Junbeom Hur
Orcid: 0000-0002-4823-4194
According to our database1,
Junbeom Hur
authored at least 126 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IEEE Trans. Inf. Forensics Secur., 2024
$\gamma$γ-Knife: Extracting Neural Network Architecture Through Software-Based Power Side-Channel.
IEEE Trans. Dependable Secur. Comput., 2024
PhishinWebView: Analysis of Anti-Phishing Entities in Mobile Apps with WebView Targeted Phishing.
Proceedings of the ACM on Web Conference 2024, 2024
Proceedings of the International Conference on Information Networking, 2024
Beneath the Phishing Scripts: A Script-Level Analysis of Phishing Kits and Their Impact on Real-World Phishing Websites.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
2023
Detect Your Fingerprint in Your Photographs: Photography-based Multi-Feature Sybil Detection.
Proc. Priv. Enhancing Technol., January, 2023
IEEE Trans. Serv. Comput., 2023
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
Shedding Light on Blind Spot of Backward Privacy in Dynamic Searchable Symmetric Encryption.
IEEE Access, 2023
Did the Shark Eat the Watchdog in the NTP Pool? Deceiving the NTP Pool's Monitoring System.
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
A Honey postMessage, but a Heart of Gall: Exploiting Push Service in Service Workers Via postMessage.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023
2022
IEEE Trans. Serv. Comput., 2022
ACM Trans. Internet Techn., 2022
IEEE Trans. Cloud Comput., 2022
IEEE Access, 2022
Proceedings of the 25th International Symposium on Research in Attacks, 2022
Proceedings of the MobiHoc '22: The Twenty-third International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing, Seoul, Republic of Korea, October 17, 2022
Comparative Analysis of Forward and Backward Private Searchable Encryption using SGX.
Proceedings of the 13th International Conference on Information and Communication Technology Convergence, 2022
Proceedings of the 13th International Conference on Information and Communication Technology Convergence, 2022
Proceedings of the 13th International Conference on Information and Communication Technology Convergence, 2022
Proceedings of the 13th International Conference on Information and Communication Technology Convergence, 2022
Proceedings of the 26th International Conference on Pattern Recognition, 2022
Proceedings of the International Conference on Information Networking, 2022
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022
2021
Comput. Informatics, 2021
Proceedings of the IEEE World Congress on Services, 2021
Efficient Fully Anonymous Public-Key Trace and Revoke with Adaptive IND-CCA Security.
Proceedings of the Information Security Practice and Experience: 16th International Conference, 2021
Proceedings of the International Conference on Information Networking, 2021
Proceedings of the International Conference on Information Networking, 2021
2020
IEEE Trans. Serv. Comput., 2020
IEEE Trans. Inf. Forensics Secur., 2020
Toward Serverless and Efficient Encrypted Deduplication in Mobile Cloud Computing Environments.
Secur. Commun. Networks, 2020
Collusion Attacks on Decentralized Attributed-Based Encryption: Analyses and a Solution.
CoRR, 2020
Inferring Firewall Rules by Cache Side-channel Analysis in Network Function Virtualization.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
Proceedings of the International Conference on Information and Communication Technology Convergence, 2020
Proceedings of the 2020 International Conference on Information Networking, 2020
Proceedings of the CoNEXT '20: The 16th International Conference on emerging Networking EXperiments and Technologies, 2020
Proceedings of the 13th IEEE International Conference on Cloud Computing, 2020
2019
Wirel. Pers. Commun., 2019
Peer-to-Peer Netw. Appl., 2019
IEEE Internet Things J., 2019
Future Gener. Comput. Syst., 2019
Shedding Light on Dark Korea: An In-Depth Analysis and Profiling of the Dark Web in Korea.
Proceedings of the Information Security Applications - 20th International Conference, 2019
Analysis of Forward Private Searchable Encryption and Its Application to Multi-Client Settings.
Proceedings of the Eleventh International Conference on Ubiquitous and Future Networks, 2019
2018
Privacy-preserving deduplication of encrypted data with dynamic ownership management in fog computing.
Future Gener. Comput. Syst., 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Proceedings of the 2nd ACM Workshop on Blockchains, Cryptocurrencies, and Contracts, 2018
Privacy-Preserving and Updatable Block-Level Data Deduplication in Cloud Storage Services.
Proceedings of the 11th IEEE International Conference on Cloud Computing, 2018
Toward Trustworthy Delegation: Verifiable Outsourced Decryption with Tamper-Resistance in Public Cloud Storage.
Proceedings of the 11th IEEE International Conference on Cloud Computing, 2018
2017
Privacy-Preserving Electrocardiogram Monitoring for Intelligent Arrhythmia Detection.
Sensors, 2017
Multim. Tools Appl., 2017
Secure authentication using ciphertext policy attribute-based encryption in mobile multi-hop networks.
Multim. Tools Appl., 2017
Multim. Tools Appl., 2017
IEICE Trans. Inf. Syst., 2017
ACM Comput. Surv., 2017
Proceedings of the 2017 IEEE International Conference on Systems, Man, and Cybernetics, 2017
Proceedings of the 2017 IEEE International Conference on Systems, Man, and Cybernetics, 2017
An Online Data-Oriented Authentication Based on Merkle Tree with Improved Reliability.
Proceedings of the 2017 IEEE International Conference on Web Services, 2017
Proceedings of the Ninth International Conference on Ubiquitous and Future Networks, 2017
Proceedings of the 2017 International Conference on Information Networking, 2017
Authenticated Key Exchange, Signcryption and Deniable Signcryption Protocols Based on Two Hard Problems.
Proceedings of the International Conference on Advanced Computing and Applications, 2017
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017
2016
IEEE Trans. Knowl. Data Eng., 2016
Privacy-preserving public auditing for educational multimedia data in cloud computing.
Multim. Tools Appl., 2016
Enhanced authentication for outsourced educational contents through provable block possession.
Multim. Tools Appl., 2016
Efficient Attribute-Based Secure Data Sharing with Hidden Policies and Traceability in Mobile Health Networks.
Mob. Inf. Syst., 2016
J. Commun. Networks, 2016
IEICE Trans. Inf. Syst., 2016
ICT Express, 2016
Proceedings of the Information Security Applications - 17th International Workshop, 2016
Proceedings of the Eighth International Conference on Ubiquitous and Future Networks, 2016
Recommendations for antiarrhythmic drugs based on latent semantic analysis with fc-means clustering.
Proceedings of the 38th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2016
Proceedings of the 2016 IEEE International Conference on Cloud Computing Technology and Science, 2016
Proceedings of the 2016 IEEE International Conference on Cloud Computing Technology and Science, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the 2016 International Conference on Big Data and Smart Computing, 2016
2015
Secure pattern-based authentication against shoulder surfing attack in smart devices.
Proceedings of the Seventh International Conference on Ubiquitous and Future Networks, 2015
Proceedings of the Seventh International Conference on Ubiquitous and Future Networks, 2015
2014
IEEE/ACM Trans. Netw., 2014
KSII Trans. Internet Inf. Syst., 2014
J. Res. Pract. Inf. Technol., 2014
Proceedings of the Wireless Algorithms, Systems, and Applications, 2014
Proceedings of the Wireless Algorithms, Systems, and Applications, 2014
Fully-distributed multicast routing protocol for IEEE 802.15.8 peer-aware communications.
Proceedings of the International Conference on Information Networking 2014, 2014
Secure and Efficient Deduplication over Encrypted Data with Dynamic Updates in Cloud Storage.
Proceedings of the Frontier and Innovation in Future Computing and Communications, 2014
2013
Wirel. Networks, 2013
IEEE Trans. Parallel Distributed Syst., 2013
IEEE Trans. Knowl. Data Eng., 2013
IEEE J. Biomed. Health Informatics, 2013
EURASIP J. Wirel. Commun. Netw., 2013
Comput. Math. Appl., 2013
Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage.
Comput. Electr. Eng., 2013
2012
Scalable and efficient approach for secure group communication using proxy cryptography.
Wirel. Networks, 2012
IEEE Wirel. Commun., 2012
Secur. Commun. Networks, 2012
Authenticated public key broadcast encryption scheme secure against insiders' attack.
Math. Comput. Model., 2012
J. Netw. Comput. Appl., 2012
IACR Cryptol. ePrint Arch., 2012
Comput. Commun., 2012
Proceedings of the 15th International Conference on Network-Based Information Systems, 2012
2011
Wirel. Networks, 2011
Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems.
IEEE Trans. Parallel Distributed Syst., 2011
2010
A Multi-service Group Key Management Scheme for Stateless Receivers in Wireless Mesh Networks.
Mob. Networks Appl., 2010
IEICE Electron. Express, 2010
Chosen ciphertext secure authenticated group communication using identity-based signcryption.
Comput. Math. Appl., 2010
2009
Bandwidth efficient key distribution for secure multicast in dynamic wireless mesh networks.
Proceedings of the 2009 IEEE Wireless Communications and Networking Conference, 2009
A Distributed Deterministic and Resilient Replication Attack Detection Protocol in Wireless Sensor Networks.
Proceedings of the Communication and Networking, 2009
2008
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008
2007
A New Binary Image Authentication Scheme with Small Distortion and Low False Negative Rates.
IEICE Trans. Commun., 2007
Proceedings of the Q2SWinet'07, 2007
Proceedings of the Advances in Information and Computer Security, 2007
An Efficient Proactive Key Distribution Scheme for Fast Handoff in IEEE 802.11 Wireless Networks.
Proceedings of the Information Networking. Towards Ubiquitous Networking and Services, 2007
2006
Proceedings of the Information Security Applications, 7th International Workshop, 2006
2005
Proceedings of the Information Security and Cryptology, 2005