default search action
Jin Wook Byun
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j12]Young Ah Shin, Ik Rae Jeong, Jin Wook Byun:
Identity-Based Multiproxy Signature With Proxy Signing Key for Internet of Drones. IEEE Internet Things J. 11(3): 4191-4205 (2024) - 2023
- [j11]Jin Wook Byun:
Towards serverless fast one round authentication with two mobile end devices. J. Supercomput. 79(5): 5684-5704 (2023) - [c12]Jin Wook Byun:
PUFDid: PUF-based Drone IDentifier and Its Application. ICAIIC 2023: 342-346 - 2022
- [j10]Jae Yeol Jeong, Jin Wook Byun, Ik Rae Jeong:
Key Agreement Between User and Drone With Forward Unlinkability in Internet of Drones. IEEE Access 10: 17134-17144 (2022)
2010 – 2019
- 2019
- [j9]Jin Wook Byun:
End-to-End Authenticated Key Exchange Based on Different Physical Unclonable Functions. IEEE Access 7: 102951-102965 (2019) - [j8]Jin Wook Byun:
PDAKE: A Provably Secure PUF-Based Device Authenticated Key Exchange in Cloud Setting. IEEE Access 7: 181165-181177 (2019) - [j7]Jin Wook Byun:
A Generic Multifactor Authenticated Key Exchange with Physical Unclonable Function. Secur. Commun. Networks 2019: 5935292:1-5935292:15 (2019) - [j6]Jin Wook Byun, Ik Rae Jeong:
Comments on Physically Unclonable Function Based Two-Factor Authentication Protocols. Wirel. Pers. Commun. 106(3): 1243-1252 (2019) - [j5]Jin Wook Byun:
On the Secure Design of Hash-Based Authenticator in the Smartcard Authentication System. Wirel. Pers. Commun. 109(4): 2329-2352 (2019) - [c11]Jin Wook Byun:
An efficient multi-factor authenticated key exchange with physically unclonable function. ICEIC 2019: 1-4 - 2015
- [j4]Jin Wook Byun:
Privacy preserving smartcard-based authentication system with provable security. Secur. Commun. Networks 8(17): 3028-3044 (2015) - 2011
- [j3]Jin Wook Byun, Dong Hoon Lee:
On a security model of conjunctive keyword search over encrypted relational database. J. Syst. Softw. 84(8): 1364-1372 (2011)
2000 – 2009
- 2007
- [j2]Jin Wook Byun, Dong Hoon Lee, Jong In Lim:
EC2C-PAKA: An efficient client-to-client password-authenticated key agreement. Inf. Sci. 177(19): 3995-4013 (2007) - 2006
- [j1]Jin Wook Byun, Dong Hoon Lee, Jong In Lim:
Security analysis and improvement of a gateway-oriented password-based authenticated key exchange protocol. IEEE Commun. Lett. 10(9): 683-685 (2006) - [c10]Jin Wook Byun, Dong Hoon Lee, Jongin Lim:
Efficient and Provably Secure Client-to-Client Password-Based Key Exchange Protocol. APWeb 2006: 830-836 - [c9]Jin Wook Byun, Dong Hoon Lee, Jongin Lim:
Efficient Conjunctive Keyword Search on Encrypted Data Storage System. EuroPKI 2006: 184-196 - [c8]Hyun Sook Rhee, Ik Rae Jeong, Jin Wook Byun, Dong Hoon Lee:
Difference Set Attacks on Conjunctive Keyword Search Schemes. Secure Data Management 2006: 64-74 - [c7]Jin Wook Byun, Hyun Suk Rhee, Hyun-A Park, Dong Hoon Lee:
Off-Line Keyword Guessing Attacks on Recent Keyword Search Schemes over Encrypted Data. Secure Data Management 2006: 75-83 - [c6]Jin Wook Byun, Su-Mi Lee, Dong Hoon Lee, Dowon Hong:
Constant-Round Password-Based Group Key Generation for Multi-layer Ad-Hoc Networks. SPC 2006: 3-17 - 2005
- [c5]Jin Wook Byun, Dong Hoon Lee:
N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords. ACNS 2005: 75-90 - [c4]Jin Wook Byun, Dong Hoon Lee, Jongin Lim:
Password-Based Group Key Exchange Secure Against Insider Guessing Attacks. CIS (2) 2005: 143-148 - [c3]Hyun-A Park, Jin Wook Byun, Dong Hoon Lee:
Secure Index Search for Groups. TrustBus 2005: 128-140 - [c2]Hyun Sook Rhee, Jin Wook Byun, Dong Hoon Lee, Jongin Lim:
Oblivious Conjunctive Keyword Search. WISA 2005: 318-327 - [i1]Jin Wook Byun, Dong Hoon Lee:
Comments on Weaknesses in Two Group Diffie-Hellman Key Exchange Protocols. IACR Cryptol. ePrint Arch. 2005: 209 (2005) - 2002
- [c1]Jin Wook Byun, Ik Rae Jeong, Dong Hoon Lee, Chang-Seop Park:
Password-Authenticated Key Exchange between Clients with Different Passwords. ICICS 2002: 134-146
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-12 22:02 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint