Junbeom Hur
Orcid: 0000-0002-4823-4194
  According to our database1,
  Junbeom Hur
  authored at least 136 papers
  between 2005 and 2025.
  
  
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
  2025
A Fine-Grained Data Access Control Scheme With Policy Privacy and Attribute Privacy in Vehicle-to-Grid.
    
  
    IEEE Trans. Smart Grid, July, 2025
    
  
A Lightweight and Generic Access Rights Update Mechanism for Attribute-Based Encryption in cloud storage.
    
  
    J. Syst. Archit., 2025
    
  
Quantifying Security in Volume-Hiding Searchable Symmetric Encryption Schemes With a Novel Scoring Metric.
    
  
    IEEE Access, 2025
    
  
    Proceedings of the ACM SIGCOMM 2025 Conference, 2025
    
  
    Proceedings of the IEEE International Conference on Web Services, 2025
    
  
Transferability Analysis of Adversarial Examples in CNN-based SAR Image Classification.
    
  
    Proceedings of the International Conference on Information Networking, 2025
    
  
    Proceedings of the International Conference on Information Networking, 2025
    
  
  2024
    IEEE Trans. Inf. Forensics Secur., 2024
    
  
$\gamma$γ-Knife: Extracting Neural Network Architecture Through Software-Based Power Side-Channel.
    
  
    IEEE Trans. Dependable Secur. Comput., 2024
    
  
UTRA: Universe Token Reusability Attack and Verifiable Delegatable Order-Revealing Encryption.
    
  
    IACR Cryptol. ePrint Arch., 2024
    
  
PhishinWebView: Analysis of Anti-Phishing Entities in Mobile Apps with WebView Targeted Phishing.
    
  
    Proceedings of the ACM on Web Conference 2024, 2024
    
  
VoteGAN: Generalized Membership Inference Attack Against Generative Models by Multiple Discriminators.
    
  
    Proceedings of the Information Security Applications - 25th International Conference, 2024
    
  
    Proceedings of the 15th International Conference on Information and Communication Technology Convergence, 2024
    
  
    Proceedings of the International Conference on Information Networking, 2024
    
  
Beneath the Phishing Scripts: A Script-Level Analysis of Phishing Kits and Their Impact on Real-World Phishing Websites.
    
  
    Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
    
  
  2023
Detect Your Fingerprint in Your Photographs: Photography-based Multi-Feature Sybil Detection.
    
  
    Proc. Priv. Enhancing Technol., January, 2023
    
  
    IEEE Trans. Serv. Comput., 2023
    
  
    IEEE Trans. Inf. Forensics Secur., 2023
    
  
    IEEE Trans. Dependable Secur. Comput., 2023
    
  
    IEEE Trans. Dependable Secur. Comput., 2023
    
  
Shedding Light on Blind Spot of Backward Privacy in Dynamic Searchable Symmetric Encryption.
    
  
    IEEE Access, 2023
    
  
Did the Shark Eat the Watchdog in the NTP Pool? Deceiving the NTP Pool's Monitoring System.
    
  
    Proceedings of the 32nd USENIX Security Symposium, 2023
    
  
    Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
    
  
A Honey postMessage, but a Heart of Gall: Exploiting Push Service in Service Workers Via postMessage.
    
  
    Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023
    
  
  2022
    IEEE Trans. Serv. Comput., 2022
    
  
    ACM Trans. Internet Techn., 2022
    
  
    IEEE Trans. Cloud Comput., 2022
    
  
    IEEE Access, 2022
    
  
    Proceedings of the 25th International Symposium on Research in Attacks, 2022
    
  
    Proceedings of the MobiHoc '22: The Twenty-third International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing, Seoul, Republic of Korea, October 17, 2022
    
  
Comparative Analysis of Forward and Backward Private Searchable Encryption using SGX.
    
  
    Proceedings of the 13th International Conference on Information and Communication Technology Convergence, 2022
    
  
    Proceedings of the 13th International Conference on Information and Communication Technology Convergence, 2022
    
  
    Proceedings of the 13th International Conference on Information and Communication Technology Convergence, 2022
    
  
    Proceedings of the 13th International Conference on Information and Communication Technology Convergence, 2022
    
  
    Proceedings of the 26th International Conference on Pattern Recognition, 2022
    
  
    Proceedings of the International Conference on Information Networking, 2022
    
  
    Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022
    
  
  2021
    Comput. Informatics, 2021
    
  
    Proceedings of the IEEE World Congress on Services, 2021
    
  
Efficient Fully Anonymous Public-Key Trace and Revoke with Adaptive IND-CCA Security.
    
  
    Proceedings of the Information Security Practice and Experience: 16th International Conference, 2021
    
  
    Proceedings of the International Conference on Information Networking, 2021
    
  
    Proceedings of the International Conference on Information Networking, 2021
    
  
  2020
    IEEE Trans. Serv. Comput., 2020
    
  
    IEEE Trans. Inf. Forensics Secur., 2020
    
  
Toward Serverless and Efficient Encrypted Deduplication in Mobile Cloud Computing Environments.
    
  
    Secur. Commun. Networks, 2020
    
  
Collusion Attacks on Decentralized Attributed-Based Encryption: Analyses and a Solution.
    
  
    CoRR, 2020
    
  
Inferring Firewall Rules by Cache Side-channel Analysis in Network Function Virtualization.
    
  
    Proceedings of the 39th IEEE Conference on Computer Communications, 2020
    
  
    Proceedings of the International Conference on Information and Communication Technology Convergence, 2020
    
  
    Proceedings of the 2020 International Conference on Information Networking, 2020
    
  
    Proceedings of the CoNEXT '20: The 16th International Conference on emerging Networking EXperiments and Technologies, 2020
    
  
    Proceedings of the 13th IEEE International Conference on Cloud Computing, 2020
    
  
  2019
    Wirel. Pers. Commun., 2019
    
  
    Peer-to-Peer Netw. Appl., 2019
    
  
    IEEE Internet Things J., 2019
    
  
    Future Gener. Comput. Syst., 2019
    
  
Shedding Light on Dark Korea: An In-Depth Analysis and Profiling of the Dark Web in Korea.
    
  
    Proceedings of the Information Security Applications - 20th International Conference, 2019
    
  
Analysis of Forward Private Searchable Encryption and Its Application to Multi-Client Settings.
    
  
    Proceedings of the Eleventh International Conference on Ubiquitous and Future Networks, 2019
    
  
  2018
Privacy-preserving deduplication of encrypted data with dynamic ownership management in fog computing.
    
  
    Future Gener. Comput. Syst., 2018
    
  
    Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
    
  
    Proceedings of the 2nd ACM Workshop on Blockchains, Cryptocurrencies, and Contracts, 2018
    
  
Privacy-Preserving and Updatable Block-Level Data Deduplication in Cloud Storage Services.
    
  
    Proceedings of the 11th IEEE International Conference on Cloud Computing, 2018
    
  
Toward Trustworthy Delegation: Verifiable Outsourced Decryption with Tamper-Resistance in Public Cloud Storage.
    
  
    Proceedings of the 11th IEEE International Conference on Cloud Computing, 2018
    
  
  2017
Privacy-Preserving Electrocardiogram Monitoring for Intelligent Arrhythmia Detection.
    
  
    Sensors, 2017
    
  
    Multim. Tools Appl., 2017
    
  
Secure authentication using ciphertext policy attribute-based encryption in mobile multi-hop networks.
    
  
    Multim. Tools Appl., 2017
    
  
    Multim. Tools Appl., 2017
    
  
    IEICE Trans. Inf. Syst., 2017
    
  
    ACM Comput. Surv., 2017
    
  
    Proceedings of the 2017 IEEE International Conference on Systems, Man, and Cybernetics, 2017
    
  
    Proceedings of the 2017 IEEE International Conference on Systems, Man, and Cybernetics, 2017
    
  
An Online Data-Oriented Authentication Based on Merkle Tree with Improved Reliability.
    
  
    Proceedings of the 2017 IEEE International Conference on Web Services, 2017
    
  
    Proceedings of the Ninth International Conference on Ubiquitous and Future Networks, 2017
    
  
    Proceedings of the 2017 International Conference on Information Networking, 2017
    
  
    Proceedings of the 33rd IEEE International Conference on Data Engineering, 2017
    
  
Authenticated Key Exchange, Signcryption and Deniable Signcryption Protocols Based on Two Hard Problems.
    
  
    Proceedings of the International Conference on Advanced Computing and Applications, 2017
    
  
    Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017
    
  
  2016
Privacy-preserving public auditing for educational multimedia data in cloud computing.
    
  
    Multim. Tools Appl., 2016
    
  
Enhanced authentication for outsourced educational contents through provable block possession.
    
  
    Multim. Tools Appl., 2016
    
  
Efficient Attribute-Based Secure Data Sharing with Hidden Policies and Traceability in Mobile Health Networks.
    
  
    Mob. Inf. Syst., 2016
    
  
    J. Commun. Networks, 2016
    
  
    IEICE Trans. Inf. Syst., 2016
    
  
    ICT Express, 2016
    
  
    Proceedings of the Information Security Applications - 17th International Workshop, 2016
    
  
    Proceedings of the Eighth International Conference on Ubiquitous and Future Networks, 2016
    
  
Recommendations for antiarrhythmic drugs based on latent semantic analysis with fc-means clustering.
    
  
    Proceedings of the 38th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2016
    
  
    Proceedings of the 2016 IEEE International Conference on Cloud Computing Technology and Science, 2016
    
  
    Proceedings of the 2016 IEEE International Conference on Cloud Computing Technology and Science, 2016
    
  
    Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
    
  
    Proceedings of the 2016 International Conference on Big Data and Smart Computing, 2016
    
  
  2015
Secure pattern-based authentication against shoulder surfing attack in smart devices.
    
  
    Proceedings of the Seventh International Conference on Ubiquitous and Future Networks, 2015
    
  
    Proceedings of the Seventh International Conference on Ubiquitous and Future Networks, 2015
    
  
  2014
    IEEE/ACM Trans. Netw., 2014
    
  
    KSII Trans. Internet Inf. Syst., 2014
    
  
    J. Res. Pract. Inf. Technol., 2014
    
  
    Proceedings of the Wireless Algorithms, Systems, and Applications, 2014
    
  
    Proceedings of the Wireless Algorithms, Systems, and Applications, 2014
    
  
Fully-distributed multicast routing protocol for IEEE 802.15.8 peer-aware communications.
    
  
    Proceedings of the International Conference on Information Networking 2014, 2014
    
  
Secure and Efficient Deduplication over Encrypted Data with Dynamic Updates in Cloud Storage.
    
  
    Proceedings of the Frontier and Innovation in Future Computing and Communications, 2014
    
  
  2013
    Wirel. Networks, 2013
    
  
    IEEE Trans. Parallel Distributed Syst., 2013
    
  
    IEEE Trans. Knowl. Data Eng., 2013
    
  
    IEEE J. Biomed. Health Informatics, 2013
    
  
    EURASIP J. Wirel. Commun. Netw., 2013
    
  
    Comput. Math. Appl., 2013
    
  
Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage.
    
  
    Comput. Electr. Eng., 2013
    
  
  2012
Scalable and efficient approach for secure group communication using proxy cryptography.
    
  
    Wirel. Networks, 2012
    
  
    IEEE Wirel. Commun., 2012
    
  
    Secur. Commun. Networks, 2012
    
  
Authenticated public key broadcast encryption scheme secure against insiders' attack.
    
  
    Math. Comput. Model., 2012
    
  
    J. Netw. Comput. Appl., 2012
    
  
    IACR Cryptol. ePrint Arch., 2012
    
  
    Comput. Commun., 2012
    
  
    Proceedings of the 15th International Conference on Network-Based Information Systems, 2012
    
  
  2011
    Wirel. Networks, 2011
    
  
Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems.
    
  
    IEEE Trans. Parallel Distributed Syst., 2011
    
  
  2010
A Multi-service Group Key Management Scheme for Stateless Receivers in Wireless Mesh Networks.
    
  
    Mob. Networks Appl., 2010
    
  
    IEICE Electron. Express, 2010
    
  
Chosen ciphertext secure authenticated group communication using identity-based signcryption.
    
  
    Comput. Math. Appl., 2010
    
  
  2009
Bandwidth efficient key distribution for secure multicast in dynamic wireless mesh networks.
    
  
    Proceedings of the 2009 IEEE Wireless Communications and Networking Conference, 2009
    
  
A Distributed Deterministic and Resilient Replication Attack Detection Protocol in Wireless Sensor Networks.
    
  
    Proceedings of the Communication and Networking, 2009
    
  
  2008
    Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008
    
  
  2007
A New Binary Image Authentication Scheme with Small Distortion and Low False Negative Rates.
    
  
    IEICE Trans. Commun., 2007
    
  
    Proceedings of the Q2SWinet'07, 2007
    
  
    Proceedings of the Advances in Information and Computer Security, 2007
    
  
An Efficient Proactive Key Distribution Scheme for Fast Handoff in IEEE 802.11 Wireless Networks.
    
  
    Proceedings of the Information Networking. Towards Ubiquitous Networking and Services, 2007
    
  
  2006
    Proceedings of the Information Security Applications, 7th International Workshop, 2006
    
  
  2005
    Proceedings of the Information Security and Cryptology, 2005