Ji Young Chun

Orcid: 0000-0002-5329-8918

According to our database1, Ji Young Chun authored at least 17 papers between 2007 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Securing a Local Training Dataset Size in Federated Learning.
IEEE Access, 2022

2021
Comments on "Identity-Based Revocation From Subset Difference Methods Under Simple Assumptions".
IEEE Access, 2021

2018
Identifying ECUs Using Inimitable Characteristics of Signals in Controller Area Networks.
IEEE Trans. Veh. Technol., 2018

2015
Passing Go with DNA Sequencing: Delivering Messages in a Covert Transgenic Channel.
Proceedings of the 2015 IEEE Symposium on Security and Privacy Workshops, 2015

2014
Sharing Privacy Protected and Statistically Sound Clinical Research Data Using Outsourced Data Storage.
J. Appl. Math., 2014

Strongly Unforgeable Ring Signature Scheme from Lattices in the Standard Model.
J. Appl. Math., 2014

Privacy-preserving audit for broker-based health information exchange.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

2013
Privacy-preserving disjunctive normal form operations on distributed sets.
Inf. Sci., 2013

2012
Privacy-preserving range set union for rare cases in healthcare data.
IET Commun., 2012

Scalable Privacy-Preserving <i>t</i>-Repetition Protocol with Distributed Medical Data.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012

2011
RFID tag search protocol preserving privacy of mobile reader holders.
IEICE Electron. Express, 2011

2009
Weaknesses in the Hur-Shin-Yoon decentralized group key management.
Wirel. Commun. Mob. Comput., 2009

A note on leakage-resilient authenticated key exchange.
IEEE Trans. Wirel. Commun., 2009

Security Enhancing Compiler for Localization Schemes in Pervasive Sensor Networks.
Proceedings of the 8th IEEE/ACIS International Conference on Computer and Information Science, 2009

2008
Cryptanalysis of Two Improved Remote User Authentication Schemes Preserving User Anonymity.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Strong Authentication Protocol for Secure RFID Tag Search without Help of Central Database.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

2007
Location-aware Random Pair-wise Keys Scheme for Wireless Sensor Networks.
Proceedings of the Third International Workshop on Security, 2007


  Loading...