Taek-Young Youn
Orcid: 0000-0002-3840-2254
According to our database1,
Taek-Young Youn
authored at least 43 papers
between 2005 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
Proceedings of the Applied Cryptography and Network Security Workshops, 2023
2022
IEICE Trans. Inf. Syst., November, 2022
Fully Dynamic Data Management in Cloud Storage Systems with Secure Proof of Retrievability.
IEICE Trans. Inf. Syst., November, 2022
2021
Secure Data Management using Distributed Storages for Stronger Cybersecurity in Cloud Service.
Proceedings of the 2021 World Automation Congress, 2021
Efficient Data Delivery in Content-Centric Network with Stronger Privacy of Publisher.
Proceedings of the International Conference on Information Networking, 2021
2020
Trapdoor Digital Shredder: A New Technique for Improved Data Security without Cryptographic Encryption.
KSII Trans. Internet Inf. Syst., 2020
Practical Sender Authentication Scheme for In-Vehicle CAN With Efficient Key Management.
IEEE Access, 2020
2019
Wirel. Commun. Mob. Comput., 2019
UAV-Undertaker: Securely Verifiable Remote Erasure Scheme with a Countdown-Concept for UAV via Randomized Data Synchronization.
Wirel. Commun. Mob. Comput., 2019
CAN ID Shuffling Technique (CIST): Moving Target Defense Strategy for Protecting In-Vehicle CAN.
IEEE Access, 2019
Proceedings of the Information Security Applications - 20th International Conference, 2019
2018
Design of additive homomorphic encryption with multiple message spaces for secure and practical storage services over encrypted data.
J. Supercomput., 2018
TLDA: An Efficient Two-Layered Data Authentication Mechanism for Content-Centric Networking.
Secur. Commun. Networks, 2018
TIM: A Trapdoor Hash Function-based Authentication Mechanism for Streaming Applications.
KSII Trans. Internet Inf. Syst., 2018
Bi-directional and concurrent proof of ownership for stronger storage services with de-duplication.
Sci. China Inf. Sci., 2018
Efficient Client-Side Deduplication of Encrypted Data With Public Auditing in Cloud Storage.
IEEE Access, 2018
Non-Repudiable Dynamic PDP with Stronger Security based on Stateful Rank Based Skip List.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2018
2017
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2017
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2017
2016
Semi-Generic Transformation of Revocable Hierarchical Identity-Based Encryption and Its DBDH Instantiation.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016
2015
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2015
2014
J. Intell. Manuf., 2014
Int. J. Distributed Sens. Networks, 2014
Authenticated Distance Bounding Protocol with Improved FAR: Beyond the Minimal Bound of FAR.
IEICE Trans. Commun., 2014
Proceedings of the Frontier and Innovation in Future Computing and Communications, 2014
2013
Telecommun. Syst., 2013
2012
Signcryption with fast online signing and short signcryptext for secure and private mobile communication.
Sci. China Inf. Sci., 2012
2011
An efficient non-interactive deniable authentication scheme based on trapdoor commitment schemes.
Comput. Commun., 2011
2010
IEEE Commun. Lett., 2010
Improved Delegation-Based Authentication Protocol for Secure Roaming Service with Unlinkability.
IEEE Commun. Lett., 2010
2009
IEICE Trans. Inf. Syst., 2009
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
Weaknesses in an anonymous authentication scheme for roaming service in global mobility networks.
IEEE Commun. Lett., 2009
2008
Inf. Process. Lett., 2008
Efficient Flexible Batch Signing Techniques for Imbalanced Communication Applications.
IEICE Trans. Inf. Syst., 2008
2006
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006
On the Security of Multilevel Cryptosystems over Class Semigroups of Imaginary Quadratic Non-maximal Orders.
Proceedings of the Public Key Infrastructure, 2006
2005
An Efficient Public Key Cryptosystem with a Privacy Enhanced Double Decryption Mechanism.
Proceedings of the Selected Areas in Cryptography, 12th International Workshop, 2005