If you made any changes in Pure these will be visible here soon.

Research Output 2005 2019

  • 1173 Citations
  • 14 h-Index
  • 50 Article
  • 38 Conference contribution
  • 1 Editorial
2019

(In-)Security of Cookies in HTTPS: Cookie Theft by Removing Cookie Flags

Kwon, H., Nam, H., Lee, S., Hahn, C. & Hur, J., 2019 Jan 1, (Accepted/In press) In : IEEE Transactions on Information Forensics and Security.

Research output: Contribution to journalArticle

HTTP
Servers
Web browsers
Authentication
Communication

Analysis of Forward Private Searchable Encryption and Its Application to Multi-Client Settings

Kim, H., Hahn, C. & Hur, J., 2019 Jul 1, ICUFN 2019 - 11th International Conference on Ubiquitous and Future Networks. IEEE Computer Society, p. 529-531 3 p. 8806172. (International Conference on Ubiquitous and Future Networks, ICUFN; vol. 2019-July).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
1 Citation (Scopus)

A reliable adaptive forwarding approach in named data networking

Rezaeifar, Z., Wang, J., Oh, H., Lee, S. B. & Hur, J., 2019 Jul 1, In : Future Generation Computer Systems. 96, p. 538-551 14 p.

Research output: Contribution to journalArticle

Interfaces (computer)
Internet
Bandwidth
2018
2 Citations (Scopus)

A practical de-mixing algorithm for bitcoin mixing services

Hong, Y., Kwon, H., Lee, J. & Hur, J., 2018 May 22, BCC 2018 - Proceedings of the 2nd ACM Workshop on Blockchains, Cryptocurrencies, and Contracts, Co-located with ASIA CCS 2018. Association for Computing Machinery, Inc, p. 15-20 6 p. (BCC 2018 - Proceedings of the 2nd ACM Workshop on Blockchains, Cryptocurrencies, and Contracts, Co-located with ASIA CCS 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Experiments

Authenticated Key Exchange, Signcryption and Deniable Signcryption Protocols Based on Two Hard Problems

Binh, D. V., Minh, N. H., Hai, N. N., Hur, J., Minh, D. H. & Tan, H. S., 2018 Jun 21, Proceedings - 2017 International Conference on Advanced Computing and Applications, ACOMP 2017. Ishibashi, K., Kung, J., Le, L-S., Thoai, N. & Dang, T. K. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 16-22 7 p. (Proceedings - 2017 International Conference on Advanced Computing and Applications, ACOMP 2017).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Electronic document identification systems

Efficient Multi-user Similarity Search Over Encrypted Data in Cloud Storage

Hahn, C., Shin, H. J., Kwon, H. & Hur, J., 2018 Apr 17, (Accepted/In press) In : Wireless Personal Communications. p. 1-17 17 p.

Research output: Contribution to journalArticle

Outsourcing
Semantics
Communication
Testing
Costs
2 Citations (Scopus)

Improving security and reliability in Merkle tree-based online data authentication with leakage resilience

Koo, D., Shin, Y., Yun, J. & Hur, J., 2018 Dec 7, In : Applied Sciences (Switzerland). 8, 12, 2532.

Research output: Contribution to journalArticle

Open Access
resilience
Authentication
leakage
integrity
privacy

Password typographical error resilience in honey encryption

Choi, H., Jeong, J., Woo, S. S., Kang, K. & Hur, J., 2018 Jan 1, (Accepted/In press) In : Computers and Security.

Research output: Contribution to journalArticle

resilience
Cryptography
entropy
Entropy
performance
1 Citation (Scopus)

Privacy-Preserving and Updatable Block-Level Data Deduplication in Cloud Storage Services

Shin, H., Koo, D., Shin, Y. & Hur, J., 2018 Sep 7, Proceedings - 2018 IEEE International Conference on Cloud Computing, CLOUD 2018 - Part of the 2018 IEEE World Congress on Services. IEEE Computer Society, p. 392-400 9 p. 8457824. (IEEE International Conference on Cloud Computing, CLOUD; vol. 2018-July).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
Bandwidth
20 Citations (Scopus)

Privacy-preserving deduplication of encrypted data with dynamic ownership management in fog computing

Koo, D. & Hur, J., 2018 Jan 1, In : Future Generation Computer Systems. 78, p. 739-752 14 p.

Research output: Contribution to journalArticle

Fog
Communication
Outsourcing
Access control
Explosions

Secure deduplication with reliable and revocable key management in fog computing

Kwon, H., Hahn, C., Kang, K. & Hur, J., 2018 Jan 1, (Accepted/In press) In : Peer-to-Peer Networking and Applications.

Research output: Contribution to journalArticle

Fog
Cryptography
Costs
2 Citations (Scopus)

Toward Trustworthy Delegation: Verifiable Outsourced Decryption with Tamper-Resistance in Public Cloud Storage

Hahn, C., Kwon, H. & Hur, J., 2018 Sep 7, Proceedings - 2018 IEEE International Conference on Cloud Computing, CLOUD 2018 - Part of the 2018 IEEE World Congress on Services. IEEE Computer Society, p. 920-923 4 p. 8457904. (IEEE International Conference on Cloud Computing, CLOUD; vol. 2018-July).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
Servers
Authentication
Access control
Costs

Trustworthy Delegation toward Securing Mobile Healthcare Cyber-Physical Systems

Hahn, C., Kwon, H. & Hur, J., 2018 Jan 1, (Accepted/In press) In : IEEE Internet of Things Journal.

Research output: Contribution to journalArticle

Authentication
Cryptography
Servers
Access control
Health
3 Citations (Scopus)

Unveiling hardware-based data prefetcher, a hidden source of information leakage

Shin, Y., Kim, H. C., Kwon, D., Jeong, J. H. & Hur, J., 2018 Oct 15, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 131-145 15 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Table lookup
Microprocessor chips
Hardware
Data storage equipment
Monitoring
2017
5 Citations (Scopus)

A hybrid deduplication for secure and efficient data outsourcing in fog computing

Koo, D., Shin, Y., Yun, J. & Hur, J., 2017 Jan 23, Proceedings - 8th IEEE International Conference on Cloud Computing Technology and Science, CloudCom 2016. IEEE Computer Society, p. 285-293 9 p. 7830695. (Proceedings of the International Conference on Cloud Computing Technology and Science, CloudCom).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Outsourcing
Fog
Data privacy
Computing
Servers
4 Citations (Scopus)

An Online Data-Oriented Authentication Based on Merkle Tree with Improved Reliability

Koo, D., Shin, Y., Yun, J. & Hur, J., 2017 Sep 7, Proceedings - 2017 IEEE 24th International Conference on Web Services, ICWS 2017. Chen, S. & Altintas, I. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 840-843 4 p. 8029845. (Proceedings - 2017 IEEE 24th International Conference on Web Services, ICWS 2017).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authentication

A practical analysis of TLS vulnerabilities in Korea web environment

Jeong, J., Kwon, H., Shin, H. & Hur, J., 2017 Jan 1, Information Security Applications - 17th International Workshop, WISA 2016, Revised Selected Papers. Choi, D. & Guilley, S. (eds.). Springer Verlag, p. 112-123 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10144 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Vulnerability
Websites
Network protocols
Electronic Mail
Scanner
5 Citations (Scopus)

CLDSafe: An efficient file backup system in cloud storage against ransomware

Yun, J., Hur, J., Shin, Y. & Koo, D., 2017 Sep 1, In : IEICE Transactions on Information and Systems. E100D, 9, p. 2228-2231 4 p.

Research output: Contribution to journalArticle

Open Access
Computer systems
Servers
Restoration
Malware

Cloud-based biometrics processing for privacy-preserving identification

Hahn, C., Shin, H. & Hur, J., 2017 Jul 26, ICUFN 2017 - 9th International Conference on Ubiquitous and Future Networks. IEEE Computer Society, p. 595-600 6 p. 7993859. (International Conference on Ubiquitous and Future Networks, ICUFN).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Biometrics
Processing
Degradation
5 Citations (Scopus)

Decentralized Server-aided Encryption for Secure Deduplication in Cloud Storage

Shin, Y., Koo, D., Yun, J. & Hur, J., 2017 Sep 1, (Accepted/In press) In : IEEE Transactions on Services Computing.

Research output: Contribution to journalArticle

Cryptography
Servers
Scalability
Encryption
Redundancy
1 Citation (Scopus)

Efficient and secure identity-based onion routing

Hur, J. & Noh, D. K., 2017 Jan 1, In : International Journal of Applied Engineering Research. 12, 6, p. 1069-1074 6 p.

Research output: Contribution to journalArticle

Routing protocols
Routers
Networks (circuits)
Communication
Costs
4 Citations (Scopus)

Novel hybrid CNN-SVM model for recognition of functional magnetic resonance images

Sun, X., Park, J., Kang, K. & Hur, J., 2017 Nov 27, 2017 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2017. Institute of Electrical and Electronics Engineers Inc., p. 1001-1006 6 p. (2017 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2017; vol. 2017-January).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Magnetic Resonance Image
Magnetic resonance
Support vector machines
Functional Magnetic Resonance Imaging
Support Vector Machine
5 Citations (Scopus)

Password typos resilience in honey encryption

Choi, H., Nam, H. & Hur, J., 2017 Apr 13, 31st International Conference on Information Networking, ICOIN 2017. IEEE Computer Society, p. 593-598 6 p. 7899565. (International Conference on Information Networking).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
Entropy
Recovery

Practical Data Outsourcing Framework with Provably Secure Deduplication in Untrusted Remote Storage

Koo, D., Shin, Y. & Hur, J., 2017 Mar 20, 2017 International Conference on Platform Technology and Service, PlatCon 2017 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 7883720. (2017 International Conference on Platform Technology and Service, PlatCon 2017 - Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Outsourcing
outsourcing
Cryptography
utilization
management
7 Citations (Scopus)

Privacy-preserving aggregation and authentication of multi-source smart meters in a smart grid system

Koo, D., Shin, Y. & Hur, J., 2017 Sep 29, In : Applied Sciences (Switzerland). 7, 10, 1007.

Research output: Contribution to journalArticle

Open Access
Smart meters
privacy
Authentication
preserving
Agglomeration
7 Citations (Scopus)

Privacy-preserving electrocardiogram monitoring for intelligent arrhythmia detection

Son, J., Park, J., Oh, H., Bhuiyan, M. Z. A., Hur, J. & Kang, K., 2017 Jun 12, In : Sensors (Switzerland). 17, 6, 1360.

Research output: Contribution to journalArticle

Open Access
arrhythmia
electrocardiography
privacy
Privacy
Electrocardiography
7 Citations (Scopus)

Scalable and Reliable Key Management for Secure Deduplication in Cloud Storage

Kwon, H., Hahn, C., Koo, D. & Hur, J., 2017 Sep 8, Proceedings - 2017 IEEE 10th International Conference on Cloud Computing, CLOUD 2017. Fox, G. C. (ed.). IEEE Computer Society, p. 391-398 8 p. 8030613. (IEEE International Conference on Cloud Computing, CLOUD; vol. 2017-June).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
Scalability
Costs
8 Citations (Scopus)

Secure authentication using ciphertext policy attribute-based encryption in mobile multi-hop networks

Kwon, H., Kim, D., Hahn, C. & Hur, J., 2017 Oct 1, In : Multimedia Tools and Applications. 76, 19, p. 19507-19521 15 p.

Research output: Contribution to journalArticle

Authentication
Cryptography
Network protocols
Wi-Fi
Smartphones
1 Citation (Scopus)

Secure data deduplication with dynamic ownership management in cloud storage (Extended abstract)

Hur, J., Koo, D., Shin, Y. & Kang, K., 2017 May 16, Proceedings - 2017 IEEE 33rd International Conference on Data Engineering, ICDE 2017. IEEE Computer Society, p. 69-70 2 p. 7929937. (Proceedings - International Conference on Data Engineering).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
Servers
Bandwidth
9 Citations (Scopus)

Secure deduplication for multimedia data with user revocation in cloud storage

Kwon, H., Hahn, C., Kim, D. & Hur, J., 2017 Feb 1, In : Multimedia Tools and Applications. 76, 4, p. 5889-5903 15 p.

Research output: Contribution to journalArticle

Cryptography
Servers
Data storage equipment
3 Citations (Scopus)

Secure proof of storage with deduplication for cloud storage systems

Shin, Y., Koo, D., Hur, J. & Yun, J., 2017 Oct 1, In : Multimedia Tools and Applications. 76, 19, p. 19363-19378 16 p.

Research output: Contribution to journalArticle

Cloud computing
Data privacy
Outsourcing
Explosions

SEED: Enabling serverless and efficient encrypted deduplication for cloud storage

Shin, Y., Koo, D., Yun, J. & Hur, J., 2017 Jan 23, Proceedings - 8th IEEE International Conference on Cloud Computing Technology and Science, CloudCom 2016. IEEE Computer Society, p. 482-487 6 p. 7830725. (Proceedings of the International Conference on Cloud Computing Technology and Science, CloudCom).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
Redundancy
Confidentiality
Servers
Encryption
3 Citations (Scopus)

Special issue on V2X communications and networks

Choi, Y. J., Hur, J., Jeong, H. Y. & Joo, C., 2017 Jun 1, In : Journal of Communications and Networks. 19, 3, p. 205-206 2 p., 7977930.

Research output: Contribution to journalEditorial

Communication
29 Citations (Scopus)

Survey of secure data deduplication schemes for cloud storage systems

Shin, Y., Koo, D. & Hur, J., 2017 Jan 1, In : ACM Computing Surveys. 49, 4, 3017428.

Research output: Contribution to journalArticle

Storage System
Privacy
Attack
Costs
Scenarios
2 Citations (Scopus)

TrapFetch: A breakpoint-based prefetcher for both launch and run-time

Won, J., Kwon, O., Ryu, J., Hur, J., Lee, I. & Kang, K., 2017 Nov 27, 2017 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2017. Institute of Electrical and Electronics Engineers Inc., p. 2766-2771 6 p. (2017 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2017; vol. 2017-January).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Burst
Eternity
Cache
Consecutive
Interference
2016
4 Citations (Scopus)

A reliable group key management scheme for broadcast encryption

Hur, J. & Lee, Y., 2016 Apr 1, In : Journal of Communications and Networks. 18, 2, p. 246-260 15 p., 7487982.

Research output: Contribution to journalArticle

Cryptography
Radio stations
Access control
Scalability
Feedback
2 Citations (Scopus)

A survey on MITM and its countermeasures in the TLS handshake protocol

Han, S. W., Kwon, H., Hahn, C., Koo, D. & Hur, J., 2016 Aug 9, ICUFN 2016 - 8th International Conference on Ubiquitous and Future Networks. IEEE Computer Society, p. 724-729 6 p. 7537132. (International Conference on Ubiquitous and Future Networks, ICUFN; vol. 2016-August).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Network protocols
Servers
11 Citations (Scopus)

Efficient and privacy-preserving biometric identification in cloud

Hahn, C. & Hur, J., 2016 Sep 1, In : ICT Express. 2, 3, p. 135-139 5 p.

Research output: Contribution to journalArticle

Open Access
Biometrics
Identification (control systems)
Servers
Cryptography
Sensors
7 Citations (Scopus)

Efficient attribute-based secure data sharing with hidden policies and traceability in mobile health networks

Hahn, C., Kwon, H. & Hur, J., 2016 Jan 1, In : Mobile Information Systems. 2016, 6545873.

Research output: Contribution to journalArticle

Open Access
Public health
Access control
Mobile devices
mHealth
Costs
1 Citation (Scopus)

Enhanced authentication for outsourced educational contents through provable block possession

Hahn, C., Kwon, H., Kim, D. & Hur, J., 2016 Nov 1, In : Multimedia Tools and Applications. 75, 21, p. 13057-13076 20 p.

Research output: Contribution to journalArticle

Authentication
Biometrics
Learning systems
Hardware
Degradation
2 Citations (Scopus)

POSTER: Towards privacy-preserving biometric identification in cloud computing

Hahn, C. & Hur, J., 2016 Oct 24, CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1826-1828 3 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 24-28-October-2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Biometrics
Cloud computing
Identification (control systems)
15 Citations (Scopus)

Privacy-preserving public auditing for educational multimedia data in cloud computing

Kim, D., Kwon, H., Hahn, C. & Hur, J., 2016 Nov 1, In : Multimedia Tools and Applications. 75, 21, p. 13077-13091 15 p.

Research output: Contribution to journalArticle

Data privacy
Distance education
Cloud computing
Hash functions
Learning systems
3 Citations (Scopus)

Recommendations for antiarrhythmic drugs based on latent semantic analysis with fc-means clustering

Park, J., Kang, M., Hur, J. & Kang, K., 2016 Oct 13, 2016 38th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, EMBC 2016. Institute of Electrical and Electronics Engineers Inc., p. 4423-4426 4 p. 7591708. (Proceedings of the Annual International Conference of the IEEE Engineering in Medicine and Biology Society, EMBS; vol. 2016-October).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Anti-Arrhythmia Agents
Semantics
Cluster Analysis
Cardiac Arrhythmias
Databases
1 Citation (Scopus)

Reputation-based collusion detection with majority of colluders

Hur, J., Guo, M., Park, Y., Lee, C. G. & Park, H. H., 2016 Jul 1, In : IEICE Transactions on Information and Systems. E99D, 7, p. 1822-1835 14 p.

Research output: Contribution to journalArticle

Open Access
Experiments
3 Citations (Scopus)

Scalable and secure Private Set intersection for big data

Hahn, C. & Hur, J., 2016 Jan 1, 2016 International Conference on Big Data and Smart Computing, BigComp 2016. Institute of Electrical and Electronics Engineers Inc., p. 285-288 4 p. 7425929. (2016 International Conference on Big Data and Smart Computing, BigComp 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Servers
Big data
Filter
Degradation
Countermeasures
48 Citations (Scopus)

Secure Data Deduplication with Dynamic Ownership Management in Cloud Storage

Hur, J., Koo, D., Shin, Y. & Kang, K., 2016 Jan 1, In : IEEE Transactions on Knowledge and Data Engineering. 28, 11, p. 3113-3125 13 p., 7490366.

Research output: Contribution to journalArticle

Servers
Cryptography
Outsourcing
Access control
Bandwidth
2015
4 Citations (Scopus)

A secure OTP algorithm using a smartphone application

Choi, H., Kwon, H. & Hur, J., 2015 Aug 7, ICUFN 2015 - 7th International Conference on Ubiquitous and Future Networks. IEEE Computer Society, p. 476-481 6 p. 7182589. (International Conference on Ubiquitous and Future Networks, ICUFN; vol. 2015-August).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Smartphones
Authentication
12 Citations (Scopus)

Medical-grade quality of service for real-time mobile healthcare

Kang, K., Wang, Q., Hur, J., Park, K. J. & Sha, L., 2015 Feb 1, Computer, 48, 2, p. 41-49 9 p.

Research output: Contribution to specialist publicationArticle

3G mobile communication systems
Telemetering
Electrocardiography
Quality of service
Network protocols
10 Citations (Scopus)

Privacy-preserving smart metering with authentication in a smart grid

Hur, J., Koo, D. Y. & Shin, Y. J., 2015 Jan 1, In : Applied Sciences (Switzerland). 5, 4, p. 1503-1527 25 p.

Research output: Contribution to journalArticle

Open Access
Smart meters
privacy
Authentication
preserving
grids
6 Citations (Scopus)

Secure pattern-based authentication against shoulder surfing attack in smart devices

Shin, H., Kim, D. & Hur, J., 2015 Aug 7, ICUFN 2015 - 7th International Conference on Ubiquitous and Future Networks. IEEE Computer Society, p. 13-18 6 p. 7182486. (International Conference on Ubiquitous and Future Networks, ICUFN; vol. 2015-August).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authentication