default search action
Junbeom Hur
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j65]Danial Javaheri, Mahdi Fahmideh, Hassan Chizari, Pooia Lalbakhsh, Junbeom Hur:
Cybersecurity threats in FinTech: A systematic review. Expert Syst. Appl. 241: 122697 (2024) - [j64]Dohyun Ryu, Yerim Kim, Junbeom Hur:
$\gamma$γ-Knife: Extracting Neural Network Architecture Through Software-Based Power Side-Channel. IEEE Trans. Dependable Secur. Comput. 21(4): 2686-2703 (2024) - [j63]Hodong Kim, Changhee Hahn, Hyunwoo J. Kim, Youngjoo Shin, Junbeom Hur:
Deep Learning-Based Detection for Multiple Cache Side-Channel Attacks. IEEE Trans. Inf. Forensics Secur. 19: 1672-1686 (2024) - [c60]Woonghee Lee, Junbeom Hur, Doowon Kim:
Beneath the Phishing Scripts: A Script-Level Analysis of Phishing Kits and Their Impact on Real-World Phishing Websites. AsiaCCS 2024 - [c59]Chaewon Kwak, Kangmo Ahn, Changhee Hahn, Dongyoung Koo, Junbeom Hur:
Revisiting Secure Multi-Server Oblivious RAMs. ICOIN 2024: 469-472 - [c58]Yoonjung Choi, Woonghee Lee, Junbeom Hur:
PhishinWebView: Analysis of Anti-Phishing Entities in Mobile Apps with WebView Targeted Phishing. WWW 2024: 1923-1932 - 2023
- [j62]Bosung Yang, Gyeongsup Lim, Junbeom Hur:
Toward Practical Deep Blind Watermarking for Traitor Tracing. IEEE Access 11: 72836-72847 (2023) - [j61]Hyundo Yoon, Muncheon Yu, Chaewon Kwak, Changhee Hahn, Dongyoung Koo, Junbeom Hur:
Shedding Light on Blind Spot of Backward Privacy in Dynamic Searchable Symmetric Encryption. IEEE Access 11: 146223-146237 (2023) - [j60]Yerim Kim, Minjae Kim, Myungjae Chung, Junbeom Hur:
Detect Your Fingerprint in Your Photographs: Photography-based Multi-Feature Sybil Detection. Proc. Priv. Enhancing Technol. 2023(1): 244-263 (2023) - [j59]Changhee Hahn, Hodong Kim, Minjae Kim, Junbeom Hur:
VerSA: Verifiable Secure Aggregation for Cross-Device Federated Learning. IEEE Trans. Dependable Secur. Comput. 20(1): 36-52 (2023) - [j58]Hyunsoo Kwon, Sangtae Lee, Minjae Kim, Changhee Hahn, Junbeom Hur:
Certificate Transparency With Enhanced Privacy. IEEE Trans. Dependable Secur. Comput. 20(5): 3860-3872 (2023) - [j57]Changhee Hahn, Hyundo Yoon, Junbeom Hur:
Multi-Key Similar Data Search on Encrypted Storage With Secure Pay-Per-Query. IEEE Trans. Inf. Forensics Secur. 18: 1169-1181 (2023) - [j56]Changhee Hahn, Junbeom Hur:
Delegatable Order-Revealing Encryption for Reliable Cross-Database Query. IEEE Trans. Serv. Comput. 16(3): 1763-1777 (2023) - [c57]Yeomin Jeong, Woonghee Lee, Junbeom Hur:
A Honey postMessage, but a Heart of Gall: Exploiting Push Service in Service Workers Via postMessage. AsiaCCS 2023: 785-796 - [c56]Taehun Kim, Hyeongjin Park, Seokmin Lee, Seunghee Shin, Junbeom Hur, Youngjoo Shin:
DevIOus: Device-Driven Side-Channel Attacks on the IOMMU. SP 2023: 2288-2305 - [c55]Jonghoon Kwon, Jeonggyu Song, Junbeom Hur, Adrian Perrig:
Did the Shark Eat the Watchdog in the NTP Pool? Deceiving the NTP Pool's Monitoring System. USENIX Security Symposium 2023: 6151-6166 - [i3]Danial Javaheri, Mahdi Fahmideh, Hassan Chizari, Pooia Lalbakhsh, Junbeom Hur:
Cybersecurity threats in FinTech: A systematic review. CoRR abs/2312.01752 (2023) - 2022
- [j55]Minjae Kim, Jinhee Lee, Hyunsoo Kwon, Junbeom Hur:
Get off of Chain: Unveiling Dark Web Using Multilayer Bitcoin Address Clustering. IEEE Access 10: 70078-70091 (2022) - [j54]Hyunsoo Kwon, Junbeom Hur, Changhee Hahn:
Order-Hiding Range Query Over Encrypted Cloud Data. IEEE Access 10: 75604-75618 (2022) - [j53]Changhee Hahn, Jongkil Kim, Hyunsoo Kwon, Junbeom Hur:
Efficient IoT Management With Resilience to Unauthorized Access to Cloud Storage. IEEE Trans. Cloud Comput. 10(2): 1008-1020 (2022) - [j52]Hyungjune Shin, Dongyoung Koo, Junbeom Hur:
Secure and Efficient Hybrid Data Deduplication in Edge Computing. ACM Trans. Internet Techn. 22(3): 80:1-80:25 (2022) - [j51]Changhee Hahn, Hyunsoo Kwon, Daeyeong Kim, Junbeom Hur:
Enabling Fast Public Auditing and Data Dynamics in Cloud Services. IEEE Trans. Serv. Comput. 15(4): 2047-2059 (2022) - [c54]Changseok Koh, Jonghoon Kwon, Junbeom Hur:
BLAP: Bluetooth Link Key Extraction and Page Blocking Attacks. DSN 2022: 227-238 - [c53]Muncheon Yoo, Hyundo Yoon, Changhee Hahn, Dongyoung Koo, Junbeom Hur:
Downgrading Backward Privacy of Searchable Encryption. ICOIN 2022: 324-328 - [c52]Gyeongsup Lim, Minjae Kim, Junbeom Hur:
Adversarial Attack on Semantic Segmentation Preprocessed with Super Resolution. ICPR 2022: 484-490 - [c51]Hodong Kim, Junbeom Hur:
PCIe Side-channel Attack on I/O Device via RDMA-enabled Network Card. ICTC 2022: 1468-1470 - [c50]Hyundo Yoon, Junbeom Hur:
Comparative Analysis of Forward and Backward Private Searchable Encryption using SGX. ICTC 2022: 1846-1848 - [c49]Yeomin Jeong, Junbeom Hur:
A Survey on Vulnerabilities of Service Workers. ICTC 2022: 2080-2082 - [c48]Donghee Kim, Junbeom Hur:
A Survey on Security Threats in Blockchain-based Internet of Things Systems. ICTC 2022: 2134-2138 - [c47]Jeonggyu Song, Jonghoon Kwon, Junbeom Hur:
Analysis of NTP pool monitoring system based on multiple monitoring stations. MobiHoc 2022: 259-264 - [c46]Hoyong Jeong, Hodong Kim, Junbeom Hur:
Exploiting Metaobjects to Reinforce Data Leakage Attacks. RAID 2022: 17-29 - 2021
- [j50]Ngoc Quy Tran, Junbeom Hur, Hieu Minh Nguyen:
Effective Feature Extraction Method for SVM-Based Profiled Attacks. Comput. Informatics 40(5) (2021) - [c45]Hodong Kim, Changhee Hahn, Junbeom Hur:
Real-time Detection of Cache Side-channel Attack Using Non-cache Hardware Events. ICOIN 2021: 28-31 - [c44]Hoyong Jeong, Dohyun Ryu, Junbeom Hur:
Neural Network Stealing via Meltdown. ICOIN 2021: 36-38 - [c43]Mriganka Mandal, Ramprasad Sarkar, Junbeom Hur, Koji Nuida:
Efficient Fully Anonymous Public-Key Trace and Revoke with Adaptive IND-CCA Security. ISPEC 2021: 168-189 - [c42]Changhee Hahn, Hyunsoo Kwon, Daeyoung Kim, Junbeom Hur:
Enabling Fast Public Auditing and Data Dynamics in Cloud Services. SERVICES 2021: 4 - 2020
- [j49]Youngjoo Shin, Junbeom Hur, Dongyoung Koo, Joobeom Yun:
Toward Serverless and Efficient Encrypted Deduplication in Mobile Cloud Computing Environments. Secur. Commun. Networks 2020: 3046595:1-3046595:15 (2020) - [j48]Hyunsoo Kwon, Hyunjae Nam, Sangtae Lee, Changhee Hahn, Junbeom Hur:
(In-)Security of Cookies in HTTPS: Cookie Theft by Removing Cookie Flags. IEEE Trans. Inf. Forensics Secur. 15: 1204-1215 (2020) - [j47]Youngjoo Shin, Dongyoung Koo, Joobeom Yun, Junbeom Hur:
Decentralized Server-Aided Encryption for Secure Deduplication in Cloud Storage. IEEE Trans. Serv. Comput. 13(6): 1021-1033 (2020) - [c41]Hyeongseob Kim, Changhee Hahn, Junbeom Hur:
Forward Secure Public Key Encryption with Keyword Search for Cloud-assisted IoT. CLOUD 2020: 549-556 - [c40]Sangtae Lee, Youngjoo Shin, Junbeom Hur:
Return of version downgrade attack in the era of TLS 1.3. CoNEXT 2020: 157-168 - [c39]Hodong Kim, Hyundo Yoon, Youngjoo Shin, Junbeom Hur:
Cache Side-Channel Attack on Mail User Agent. ICOIN 2020: 236-238 - [c38]Hyundo Yoon, Junbeom Hur:
A Comparative Analysis of Searchable Encryption Schemes using SGX. ICTC 2020: 526-528 - [c37]Youngjoo Shin, Dongyoung Koo, Junbeom Hur:
Inferring Firewall Rules by Cache Side-channel Analysis in Network Function Virtualization. INFOCOM 2020: 1798-1807 - [i2]Ehsan Meamari, Hao Guo, Chien-Chung Shen, Junbeom Hur:
Collusion Attacks on Decentralized Attributed-Based Encryption: Analyses and a Solution. CoRR abs/2002.07811 (2020)
2010 – 2019
- 2019
- [j46]Hoyul Choi, Jongmin Jeong, Simon S. Woo, Kyungtae Kang, Junbeom Hur:
Password typographical error resilience in honey encryption. Comput. Secur. 87 (2019) - [j45]Zeinab Rezaeifar, Jian Wang, Heekuck Oh, Suk-Bok Lee, Junbeom Hur:
A reliable adaptive forwarding approach in named data networking. Future Gener. Comput. Syst. 96: 538-551 (2019) - [j44]Changhee Hahn, Hyunsoo Kwon, Junbeom Hur:
Trustworthy Delegation Toward Securing Mobile Healthcare Cyber-Physical Systems. IEEE Internet Things J. 6(4): 6301-6309 (2019) - [j43]Hyunsoo Kwon, Changhee Hahn, Kyungtae Kang, Junbeom Hur:
Secure deduplication with reliable and revocable key management in fog computing. Peer-to-Peer Netw. Appl. 12(4): 850-864 (2019) - [j42]Changhee Hahn, Hyungjune Shin, Hyunsoo Kwon, Junbeom Hur:
Efficient Multi-user Similarity Search Over Encrypted Data in Cloud Storage. Wirel. Pers. Commun. 107(3): 1337-1353 (2019) - [c36]Hyeongseob Kim, Changhee Hahn, Junbeom Hur:
Analysis of Forward Private Searchable Encryption and Its Application to Multi-Client Settings. ICUFN 2019: 529-531 - [c35]Jinhee Lee, Younggee Hong, Hyunsoo Kwon, Junbeom Hur:
Shedding Light on Dark Korea: An In-Depth Analysis and Profiling of the Dark Web in Korea. WISA 2019: 357-369 - 2018
- [j41]Dongyoung Koo, Junbeom Hur:
Privacy-preserving deduplication of encrypted data with dynamic ownership management in fog computing. Future Gener. Comput. Syst. 78: 739-752 (2018) - [c34]Hyungjune Shin, Dongyoung Koo, Young-joo Shin, Junbeom Hur:
Privacy-Preserving and Updatable Block-Level Data Deduplication in Cloud Storage Services. IEEE CLOUD 2018: 392-400 - [c33]Changhee Hahn, Hyunsoo Kwon, Junbeom Hur:
Toward Trustworthy Delegation: Verifiable Outsourced Decryption with Tamper-Resistance in Public Cloud Storage. IEEE CLOUD 2018: 920-923 - [c32]Younggee Hong, Hyunsoo Kwon, Jihwan Lee, Junbeom Hur:
A Practical De-mixing Algorithm for Bitcoin Mixing Services. BCC@AsiaCCS 2018: 15-20 - [c31]Young-joo Shin, Hyung Chan Kim, Dokeun Kwon, Ji-Hoon Jeong, Junbeom Hur:
Unveiling Hardware-based Data Prefetcher, a Hidden Source of Information Leakage. CCS 2018: 131-145 - 2017
- [j40]Young-joo Shin, Dongyoung Koo, Junbeom Hur:
A Survey of Secure Data Deduplication Schemes for Cloud Storage Systems. ACM Comput. Surv. 49(4): 74:1-74:38 (2017) - [j39]Joobeom Yun, Junbeom Hur, Young-joo Shin, Dongyoung Koo:
CLDSafe: An Efficient File Backup System in Cloud Storage against Ransomware. IEICE Trans. Inf. Syst. 100-D(9): 2228-2231 (2017) - [j38]Young-June Choi, Junbeom Hur, Han-You Jeong, Changhee Joo:
Special issue on V2X communications and networks. J. Commun. Networks 19(3): 205-208 (2017) - [j37]Hyunsoo Kwon, Changhee Hahn, Daeyoung Kim, Junbeom Hur:
Secure deduplication for multimedia data with user revocation in cloud storage. Multim. Tools Appl. 76(4): 5889-5903 (2017) - [j36]Young-joo Shin, Dongyoung Koo, Junbeom Hur, Joobeom Yun:
Secure proof of storage with deduplication for cloud storage systems. Multim. Tools Appl. 76(19): 19363-19378 (2017) - [j35]Hyunsoo Kwon, Daeyeong Kim, Changhee Hahn, Junbeom Hur:
Secure authentication using ciphertext policy attribute-based encryption in mobile multi-hop networks. Multim. Tools Appl. 76(19): 19507-19521 (2017) - [j34]Junggab Son, Juyoung Park, Heekuck Oh, Md. Zakirul Alam Bhuiyan, Junbeom Hur, Kyungtae Kang:
Privacy-Preserving Electrocardiogram Monitoring for Intelligent Arrhythmia Detection. Sensors 17(6): 1360 (2017) - [c30]Hyunsoo Kwon, Changhee Hahn, Dongyoung Koo, Junbeom Hur:
Scalable and Reliable Key Management for Secure Deduplication in Cloud Storage. CLOUD 2017: 391-398 - [c29]Do Viet Binh, Hieu Minh Nguyen, Nguyen Nam Hai, Junbeom Hur, Dang Hoang Minh, Ho Sy Tan:
Authenticated Key Exchange, Signcryption and Deniable Signcryption Protocols Based on Two Hard Problems. ACOMP 2017: 16-22 - [c28]Junbeom Hur, Dongyoung Koo, Young-joo Shin, Kyungtae Kang:
Secure Data Deduplication with Dynamic Ownership Management in Cloud Storage. ICDE 2017: 69-70 - [c27]Hoyul Choi, Hyunjae Nam, Junbeom Hur:
Password typos resilience in honey encryption. ICOIN 2017: 593-598 - [c26]Changhee Hahn, Hyungjune Shin, Junbeom Hur:
Cloud-based biometrics processing for privacy-preserving identification. ICUFN 2017: 595-600 - [c25]Dongyoung Koo, Young-joo Shin, Joobeom Yun, Junbeom Hur:
An Online Data-Oriented Authentication Based on Merkle Tree with Improved Reliability. ICWS 2017: 840-843 - [c24]Xiaolong Sun, Juyoung Park, Kyungtae Kang, Junbeom Hur:
Novel hybrid CNN-SVM model for recognition of functional magnetic resonance images. SMC 2017: 1001-1006 - [c23]Jiwoong Won, Oseok Kwon, Junhee Ryu, Junbeom Hur, Insup Lee, Kyungtae Kang:
Trapfetch: A breakpoint-based prefetcher for both launch and run-time. SMC 2017: 2766-2771 - 2016
- [j33]Changhee Hahn, Junbeom Hur:
Efficient and privacy-preserving biometric identification in cloud. ICT Express 2(3): 135-139 (2016) - [j32]Junbeom Hur, Mengxue Guo, Younsoo Park, Chan-Gun Lee, Ho-Hyun Park:
Reputation-Based Collusion Detection with Majority of Colluders. IEICE Trans. Inf. Syst. 99-D(7): 1822-1835 (2016) - [j31]Junbeom Hur, Younho Lee:
A reliable group key management scheme for broadcast encryption. J. Commun. Networks 18(2): 246-260 (2016) - [j30]Changhee Hahn, Hyunsoo Kwon, Junbeom Hur:
Efficient Attribute-Based Secure Data Sharing with Hidden Policies and Traceability in Mobile Health Networks. Mob. Inf. Syst. 2016: 6545873:1-6545873:13 (2016) - [j29]Changhee Hahn, Hyunsoo Kwon, Daeyoung Kim, Junbeom Hur:
Enhanced authentication for outsourced educational contents through provable block possession. Multim. Tools Appl. 75(21): 13057-13076 (2016) - [j28]Daeyeong Kim, Hyunsoo Kwon, Changhee Hahn, Junbeom Hur:
Privacy-preserving public auditing for educational multimedia data in cloud computing. Multim. Tools Appl. 75(21): 13077-13091 (2016) - [j27]Junbeom Hur, Dongyoung Koo, Young-joo Shin, Kyungtae Kang:
Secure Data Deduplication with Dynamic Ownership Management in Cloud Storage. IEEE Trans. Knowl. Data Eng. 28(11): 3113-3125 (2016) - [c22]Changhee Hahn, Junbeom Hur:
Scalable and secure Private Set intersection for big data. BigComp 2016: 285-288 - [c21]Changhee Hahn, Junbeom Hur:
POSTER: Towards Privacy-Preserving Biometric Identification in Cloud Computing. CCS 2016: 1826-1828 - [c20]Dongyoung Koo, Young-joo Shin, Joobeom Yun, Junbeom Hur:
A Hybrid Deduplication for Secure and Efficient Data Outsourcing in Fog Computing. CloudCom 2016: 285-293 - [c19]Young-joo Shin, Dongyoung Koo, Joobeom Yun, Junbeom Hur:
SEED: Enabling Serverless and Efficient Encrypted Deduplication for Cloud Storage. CloudCom 2016: 482-487 - [c18]Juyoung Park, Mingon Kang, Junbeom Hur, Kyungtae Kang:
Recommendations for antiarrhythmic drugs based on latent semantic analysis with fc-means clustering. EMBC 2016: 4423-4426 - [c17]Seung-Woo Han, Hyunsoo Kwon, Changhee Hahn, Dongyoug Koo, Junbeom Hur:
A survey on MITM and its countermeasures in the TLS handshake protocol. ICUFN 2016: 724-729 - [c16]Jongmin Jeong, Hyunsoo Kwon, Hyungjune Shin, Junbeom Hur:
A Practical Analysis of TLS Vulnerabilities in Korea Web Environment. WISA 2016: 112-123 - 2015
- [j26]Kyungtae Kang, Qixin Wang, Junbeom Hur, Kyung-Joon Park, Lui Sha:
Medical-Grade Quality of Service for Real-Time Mobile Healthcare. Computer 48(2): 41-49 (2015) - [c15]Hyungjune Shin, Daeyoung Kim, Junbeom Hur:
Secure pattern-based authentication against shoulder surfing attack in smart devices. ICUFN 2015: 13-18 - [c14]Hoyul Choi, Hyunsoo Kwon, Junbeom Hur:
A secure OTP algorithm using a smartphone application. ICUFN 2015: 476-481 - 2014
- [j25]Junbeom Hur, Dong Kun Noh:
Efficient and Secure Identity-Based Onion Routing. J. Res. Pract. Inf. Technol. 46(2-3) (2014) - [j24]Lin Dong, Jinwoo Park, Junbeom Hur, Ho-Hyun Park:
An Enhanced Remote Data Checking Scheme for Dynamic Updates. KSII Trans. Internet Inf. Syst. 8(5): 1744-1765 (2014) - [j23]Junbeom Hur, Kyungtae Kang:
Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks. IEEE/ACM Trans. Netw. 22(1): 16-26 (2014) - [c13]Dongyoung Koo, Junbeom Hur, Hyunsoo Yoon:
Secure and Efficient Deduplication over Encrypted Data with Dynamic Updates in Cloud Storage. FCC 2014: 229-235 - [c12]Jeongseok Yu, Taejin Kim, Woongsoo Na, Hyoungchel Bae, Yunseong Lee, Juho Lee, Zeynep Vatandas, Sungrae Cho, Junbeom Hur:
Fully-distributed multicast routing protocol for IEEE 802.15.8 peer-aware communications. ICOIN 2014: 64-69 - [c11]Hyunsoo Kwon, Changhee Hahn, Daeyoung Kim, Kyungtae Kang, Junbeom Hur:
Secure Device-to-Device Authentication in Mobile Multi-hop Networks. WASA 2014: 267-278 - [c10]Changhee Hahn, Hyunsoo Kwon, Daeyoung Kim, Kyungtae Kang, Junbeom Hur:
A Privacy Threat in 4th Generation Mobile Telephony and Its Countermeasure. WASA 2014: 624-635 - 2013
- [j22]Dongyoung Koo, Junbeom Hur, Hyunsoo Yoon:
Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage. Comput. Electr. Eng. 39(1): 34-46 (2013) - [j21]Junbeom Hur, Dongyoung Koo, Seong Oun Hwang, Kyungtae Kang:
Removing escrow from ciphertext policy attribute-based encryption. Comput. Math. Appl. 65(9): 1310-1317 (2013) - [j20]Dong Kun Noh, Junbeom Hur:
Energy-aware topology control for reliable data delivery in solar-powered WSNs. EURASIP J. Wirel. Commun. Netw. 2013: 258 (2013) - [j19]Kyungtae Kang, Junhee Ryu, Junbeom Hur, Lui Sha:
Design and QoS of a Wireless System for Real-Time Remote Electrocardiography. IEEE J. Biomed. Health Informatics 17(3): 745-755 (2013) - [j18]Junbeom Hur:
Improving Security and Efficiency in Attribute-Based Data Sharing. IEEE Trans. Knowl. Data Eng. 25(10): 2271-2282 (2013) - [j17]Junbeom Hur:
Attribute-Based Secure Data Sharing with Hidden Policies in Smart Grid. IEEE Trans. Parallel Distributed Syst. 24(11): 2171-2180 (2013) - [j16]Kyungtae Kang, Juyoung Park, Junbeom Hur:
Cross-layer analysis of protocol delay in mobile devices receiving BCMCS. Wirel. Networks 19(7): 1497-1509 (2013) - 2012
- [j15]Junbeom Hur, Kyungtae Kang:
Dependable and secure computing in medical information systems. Comput. Commun. 36(1): 20-28 (2012) - [j14]Junbeom Hur, Chanil Park, Seongoun Hwang:
Privacy-preserving identity-based broadcast encryption. Inf. Fusion 13(4): 296-303 (2012) - [j13]Dong Kun Noh, Junbeom Hur:
Using a dynamic backbone for efficient data delivery in solar-powered WSNs. J. Netw. Comput. Appl. 35(4): 1277-1284 (2012) - [j12]Chanil Park, Junbeom Hur, Seongoun Hwang, Hyunsoo Yoon:
Authenticated public key broadcast encryption scheme secure against insiders' attack. Math. Comput. Model. 55(1-2): 113-122 (2012) - [j11]Junbeom Hur, Chanil Park, Seongoun Hwang:
Fine-grained user access control in ciphertext-policy attribute-based encryption. Secur. Commun. Networks 5(3): 253-261 (2012) - [j10]Kyungtae Kang, Junhee Ryu, Sunghyun Choi, Kyung-Joon Park, Junbeom Hur:
Toward energy-efficient error control in 3G broadcast video. IEEE Wirel. Commun. 19(6): 60-67 (2012) - [j9]Young-joo Shin, Junbeom Hur:
Scalable and efficient approach for secure group communication using proxy cryptography. Wirel. Networks 18(4): 413-425 (2012) - [c9]Juyoung Park, Jaemyoun Lee, Junbeom Hur, Kyungtae Kang:
Extending Service Coverage Using FGS-Aware Blind Repetition. NBiS 2012: 180-186 - [i1]Young-joo Shin, Junbeom Hur, Kwangjo Kim:
Security weakness in the Proof of Storage with Deduplication. IACR Cryptol. ePrint Arch. 2012: 554 (2012) - 2011
- [j8]Junbeom Hur, Dong Kun Noh:
Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems. IEEE Trans. Parallel Distributed Syst. 22(7): 1214-1221 (2011) - [j7]Junbeom Hur:
Fine-grained data access control for distributed sensor networks. Wirel. Networks 17(5): 1235-1249 (2011) - 2010
- [j6]Junbeom Hur, Chanil Park, Hyunsoo Yoon:
Chosen ciphertext secure authenticated group communication using identity-based signcryption. Comput. Math. Appl. 60(2): 362-375 (2010) - [j5]Chanil Park, Junbeom Hur, Kisuk Kweon, Hyunsoo Yoon:
Self-healing key distribution scheme with long service time. IEICE Electron. Express 7(13): 913-919 (2010) - [j4]Junbeom Hur, Hyunsoo Yoon:
A Multi-service Group Key Management Scheme for Stateless Receivers in Wireless Mesh Networks. Mob. Networks Appl. 15(5): 680-692 (2010)
2000 – 2009
- 2009
- [j3]Junbeom Hur, Hyunsoo Yoon:
A Decentralized Multi-Group Key Management Scheme. IEICE Trans. Commun. 92-B(2): 632-635 (2009) - [j2]Byungchun Chung, Junbeom Hur, Heeyoul Kim, Seong-Min Hong, Hyunsoo Yoon:
Improved batch exponentiation. Inf. Process. Lett. 109(15): 832-837 (2009) - [c8]Chano Kim, Chanil Park, Junbeom Hur, Hanjin Lee, Hyunsoo Yoon:
A Distributed Deterministic and Resilient Replication Attack Detection Protocol in Wireless Sensor Networks. FGIT-FGCN 2009: 405-412 - [c7]Seungjae Shin, Junbeom Hur, Hanjin Lee, Hyunsoo Yoon:
Bandwidth efficient key distribution for secure multicast in dynamic wireless mesh networks. WCNC 2009: 2202-2207 - 2008
- [c6]Junbeom Hur, HyeongSeop Shim, Pyung Kim, Hyunsoo Yoon, Nah-Oak Song:
Security Considerations for Handover Schemes in Mobile WiMAX Networks. WCNC 2008: 2531-2536 - 2007
- [j1]Younho Lee, Junbeom Hur, Heeyoul Kim, Yongsu Park, Hyunsoo Yoon:
A New Binary Image Authentication Scheme with Small Distortion and Low False Negative Rates. IEICE Trans. Commun. 90-B(11): 3259-3262 (2007) - [c5]Junbeom Hur, Chanil Park, Young-joo Shin, Hyunsoo Yoon:
An Efficient Proactive Key Distribution Scheme for Fast Handoff in IEEE 802.11 Wireless Networks. ICOIN 2007: 629-638 - [c4]Junbeom Hur, Chanil Park, Hyunsoo Yoon:
An Efficient Pre-authentication Scheme for IEEE 802.11-Based Vehicular Networks. IWSEC 2007: 121-136 - [c3]Junbeom Hur, Young-joo Shin, Hyunsoo Yoon:
Decentralized group key management for dynamic networks using proxy cryptography. Q2SWinet 2007: 123-129 - 2006
- [c2]Chanil Park, Junbeom Hur, Chanoe Kim, Young-joo Shin, Hyunsoo Yoon:
Pre-authentication for Fast Handoff in Wireless Mesh Networks with Mobile APs. WISA 2006: 349-363 - 2005
- [c1]Junbeom Hur, Younho Lee, Seong-Min Hong, Hyunsoo Yoon:
Trust Management for Resilient Wireless Sensor Networks. ICISC 2005: 56-68
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint