Seung-Hyun Seo

According to our database1, Seung-Hyun Seo authored at least 27 papers between 2003 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
A Lightweight Encryption Method for Privacy Protection in Surveillance Videos.
IEEE Access, 2018

2017
Secure Utilization of Beacons and UAVs in Emergency Response Systems for Building Fire Hazard.
Sensors, 2017

Secure and Usable Bio-Passwords based on Confidence Interval.
J. Internet Serv. Inf. Secur., 2017

Certificateless Cryptographic Protocols for Efficient Drone-Based Smart City Applications.
IEEE Access, 2017

2016
pCLSC-TKEM: a Pairing-free Certificateless Signcryption-tag Key Encapsulation Mechanism for a Privacy-Preserving IoT.
Transactions on Data Privacy, 2016

A Security Framework for a Drone Delivery Service.
Proceedings of the 2nd Workshop on Micro Aerial Vehicle Networks, 2016

2015
Effective Key Management in Dynamic Wireless Sensor Networks.
IEEE Trans. Information Forensics and Security, 2015

A Strengthened Android Signature Management Method.
TIIS, 2015

Scalable end-to-end security for advanced metering infrastructures.
Inf. Syst., 2015

A Secure Communication Protocol for Drones and Smart Objects.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds.
IEEE Trans. Knowl. Data Eng., 2014

Detecting mobile malware threats to homeland security through static analysis.
J. Network and Computer Applications, 2014

POSTER: a pairing-free certificateless hybrid sign-cryption scheme for advanced metering infrastructures.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

2013
Encryption key management for secure communication in smart advanced metering infrastructures.
Proceedings of the IEEE Fourth International Conference on Smart Grid Communications, 2013

Potential vulnerability analysis of mobile banking applications.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2013

An efficient certificateless cryptography scheme without pairing.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013

2012
Efficient certificateless proxy signature scheme with provable security.
Inf. Sci., 2012

Analysis on Maliciousness for Mobile Applications.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

An Access Control Mechanism for Remote Control of Home Security System.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

Mobile Malware Threats and Defenses for Homeland Security.
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012

2008
Identity-based universal designated multi-verifiers signature schemes.
Computer Standards & Interfaces, 2008

2006
Cryptanalysis of ID-Based Authenticated Key Agreement Protocols from Bilinear Pairings (Short Paper).
Proceedings of the Information and Communications Security, 8th International Conference, 2006

2005
A Mediated Proxy Signature Scheme with Fast Revocation for Electronic Transactions.
Proceedings of the Trust, 2005

A Secure Mobile Agent Protocol for AMR Systems in Home Network Environments.
Proceedings of the Information Networking, 2005

Security Analysis of Password-Authenticated Key Agreement Protocols.
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005

2004
A Secure and Flexible Multi-signcryption Scheme.
Proceedings of the Computational Science and Its Applications, 2004

2003
A Secure Mobile Agent System Using Multi-signature Scheme in Electronic Commerce.
Proceedings of the Web Communication Technologies and Internet-Related Social Issues, 2003


  Loading...