Hyunsung Kim
Orcid: 0000-0002-7814-7454Affiliations:
- Kyungil University, Department of Cyber Security, Gyeongsan, South Korea
According to our database1,
Hyunsung Kim
authored at least 68 papers
between 1999 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2023
Optimal ElGamal Encryption with Hybrid Deep-Learning-Based Classification on Secure Internet of Things Environment.
Sensors, 2023
FakedBits- Detecting Fake Information on Social Platforms using Multi-Modal Features.
KSII Trans. Internet Inf. Syst., 2023
2022
Using XAI for Deep Learning-Based Image Manipulation Detection with Shapley Additive Explanation.
Symmetry, 2022
A survey on security challenges and protocols of electric vehicle dynamic charging system.
Secur. Priv., 2022
Certificate-less authenticated key agreement scheme with anonymity for smart grid communications.
J. Intell. Fuzzy Syst., 2022
Provably Secure Pseudo-Identity Three-Factor Authentication Protocol Based on Extended Chaotic-Maps for Lightweight Mobile Devices.
IEEE Access, 2022
2021
Privacy preserving authenticated key agreement based on bilinear pairing for uHealthcare.
Int. Arab J. Inf. Technol., 2021
Lightweight Privacy-Preserving Data Aggregation Scheme Based on Elliptic Curve Cryptography for Smart Grid Communications.
Proceedings of the Smart Grid and Internet of Things - 5th EAI International Conference, 2021
Proceedings of the IEEE Latin-American Conference on Communications, 2021
2020
Informatica, 2020
2019
Secur. Commun. Networks, 2019
2017
J. Sens. Actuator Networks, 2017
Int. J. Comput. Commun. Control, 2017
2015
An efficient privacy-preserving authentication scheme with adaptive key evolution in remote health monitoring system.
Peer-to-Peer Netw. Appl., 2015
2014
Sensors, 2014
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014
2013
An Efficient Broadcast Authentication Scheme with Batch Verification for ADS-B Messages.
KSII Trans. Internet Inf. Syst., 2013
KSII Trans. Internet Inf. Syst., 2013
Proceedings of the 14th ACIS International Conference on Software Engineering, 2013
Security Concerns of Identity Authentication and Context Privacy Preservation in uHealthcare System.
Proceedings of the 14th ACIS International Conference on Software Engineering, 2013
Proceedings of the Multimedia and Ubiquitous Engineering, 2013
Proceedings of the Multimedia and Ubiquitous Engineering, 2013
Proceedings of the Multimedia and Ubiquitous Engineering, 2013
Proceedings of the Multimedia and Ubiquitous Engineering, 2013
A Pairing-Free Public Key Encryption with Keyword Searching for Cloud Storage Services.
Proceedings of the e-Infrastructure and e-Services for Developing Countries, 2013
A Pairing Based Authentication and Key Establishment Scheme for Remote Patient Monitoring Systems.
Proceedings of the e-Infrastructure and e-Services for Developing Countries, 2013
2012
Math. Comput. Model., 2012
2011
Location-based authentication protocol for first cognitive radio networking standard.
J. Netw. Comput. Appl., 2011
AUTH<sub>HOTP</sub> - HOTP Based Authentication Scheme over Home Network Environment.
Proceedings of the Computational Science and Its Applications - ICCSA 2011, 2011
Proceedings of the Computational Science and Its Applications - ICCSA 2011, 2011
Robust Attributes-Based Authenticated Key Agreement Protocol Using Smart Cards over Home Network.
Proceedings of the Computational Science and Its Applications - ICCSA 2011, 2011
2010
Proceedings of the Data and Applications Security and Privacy XXIV, 2010
2009
IEEE Trans. Consumer Electron., 2009
Comput. Stand. Interfaces, 2009
2008
Proceedings of the Computational Science and Its Applications - ICCSA 2008, International Conference, Perugia, Italy, June 30, 2008
2007
Energy Efficient Data-centric Routing Protocol Over Wireless Sensor Network.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2007
2006
Low Complexity Systolic Architecture for Modular Multiplication over GF(2<sup><i>m</i></sup>).
Proceedings of the Computational Science, 2006
2005
Comput. Stand. Interfaces, 2005
Efficient verifier-based key agreement protocol for three parties without server's public key.
Appl. Math. Comput., 2005
Appl. Math. Comput., 2005
Appl. Math. Comput., 2005
2004
Comment on "A remote user authentication scheme using smart cards with forward secrecy.
IEEE Trans. Consumer Electron., 2004
IEEE Trans. Consumer Electron., 2004
ACM SIGOPS Oper. Syst. Rev., 2004
Proceedings of the Computational Science and Its Applications, 2004
2003
ACM SIGOPS Oper. Syst. Rev., 2003
ACM SIGOPS Oper. Syst. Rev., 2003
Proceedings of the Security in Pervasive Computing, 2003
New AB<sup>2</sup> Multiplier over GF(2<sup>m</sup>) using Cellular Automata.
Proceedings of the ISCA 18th International Conference Computers and Their Applications, 2003
Secure Authenticated Key Exchange Protocol.
Proceedings of the ISCA 18th International Conference Computers and Their Applications, 2003
ID-based Key Exchange Protocol using Smart Cards with Fingerprint.
Proceedings of the ISCA 16th International Conference on Parallel and Distributed Computing Systems, 2003
2002
New Parallel Architecture for Modular Multiplication and Squaring Based on Cellular Automata.
Proceedings of the Applied Parallel Computing Advanced Scientific Computing, 2002
Proceedings of the Infrastructure Security, International Conference, 2002
Proceedings of the Information Networking, 2002
Proceedings of the EurAsia-ICT 2002: Information and Communication Technology, 2002
Design of New Multiplier/Squarer using Montgomery Algorithm over GF(2<sup>m</sup>) Based on Cellular Automata.
Proceedings of the ISCA 17th International Conference Computers and Their Applications, 2002
Basic Architecture for Modular Exponentiation over GF(2<sup>m</sup>).
Proceedings of the ISCA 17th International Conference Computers and Their Applications, 2002
New AB<sup>2</sup> Systolic Architectures in GF(2<sup>m</sup>).
Proceedings of the ISCA 17th International Conference Computers and Their Applications, 2002
2001
Proceedings of the Computing and Combinatorics, 7th Annual International Conference, 2001
Area Efficient Architecture for Multiplication and Squaring in GF(2^m) using Irreducible AOP.
Proceedings of the ISCA 14th International Conference on Parallel and Distributed Computing Systems, 2001
2000
Inf. Process. Lett., 2000
1999
Pipelined Systolic Multiplier for Finite Fields GF (2<sup>m</sup>).
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1999
Proceedings of the 1999 International Conference on Parallel Processing Workshops, 1999
Proceedings of the Computing and Combinatorics, 5th Annual International Conference, 1999