Hyunsoo Kwon

Orcid: 0000-0002-6728-0698

According to our database1, Hyunsoo Kwon authored at least 25 papers between 2014 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Certificate Transparency With Enhanced Privacy.
IEEE Trans. Dependable Secur. Comput., 2023

2022
Enabling Fast Public Auditing and Data Dynamics in Cloud Services.
IEEE Trans. Serv. Comput., 2022

Efficient IoT Management With Resilience to Unauthorized Access to Cloud Storage.
IEEE Trans. Cloud Comput., 2022

Order-Hiding Range Query Over Encrypted Cloud Data.
IEEE Access, 2022

Asymptotically Optimal and Secure Multiwriter/Multireader Similarity Search.
IEEE Access, 2022

Get off of Chain: Unveiling Dark Web Using Multilayer Bitcoin Address Clustering.
IEEE Access, 2022

2021
Enabling Fast Public Auditing and Data Dynamics in Cloud Services.
Proceedings of the IEEE World Congress on Services, 2021

2020
(In-)Security of Cookies in HTTPS: Cookie Theft by Removing Cookie Flags.
IEEE Trans. Inf. Forensics Secur., 2020

2019
Efficient Multi-user Similarity Search Over Encrypted Data in Cloud Storage.
Wirel. Pers. Commun., 2019

Secure deduplication with reliable and revocable key management in fog computing.
Peer-to-Peer Netw. Appl., 2019

Trustworthy Delegation Toward Securing Mobile Healthcare Cyber-Physical Systems.
IEEE Internet Things J., 2019

Shedding Light on Dark Korea: An In-Depth Analysis and Profiling of the Dark Web in Korea.
Proceedings of the Information Security Applications - 20th International Conference, 2019

2018
A Practical De-mixing Algorithm for Bitcoin Mixing Services.
Proceedings of the 2nd ACM Workshop on Blockchains, Cryptocurrencies, and Contracts, 2018

Toward Trustworthy Delegation: Verifiable Outsourced Decryption with Tamper-Resistance in Public Cloud Storage.
Proceedings of the 11th IEEE International Conference on Cloud Computing, 2018

2017
Secure authentication using ciphertext policy attribute-based encryption in mobile multi-hop networks.
Multim. Tools Appl., 2017

Secure deduplication for multimedia data with user revocation in cloud storage.
Multim. Tools Appl., 2017

Scalable and Reliable Key Management for Secure Deduplication in Cloud Storage.
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017

2016
Privacy-preserving public auditing for educational multimedia data in cloud computing.
Multim. Tools Appl., 2016

Enhanced authentication for outsourced educational contents through provable block possession.
Multim. Tools Appl., 2016

Efficient Attribute-Based Secure Data Sharing with Hidden Policies and Traceability in Mobile Health Networks.
Mob. Inf. Syst., 2016

A Practical Analysis of TLS Vulnerabilities in Korea Web Environment.
Proceedings of the Information Security Applications - 17th International Workshop, 2016

A survey on MITM and its countermeasures in the TLS handshake protocol.
Proceedings of the Eighth International Conference on Ubiquitous and Future Networks, 2016

2015
A secure OTP algorithm using a smartphone application.
Proceedings of the Seventh International Conference on Ubiquitous and Future Networks, 2015

2014
Secure Device-to-Device Authentication in Mobile Multi-hop Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2014

A Privacy Threat in 4th Generation Mobile Telephony and Its Countermeasure.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2014


  Loading...