Hyunsung Kim

Orcid: 0000-0002-7814-7454

Affiliations:
  • Kyungil University, Department of Cyber Security, Gyeongsan, South Korea


According to our database1, Hyunsung Kim authored at least 68 papers between 1999 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Optimal ElGamal Encryption with Hybrid Deep-Learning-Based Classification on Secure Internet of Things Environment.
Sensors, 2023

FakedBits- Detecting Fake Information on Social Platforms using Multi-Modal Features.
KSII Trans. Internet Inf. Syst., 2023

2022
Using XAI for Deep Learning-Based Image Manipulation Detection with Shapley Additive Explanation.
Symmetry, 2022

A survey on security challenges and protocols of electric vehicle dynamic charging system.
Secur. Priv., 2022

Certificate-less authenticated key agreement scheme with anonymity for smart grid communications.
J. Intell. Fuzzy Syst., 2022

Provably Secure Pseudo-Identity Three-Factor Authentication Protocol Based on Extended Chaotic-Maps for Lightweight Mobile Devices.
IEEE Access, 2022

2021
Privacy preserving authenticated key agreement based on bilinear pairing for uHealthcare.
Int. Arab J. Inf. Technol., 2021

Lightweight Privacy-Preserving Data Aggregation Scheme Based on Elliptic Curve Cryptography for Smart Grid Communications.
Proceedings of the Smart Grid and Internet of Things - 5th EAI International Conference, 2021

Easy-Auth: Graphical Password Authentication using a Randomization Method.
Proceedings of the IEEE Latin-American Conference on Communications, 2021

2020
Location Verification Technique for Cluster Based Geographical Routing in MANET.
Informatica, 2020

2019
Linear (t, n) Secret Sharing Scheme with Reduced Number of Polynomials.
Secur. Commun. Networks, 2019

2017
Delegation Based User Authentication Framework over Cognitive Radio Networks.
J. Sens. Actuator Networks, 2017

SHRP - Secure Hybrid Routing Protocol over Hierarchical Wireless Sensor Networks.
Int. J. Comput. Commun. Control, 2017

2015
An efficient privacy-preserving authentication scheme with adaptive key evolution in remote health monitoring system.
Peer-to-Peer Netw. Appl., 2015

2014
Freshness-Preserving Non-Interactive Hierarchical Key Agreement Protocol over WHMS.
Sensors, 2014

Privacy Preserving Biometric-Based User Authentication Protocol Using Smart Cards.
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014

2013
An Efficient Broadcast Authentication Scheme with Batch Verification for ADS-B Messages.
KSII Trans. Internet Inf. Syst., 2013

An Efficient Somewhat HE scheme over Integers and Its Variation.
KSII Trans. Internet Inf. Syst., 2013

User Authentication for Hiererchical Wireless Sensor Networks.
Proceedings of the 14th ACIS International Conference on Software Engineering, 2013

Security Concerns of Identity Authentication and Context Privacy Preservation in uHealthcare System.
Proceedings of the 14th ACIS International Conference on Software Engineering, 2013

Attack on Recent Homomorphic Encryption Scheme over Integers.
Proceedings of the Multimedia and Ubiquitous Engineering, 2013

Three Factor Authentication Protocol Based on Bilinear Pairing.
Proceedings of the Multimedia and Ubiquitous Engineering, 2013

Identity-Based Privacy Preservation Framework over u-Healthcare System.
Proceedings of the Multimedia and Ubiquitous Engineering, 2013

Freshness Preserving Hierarchical Key Agreement Protocol Over Hierarchical MANETs.
Proceedings of the Multimedia and Ubiquitous Engineering, 2013

A Pairing-Free Public Key Encryption with Keyword Searching for Cloud Storage Services.
Proceedings of the e-Infrastructure and e-Services for Developing Countries, 2013

A Pairing Based Authentication and Key Establishment Scheme for Remote Patient Monitoring Systems.
Proceedings of the e-Infrastructure and e-Services for Developing Countries, 2013

2012
KCI-resilient anonymous wireless link-layer authentication protocols.
Math. Comput. Model., 2012

2011
Location-based authentication protocol for first cognitive radio networking standard.
J. Netw. Comput. Appl., 2011

AUTH<sub>HOTP</sub> - HOTP Based Authentication Scheme over Home Network Environment.
Proceedings of the Computational Science and Its Applications - ICCSA 2011, 2011

Secure Hash-Based Password Authentication Protocol Using Smartcards.
Proceedings of the Computational Science and Its Applications - ICCSA 2011, 2011

Robust Attributes-Based Authenticated Key Agreement Protocol Using Smart Cards over Home Network.
Proceedings of the Computational Science and Its Applications - ICCSA 2011, 2011

2010
When ABE Meets RSS.
Proceedings of the Data and Applications Security and Privacy XXIV, 2010

2009
Enhanced novel access control protocol over wireless sensor networks.
IEEE Trans. Consumer Electron., 2009

Area and time efficient AB<sup>2</sup> multipliers based on cellular automata.
Comput. Stand. Interfaces, 2009

2008
Semi-systolic Modular Multiplier over GF(2m).
Proceedings of the Computational Science and Its Applications - ICCSA 2008, International Conference, Perugia, Italy, June 30, 2008

2007
LFSR multipliers over GF(2<sup>m</sup>) defined by all-one polynomial.
Integr., 2007

Energy Efficient Data-centric Routing Protocol Over Wireless Sensor Network.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2007

2006
Low Complexity Systolic Architecture for Modular Multiplication over GF(2<sup><i>m</i></sup>).
Proceedings of the Computational Science, 2006

2005
Improvement of Chien et al.'s remote user authentication scheme using smart cards.
Comput. Stand. Interfaces, 2005

Efficient verifier-based key agreement protocol for three parties without server's public key.
Appl. Math. Comput., 2005

Efficient nonce-based remote user authentication scheme using smart cards.
Appl. Math. Comput., 2005

Improvement of HWWM-authenticated key agreement protocol.
Appl. Math. Comput., 2005

Improvement of Lee and Lee's authenticated key agreement scheme.
Appl. Math. Comput., 2005

2004
Comment on "A remote user authentication scheme using smart cards with forward secrecy.
IEEE Trans. Consumer Electron., 2004

Improved efficient remote user authentication scheme using smart cards.
IEEE Trans. Consumer Electron., 2004

Cryptanalysis of a user authentication scheme using hash functions.
ACM SIGOPS Oper. Syst. Rev., 2004

AOP arithmetic architectures over GF(2<sup>m</sup>).
Appl. Math. Comput., 2004

Efficient Password-Based Authenticated Key Agreement Protocol.
Proceedings of the Computational Science and Its Applications, 2004

2003
Parallizable simple authenticated key agreement protocol .
ACM SIGOPS Oper. Syst. Rev., 2003

ID-based password authentication scheme using smart cards and fingerprints.
ACM SIGOPS Oper. Syst. Rev., 2003

Cellular Automata Based Multiplier for Public-Key Cryptosystem.
Proceedings of the Security in Pervasive Computing, 2003

New AB<sup>2</sup> Multiplier over GF(2<sup>m</sup>) using Cellular Automata.
Proceedings of the ISCA 18th International Conference Computers and Their Applications, 2003

Secure Authenticated Key Exchange Protocol.
Proceedings of the ISCA 18th International Conference Computers and Their Applications, 2003

ID-based Key Exchange Protocol using Smart Cards with Fingerprint.
Proceedings of the ISCA 16th International Conference on Parallel and Distributed Computing Systems, 2003

2002
Bit-serial AB2 Multiplier Using Modified Inner Product.
J. Inf. Sci. Eng., 2002

New Parallel Architecture for Modular Multiplication and Squaring Based on Cellular Automata.
Proceedings of the Applied Parallel Computing Advanced Scientific Computing, 2002

Bit-Serial AOP Arithmetic Architectures over GF (2<sup>m</sup>).
Proceedings of the Infrastructure Security, International Conference, 2002

A Power-Sum Systolic Architecture in GF(2<sup>m</sup>).
Proceedings of the Information Networking, 2002

Parallel Algorithm and Architecture for Public-Key Cryptosystem.
Proceedings of the EurAsia-ICT 2002: Information and Communication Technology, 2002

Design of New Multiplier/Squarer using Montgomery Algorithm over GF(2<sup>m</sup>) Based on Cellular Automata.
Proceedings of the ISCA 17th International Conference Computers and Their Applications, 2002

Basic Architecture for Modular Exponentiation over GF(2<sup>m</sup>).
Proceedings of the ISCA 17th International Conference Computers and Their Applications, 2002

New AB<sup>2</sup> Systolic Architectures in GF(2<sup>m</sup>).
Proceedings of the ISCA 17th International Conference Computers and Their Applications, 2002

2001
Area Efficient Exponentiation Using Modular Multiplier/Squarer in GF(2<sup>m</sup>.
Proceedings of the Computing and Combinatorics, 7th Annual International Conference, 2001

Area Efficient Architecture for Multiplication and Squaring in GF(2^m) using Irreducible AOP.
Proceedings of the ISCA 14th International Conference on Parallel and Distributed Computing Systems, 2001

2000
Partitioned systolic architecture for modular multiplication in GF(2<sup>m</sup>).
Inf. Process. Lett., 2000

1999
Pipelined Systolic Multiplier for Finite Fields GF (2<sup>m</sup>).
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1999

Partitioned Systolic Multiplier for GF(2<sup>m</sup>).
Proceedings of the 1999 International Conference on Parallel Processing Workshops, 1999

Efficient Fixed-Size Systolic Arrays for the Modular Multiplication.
Proceedings of the Computing and Combinatorics, 5th Annual International Conference, 1999


  Loading...