default search action
Hyunsoo Kwon
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j15]Hyunsoo Kwon, Sangtae Lee, Minjae Kim, Changhee Hahn, Junbeom Hur:
Certificate Transparency With Enhanced Privacy. IEEE Trans. Dependable Secur. Comput. 20(5): 3860-3872 (2023) - 2022
- [j14]Minjae Kim, Jinhee Lee, Hyunsoo Kwon, Junbeom Hur:
Get off of Chain: Unveiling Dark Web Using Multilayer Bitcoin Address Clustering. IEEE Access 10: 70078-70091 (2022) - [j13]Hyunsoo Kwon, Junbeom Hur, Changhee Hahn:
Order-Hiding Range Query Over Encrypted Cloud Data. IEEE Access 10: 75604-75618 (2022) - [j12]Hyunsoo Kwon, Changhee Hahn:
Asymptotically Optimal and Secure Multiwriter/Multireader Similarity Search. IEEE Access 10: 101957-101971 (2022) - [j11]Changhee Hahn, Jongkil Kim, Hyunsoo Kwon, Junbeom Hur:
Efficient IoT Management With Resilience to Unauthorized Access to Cloud Storage. IEEE Trans. Cloud Comput. 10(2): 1008-1020 (2022) - [j10]Changhee Hahn, Hyunsoo Kwon, Daeyeong Kim, Junbeom Hur:
Enabling Fast Public Auditing and Data Dynamics in Cloud Services. IEEE Trans. Serv. Comput. 15(4): 2047-2059 (2022) - 2021
- [c10]Changhee Hahn, Hyunsoo Kwon, Daeyoung Kim, Junbeom Hur:
Enabling Fast Public Auditing and Data Dynamics in Cloud Services. SERVICES 2021: 4 - 2020
- [j9]Hyunsoo Kwon, Hyunjae Nam, Sangtae Lee, Changhee Hahn, Junbeom Hur:
(In-)Security of Cookies in HTTPS: Cookie Theft by Removing Cookie Flags. IEEE Trans. Inf. Forensics Secur. 15: 1204-1215 (2020)
2010 – 2019
- 2019
- [j8]Changhee Hahn, Hyunsoo Kwon, Junbeom Hur:
Trustworthy Delegation Toward Securing Mobile Healthcare Cyber-Physical Systems. IEEE Internet Things J. 6(4): 6301-6309 (2019) - [j7]Hyunsoo Kwon, Changhee Hahn, Kyungtae Kang, Junbeom Hur:
Secure deduplication with reliable and revocable key management in fog computing. Peer-to-Peer Netw. Appl. 12(4): 850-864 (2019) - [j6]Changhee Hahn, Hyungjune Shin, Hyunsoo Kwon, Junbeom Hur:
Efficient Multi-user Similarity Search Over Encrypted Data in Cloud Storage. Wirel. Pers. Commun. 107(3): 1337-1353 (2019) - [c9]Jinhee Lee, Younggee Hong, Hyunsoo Kwon, Junbeom Hur:
Shedding Light on Dark Korea: An In-Depth Analysis and Profiling of the Dark Web in Korea. WISA 2019: 357-369 - 2018
- [c8]Changhee Hahn, Hyunsoo Kwon, Junbeom Hur:
Toward Trustworthy Delegation: Verifiable Outsourced Decryption with Tamper-Resistance in Public Cloud Storage. IEEE CLOUD 2018: 920-923 - [c7]Younggee Hong, Hyunsoo Kwon, Jihwan Lee, Junbeom Hur:
A Practical De-mixing Algorithm for Bitcoin Mixing Services. BCC@AsiaCCS 2018: 15-20 - 2017
- [j5]Hyunsoo Kwon, Changhee Hahn, Daeyoung Kim, Junbeom Hur:
Secure deduplication for multimedia data with user revocation in cloud storage. Multim. Tools Appl. 76(4): 5889-5903 (2017) - [j4]Hyunsoo Kwon, Daeyeong Kim, Changhee Hahn, Junbeom Hur:
Secure authentication using ciphertext policy attribute-based encryption in mobile multi-hop networks. Multim. Tools Appl. 76(19): 19507-19521 (2017) - [c6]Hyunsoo Kwon, Changhee Hahn, Dongyoung Koo, Junbeom Hur:
Scalable and Reliable Key Management for Secure Deduplication in Cloud Storage. CLOUD 2017: 391-398 - 2016
- [j3]Changhee Hahn, Hyunsoo Kwon, Junbeom Hur:
Efficient Attribute-Based Secure Data Sharing with Hidden Policies and Traceability in Mobile Health Networks. Mob. Inf. Syst. 2016: 6545873:1-6545873:13 (2016) - [j2]Changhee Hahn, Hyunsoo Kwon, Daeyoung Kim, Junbeom Hur:
Enhanced authentication for outsourced educational contents through provable block possession. Multim. Tools Appl. 75(21): 13057-13076 (2016) - [j1]Daeyeong Kim, Hyunsoo Kwon, Changhee Hahn, Junbeom Hur:
Privacy-preserving public auditing for educational multimedia data in cloud computing. Multim. Tools Appl. 75(21): 13077-13091 (2016) - [c5]Seung-Woo Han, Hyunsoo Kwon, Changhee Hahn, Dongyoug Koo, Junbeom Hur:
A survey on MITM and its countermeasures in the TLS handshake protocol. ICUFN 2016: 724-729 - [c4]Jongmin Jeong, Hyunsoo Kwon, Hyungjune Shin, Junbeom Hur:
A Practical Analysis of TLS Vulnerabilities in Korea Web Environment. WISA 2016: 112-123 - 2015
- [c3]Hoyul Choi, Hyunsoo Kwon, Junbeom Hur:
A secure OTP algorithm using a smartphone application. ICUFN 2015: 476-481 - 2014
- [c2]Hyunsoo Kwon, Changhee Hahn, Daeyoung Kim, Kyungtae Kang, Junbeom Hur:
Secure Device-to-Device Authentication in Mobile Multi-hop Networks. WASA 2014: 267-278 - [c1]Changhee Hahn, Hyunsoo Kwon, Daeyoung Kim, Kyungtae Kang, Junbeom Hur:
A Privacy Threat in 4th Generation Mobile Telephony and Its Countermeasure. WASA 2014: 624-635
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-26 18:26 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint