Taek-Young Youn

Orcid: 0000-0002-3840-2254

According to our database1, Taek-Young Youn authored at least 43 papers between 2005 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
POSTER: Stopping Run-Time Countermeasures in Cryptographic Primitives.
Proceedings of the Applied Cryptography and Network Security Workshops, 2023

2022
Practical Order-Revealing Encryption with Short Ciphertext.
IEICE Trans. Inf. Syst., November, 2022

Fully Dynamic Data Management in Cloud Storage Systems with Secure Proof of Retrievability.
IEICE Trans. Inf. Syst., November, 2022

2021
Secure Data Management using Distributed Storages for Stronger Cybersecurity in Cloud Service.
Proceedings of the 2021 World Automation Congress, 2021

Efficient Data Delivery in Content-Centric Network with Stronger Privacy of Publisher.
Proceedings of the International Conference on Information Networking, 2021

2020
Blockchain-Based Data Sharing and Trading Model for the Connected Car.
Sensors, 2020

Trapdoor Digital Shredder: A New Technique for Improved Data Security without Cryptographic Encryption.
KSII Trans. Internet Inf. Syst., 2020

Public key encryption with equality test in the standard model.
Inf. Sci., 2020

Practical Sender Authentication Scheme for In-Vehicle CAN With Efficient Key Management.
IEEE Access, 2020

Deep Neural Networks Based Key Concealment Scheme.
IEEE Access, 2020

2019
Authorized Client-Side Deduplication Using CP-ABE in Cloud Storage.
Wirel. Commun. Mob. Comput., 2019

UAV-Undertaker: Securely Verifiable Remote Erasure Scheme with a Countdown-Concept for UAV via Randomized Data Synchronization.
Wirel. Commun. Mob. Comput., 2019

CAN ID Shuffling Technique (CIST): Moving Target Defense Strategy for Protecting In-Vehicle CAN.
IEEE Access, 2019

Is It Possible to Hide My Key into Deep Neural Network?
Proceedings of the Information Security Applications - 20th International Conference, 2019

2018
Design of additive homomorphic encryption with multiple message spaces for secure and practical storage services over encrypted data.
J. Supercomput., 2018

Smart Contract-Based Review System for an IoT Data Marketplace.
Sensors, 2018

TLDA: An Efficient Two-Layered Data Authentication Mechanism for Content-Centric Networking.
Secur. Commun. Networks, 2018

TIM: A Trapdoor Hash Function-based Authentication Mechanism for Streaming Applications.
KSII Trans. Internet Inf. Syst., 2018

Bi-directional and concurrent proof of ownership for stronger storage services with de-duplication.
Sci. China Inf. Sci., 2018

Efficient Client-Side Deduplication of Encrypted Data With Public Auditing in Cloud Storage.
IEEE Access, 2018

Non-Repudiable Dynamic PDP with Stronger Security based on Stateful Rank Based Skip List.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2018

2017
New User Management Technique in Storage Services for Stronger Privacy.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2017

A Solution for Reducing Redistribution Costs of HAIL.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2017

2016
Semi-Generic Transformation of Revocable Hierarchical Identity-Based Encryption and Its DBDH Instantiation.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016

2015
Necessity of Incentive System for the First Uploader in Client-Side Deduplication.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2015

2014
Study on two privacy-oriented protocols for information communication systems.
J. Intell. Manuf., 2014

Practical RSA-PAKE for Low-Power Device in Imbalanced Wireless Networks.
Int. J. Distributed Sens. Networks, 2014

Authenticated Distance Bounding Protocol with Improved FAR: Beyond the Minimal Bound of FAR.
IEICE Trans. Commun., 2014

Bucket Index Ordering Problem in Range Queries.
Proceedings of the Frontier and Innovation in Future Computing and Communications, 2014

2013
Efficient three-party key exchange protocols with round efficiency.
Telecommun. Syst., 2013

2012
Signcryption with fast online signing and short signcryptext for secure and private mobile communication.
Sci. China Inf. Sci., 2012

2011
An efficient non-interactive deniable authentication scheme based on trapdoor commitment schemes.
Comput. Commun., 2011

2010
Security analysis of an unlinkable secret handshakes scheme.
IEEE Commun. Lett., 2010

Improved Delegation-Based Authentication Protocol for Secure Roaming Service with Unlinkability.
IEEE Commun. Lett., 2010

2009
Efficient Trapdoor Commitment as Secure as Factoring with Useful Properties.
IEICE Trans. Inf. Syst., 2009

An Efficient Signature Scheme with Fast Online Signing.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

Security Vulnerability of ID-Based Key Sharing Schemes.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

Weaknesses in an anonymous authentication scheme for roaming service in global mobility networks.
IEEE Commun. Lett., 2009

2008
Weakness in a RSA-based password authenticated key exchange protocol.
Inf. Process. Lett., 2008

Efficient Flexible Batch Signing Techniques for Imbalanced Communication Applications.
IEICE Trans. Inf. Syst., 2008

2006
An Efficient ID-Based Delegation Network.
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006

On the Security of Multilevel Cryptosystems over Class Semigroups of Imaginary Quadratic Non-maximal Orders.
Proceedings of the Public Key Infrastructure, 2006

2005
An Efficient Public Key Cryptosystem with a Privacy Enhanced Double Decryption Mechanism.
Proceedings of the Selected Areas in Cryptography, 12th International Workshop, 2005


  Loading...