Junbeom Hur

Orcid: 0000-0002-4823-4194

According to our database1, Junbeom Hur authored at least 121 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Deep Learning-Based Detection for Multiple Cache Side-Channel Attacks.
IEEE Trans. Inf. Forensics Secur., 2024

2023
Detect Your Fingerprint in Your Photographs: Photography-based Multi-Feature Sybil Detection.
Proc. Priv. Enhancing Technol., January, 2023

Delegatable Order-Revealing Encryption for Reliable Cross-Database Query.
IEEE Trans. Serv. Comput., 2023

Multi-Key Similar Data Search on Encrypted Storage With Secure Pay-Per-Query.
IEEE Trans. Inf. Forensics Secur., 2023

Certificate Transparency With Enhanced Privacy.
IEEE Trans. Dependable Secur. Comput., 2023

VerSA: Verifiable Secure Aggregation for Cross-Device Federated Learning.
IEEE Trans. Dependable Secur. Comput., 2023

Cybersecurity threats in FinTech: A systematic review.
CoRR, 2023

Shedding Light on Blind Spot of Backward Privacy in Dynamic Searchable Symmetric Encryption.
IEEE Access, 2023

Did the Shark Eat the Watchdog in the NTP Pool? Deceiving the NTP Pool's Monitoring System.
Proceedings of the 32nd USENIX Security Symposium, 2023

DevIOus: Device-Driven Side-Channel Attacks on the IOMMU.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

A Honey postMessage, but a Heart of Gall: Exploiting Push Service in Service Workers Via postMessage.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

2022
Enabling Fast Public Auditing and Data Dynamics in Cloud Services.
IEEE Trans. Serv. Comput., 2022

Secure and Efficient Hybrid Data Deduplication in Edge Computing.
ACM Trans. Internet Techn., 2022

Efficient IoT Management With Resilience to Unauthorized Access to Cloud Storage.
IEEE Trans. Cloud Comput., 2022

Order-Hiding Range Query Over Encrypted Cloud Data.
IEEE Access, 2022

Get off of Chain: Unveiling Dark Web Using Multilayer Bitcoin Address Clustering.
IEEE Access, 2022

Exploiting Metaobjects to Reinforce Data Leakage Attacks.
Proceedings of the 25th International Symposium on Research in Attacks, 2022

Analysis of NTP pool monitoring system based on multiple monitoring stations.
Proceedings of the MobiHoc '22: The Twenty-third International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing, Seoul, Republic of Korea, October 17, 2022

Comparative Analysis of Forward and Backward Private Searchable Encryption using SGX.
Proceedings of the 13th International Conference on Information and Communication Technology Convergence, 2022

A Survey on Security Threats in Blockchain-based Internet of Things Systems.
Proceedings of the 13th International Conference on Information and Communication Technology Convergence, 2022

PCIe Side-channel Attack on I/O Device via RDMA-enabled Network Card.
Proceedings of the 13th International Conference on Information and Communication Technology Convergence, 2022

A Survey on Vulnerabilities of Service Workers.
Proceedings of the 13th International Conference on Information and Communication Technology Convergence, 2022

Adversarial Attack on Semantic Segmentation Preprocessed with Super Resolution.
Proceedings of the 26th International Conference on Pattern Recognition, 2022

Downgrading Backward Privacy of Searchable Encryption.
Proceedings of the International Conference on Information Networking, 2022

BLAP: Bluetooth Link Key Extraction and Page Blocking Attacks.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022

2021
Effective Feature Extraction Method for SVM-Based Profiled Attacks.
Comput. Informatics, 2021

Enabling Fast Public Auditing and Data Dynamics in Cloud Services.
Proceedings of the IEEE World Congress on Services, 2021

Efficient Fully Anonymous Public-Key Trace and Revoke with Adaptive IND-CCA Security.
Proceedings of the Information Security Practice and Experience: 16th International Conference, 2021

Real-time Detection of Cache Side-channel Attack Using Non-cache Hardware Events.
Proceedings of the International Conference on Information Networking, 2021

Neural Network Stealing via Meltdown.
Proceedings of the International Conference on Information Networking, 2021

2020
Decentralized Server-Aided Encryption for Secure Deduplication in Cloud Storage.
IEEE Trans. Serv. Comput., 2020

(In-)Security of Cookies in HTTPS: Cookie Theft by Removing Cookie Flags.
IEEE Trans. Inf. Forensics Secur., 2020

Toward Serverless and Efficient Encrypted Deduplication in Mobile Cloud Computing Environments.
Secur. Commun. Networks, 2020

Collusion Attacks on Decentralized Attributed-Based Encryption: Analyses and a Solution.
CoRR, 2020

Inferring Firewall Rules by Cache Side-channel Analysis in Network Function Virtualization.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

A Comparative Analysis of Searchable Encryption Schemes using SGX.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2020

Cache Side-Channel Attack on Mail User Agent.
Proceedings of the 2020 International Conference on Information Networking, 2020

Return of version downgrade attack in the era of TLS 1.3.
Proceedings of the CoNEXT '20: The 16th International Conference on emerging Networking EXperiments and Technologies, 2020

Forward Secure Public Key Encryption with Keyword Search for Cloud-assisted IoT.
Proceedings of the 13th IEEE International Conference on Cloud Computing, 2020

2019
Efficient Multi-user Similarity Search Over Encrypted Data in Cloud Storage.
Wirel. Pers. Commun., 2019

Secure deduplication with reliable and revocable key management in fog computing.
Peer-to-Peer Netw. Appl., 2019

Trustworthy Delegation Toward Securing Mobile Healthcare Cyber-Physical Systems.
IEEE Internet Things J., 2019

A reliable adaptive forwarding approach in named data networking.
Future Gener. Comput. Syst., 2019

Password typographical error resilience in honey encryption.
Comput. Secur., 2019

Shedding Light on Dark Korea: An In-Depth Analysis and Profiling of the Dark Web in Korea.
Proceedings of the Information Security Applications - 20th International Conference, 2019

Analysis of Forward Private Searchable Encryption and Its Application to Multi-Client Settings.
Proceedings of the Eleventh International Conference on Ubiquitous and Future Networks, 2019

2018
Privacy-preserving deduplication of encrypted data with dynamic ownership management in fog computing.
Future Gener. Comput. Syst., 2018

Unveiling Hardware-based Data Prefetcher, a Hidden Source of Information Leakage.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

A Practical De-mixing Algorithm for Bitcoin Mixing Services.
Proceedings of the 2nd ACM Workshop on Blockchains, Cryptocurrencies, and Contracts, 2018

Privacy-Preserving and Updatable Block-Level Data Deduplication in Cloud Storage Services.
Proceedings of the 11th IEEE International Conference on Cloud Computing, 2018

Toward Trustworthy Delegation: Verifiable Outsourced Decryption with Tamper-Resistance in Public Cloud Storage.
Proceedings of the 11th IEEE International Conference on Cloud Computing, 2018

2017
Privacy-Preserving Electrocardiogram Monitoring for Intelligent Arrhythmia Detection.
Sensors, 2017

Secure proof of storage with deduplication for cloud storage systems.
Multim. Tools Appl., 2017

Secure authentication using ciphertext policy attribute-based encryption in mobile multi-hop networks.
Multim. Tools Appl., 2017

Secure deduplication for multimedia data with user revocation in cloud storage.
Multim. Tools Appl., 2017

Special issue on V2X communications and networks.
J. Commun. Networks, 2017

CLDSafe: An Efficient File Backup System in Cloud Storage against Ransomware.
IEICE Trans. Inf. Syst., 2017

A Survey of Secure Data Deduplication Schemes for Cloud Storage Systems.
ACM Comput. Surv., 2017

Trapfetch: A breakpoint-based prefetcher for both launch and run-time.
Proceedings of the 2017 IEEE International Conference on Systems, Man, and Cybernetics, 2017

Novel hybrid CNN-SVM model for recognition of functional magnetic resonance images.
Proceedings of the 2017 IEEE International Conference on Systems, Man, and Cybernetics, 2017

An Online Data-Oriented Authentication Based on Merkle Tree with Improved Reliability.
Proceedings of the 2017 IEEE International Conference on Web Services, 2017

Cloud-based biometrics processing for privacy-preserving identification.
Proceedings of the Ninth International Conference on Ubiquitous and Future Networks, 2017

Password typos resilience in honey encryption.
Proceedings of the 2017 International Conference on Information Networking, 2017

Authenticated Key Exchange, Signcryption and Deniable Signcryption Protocols Based on Two Hard Problems.
Proceedings of the International Conference on Advanced Computing and Applications, 2017

Scalable and Reliable Key Management for Secure Deduplication in Cloud Storage.
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017

2016
Secure Data Deduplication with Dynamic Ownership Management in Cloud Storage.
IEEE Trans. Knowl. Data Eng., 2016

Privacy-preserving public auditing for educational multimedia data in cloud computing.
Multim. Tools Appl., 2016

Enhanced authentication for outsourced educational contents through provable block possession.
Multim. Tools Appl., 2016

Efficient Attribute-Based Secure Data Sharing with Hidden Policies and Traceability in Mobile Health Networks.
Mob. Inf. Syst., 2016

A reliable group key management scheme for broadcast encryption.
J. Commun. Networks, 2016

Reputation-Based Collusion Detection with Majority of Colluders.
IEICE Trans. Inf. Syst., 2016

Efficient and privacy-preserving biometric identification in cloud.
ICT Express, 2016

A Practical Analysis of TLS Vulnerabilities in Korea Web Environment.
Proceedings of the Information Security Applications - 17th International Workshop, 2016

A survey on MITM and its countermeasures in the TLS handshake protocol.
Proceedings of the Eighth International Conference on Ubiquitous and Future Networks, 2016

Recommendations for antiarrhythmic drugs based on latent semantic analysis with fc-means clustering.
Proceedings of the 38th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2016

SEED: Enabling Serverless and Efficient Encrypted Deduplication for Cloud Storage.
Proceedings of the 2016 IEEE International Conference on Cloud Computing Technology and Science, 2016

A Hybrid Deduplication for Secure and Efficient Data Outsourcing in Fog Computing.
Proceedings of the 2016 IEEE International Conference on Cloud Computing Technology and Science, 2016

POSTER: Towards Privacy-Preserving Biometric Identification in Cloud Computing.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Scalable and secure Private Set intersection for big data.
Proceedings of the 2016 International Conference on Big Data and Smart Computing, 2016

2015
Medical-Grade Quality of Service for Real-Time Mobile Healthcare.
Computer, 2015

Secure pattern-based authentication against shoulder surfing attack in smart devices.
Proceedings of the Seventh International Conference on Ubiquitous and Future Networks, 2015

A secure OTP algorithm using a smartphone application.
Proceedings of the Seventh International Conference on Ubiquitous and Future Networks, 2015

2014
Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks.
IEEE/ACM Trans. Netw., 2014

An Enhanced Remote Data Checking Scheme for Dynamic Updates.
KSII Trans. Internet Inf. Syst., 2014

Efficient and Secure Identity-Based Onion Routing.
J. Res. Pract. Inf. Technol., 2014

Secure Device-to-Device Authentication in Mobile Multi-hop Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2014

A Privacy Threat in 4th Generation Mobile Telephony and Its Countermeasure.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2014

Fully-distributed multicast routing protocol for IEEE 802.15.8 peer-aware communications.
Proceedings of the International Conference on Information Networking 2014, 2014

Secure and Efficient Deduplication over Encrypted Data with Dynamic Updates in Cloud Storage.
Proceedings of the Frontier and Innovation in Future Computing and Communications, 2014

2013
Cross-layer analysis of protocol delay in mobile devices receiving BCMCS.
Wirel. Networks, 2013

Attribute-Based Secure Data Sharing with Hidden Policies in Smart Grid.
IEEE Trans. Parallel Distributed Syst., 2013

Improving Security and Efficiency in Attribute-Based Data Sharing.
IEEE Trans. Knowl. Data Eng., 2013

Design and QoS of a Wireless System for Real-Time Remote Electrocardiography.
IEEE J. Biomed. Health Informatics, 2013

Energy-aware topology control for reliable data delivery in solar-powered WSNs.
EURASIP J. Wirel. Commun. Netw., 2013

Removing escrow from ciphertext policy attribute-based encryption.
Comput. Math. Appl., 2013

Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage.
Comput. Electr. Eng., 2013

2012
Scalable and efficient approach for secure group communication using proxy cryptography.
Wirel. Networks, 2012

Toward energy-efficient error control in 3G broadcast video.
IEEE Wirel. Commun., 2012

Fine-grained user access control in ciphertext-policy attribute-based encryption.
Secur. Commun. Networks, 2012

Authenticated public key broadcast encryption scheme secure against insiders' attack.
Math. Comput. Model., 2012

Using a dynamic backbone for efficient data delivery in solar-powered WSNs.
J. Netw. Comput. Appl., 2012

Privacy-preserving identity-based broadcast encryption.
Inf. Fusion, 2012

Security weakness in the Proof of Storage with Deduplication.
IACR Cryptol. ePrint Arch., 2012

Dependable and secure computing in medical information systems.
Comput. Commun., 2012

Extending Service Coverage Using FGS-Aware Blind Repetition.
Proceedings of the 15th International Conference on Network-Based Information Systems, 2012

2011
Fine-grained data access control for distributed sensor networks.
Wirel. Networks, 2011

Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems.
IEEE Trans. Parallel Distributed Syst., 2011

2010
A Multi-service Group Key Management Scheme for Stateless Receivers in Wireless Mesh Networks.
Mob. Networks Appl., 2010

Self-healing key distribution scheme with long service time.
IEICE Electron. Express, 2010

Chosen ciphertext secure authenticated group communication using identity-based signcryption.
Comput. Math. Appl., 2010

2009
Improved batch exponentiation.
Inf. Process. Lett., 2009

A Decentralized Multi-Group Key Management Scheme.
IEICE Trans. Commun., 2009

Bandwidth efficient key distribution for secure multicast in dynamic wireless mesh networks.
Proceedings of the 2009 IEEE Wireless Communications and Networking Conference, 2009

A Distributed Deterministic and Resilient Replication Attack Detection Protocol in Wireless Sensor Networks.
Proceedings of the Communication and Networking, 2009

2008
Security Considerations for Handover Schemes in Mobile WiMAX Networks.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

2007
A New Binary Image Authentication Scheme with Small Distortion and Low False Negative Rates.
IEICE Trans. Commun., 2007

Decentralized group key management for dynamic networks using proxy cryptography.
Proceedings of the Q2SWinet'07, 2007

An Efficient Pre-authentication Scheme for IEEE 802.11-Based Vehicular Networks.
Proceedings of the Advances in Information and Computer Security, 2007

An Efficient Proactive Key Distribution Scheme for Fast Handoff in IEEE 802.11 Wireless Networks.
Proceedings of the Information Networking. Towards Ubiquitous Networking and Services, 2007

2006
Pre-authentication for Fast Handoff in Wireless Mesh Networks with Mobile APs.
Proceedings of the Information Security Applications, 7th International Workshop, 2006

2005
Trust Management for Resilient Wireless Sensor Networks.
Proceedings of the Information Security and Cryptology, 2005


  Loading...