Sooyeon Shin

Orcid: 0009-0003-0462-9172

According to our database1, Sooyeon Shin authored at least 18 papers between 2005 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
The Day Spring Comes.
Proceedings of the SIGGRAPH Asia 2023 Computer Animation Festival, 2023

2020
A Privacy-Preserving Authentication, Authorization, and Key Agreement Scheme for Wireless Sensor Networks in 5G-Integrated Internet of Things.
IEEE Access, 2020

2019
A Lightweight Three-Factor Authentication and Key Agreement Scheme in Wireless Sensor Networks for Smart Homes.
Sensors, 2019

Detection of malicious packet dropping attacks in RPL-based internet of things.
Int. J. Ad Hoc Ubiquitous Comput., 2019

Draw It As Shown: Behavioral Pattern Lock for Mobile User Authentication.
IEEE Access, 2019

2018
Two-Factor Authenticated Key Agreement Supporting Unlinkability in 5G-Integrated Wireless Sensor Networks.
IEEE Access, 2018

A Guided Approach to Behavioral Authentication.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Experimental performance analysis of lightweight block ciphers and message authentication codes for wireless sensor networks.
Int. J. Distributed Sens. Networks, 2017

A corrupted cloud and corrupted multi-cloud identification method for batch auditing in cloud storage services.
Comput. Syst. Sci. Eng., 2017

2015
A Survey of Public Provable Data Possession Schemes with Batch Verification in Cloud Storage.
J. Internet Serv. Inf. Secur., 2015

Identification of Corrupted Cloud Storage in Batch Auditing for Multi-Cloud Environments.
Proceedings of the Information and Communication Technology, 2015

2014
Covert Attentional Shoulder Surfing: Human Adversaries Are More Powerful Than Expected.
IEEE Trans. Syst. Man Cybern. Syst., 2014

Touch pointer: rethink point-and-click for accurate indirect touch interactions on small touchscreens.
IEEE Trans. Consumer Electron., 2014

AAnA: Anonymous authentication and authorization based on short traceable signatures.
Int. J. Inf. Sec., 2014

2010
An Experimental Study of Hierarchical Intrusion Detection for Wireless Industrial Sensor Networks.
IEEE Trans. Ind. Informatics, 2010

2007
Efficient and Secure Key Agreement for Merging Clusters in Ad-Hoc Networking Environments.
IEICE Trans. Commun., 2007

Multi-modal Authentication for Ubiquitous Computing Environments.
Proceedings of the Universal Access in Human-Computer Interaction. Ambient Interaction, 2007

2005
Efficient Key Agreement for Merging Clusters in Ad-Hoc Networking Environments.
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005


  Loading...