Jung Yeon Hwang

Orcid: 0000-0002-8123-0507

Affiliations:
  • Electronics and Telecommunications Research Institute (ETRI), Daejeon, South Korea


According to our database1, Jung Yeon Hwang authored at least 62 papers between 2003 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Dynamic Anonymous Credential Systems With Controllable Anonymity and Unlinkability.
IEEE Access, 2023

2022
A Novel Joint Dataset and Computation Management Scheme for Energy-Efficient Federated Learning in Mobile Edge Computing.
IEEE Wirel. Commun. Lett., 2022

2021
A Novel Joint Mobile Cache and Power Management Scheme for Energy-Efficient Mobile Augmented Reality Service in Mobile Edge Computing.
IEEE Wirel. Commun. Lett., 2021

A Novel Deep Learning-Based IoT Device Transmission Interval Management Scheme for Enhanced Scalability in LoRa Networks.
IEEE Wirel. Commun. Lett., 2021

Secure Chaff-less Fuzzy Vault for Face Identification Systems.
ACM Trans. Multim. Comput. Commun. Appl., 2021

Secure Secret Sharing Enabled b-band Mini Vaults Bio-Cryptosystem for Vectorial Biometrics.
IEEE Trans. Dependable Secur. Comput., 2021

A Verifier-Based Password-Authenticated Key Exchange Using Tamper-Proof Hardware.
Comput. J., 2021

Comments on "Identity-Based Revocation From Subset Difference Methods Under Simple Assumptions".
IEEE Access, 2021

2020
Open-set face identification with index-of-max hashing by learning.
Pattern Recognit., 2020

Is Your Android App Insecure? Patching Security Functions With Dynamic Policy Based on a Java Reflection Technique.
IEEE Access, 2020

2019
A parameterized model to select discriminating features on keystroke dynamics authentication on smartphones.
Pervasive Mob. Comput., 2019

Symmetric keyring encryption scheme for biometric cryptosystem.
Inf. Sci., 2019

SIMS : Self Sovereign Identity Management System with Preserving Privacy in Blockchain.
IACR Cryptol. ePrint Arch., 2019

Fuzzy Vector Signature and Its Application to Privacy-Preserving Authentication.
IEEE Access, 2019

Efficient Privacy-Preserving Machine Learning for Blockchain Network.
IEEE Access, 2019

Viewpoint Networking for Trusted Reality.
Proceedings of the Eleventh International Conference on Ubiquitous and Future Networks, 2019

2018
Ranking-Based Locality Sensitive Hashing-Enabled Cancelable Biometrics: Index-of-Max Hashing.
IEEE Trans. Inf. Forensics Secur., 2018

Construction of a New Biometric-Based Key Derivation Function and Its Application.
Secur. Commun. Networks, 2018

Understanding Keystroke Dynamics for Smartphone Users Authentication and Keystroke Dynamics on Smartphones Built-In Motion Sensors.
Secur. Commun. Networks, 2018

A Symmetric Keyring Encryption Scheme for Biometric Cryptosystems.
CoRR, 2018

Round-Reduced Modular Construction of Asymmetric Password-Authenticated Key Exchange.
Proceedings of the Security and Cryptography for Networks - 11th International Conference, 2018

2017
Simplified small exponent test for batch verification.
Theor. Comput. Sci., 2017

A New and Practical Design of Cancellable Biometrics: Index-of-Max Hashing.
CoRR, 2017

A Cancellable Ranking Based Hashing Method for Fingerprint Template Protection.
Proceedings of the Mobile Networks and Management - 9th International Conference, 2017

2016
Anonymity-based authenticated key agreement with full binding property.
J. Commun. Networks, 2016

2015
Short Dynamic Group Signature Scheme Supporting Controllable Linkability.
IEEE Trans. Inf. Forensics Secur., 2015

New efficient batch verification for an identity-based signature scheme.
Secur. Commun. Networks, 2015

Constructing Efficient PAKE Protocols from Identity-Based KEM/DEM.
IACR Cryptol. ePrint Arch., 2015

Collusion-resistant convertible ring signature schemes.
Sci. China Inf. Sci., 2015

Robust Authenticated Key Exchange Using Passwords and Identity-Based Signatures.
Proceedings of the Security Standardisation Research - Second International Conference, 2015

2014
An enhanced (t, n) threshold directed signature scheme.
Inf. Sci., 2014

2013
Group signatures with controllable linkability for dynamic membership.
Inf. Sci., 2013

2012
Identity-Based Ring Signature Schemes for Multiple Domains.
KSII Trans. Internet Inf. Syst., 2012

Efficient certificateless proxy signature scheme with provable security.
Inf. Sci., 2012

2011
A note on an identity-based ring signature scheme with signer verifiability.
Theor. Comput. Sci., 2011

RFID tag search protocol preserving privacy of mobile reader holders.
IEICE Electron. Express, 2011

Security Improvement of an RFID Security Protocol of ISO/IEC WD 29167-6.
IEEE Commun. Lett., 2011

Privacy-Enhanced Deniable Authentication E-Mail Service.
Proceedings of the Digital Enterprise and Information Systems - International Conference, 2011

2010
A Privacy-Enhanced Contents Sharing Mechanism with Secure Removable Media(SRM).
Proceedings of the 4th International Conference on Multimedia and Ubiquitous Engineering, 2010

2009
Weaknesses in the Hur-Shin-Yoon decentralized group key management.
Wirel. Commun. Mob. Comput., 2009

A note on leakage-resilient authenticated key exchange.
IEEE Trans. Wirel. Commun., 2009

Security vulnerability in a non-interactive ID-based proxy re-encryption scheme.
Inf. Process. Lett., 2009

The Kurosawa-Desmedt key encapsulation is not chosen-ciphertext secure.
Inf. Process. Lett., 2009

Security Vulnerability of ID-Based Key Sharing Schemes.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

Configurations of Dual RAID System.
Proceedings of the Communication and Networking, 2009

Universal forgery of the identity-based sequential aggregate signature scheme.
Proceedings of the 2009 ACM Symposium on Information, 2009

Security Enhancing Compiler for Localization Schemes in Pervasive Sensor Networks.
Proceedings of the 8th IEEE/ACIS International Conference on Computer and Information Science, 2009

2008
Impersonation Attack on a Strong ID-Based Key Distribution.
IEICE Trans. Commun., 2008

ID-Based Authenticated Group Key Agreement Secure against Insider Attacks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

Identity-based universal designated multi-verifiers signature schemes.
Comput. Stand. Interfaces, 2008

Security weakness in an authenticated group key agreement protocol in two rounds.
Comput. Commun., 2008

Non-interactive Identity-Based DNF Signature Scheme and Its Extensions.
Proceedings of the Information Security and Cryptology, 2008

2007
Certificateless Public Key Encryption in the Selective-ID Security Model (Without Random Oracles).
Proceedings of the Pairing-Based Cryptography, 2007

Efficient Certificateless Signature Schemes.
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007

2005
Cryptanalysis of Lee-Kim-Yoo password-based key agreement scheme.
Appl. Math. Comput., 2005

One-Way Chain Based Broadcast Encryption Schemes.
Proceedings of the Advances in Cryptology, 2005

Generic Transformation for Scalable Broadcast Encryption Schemes.
Proceedings of the Advances in Cryptology, 2005

ID-based Authenticated Key Agreement for Low-Power Mobile Devices.
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005

2004
Efficient Password-Based Group Key Exchange.
Proceedings of the Trust and Privacy in Digital Business, First International Conference, 2004

Efficient ID-based Group Key Agreement with Bilinear Maps.
Proceedings of the Public Key Cryptography, 2004

2003
An Anonymous Asymmetric Public Key Traitor Tracing Scheme.
Proceedings of the E-Commerce and Web Technologies, 4th International Conference, 2003

Digital Signature Schemes with Restriction on Signing Capability.
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003


  Loading...