea, November 29, 2017

2015
Detection of Rogue Devices in WLAN by Analyzing RF Features and Indoor Location of the Device.
Proceedings of the Information Security Applications - 16th International Workshop, 2015

2009
Protecting IPTV Service Network against Malicious Rendezvous Point.
Proceedings of the Information Security Applications, 10th International Workshop, 2009

2008
Random Visitor: Defense against Identity Attacks in P2P Networks.
IEICE Trans. Inf. Syst., 2008

2007
Public Key Management Framework for Two-tier Super Peer Architecture.
Proceedings of the 27th International Conference on Distributed Computing Systems Workshops (ICDCS 2007 Workshops), 2007

Performance Prediction in Peer-to-Peer MultiAgent Networks.
Proceedings of the Agents and Peer-to-Peer Computing, 6th International Workshop, 2007

2006
A Protocol Switching Scheme for Developing Network Management Applications.
Proceedings of the Information Networking, 2006

2005
An automatic security test engine for IPv6 network.
Int. J. Wirel. Mob. Comput., 2005

2003
An Automatic Security Evaluation System for IPv6 Network.
Proceedings of the Information Security Applications, 4th International Workshop, 2003

2001
A Migration Strategy of Mobile Agent.
Proceedings of the Eigth International Conference on Parallel and Distributed Systems, 2001

1995
POOSL: A Programming Model for Efficient Parallel Processing in the Message Passing System.
Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, 1995


  Loading...