Jun Wen Wong

Orcid: 0009-0007-8968-7927

According to our database1, Jun Wen Wong authored at least 14 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
RollBack: A New Time-Agnostic Replay Attack Against the Automotive Remote Keyless Entry Systems.
ACM Trans. Cyber Phys. Syst., January, 2024

2022
PRoM: Passive Remote Attestation Against Roving Malware in Multicore IoT Devices.
IEEE Syst. J., 2022

Machine-Learning-Based Attestation for the Internet of Things Using Memory Traces.
IEEE Internet Things J., 2022

2020
HAtt: Hybrid Remote Attestation for the Internet of Things With High Availability.
IEEE Internet Things J., 2020

2019
SCADAWall: A CPI-enabled firewall model for SCADA security.
Comput. Secur., 2019

2017
Mind the Gap: Security Analysis of Metro Platform Screen Door System.
Proceedings of the A Systems Approach to Cyber Security, 2017

A scheme for lightweight SCADA packet authentication.
Proceedings of the 23rd Asia-Pacific Conference on Communications, 2017

Cyber-physical authentication for metro systems.
Proceedings of the 23rd Asia-Pacific Conference on Communications, 2017

2016
Scalable Two-Factor Authentication Using Historical Data.
Proceedings of the Computer Security - ESORICS 2016, 2016

2013
Privacy-preserving smart metering with regional statistics and personal enquiry services.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2010
Efficient online/offline identity-based signature for wireless sensor network.
Int. J. Inf. Sec., 2010

Towards practical anonymous password authentication.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010

2008
Realizing Stateful Public Key Encryption in Wireless Sensor Network.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

Implementation and performance analysis for key divergent and evolution protocols in wireless sensor network.
Proceedings of the 5th Annual International Conference on Mobile and Ubiquitous Systems: Computing, 2008


  Loading...