Ji Sun Shin

Orcid: 0000-0002-7626-1528

According to our database1, Ji Sun Shin authored at least 32 papers between 2005 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
SAFE-IDS: A privacy-preserving framework for overcoming non-IID challenges in federated intrusion detection.
Comput. Secur., 2025

Minimal and Simplified Analysis of Hierarchical Density-Based Spatial Clustering.
IEEE Access, 2025

Enhancing SR-Tree for Nearest Neighbor Search.
IEEE Access, 2025

Trusted and Privacy-Preserving Billing System for Smart Grids.
Proceedings of the IEEE International Conference on Big Data and Smart Computing, 2025

2024
Dynamic data summarization for hierarchical spatial clustering.
CoRR, 2024

An Incremental Majority Voting Approach for Intrusion Detection System Based on Machine Learning.
IEEE Access, 2024

2023
A new location verification protocol and blockchain-based drone rental mechanism in smart farming.
Comput. Electron. Agric., November, 2023

Efficient Continuous Key Agreement With Reduced Bandwidth From a Decomposable KEM.
IEEE Access, 2023

2021
Keystroke Dynamics-Based Authentication Using Unique Keypad.
Sensors, 2021

A New Distributed, Decentralized Privacy-Preserving ID Registration System.
IEEE Commun. Mag., 2021

A Verifier-Based Password-Authenticated Key Exchange Using Tamper-Proof Hardware.
Comput. J., 2021

2020
Graphical passwords: Behind the attainment of goals.
Secur. Priv., 2020

A New Feature Scoring Method in Keystroke Dynamics-Based User Authentications.
IEEE Access, 2020

2019
A parameterized model to select discriminating features on keystroke dynamics authentication on smartphones.
Pervasive Mob. Comput., 2019

A Privacy Preserving three-factor authenticated key agreement protocol for client-server environment.
J. Ambient Intell. Humaniz. Comput., 2019

Cryptoanalysis on 'A round-optimal lattice-based blind signature scheme for cloud services'.
Future Gener. Comput. Syst., 2019

2018
Understanding Keystroke Dynamics for Smartphone Users Authentication and Keystroke Dynamics on Smartphones Built-In Motion Sensors.
Secur. Commun. Networks, 2018

An Empirical Performance Analysis on Hadoop via Optimizing the Network Heartbeat Period.
KSII Trans. Internet Inf. Syst., 2018

Forward-secure ID based digital signature scheme with forward-secure private key generator.
Inf. Sci., 2018

In-Storage Anti-Virus System via On-Demand Inspection.
IEICE Trans. Inf. Syst., 2018

Round-Reduced Modular Construction of Asymmetric Password-Authenticated Key Exchange.
Proceedings of the Security and Cryptography for Networks - 11th International Conference, 2018

2017
DiSC: A Distributed In-Storage Computing Platform Using Cost-Effective Hardware Devices.
IEICE Trans. Inf. Syst., 2017

Evolution of Spamming Attacks on Facebook.
Proceedings of the Information Security Applications - 18th International Conference, 2017

2016
LigeroAV: A Light-Weight, Signature-Based Antivirus for Mobile Environment.
IEICE Trans. Inf. Syst., 2016

2015
Network Adversary Attacks against Secure Encryption Schemes.
IEICE Trans. Commun., 2015

2013
A New Privacy-Enhanced Matchmaking Protocol.
IEICE Trans. Commun., 2013

2012
Tidal flat reflectance model accommodating tidal conditions using Geostationary Ocean Color Imager (GOCI): Preliminary results.
Proceedings of the 2012 IEEE International Geoscience and Remote Sensing Symposium, 2012

2010
Parallel and Concurrent Security of the HB and HB<sup>+</sup> Protocols.
J. Cryptol., 2010

2009
Enhancing Privacy in Cryptographic Protocols.
PhD thesis, 2009

2006
Parallel and Concurrent Security of the HB and HB<sup>+</sup> Protocols.
Proceedings of the Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28, 2006

2005
Parallel and Concurrent Security of the HB and HB+ Protocols.
IACR Cryptol. ePrint Arch., 2005

Modeling Insider Attacks on Group Key-Exchange Protocols.
IACR Cryptol. ePrint Arch., 2005


  Loading...