Ji Sun Shin

Orcid: 0000-0002-7626-1528

According to our database1, Ji Sun Shin authored at least 27 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
An Incremental Majority Voting Approach for Intrusion Detection System Based on Machine Learning.
IEEE Access, 2024

2023
A new location verification protocol and blockchain-based drone rental mechanism in smart farming.
Comput. Electron. Agric., November, 2023

Efficient Continuous Key Agreement With Reduced Bandwidth From a Decomposable KEM.
IEEE Access, 2023

2021
Keystroke Dynamics-Based Authentication Using Unique Keypad.
Sensors, 2021

A New Distributed, Decentralized Privacy-Preserving ID Registration System.
IEEE Commun. Mag., 2021

A Verifier-Based Password-Authenticated Key Exchange Using Tamper-Proof Hardware.
Comput. J., 2021

2020
Graphical passwords: Behind the attainment of goals.
Secur. Priv., 2020

A New Feature Scoring Method in Keystroke Dynamics-Based User Authentications.
IEEE Access, 2020

2019
A parameterized model to select discriminating features on keystroke dynamics authentication on smartphones.
Pervasive Mob. Comput., 2019

A Privacy Preserving three-factor authenticated key agreement protocol for client-server environment.
J. Ambient Intell. Humaniz. Comput., 2019

Cryptoanalysis on 'A round-optimal lattice-based blind signature scheme for cloud services'.
Future Gener. Comput. Syst., 2019

2018
Understanding Keystroke Dynamics for Smartphone Users Authentication and Keystroke Dynamics on Smartphones Built-In Motion Sensors.
Secur. Commun. Networks, 2018

An Empirical Performance Analysis on Hadoop via Optimizing the Network Heartbeat Period.
KSII Trans. Internet Inf. Syst., 2018

Forward-secure ID based digital signature scheme with forward-secure private key generator.
Inf. Sci., 2018

In-Storage Anti-Virus System via On-Demand Inspection.
IEICE Trans. Inf. Syst., 2018

Round-Reduced Modular Construction of Asymmetric Password-Authenticated Key Exchange.
Proceedings of the Security and Cryptography for Networks - 11th International Conference, 2018

2017
DiSC: A Distributed In-Storage Computing Platform Using Cost-Effective Hardware Devices.
IEICE Trans. Inf. Syst., 2017

Evolution of Spamming Attacks on Facebook.
Proceedings of the Information Security Applications - 18th International Conference, 2017

2016
LigeroAV: A Light-Weight, Signature-Based Antivirus for Mobile Environment.
IEICE Trans. Inf. Syst., 2016

2015
Network Adversary Attacks against Secure Encryption Schemes.
IEICE Trans. Commun., 2015

2013
A New Privacy-Enhanced Matchmaking Protocol.
IEICE Trans. Commun., 2013

2012
Tidal flat reflectance model accommodating tidal conditions using Geostationary Ocean Color Imager (GOCI): Preliminary results.
Proceedings of the 2012 IEEE International Geoscience and Remote Sensing Symposium, 2012

2010
Parallel and Concurrent Security of the HB and HB<sup>+</sup> Protocols.
J. Cryptol., 2010

2009
Enhancing Privacy in Cryptographic Protocols.
PhD thesis, 2009

2006
Parallel and Concurrent Security of the HB and HB<sup>+</sup> Protocols.
Proceedings of the Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28, 2006

2005
Parallel and Concurrent Security of the HB and HB+ Protocols.
IACR Cryptol. ePrint Arch., 2005

Modeling Insider Attacks on Group Key-Exchange Protocols.
IACR Cryptol. ePrint Arch., 2005


  Loading...