Taekyoung Kwon

According to our database1, Taekyoung Kwon authored at least 123 papers between 1996 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
A Password Meter without Password Exposure.
Sensors, 2021

2020
Birds of a Feature: Intrafamily Clustering for Version Identification of Packed Malware.
IEEE Syst. J., 2020

A Privacy-Preserving Authentication, Authorization, and Key Agreement Scheme for Wireless Sensor Networks in 5G-Integrated Internet of Things.
IEEE Access, 2020

2019
Visual analytics and visualization for android security risk.
J. Comput. Lang., 2019

A Lightweight Three-Factor Authentication and Key Agreement Scheme in Wireless Sensor Networks for Smart Homes.
Sensors, 2019

Detection of malicious packet dropping attacks in RPL-based internet of things.
Int. J. Ad Hoc Ubiquitous Comput., 2019

Draw It As Shown: Behavioral Pattern Lock for Mobile User Authentication.
IEEE Access, 2019

Poster: Effective Layers in Coverage Metrics for Deep Neural Networks.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Poster: Evaluating Code Coverage for System Call Fuzzers.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Intriguer: Field-Level Constraint Solving for Hybrid Fuzzing.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Two-Factor Authenticated Key Agreement Supporting Unlinkability in 5G-Integrated Wireless Sensor Networks.
IEEE Access, 2018

Data Transfusion: Pairing Wearable Devices and Its Implication on Security for Internet of Things.
IEEE Access, 2018

Round-Reduced Modular Construction of Asymmetric Password-Authenticated Key Exchange.
Proceedings of the Security and Cryptography for Networks - 11th International Conference, 2018

A Bitstream Reverse Engineering Tool for FPGA Hardware Trojan Detection.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

A Guided Approach to Behavioral Authentication.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Location-Based Key Management Strong Against Insider Threats in Wireless Sensor Networks.
IEEE Syst. J., 2017

Experimental performance analysis of lightweight block ciphers and message authentication codes for wireless sensor networks.
Int. J. Distributed Sens. Networks, 2017

A corrupted cloud and corrupted multi-cloud identification method for batch auditing in cloud storage services.
Comput. Syst. Sci. Eng., 2017

Glitch Recall: A Hardware Trojan Exploiting Natural Glitches in Logic Circuits.
Proceedings of the Information Security Applications - 18th International Conference, 2017

Personal visual analytics for android security risk lifelog.
Proceedings of the 10th International Symposium on Visual Information Communication and Interaction, 2017

The Fuzzing Awakens: File Format-Aware Mutational Fuzzing on Smartphone Media Server Daemons.
Proceedings of the ICT Systems Security and Privacy Protection, 2017

POSTER: Watch Out Your Smart Watch When Paired.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

POSTER: Rethinking Fingerprint Identification on Smartphones.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Here Is Your Fingerprint!: Actual Risk versus User Perception of Latent Fingerprints and Smudges Remaining on Smartphones.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
Wireless/mobile connected entertainment [Guest editors' introduction].
IEEE Wirel. Commun., 2016

FlexiCast: Energy-Efficient Software Integrity Checks to Build Secure Industrial Wireless Active Sensor Networks.
IEEE Trans. Ind. Informatics, 2016

SteganoPIN: Two-Faced Human-Machine Interface for Practical Enforcement of PIN Entry Security.
IEEE Trans. Hum. Mach. Syst., 2016

LinkA: A Link Layer Anonymization Method Based on Bloom Filter for Authenticated IoT Devices.
Intell. Autom. Soft Comput., 2016

Secure dissemination of software updates for intelligent mobility in future wireless networks.
EURASIP J. Wirel. Commun. Netw., 2016

2015
Analysis and Improvement of a PIN-Entry Method Resilient to Shoulder-Surfing and Recording Attacks.
IEEE Trans. Inf. Forensics Secur., 2015

A Survey of Public Provable Data Possession Schemes with Batch Verification in Cloud Storage.
J. Internet Serv. Inf. Secur., 2015

Constructing Efficient PAKE Protocols from Identity-Based KEM/DEM.
IACR Cryptol. ePrint Arch., 2015

Identification of Corrupted Cloud Storage in Batch Auditing for Multi-Cloud Environments.
Proceedings of the Information and Communication Technology, 2015

2014
Covert Attentional Shoulder Surfing: Human Adversaries Are More Powerful Than Expected.
IEEE Trans. Syst. Man Cybern. Syst., 2014

Touch pointer: rethink point-and-click for accurate indirect touch interactions on small touchscreens.
IEEE Trans. Consumer Electron., 2014

Drag-and-type: a new method for typing with virtual keyboards on small touchscreens.
IEEE Trans. Consumer Electron., 2014

A Method for Hiding Link Layer Addresses Using Bloom Filter in Wireless Sensor Networks.
J. Internet Serv. Inf. Secur., 2014

AAnA: Anonymous authentication and authorization based on short traceable signatures.
Int. J. Inf. Sec., 2014

GENDEP: Location-Aware Key Management for General Deployment of Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2014

Information-Centric Networking 3 (Dagstuhl Seminar 14291).
Dagstuhl Reports, 2014

TinyLock: Affordable defense against smudge attacks on smartphone pattern lock systems.
Comput. Secur., 2014

RIK: A virtual keyboard resilient to spyware in smartphones.
Proceedings of the IEEE International Conference on Consumer Electronics, 2014

SwitchPIN: Securing smartphone PIN entry with switchable keypads.
Proceedings of the IEEE International Conference on Consumer Electronics, 2014

2013
Classification and Experimental Analysis for Clone Detection Approaches in Wireless Sensor Networks.
IEEE Syst. J., 2013

2012
An iterative analysis of single-hop B-MAC networks under Poisson traffic.
J. Commun. Networks, 2012

Optimal frame structure design using landmarks for interactive light field streaming.
Proceedings of the 2012 IEEE International Conference on Acoustics, 2012

2011
Itinerary Planning for Energy-Efficient Agent Communications in Wireless Sensor Networks.
IEEE Trans. Veh. Technol., 2011

Fast Exponentiation Using Split Exponents.
IEEE Trans. Inf. Theory, 2011

A Genetic Algorithm Approach to Multi-Agent Itinerary Planning in Wireless Sensor Networks.
Mob. Networks Appl., 2011

Privacy preservation with X.509 standard certificates.
Inf. Sci., 2011

Multiple mobile agents' itinerary planning in wireless sensor networks: survey and evaluation.
IET Commun., 2011

Secure Authentication Scheme with Improved Anonymity for Wireless Environments.
IEICE Trans. Commun., 2011

Decryptable to Your Eyes: Visualization of Security Protocols at the User Interface
CoRR, 2011

Rate adaptation in visual MIMO.
Proceedings of the 8th Annual IEEE Communications Society Conference on Sensor, 2011

Optimized frame structure for interactive light field streaming with cooperative caching.
Proceedings of the 2011 IEEE International Conference on Multimedia and Expo, 2011

2010
An Experimental Study of Hierarchical Intrusion Detection for Wireless Industrial Sensor Networks.
IEEE Trans. Ind. Informatics, 2010

Group Connectivity Model for Industrial Wireless Sensor Networks.
IEEE Trans. Ind. Electron., 2010

Secure and Efficient Broadcast Authentication in Wireless Sensor Networks.
IEEE Trans. Computers, 2010

2009
Receiver-oriented load-balancing and reliable routing in wireless sensor networks.
Wirel. Commun. Mob. Comput., 2009

Location-based pairwise key predistribution for wireless sensor networks.
IEEE Trans. Wirel. Commun., 2009

Spatial-Temporal relation-based Energy-Efficient Reliable routing protocol in wireless sensor networks.
Int. J. Sens. Networks, 2009

Energy-Efficient Itinerary Planning for Mobile Agents in Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2009

On the Privacy-Preserving HCI Issues.
Proceedings of the Universal Access in Human-Computer Interaction. Addressing Diversity, 2009

2008
Biometric Authentication for Border Control Applications.
IEEE Trans. Knowl. Data Eng., 2008

Reliable and energy-efficient routing protocol in dense wireless sensor networks.
Int. J. Sens. Networks, 2008

Efficient Flexible Batch Signing Techniques for Imbalanced Communication Applications.
IEICE Trans. Inf. Syst., 2008

New Hardware Architecture for Multiplication over <i>GF</i>(2<i><sup>m</sup></i>) and Comparisons with Normal and Polynomial Basis Multipliers for Elliptic Curve Cryptography.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

2007
Efficient and Secure Key Agreement for Merging Clusters in Ad-Hoc Networking Environments.
IEICE Trans. Commun., 2007

A Practical Method for Generating Digital Signatures Using Biometrics.
IEICE Trans. Commun., 2007

Secure Dynamic Network Reprogramming Using Supplementary Hash in Wireless Sensor Networks.
Proceedings of the Ubiquitous Intelligence and Computing, 4th International Conference, 2007

A Time-Based Key Management Protocol for Wireless Sensor Networks.
Proceedings of the Information Security Practice and Experience, 2007

Biometric Person Authentication for Access Control Scenario Based on Face Recognition.
Proceedings of the Universal Access in Human Computer Interaction. Coping with Diversity, 2007

Biometric Digital Key Mechanisms for Telebiometric Authentication Based on Biometric Certificate.
Proceedings of the Universal Access in Human Computer Interaction. Coping with Diversity, 2007

Multi-modal Authentication for Ubiquitous Computing Environments.
Proceedings of the Universal Access in Human-Computer Interaction. Ambient Interaction, 2007

Knowledge-Based User Authentication Associated with Biometrics.
Proceedings of the Universal Access in Human Computer Interaction. Coping with Diversity, 2007

2006
Contents distribution system based on MPEG-4 ISMACryp in IP set-top box environments.
IEEE Trans. Consumer Electron., 2006

Mobile Agent Based Wireless Sensor Networks.
J. Comput., 2006

Partial Key Exposure Attacks on Unbalanced RSA with the CRT.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006

A Novel Cluster-Based Cooperative MIMO Scheme for Multi-Hop Wireless Sensor Networks.
EURASIP J. Wirel. Commun. Netw., 2006

Three-Party Password Authenticated Key Agreement Resistant to Server Compromise.
Proceedings of the Information Security Applications, 7th International Workshop, 2006

Privacy Protection in PKIs: A Separation-of-Authority Approach.
Proceedings of the Information Security Applications, 7th International Workshop, 2006

Security Analysis of Secure Password Authentication for Keystroke Dynamics.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2006

Experimental Study on Wireless Sensor Network Security.
Proceedings of the Intelligence and Security Informatics, 2006

Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer.
Proceedings of the Information and Communications Security, 8th International Conference, 2006

An Improved Fingerprint-Based Remote User Authentication Scheme Using Smart Cards.
Proceedings of the Computational Science and Its Applications, 2006

Cluster-Based Certificate Chain for Mobile Ad Hoc Networks.
Proceedings of the Computational Science and Its Applications, 2006

Location-Aware Key Management Using Multi-layer Grids for Wireless Sensor Networks.
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006

2005
Security analysis and improvement of the efficient password-based authentication protocol.
IEEE Commun. Lett., 2005

Efficient Linear Array for Multiplication over NIST Recommended Binary Fields.
Proceedings of the Fuzzy Logic and Applications, 6th International Workshop, 2005

Multi-modal Biometrics with PKI Technologies for Border Control Applications.
Proceedings of the Intelligence and Security Informatics, 2005

New Architecture for Multiplication in <i>GF</i>(2<sup><i>m</i></sup>) and Comparisons with Normal and Polynomial Basis Multipliers for Elliptic Curve Cryptography.
Proceedings of the Information Security and Cryptology, 2005

Multi-modal Biometrics with PKIs for Border Control Applications.
Proceedings of the Computational Science and Its Applications, 2005

Authenticated Key Agreement Without Subgroup Element Verification.
Proceedings of the Computational Science and Its Applications, 2005

Multi-modal Techniques for Identity Theft Prevention.
Proceedings of the Web and Communication Technologies and Internet-Related Social Issues, 2005

Efficient Key Agreement for Merging Clusters in Ad-Hoc Networking Environments.
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005

An Efficient Message Broadcast Authentication Scheme for Sensor Networks.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

Strengthening Password-Based Authentication Protocols Against Online Dictionary Attacks.
Proceedings of the Applied Cryptography and Network Security, 2005

2004
Refinement and improvement of virtual software token protocols.
IEEE Commun. Lett., 2004

Domain-Based Proxy for Efficient Location Tracking of Mobile Agents.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2004

Design and Analysis of Improved GSM Authentication Protocol for Roaming Users.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2004

Practical Authenticated Key Agreement Using Passwords.
Proceedings of the Information Security, 7th International Conference, 2004

Reflector Attack Traceback System with Pushback Based iTrace Mechanism.
Proceedings of the Information and Communications Security, 6th International Conference, 2004

Practical Digital Signature Generation Using Biometrics.
Proceedings of the Computational Science and Its Applications, 2004

An Authentication Scheme Based Upon Face Recognition for the Mobile Environment.
Proceedings of the Computational and Information Science, First International Symposium, 2004

NS-2 Based IP Traceback Simulation Against Reflector Based DDoS Attack.
Proceedings of the Artificial Intelligence and Simulation, 2004

2003
Erratum to: "Digital signature algorithm for securing digital identities": [Information Processing Letters 82 (2002) 247-252].
Inf. Process. Lett., 2003

Automation-Considered Logic of Authentication and Key Distribution.
Proceedings of the Information Security Applications, 4th International Workshop, 2003

Practical Security Improvement of PKCS#5.
Proceedings of the Computer and Information Sciences, 2003

Robust Software Tokens - Yet Another Method for Securing User's Digital Identity.
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003

2002
Digital signature algorithm for securing digital identities.
Inf. Process. Lett., 2002

Impersonation attacks on software-only two-factor authentication schemes.
IEEE Commun. Lett., 2002

On the Difficulty of Protecting Private Keys in Software.
Proceedings of the Information Security, 5th International Conference, 2002

Virtual Software Tokens - A Practical Way to Secure PKI Roaming.
Proceedings of the Infrastructure Security, International Conference, 2002

A Model for Embedding and Authorizing Digital Signatures in Printed Documents.
Proceedings of the Information Security and Cryptology, 2002

2001
Robust Software Tokens: Towards Securing a Digital Identity.
IACR Cryptol. ePrint Arch., 2001

Authentication and Key Agreement Via Memorable Passwords.
Proceedings of the Network and Distributed System Security Symposium, 2001

2000
Authentication and Key Agreement via Memorable Password.
IACR Cryptol. ePrint Arch., 2000

1999
Clarifying Straight Replays and Forced Delays.
ACM SIGOPS Oper. Syst. Rev., 1999

1998
Efficient and secure password-based authentication protocols against guessing attacks.
Comput. Commun., 1998

1997
Security and efficiency in authentication protocols resistant to password guessing attack.
Proceedings of the 22nd IEEE Conference on Local Computer Networks (LCN '97), 1997

A modeling of security management system for electronic data interchange.
Proceedings of the Second IEEE Symposium on Computers and Communications (ISCC 1997), 1997

An Adaptable and Reliable Authentication Protocol for Communication Networks.
Proceedings of the Proceedings IEEE INFOCOM '97, 1997

1996
The Design and Verification of Services Feature Interaction Manager on AIN Using Z Schema.
Proceedings of the COMPSAC '96, 1996


  Loading...