Jin Wook Byun
Orcid: 0000-0002-5450-3207
According to our database1,
Jin Wook Byun
authored at least 25 papers
between 2002 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IEEE Internet Things J., February, 2024
2023
J. Supercomput., March, 2023
Proceedings of the International Conference on Artificial Intelligence in Information and Communication, 2023
2022
Key Agreement Between User and Drone With Forward Unlinkability in Internet of Drones.
IEEE Access, 2022
2019
Comments on Physically Unclonable Function Based Two-Factor Authentication Protocols.
Wirel. Pers. Commun., 2019
On the Secure Design of Hash-Based Authenticator in the Smartcard Authentication System.
Wirel. Pers. Commun., 2019
Secur. Commun. Networks, 2019
PDAKE: A Provably Secure PUF-Based Device Authenticated Key Exchange in Cloud Setting.
IEEE Access, 2019
End-to-End Authenticated Key Exchange Based on Different Physical Unclonable Functions.
IEEE Access, 2019
An efficient multi-factor authenticated key exchange with physically unclonable function.
Proceedings of the International Conference on Electronics, Information, and Communication, 2019
2015
Secur. Commun. Networks, 2015
2011
On a security model of conjunctive keyword search over encrypted relational database.
J. Syst. Softw., 2011
2007
Inf. Sci., 2007
2006
Security analysis and improvement of a gateway-oriented password-based authenticated key exchange protocol.
IEEE Commun. Lett., 2006
Proceedings of the Security in Pervasive Computing, Third International Conference, 2006
Proceedings of the Secure Data Management, Third VLDB Workshop, SDM 2006, Seoul, Korea, 2006
Off-Line Keyword Guessing Attacks on Recent Keyword Search Schemes over Encrypted Data.
Proceedings of the Secure Data Management, Third VLDB Workshop, SDM 2006, Seoul, Korea, 2006
Proceedings of the Public Key Infrastructure, 2006
Proceedings of the Frontiers of WWW Research and Development, 2006
2005
IACR Cryptol. ePrint Arch., 2005
Proceedings of the Information Security Applications, 6th International Workshop, 2005
Proceedings of the Computational Intelligence and Security, International Conference, 2005
Proceedings of the Applied Cryptography and Network Security, 2005
2002
Proceedings of the Information and Communications Security, 4th International Conference, 2002