Jin Wook Byun

Orcid: 0000-0002-5450-3207

According to our database1, Jin Wook Byun authored at least 25 papers between 2002 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Identity-Based Multiproxy Signature With Proxy Signing Key for Internet of Drones.
IEEE Internet Things J., February, 2024

2023
Towards serverless fast one round authentication with two mobile end devices.
J. Supercomput., March, 2023

PUFDid: PUF-based Drone IDentifier and Its Application.
Proceedings of the International Conference on Artificial Intelligence in Information and Communication, 2023

2022
Key Agreement Between User and Drone With Forward Unlinkability in Internet of Drones.
IEEE Access, 2022

2019
Comments on Physically Unclonable Function Based Two-Factor Authentication Protocols.
Wirel. Pers. Commun., 2019

On the Secure Design of Hash-Based Authenticator in the Smartcard Authentication System.
Wirel. Pers. Commun., 2019

A Generic Multifactor Authenticated Key Exchange with Physical Unclonable Function.
Secur. Commun. Networks, 2019

PDAKE: A Provably Secure PUF-Based Device Authenticated Key Exchange in Cloud Setting.
IEEE Access, 2019

End-to-End Authenticated Key Exchange Based on Different Physical Unclonable Functions.
IEEE Access, 2019

An efficient multi-factor authenticated key exchange with physically unclonable function.
Proceedings of the International Conference on Electronics, Information, and Communication, 2019

2015
Privacy preserving smartcard-based authentication system with provable security.
Secur. Commun. Networks, 2015

2011
On a security model of conjunctive keyword search over encrypted relational database.
J. Syst. Softw., 2011

2007
EC2C-PAKA: An efficient client-to-client password-authenticated key agreement.
Inf. Sci., 2007

2006
Security analysis and improvement of a gateway-oriented password-based authenticated key exchange protocol.
IEEE Commun. Lett., 2006

Constant-Round Password-Based Group Key Generation for Multi-layer Ad-Hoc Networks.
Proceedings of the Security in Pervasive Computing, Third International Conference, 2006

Difference Set Attacks on Conjunctive Keyword Search Schemes.
Proceedings of the Secure Data Management, Third VLDB Workshop, SDM 2006, Seoul, Korea, 2006

Off-Line Keyword Guessing Attacks on Recent Keyword Search Schemes over Encrypted Data.
Proceedings of the Secure Data Management, Third VLDB Workshop, SDM 2006, Seoul, Korea, 2006

Efficient Conjunctive Keyword Search on Encrypted Data Storage System.
Proceedings of the Public Key Infrastructure, 2006

Efficient and Provably Secure Client-to-Client Password-Based Key Exchange Protocol.
Proceedings of the Frontiers of WWW Research and Development, 2006

2005
Comments on Weaknesses in Two Group Diffie-Hellman Key Exchange Protocols.
IACR Cryptol. ePrint Arch., 2005

Oblivious Conjunctive Keyword Search.
Proceedings of the Information Security Applications, 6th International Workshop, 2005

Secure Index Search for Groups.
Proceedings of the Trust, 2005

Password-Based Group Key Exchange Secure Against Insider Guessing Attacks.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords.
Proceedings of the Applied Cryptography and Network Security, 2005

2002
Password-Authenticated Key Exchange between Clients with Different Passwords.
Proceedings of the Information and Communications Security, 4th International Conference, 2002


  Loading...