Ji Young Chun

According to our database1, Ji Young Chun authored at least 16 papers between 2007 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Identifying ECUs Using Inimitable Characteristics of Signals in Controller Area Networks.
IEEE Trans. Vehicular Technology, 2018

2016
Identifying ECUs Using Inimitable Characteristics of Signals in Controller Area Networks.
CoRR, 2016

2015
Passing Go with DNA Sequencing: Delivering Messages in a Covert Transgenic Channel.
Proceedings of the 2015 IEEE Symposium on Security and Privacy Workshops, 2015

2014
Sharing Privacy Protected and Statistically Sound Clinical Research Data Using Outsourced Data Storage.
J. Applied Mathematics, 2014

Strongly Unforgeable Ring Signature Scheme from Lattices in the Standard Model.
J. Applied Mathematics, 2014

Privacy-preserving audit for broker-based health information exchange.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

2013
Privacy-preserving disjunctive normal form operations on distributed sets.
Inf. Sci., 2013

2012
Privacy-preserving range set union for rare cases in healthcare data.
IET Communications, 2012

Scalable Privacy-Preserving t-Repetition Protocol with Distributed Medical Data.
IEICE Transactions, 2012

2011
RFID tag search protocol preserving privacy of mobile reader holders.
IEICE Electronic Express, 2011

2009
Weaknesses in the Hur-Shin-Yoon decentralized group key management.
Wireless Communications and Mobile Computing, 2009

A note on leakage-resilient authenticated key exchange.
IEEE Trans. Wireless Communications, 2009

Security Enhancing Compiler for Localization Schemes in Pervasive Sensor Networks.
Proceedings of the 8th IEEE/ACIS International Conference on Computer and Information Science, 2009

2008
Cryptanalysis of Two Improved Remote User Authentication Schemes Preserving User Anonymity.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Strong Authentication Protocol for Secure RFID Tag Search without Help of Central Database.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

2007
Location-aware Random Pair-wise Keys Scheme for Wireless Sensor Networks.
Proceedings of the Third International Workshop on Security, 2007


  Loading...