Heekuck Oh

Orcid: 0000-0002-2989-8737

According to our database1, Heekuck Oh authored at least 92 papers between 1989 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
3-Multi ranked encryption with enhanced security in cloud computing.
Digit. Commun. Networks, April, 2023

2022
BinDiff<sub>NN</sub>: Learning Distributed Representation of Assembly for Robust Binary Diffing Against Semantic Differences.
IEEE Trans. Software Eng., 2022

2021
Efficient Features for Function Matching in Multi-Architecture Binary Executables.
IEEE Access, 2021

NPDHunter: Efficient Null Pointer Dereference Vulnerability Detection in Binary.
IEEE Access, 2021

2020
IPsec for high speed network links: Performance analysis and enhancements.
Future Gener. Comput. Syst., 2020

2019
A reliable adaptive forwarding approach in named data networking.
Future Gener. Comput. Syst., 2019

2018
A trust-based method for mitigating cache poisoning in Name Data Networking.
J. Netw. Comput. Appl., 2018

A Solution towards Eliminating Transaction Malleability in Bitcoin.
J. Inf. Process. Syst., 2018

Secure and Privacy-Aware Incentives-Based Witness Service in Social Internet of Vehicles Clouds.
IEEE Internet Things J., 2018

REPICA: Rewriting Position Independent Code of ARM.
IEEE Access, 2018

2017
A New Privacy Aware Payment Scheme for Wireless Charging of Electric Vehicles.
Wirel. Pers. Commun., 2017

Priority-Aware Interests Similarity Protocol (PAISP) for Proximity Based Mobile Social Network.
Wirel. Pers. Commun., 2017

PBF: A New Privacy-Aware Billing Framework for Online Electric Vehicles with Bidirectional Auditability.
Wirel. Commun. Mob. Comput., 2017

Privacy-Preserving Electrocardiogram Monitoring for Intelligent Arrhythmia Detection.
Sensors, 2017

Computational data privacy in wireless networks.
Peer-to-Peer Netw. Appl., 2017

Constructing event-driven partial barriers with resilience in wireless mobile sensor networks.
J. Netw. Comput. Appl., 2017

A new outsourcing conditional proxy re-encryption suitable for mobile cloud environment.
Concurr. Comput. Pract. Exp., 2017

PB-MII: replacing static RSUs with public buses-based mobile intermediary infrastructure in urban VANET-based clouds.
Clust. Comput., 2017

Performance Modeling and Analysis of Decentralized Environmental Notification Message in Vehicular Networks.
Ad Hoc Sens. Wirel. Networks, 2017

A Hybrid Approach for Efficient Privacy-Preserving Authentication in VANET.
IEEE Access, 2017

2016
Traffic Information Dissemination System: Extending Cooperative Awareness Among Smart Vehicles with only Single-Hop Beacons in VANET.
Wirel. Pers. Commun., 2016

Vehicle mobility driven by traditional drivers versus connected drivers.
Wirel. Networks, 2016

Modeling and performance analysis of dynamic spectrum sharing between DSRC and Wi-Fi systems.
Wirel. Commun. Mob. Comput., 2016

The Joint Adaptive Kalman Filter (JAKF) for Vehicle Motion State Estimation.
Sensors, 2016

Performance analysis of prioritized broadcast service in WAVE/IEEE 802.11p.
Comput. Networks, 2016

Computational Security for Context-Awareness in Vehicular Ad-Hoc Networks.
IEEE Access, 2016

A Hierarchical Privacy Preserving Pseudonymous Authentication Protocol for VANET.
IEEE Access, 2016

PRISM: PRivacy-Aware Interest Sharing and Matching in Mobile Social Networks.
IEEE Access, 2016

Event-driven partial barriers in wireless sensor networks.
Proceedings of the 2016 International Conference on Computing, 2016

A New Mobile Online Social Network Based Location Sharing with Enhanced Privacy Protection.
Proceedings of the 25th International Conference on Computer Communication and Networks, 2016

Rumor Propagation Detection System in Social Network Services.
Proceedings of the Computational Social Networks - 5th International Conference, 2016

Trust Evaluation Based Friend Recommendation in Proximity Based Mobile Social Network.
Proceedings of the Computational Social Networks - 5th International Conference, 2016

CACPPA: A Cloud-Assisted Conditional Privacy Preserving Authentication Protocol for VANET.
Proceedings of the IEEE/ACM 16th International Symposium on Cluster, 2016

Say Hello Again: Privacy Preserving Matchmaking Using Cloud in Encounter Based Mobile Social Networks.
Proceedings of the IEEE/ACM 16th International Symposium on Cluster, 2016

2015
A Paradigm Shift from Vehicular Ad Hoc Networks to VANET-Based Clouds.
Wirel. Pers. Commun., 2015

Secure and privacy-aware traffic information as a service in VANET-based clouds.
Pervasive Mob. Comput., 2015

PBF: A New Privacy-Aware Billing Framework for Online Electric Vehicles with Bidirectional Auditability.
CoRR, 2015

A two level privacy preserving pseudonymous authentication protocol for VANET.
Proceedings of the 11th IEEE International Conference on Wireless and Mobile Computing, 2015

On security and privacy issues of fog computing supported Internet of Things environment.
Proceedings of the 6th International Conference on the Network of the Future, 2015

Protection scheme for IoT devices using introspection.
Proceedings of the 6th International Conference on the Network of the Future, 2015

A New Privacy-Aware Mutual Authentication Mechanism for Charging-on-the-Move in Online Electric Vehicles.
Proceedings of the 11th International Conference on Mobile Ad-hoc and Sensor Networks, 2015

Covert communication based privacy preservation in mobile vehicular networks.
Proceedings of the 34th IEEE Military Communications Conference, 2015

2014
On Secure and Privacy-Aware Sybil Attack Detection in Vehicular Communications.
Wirel. Pers. Commun., 2014

SC-DVR: a secure cloud computing based framework for DVR service.
IEEE Trans. Consumer Electron., 2014

Cooperation-Aware VANET Clouds: Providing Secure Cloud Services to Vehicular Ad Hoc Networks.
J. Inf. Process. Syst., 2014

A Step towards User Privacy while Using Location-Based Services.
J. Inf. Process. Syst., 2014

Computing an effective decision making group of a society using social network analysis.
J. Comb. Optim., 2014

A Simple Yet Efficient Approach to Combat Transaction Malleability in Bitcoin.
Proceedings of the Information Security Applications - 15th International Workshop, 2014

A Trustless Broker Based Protocol to Discover Friends in Proximity-Based Mobile Social Networks.
Proceedings of the Information Security Applications - 15th International Workshop, 2014

Trade-off between Service Granularity and User Privacy in Smart Meter Operation.
Proceedings of the 10th International Conference on Mobile Ad-hoc and Sensor Networks, 2014

On Secure, Privacy-Aware, and Efficient Beacon Broadcasting among One-Hop Neighbors in VANETs.
Proceedings of the 2014 IEEE Military Communications Conference, 2014

Conditional proxy re-encryption for secure big data group sharing in cloud environment.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014

On secure data sharing in cloud environment.
Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, 2014

Media cloud: A secure and efficient virtualization framework for media service.
Proceedings of the IEEE International Conference on Consumer Electronics, 2014

C-DVR: Secure cloud based DVR framework based on personal virtualization.
Proceedings of the IEEE International Conference on Consumer Electronics, 2014

Using public buses as mobile gateways in vehicular clouds.
Proceedings of the IEEE International Conference on Consumer Electronics, 2014

Combining SVC and CAS modules to support heterogeneous devices.
Proceedings of the International Conference on Electronics, Information and Communications, 2014

2013
Conditional privacy preserving security protocol for NFC applications.
IEEE Trans. Consumer Electron., 2013

Privacy-aware route tracing and revocation games in VANET-based clouds.
Proceedings of the 9th IEEE International Conference on Wireless and Mobile Computing, 2013

Privacy Preserving Cloud-Based Computing Platform (PPCCP) for Using Location Based Services.
Proceedings of the IEEE/ACM 6th International Conference on Utility and Cloud Computing, 2013

Traffic information system: A lightweight geocast-based piggybacking strategy for cooperative awareness in VANET.
Proceedings of the IEEE International Conference on Consumer Electronics, 2013

Vehicle Witnesses as a Service: Leveraging Vehicles as Witnesses on the Road in VANET Clouds.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013

Towards Achieving Anonymity in LBS: A Cloud Based Untrusted Middleware.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013

TIaaS: Secure Cloud-assisted Traffic Information Dissemination in Vehicular Ad Hoc Networks.
Proceedings of the 13th IEEE/ACM International Symposium on Cluster, 2013

2012
User-oriented key management scheme for content protection in OPMD environment.
IEEE Trans. Consumer Electron., 2012

Privacy-Aware VANET Security: Putting Data-Centric Misbehavior and Sybil Attack Detection Schemes into Practice.
Proceedings of the Information Security Applications - 13th International Workshop, 2012

AntiSybil: Standing against Sybil Attacks in Privacy-Preserved VANET.
Proceedings of the 2012 International Conference on Connected Vehicles and Expo, 2012

ID-based key management scheme using threshold decryption for OPMD environment.
Proceedings of the IEEE International Conference on Consumer Electronics, 2012

Key management scheme using secret sharing for multi-device based DRM.
Proceedings of the IEEE International Conference on Consumer Electronics, 2012

Conditional privacy preserving security protocol for NFC applications.
Proceedings of the IEEE International Conference on Consumer Electronics, 2012

Rethinking Vehicular Communications: Merging VANET with cloud computing.
Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, 2012

2011
PVR: a novel PVR scheme for content protection.
IEEE Trans. Consumer Electron., 2011

2010
Minimum average routing path clustering problem in multi-hop 2-D underwater sensor networks.
Optim. Lett., 2010

A Simple Privacy Preserving Route Tracing Mechanism for VANET.
Proceedings of the 71st IEEE Vehicular Technology Conference, 2010

2009
Towards Privacy Aware Pseudonymless Strategy for Avoiding Profile Generation in VANET.
Proceedings of the Information Security Applications, 10th International Workshop, 2009

2008
Efficient RFID Search Protocols Using Counters.
IEICE Trans. Commun., 2008

A New Hash-Based RFID Mutual Authentication Protocol Providing Enhanced User Privacy Protection.
Proceedings of the Information Security Practice and Experience, 2008

2007
A Practical Way to Provide Perfect Forward Secrecy for Secure E-Mail Protocols.
Proceedings of the Distributed Computing and Internet Technology, 2007

A Privacy Protecting UMTS AKA Protocol Providing Perfect Forward Secrecy.
Proceedings of the Computational Science and Its Applications, 2007

A Secure Location Service for Ad Hoc Position-Based Routing Using Self-signed Locations.
Proceedings of the Cryptology and Network Security, 6th International Conference, 2007

2006
Ticket-Based Binding Update Protocol for Mobile IPv6.
Proceedings of the Distributed Computing and Internet Technology, 2006

An Efficient Hierarchical Group Key Management Protocol for a Ubiquitous Computing Environment.
Proceedings of the Computational Science and Its Applications, 2006

2005
Enhanced ID-Based Authenticated Key Agreement Protocols for a Multiple Independent PKG Environment.
Proceedings of the Information and Communications Security, 7th International Conference, 2005

Identity-Based Key Agreement Protocols in a Multiple PKG Environment.
Proceedings of the Computational Science and Its Applications, 2005

A Space-Efficient Algorithm for Pre-distributing Pairwise Keys in Sensor Networks.
Proceedings of the Computational Science, 2005

2004
Fair Offline Payment Using Verifiable Encryption.
Proceedings of the Information Security Applications, 5th International Workshop, 2004

A New Universally Verifiable and Receipt-Free Electronic Voting Scheme Using One-Way Untappable Channels.
Proceedings of the Content Computing, Advanced Workshop on Content Computing, 2004

2002
A new electronic check system with reusable refunds.
Int. J. Inf. Sec., 2002

A Knowledge-Based Information Extraction System for Semi-structured Labeled Documents.
Proceedings of the Intelligent Data Engineering and Automated Learning, 2002

1994
Adaptation of the relaxation method for learning in bidirectional associative memory.
IEEE Trans. Neural Networks, 1994

1993
Neural Networks for Pattern Recognition.
Adv. Comput., 1993

1989
Optimal Designs of Linear Flow Systolic Architectures.
Proceedings of the International Conference on Parallel Processing, 1989


  Loading...