Seung-Hun Jin

According to our database1, Seung-Hun Jin authored at least 11 papers between 2010 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Is Your Android App Insecure? Patching Security Functions With Dynamic Policy Based on a Java Reflection Technique.
IEEE Access, 2020

2018
Feature Subset for Improving Accuracy of Keystroke Dynamics on Mobile Environment.
J. Inf. Process. Syst., 2018

AppWrapper: Patching Security Functions with Dynamic Policy on Your Insecure Android Apps.
Proceedings of the 2018 IEEE International Symposium on Software Reliability Engineering Workshops, 2018

2017
Simplified small exponent test for batch verification.
Theor. Comput. Sci., 2017

Appwrapping Providing Fine-Grained Security Policy Enforcement Per Method Unit in Android.
Proceedings of the 2017 IEEE International Symposium on Software Reliability Engineering Workshops, 2017

2016
A Study on Feature of Keystroke Dynamics for Improving Accuracy in Mobile Environment.
Proceedings of the Information Security Applications - 17th International Workshop, 2016

2015
Customer Data Scanner for Hands-Free Mobile Payment.
IEICE Trans. Commun., 2015

Robust Authenticated Key Exchange Using Passwords and Identity-Based Signatures.
Proceedings of the Security Standardisation Research - Second International Conference, 2015

Accurate Indoor Proximity Zone Detection Based on Time Window and Frequency with Bluetooth Low Energy.
Proceedings of the 10th International Conference on Future Networks and Communications (FNC 2015) / The 12th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2015) / Affiliated Workshops, 2015

2013
Geo-location based QR-Code authentication scheme to defeat active real-time phishing attack.
Proceedings of the DIM'13, 2013

2010
Gatekeeper: providing secure interoperability between mobile web-browser and local resources.
Proceedings of the 6th Workshop on Digital Identity Management, 2010


  Loading...