Seung-Hyun Seo

Orcid: 0000-0002-1150-7080

According to our database1, Seung-Hyun Seo authored at least 45 papers between 2003 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Exclusively in-store: Acoustic location authentication for stationary business devices.
J. Netw. Comput. Appl., 2024

2023
A Blockchain-Based Mobile Crowdsensing and Its Incentive Mechanism.
Proceedings of the Information Security Applications - 24th International Conference, 2023

The core nodes identification method through adjustable network topology information.
Proceedings of the 7th Asia-Pacific Workshop on Networking, 2023

2022
Design of a Two Layered Blockchain-Based Reputation System in Vehicular Networks.
IEEE Trans. Veh. Technol., 2022

Public Participation Consortium Blockchain for Smart City Governance.
IEEE Internet Things J., 2022

Multivariate Quadratic Solver in GF(31) with Grover's Algorithm.
Proceedings of the International Conference on Electronics, Information, and Communication, 2022

2021
Two-Factor Device DNA-Based Fuzzy Vault for Industrial IoT Device Security.
IEEE Access, 2021

Echo-Guard: Acoustic-Based Anomaly Detection System for Smart Manufacturing Environments.
Proceedings of the Information Security Applications - 22nd International Conference, 2021

A Privacy-Preserving Payment Model for EV Charging.
Proceedings of the Information Security Applications - 22nd International Conference, 2021

2020
A Secure Shuffling Mechanism for White-Box Attack-Resistant Unmanned Vehicles.
IEEE Trans. Mob. Comput., 2020

PCA-CIA Ensemble-based Feature Extraction for Bio-Key Generation.
KSII Trans. Internet Inf. Syst., 2020

Quantum Modular Multiplication.
IEEE Access, 2020

Random Number Generator Using Sensors for Drone.
IEEE Access, 2020

2019
Two-Factor Fuzzy Commitment for Unmanned IoT Devices Security.
IEEE Internet Things J., 2019

A Comparison of NIST 2nd Round Candidates' MQ-based Signature Schemes.
Proceedings of the 2019 International Conference on Information and Communication Technology Convergence, 2019

2018
A Lightweight Encryption Method for Privacy Protection in Surveillance Videos.
IEEE Access, 2018

2017
Secure Utilization of Beacons and UAVs in Emergency Response Systems for Building Fire Hazard.
Sensors, 2017

Secure and Usable Bio-Passwords based on Confidence Interval.
J. Internet Serv. Inf. Secur., 2017

Certificateless Cryptographic Protocols for Efficient Drone-Based Smart City Applications.
IEEE Access, 2017

The Congestion Control Model for Unmanned Aircraft System Traffic Management.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2017

2016
pCLSC-TKEM: a Pairing-free Certificateless Signcryption-tag Key Encapsulation Mechanism for a Privacy-Preserving IoT.
Trans. Data Priv., 2016

Preserving Patient's Anonymity for Mobile Healthcare System in IoT Environment.
Int. J. Distributed Sens. Networks, 2016

A Security Framework for a Drone Delivery Service.
Proceedings of the 2nd Workshop on Micro Aerial Vehicle Networks, 2016

2015
Effective Key Management in Dynamic Wireless Sensor Networks.
IEEE Trans. Inf. Forensics Secur., 2015

A Strengthened Android Signature Management Method.
KSII Trans. Internet Inf. Syst., 2015

Scalable end-to-end security for advanced metering infrastructures.
Inf. Syst., 2015

Preserving biosensor users' anonymity over wireless cellular network.
Proceedings of the Seventh International Conference on Ubiquitous and Future Networks, 2015

A Secure Communication Protocol for Drones and Smart Objects.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds.
IEEE Trans. Knowl. Data Eng., 2014

Detecting mobile malware threats to homeland security through static analysis.
J. Netw. Comput. Appl., 2014

POSTER: a pairing-free certificateless hybrid sign-cryption scheme for advanced metering infrastructures.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

2013
Encryption key management for secure communication in smart advanced metering infrastructures.
Proceedings of the IEEE Fourth International Conference on Smart Grid Communications, 2013

Potential vulnerability analysis of mobile banking applications.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2013

An efficient certificateless cryptography scheme without pairing.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013

2012
Efficient certificateless proxy signature scheme with provable security.
Inf. Sci., 2012

Analysis on Maliciousness for Mobile Applications.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

An Access Control Mechanism for Remote Control of Home Security System.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

Mobile Malware Threats and Defenses for Homeland Security.
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012

2008
Identity-based universal designated multi-verifiers signature schemes.
Comput. Stand. Interfaces, 2008

2006
Cryptanalysis of ID-Based Authenticated Key Agreement Protocols from Bilinear Pairings (Short Paper).
Proceedings of the Information and Communications Security, 8th International Conference, 2006

2005
A Mediated Proxy Signature Scheme with Fast Revocation for Electronic Transactions.
Proceedings of the Trust, 2005

A Secure Mobile Agent Protocol for AMR Systems in Home Network Environments.
Proceedings of the Information Networking, 2005

Security Analysis of Password-Authenticated Key Agreement Protocols.
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005

2004
A Secure and Flexible Multi-signcryption Scheme.
Proceedings of the Computational Science and Its Applications, 2004

2003
A Secure Mobile Agent System Using Multi-signature Scheme in Electronic Commerce.
Proceedings of the Web Communication Technologies and Internet-Related Social Issues, 2003


  Loading...