default search action
Taek-Young Youn
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c12]Myung-Hyun Kim, Taek-Young Youn, Seungkwang Lee:
POSTER: Stopping Run-Time Countermeasures in Cryptographic Primitives. ACNS Workshops 2023: 675-679 - [e2]Ilsun You, Taek-Young Youn:
Information Security Applications - 23rd International Conference, WISA 2022, Jeju Island, South Korea, August 24-26, 2022, Revised Selected Papers. Lecture Notes in Computer Science 13720, Springer 2023, ISBN 978-3-031-25658-5 [contents] - 2022
- [j31]Nam-Su Jho, Daesung Moon, Taek-Young Youn:
Fully Dynamic Data Management in Cloud Storage Systems with Secure Proof of Retrievability. IEICE Trans. Inf. Syst. 105-D(11): 1872-1879 (2022) - [j30]Taek-Young Youn, Bo Sun Kwak, Seungkwang Lee, Hyun Sook Rhee:
Practical Order-Revealing Encryption with Short Ciphertext. IEICE Trans. Inf. Syst. 105-D(11): 1934-1937 (2022) - [e1]Ilsun You, Hwankuk Kim, Taek-Young Youn, Francesco Palmieri, Igor V. Kotenko:
Mobile Internet Security - 5th International Symposium, MobiSec 2021, Jeju Island, South Korea, October 7-9, 2021, Revised Selected Papers. Communications in Computer and Information Science 1544, Springer 2022, ISBN 978-981-16-9575-9 [contents] - 2021
- [c11]Taek-Young Youn, Joongheon Kim, Seog Chung Seo:
Efficient Data Delivery in Content-Centric Network with Stronger Privacy of Publisher. ICOIN 2021: 511-513 - [c10]Taek-Young Youn, Nam-Su Jho, Samuel Woo:
Secure Data Management using Distributed Storages for Stronger Cybersecurity in Cloud Service. WAC 2021: 265-270 - 2020
- [j29]Taek-Young Youn, Yousik Lee, Samuel Woo:
Practical Sender Authentication Scheme for In-Vehicle CAN With Efficient Key Management. IEEE Access 8: 86836-86849 (2020) - [j28]Taehyuk Kim, Taek-Young Youn, Dooho Choi:
Deep Neural Networks Based Key Concealment Scheme. IEEE Access 8: 204214-204225 (2020) - [j27]Hyung Tae Lee, San Ling, Jae Hong Seo, Huaxiong Wang, Taek-Young Youn:
Public key encryption with equality test in the standard model. Inf. Sci. 516: 89-108 (2020) - [j26]Taek-Young Youn, Nam-Su Jho:
Trapdoor Digital Shredder: A New Technique for Improved Data Security without Cryptographic Encryption. KSII Trans. Internet Inf. Syst. 14(3): 1249-1262 (2020) - [j25]Byeong-Gyu Jeong, Taek-Young Youn, Nam-Su Jho, Sanguk Shin:
Blockchain-Based Data Sharing and Trading Model for the Connected Car. Sensors 20(11): 3141 (2020)
2010 – 2019
- 2019
- [j24]Samuel Woo, Daesung Moon, Taek-Young Youn, Yousik Lee, Yongeun Kim:
CAN ID Shuffling Technique (CIST): Moving Target Defense Strategy for Protecting In-Vehicle CAN. IEEE Access 7: 15521-15536 (2019) - [j23]Taek-Young Youn, Nam-Su Jho, Kyung Hyune Rhee, Sang-Uk Shin:
Authorized Client-Side Deduplication Using CP-ABE in Cloud Storage. Wirel. Commun. Mob. Comput. 2019: 7840917:1-7840917:11 (2019) - [j22]Sieun Kim, Taek-Young Youn, Daeseon Choi, Ki-Woong Park:
UAV-Undertaker: Securely Verifiable Remote Erasure Scheme with a Countdown-Concept for UAV via Randomized Data Synchronization. Wirel. Commun. Mob. Comput. 2019: 8913910:1-8913910:11 (2019) - [c9]Taehyuk Kim, Taek-Young Youn, Dooho Choi:
Is It Possible to Hide My Key into Deep Neural Network? WISA 2019: 259-272 - 2018
- [j21]Taek-Young Youn, Ku-Young Chang, Kyung-Hyune Rhee, Sang-Uk Shin:
Efficient Client-Side Deduplication of Encrypted Data With Public Auditing in Cloud Storage. IEEE Access 6: 26578-26587 (2018) - [j20]Taek-Young Youn, Ku-Young Chang:
Bi-directional and concurrent proof of ownership for stronger storage services with de-duplication. Sci. China Inf. Sci. 61(3): 032107:1-032107:11 (2018) - [j19]Seog Chung Seo, Taek-Young Youn:
TIM: A Trapdoor Hash Function-based Authentication Mechanism for Streaming Applications. KSII Trans. Internet Inf. Syst. 12(6): 2922-2945 (2018) - [j18]Seog Chung Seo, Taek-Young Youn:
TLDA: An Efficient Two-Layered Data Authentication Mechanism for Content-Centric Networking. Secur. Commun. Networks 2018: 5429798:1-5429798:17 (2018) - [j17]Ji-Sun Park, Taek-Young Youn, Hye-Bin Kim, Kyung-Hyune Rhee, Sang-Uk Shin:
Smart Contract-Based Review System for an IoT Data Marketplace. Sensors 18(10): 3577 (2018) - [j16]Taek-Young Youn, Nam-Su Jho, Ku-Young Chang:
Design of additive homomorphic encryption with multiple message spaces for secure and practical storage services over encrypted data. J. Supercomput. 74(8): 3620-3638 (2018) - [c8]Minseok Lee, Doo-Ho Choi, Taek-Young Youn:
Non-Repudiable Dynamic PDP with Stronger Security based on Stateful Rank Based Skip List. ICTC 2018: 836-841 - 2017
- [c7]Taehyuk Kim, Minseok Lee, Doo-Ho Choi, Taek-Young Youn:
A Solution for Reducing Redistribution Costs of HAIL. CSA/CUTE 2017: 973-978 - [c6]Taek-Young Youn, Ku-Young Chang:
New User Management Technique in Storage Services for Stronger Privacy. CSA/CUTE 2017: 979-984 - 2016
- [j15]Keita Emura, Jae Hong Seo, Taek-Young Youn:
Semi-Generic Transformation of Revocable Hierarchical Identity-Based Encryption and Its DBDH Instantiation. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 99-A(1): 83-91 (2016) - [i1]Hyung Tae Lee, San Ling, Jae Hong Seo, Huaxiong Wang, Taek-Young Youn:
Public Key Encryption with Equality Test in the Standard Model. IACR Cryptol. ePrint Arch. 2016: 1182 (2016) - 2015
- [c5]Taek-Young Youn, Ku-Young Chang:
Necessity of Incentive System for the First Uploader in Client-Side Deduplication. CSA/CUTE 2015: 397-402 - 2014
- [j14]Taek-Young Youn, Dowon Hong:
Authenticated Distance Bounding Protocol with Improved FAR: Beyond the Minimal Bound of FAR. IEICE Trans. Commun. 97-B(5): 930-935 (2014) - [j13]Taek-Young Youn, Sewon Lee, Seokhie Hong, Young-Ho Park:
Practical RSA-PAKE for Low-Power Device in Imbalanced Wireless Networks. Int. J. Distributed Sens. Networks 10 (2014) - [j12]Taek-Young Youn, Jongsung Kim, Myung-Jae Lim:
Study on two privacy-oriented protocols for information communication systems. J. Intell. Manuf. 25(2): 339-345 (2014) - [c4]Taek-Young Youn, Nam-Su Jho, Ku-Young Chang, Dowon Hong:
Bucket Index Ordering Problem in Range Queries. FCC 2014: 347-355 - 2013
- [j11]Taek-Young Youn, Eun Sook Kang, Changhoon Lee:
Efficient three-party key exchange protocols with round efficiency. Telecommun. Syst. 52(2): 1367-1376 (2013) - 2012
- [j10]Taek-Young Youn, Dowon Hong:
Signcryption with fast online signing and short signcryptext for secure and private mobile communication. Sci. China Inf. Sci. 55(11): 2530-2541 (2012) - 2011
- [j9]Taek-Young Youn, Changhoon Lee, Young-Ho Park:
An efficient non-interactive deniable authentication scheme based on trapdoor commitment schemes. Comput. Commun. 34(3): 353-357 (2011) - 2010
- [j8]Taek-Young Youn, Young-Ho Park:
Security analysis of an unlinkable secret handshakes scheme. IEEE Commun. Lett. 14(1): 4-5 (2010) - [j7]Taek-Young Youn, Jongin Lim:
Improved Delegation-Based Authentication Protocol for Secure Roaming Service with Unlinkability. IEEE Commun. Lett. 14(9): 791-793 (2010)
2000 – 2009
- 2009
- [j6]Taek-Young Youn, Young-Ho Park, Jongin Lim:
Weaknesses in an anonymous authentication scheme for roaming service in global mobility networks. IEEE Commun. Lett. 13(7): 471-473 (2009) - [j5]Taek-Young Youn, Young-Ho Park, Jongin Lim:
An Efficient Signature Scheme with Fast Online Signing. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(10): 2431-2437 (2009) - [j4]Jung Yeon Hwang, Taek-Young Youn, Willy Susilo:
Security Vulnerability of ID-Based Key Sharing Schemes. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(10): 2641-2643 (2009) - [j3]Taek-Young Youn, Young-Ho Park, Jongin Lim:
Efficient Trapdoor Commitment as Secure as Factoring with Useful Properties. IEICE Trans. Inf. Syst. 92-D(12): 2520-2523 (2009) - 2008
- [j2]Taek-Young Youn, Young-Ho Park, Taekyoung Kwon, Soonhak Kwon, Jongin Lim:
Efficient Flexible Batch Signing Techniques for Imbalanced Communication Applications. IEICE Trans. Inf. Syst. 91-D(5): 1481-1484 (2008) - [j1]Taek-Young Youn, Young-Ho Park, Chang Han Kim, Jongin Lim:
Weakness in a RSA-based password authenticated key exchange protocol. Inf. Process. Lett. 108(6): 339-342 (2008) - 2006
- [c3]Yongtae Kim, Chang Han Kim, Taek-Young Youn:
On the Security of Multilevel Cryptosystems over Class Semigroups of Imaginary Quadratic Non-maximal Orders. EuroPKI 2006: 92-100 - [c2]Taek-Young Youn, Young-Ho Park, Chang Han Kim, Jongin Lim:
An Efficient ID-Based Delegation Network. OTM Workshops (1) 2006: 382-391 - 2005
- [c1]Taek-Young Youn, Young-Ho Park, Chang Han Kim, Jongin Lim:
An Efficient Public Key Cryptosystem with a Privacy Enhanced Double Decryption Mechanism. Selected Areas in Cryptography 2005: 144-158
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 20:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint