Folgen
Taekyoung Kwon
Taekyoung Kwon
Bestätigte E-Mail-Adresse bei yonsei.ac.kr - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Strong and robust RFID authentication enabling perfect ownership transfer
CH Lim, T Kwon
Information and Communications Security: 8th International Conference, ICICS …, 2006
2412006
An experimental study of hierarchical intrusion detection for wireless industrial sensor networks
S Shin, T Kwon, GY Jo, Y Park, H Rhy
IEEE transactions on industrial informatics 6 (4), 744-757, 2010
1872010
Authentication and key agreement via memorable password
T Kwon
NDSS (Network and Distributed System Security) Symposium, 2001
1342001
Covert attentional shoulder surfing: Human adversaries are more powerful than expected
T Kwon, S Shin, S Na
IEEE Transactions on Systems, Man, and Cybernetics: Systems 44 (6), 716-727, 2013
1002013
A privacy-preserving authentication, authorization, and key agreement scheme for wireless sensor networks in 5G-integrated Internet of Things
S Shin, T Kwon
IEEE access 8, 67555-67571, 2020
902020
TinyLock: Affordable defense against smudge attacks on smartphone pattern lock systems
T Kwon, S Na
Computers & Security 42, 137-150, 2014
872014
Secure and efficient broadcast authentication in wireless sensor networks
T Kwon, J Hong
IEEE Transactions on Computers 59 (8), 1120-1133, 2009
742009
Group connectivity model for industrial wireless sensor networks
JH Lee, T Kwon, JS Song
IEEE Transactions on Industrial Electronics 57 (5), 1835-1844, 2009
712009
A time-based key management protocol for wireless sensor networks
J Jang, T Kwon, J Song
International conference on information security practice and experience …, 2007
692007
Two-factor authenticated key agreement supporting unlinkability in 5G-integrated wireless sensor networks
S Shin, T Kwon
IEEE Access 6, 11229-11241, 2018
642018
Analysis and improvement of a pin-entry method resilient to shoulder-surfing and recording attacks
T Kwon, J Hong
IEEE Transactions on Information Forensics and Security 10 (2), 278-292, 2014
642014
A lightweight three-factor authentication and key agreement scheme in wireless sensor networks for smart homes
S Shin, T Kwon
Sensors 19 (9), 2012, 2019
632019
An improvement of the password-based authentication protocol (K1P) on security against replay attacks
T Kwon, M Kang, S Jung, J Song
IEICE Transactions on Communications 82 (7), 991-997, 1999
611999
Location-based key management strong against insider threats in wireless sensor networks
J Choi, J Bang, LH Kim, M Ahn, T Kwon
IEEE Systems Journal 11 (2), 494-502, 2015
542015
Secure agreement scheme for gxy via password authentication
T Kwon, J Song
Electronics Letters 35 (11), 892-893, 1999
531999
Intriguer: Field-level constraint solving for hybrid fuzzing
M Cho, S Kim, T Kwon
ACM CCS (Conference on Computer and Communications Security), 515-530, 2019
452019
Draw it as shown: Behavioral pattern lock for mobile user authentication
Y Ku, LH Park, S Shin, T Kwon
IEEE Access 7, 69363-69378, 2019
452019
Classification and experimental analysis for clone detection approaches in wireless sensor networks
K Cho, M Jo, T Kwon, HH Chen, DH Lee
IEEE Systems Journal 7 (1), 26-35, 2012
432012
Practical authenticated key agreement using passwords
T Kwon
International Conference on Information Security, 1-12, 2004
422004
Location-based pairwise key predistribution for wireless sensor networks
T Kwon, JH Lee, JS Song
IEEE Transactions on Wireless Communications 8 (11), 5436-5442, 2009
402009
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20