If you made any changes in Pure these will be visible here soon.

Research Output 2005 2019

  • 1173 Citations
  • 14 h-Index
  • 50 Article
  • 38 Conference contribution
  • 1 Editorial
Filter
Conference contribution
2019

Analysis of Forward Private Searchable Encryption and Its Application to Multi-Client Settings

Kim, H., Hahn, C. & Hur, J., 2019 Jul 1, ICUFN 2019 - 11th International Conference on Ubiquitous and Future Networks. IEEE Computer Society, p. 529-531 3 p. 8806172. (International Conference on Ubiquitous and Future Networks, ICUFN; vol. 2019-July).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
2018
2 Citations (Scopus)

A practical de-mixing algorithm for bitcoin mixing services

Hong, Y., Kwon, H., Lee, J. & Hur, J., 2018 May 22, BCC 2018 - Proceedings of the 2nd ACM Workshop on Blockchains, Cryptocurrencies, and Contracts, Co-located with ASIA CCS 2018. Association for Computing Machinery, Inc, p. 15-20 6 p. (BCC 2018 - Proceedings of the 2nd ACM Workshop on Blockchains, Cryptocurrencies, and Contracts, Co-located with ASIA CCS 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Experiments

Authenticated Key Exchange, Signcryption and Deniable Signcryption Protocols Based on Two Hard Problems

Binh, D. V., Minh, N. H., Hai, N. N., Hur, J., Minh, D. H. & Tan, H. S., 2018 Jun 21, Proceedings - 2017 International Conference on Advanced Computing and Applications, ACOMP 2017. Ishibashi, K., Kung, J., Le, L-S., Thoai, N. & Dang, T. K. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 16-22 7 p. (Proceedings - 2017 International Conference on Advanced Computing and Applications, ACOMP 2017).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Electronic document identification systems
1 Citation (Scopus)

Privacy-Preserving and Updatable Block-Level Data Deduplication in Cloud Storage Services

Shin, H., Koo, D., Shin, Y. & Hur, J., 2018 Sep 7, Proceedings - 2018 IEEE International Conference on Cloud Computing, CLOUD 2018 - Part of the 2018 IEEE World Congress on Services. IEEE Computer Society, p. 392-400 9 p. 8457824. (IEEE International Conference on Cloud Computing, CLOUD; vol. 2018-July).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
Bandwidth
2 Citations (Scopus)

Toward Trustworthy Delegation: Verifiable Outsourced Decryption with Tamper-Resistance in Public Cloud Storage

Hahn, C., Kwon, H. & Hur, J., 2018 Sep 7, Proceedings - 2018 IEEE International Conference on Cloud Computing, CLOUD 2018 - Part of the 2018 IEEE World Congress on Services. IEEE Computer Society, p. 920-923 4 p. 8457904. (IEEE International Conference on Cloud Computing, CLOUD; vol. 2018-July).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
Servers
Authentication
Access control
Costs
3 Citations (Scopus)

Unveiling hardware-based data prefetcher, a hidden source of information leakage

Shin, Y., Kim, H. C., Kwon, D., Jeong, J. H. & Hur, J., 2018 Oct 15, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 131-145 15 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Table lookup
Microprocessor chips
Hardware
Data storage equipment
Monitoring
2017
5 Citations (Scopus)

A hybrid deduplication for secure and efficient data outsourcing in fog computing

Koo, D., Shin, Y., Yun, J. & Hur, J., 2017 Jan 23, Proceedings - 8th IEEE International Conference on Cloud Computing Technology and Science, CloudCom 2016. IEEE Computer Society, p. 285-293 9 p. 7830695. (Proceedings of the International Conference on Cloud Computing Technology and Science, CloudCom).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Outsourcing
Fog
Data privacy
Computing
Servers
4 Citations (Scopus)

An Online Data-Oriented Authentication Based on Merkle Tree with Improved Reliability

Koo, D., Shin, Y., Yun, J. & Hur, J., 2017 Sep 7, Proceedings - 2017 IEEE 24th International Conference on Web Services, ICWS 2017. Chen, S. & Altintas, I. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 840-843 4 p. 8029845. (Proceedings - 2017 IEEE 24th International Conference on Web Services, ICWS 2017).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authentication

A practical analysis of TLS vulnerabilities in Korea web environment

Jeong, J., Kwon, H., Shin, H. & Hur, J., 2017 Jan 1, Information Security Applications - 17th International Workshop, WISA 2016, Revised Selected Papers. Choi, D. & Guilley, S. (eds.). Springer Verlag, p. 112-123 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10144 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Vulnerability
Websites
Network protocols
Electronic Mail
Scanner

Cloud-based biometrics processing for privacy-preserving identification

Hahn, C., Shin, H. & Hur, J., 2017 Jul 26, ICUFN 2017 - 9th International Conference on Ubiquitous and Future Networks. IEEE Computer Society, p. 595-600 6 p. 7993859. (International Conference on Ubiquitous and Future Networks, ICUFN).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Biometrics
Processing
Degradation
4 Citations (Scopus)

Novel hybrid CNN-SVM model for recognition of functional magnetic resonance images

Sun, X., Park, J., Kang, K. & Hur, J., 2017 Nov 27, 2017 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2017. Institute of Electrical and Electronics Engineers Inc., p. 1001-1006 6 p. (2017 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2017; vol. 2017-January).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Magnetic Resonance Image
Magnetic resonance
Support vector machines
Functional Magnetic Resonance Imaging
Support Vector Machine
5 Citations (Scopus)

Password typos resilience in honey encryption

Choi, H., Nam, H. & Hur, J., 2017 Apr 13, 31st International Conference on Information Networking, ICOIN 2017. IEEE Computer Society, p. 593-598 6 p. 7899565. (International Conference on Information Networking).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
Entropy
Recovery

Practical Data Outsourcing Framework with Provably Secure Deduplication in Untrusted Remote Storage

Koo, D., Shin, Y. & Hur, J., 2017 Mar 20, 2017 International Conference on Platform Technology and Service, PlatCon 2017 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 7883720. (2017 International Conference on Platform Technology and Service, PlatCon 2017 - Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Outsourcing
outsourcing
Cryptography
utilization
management
7 Citations (Scopus)

Scalable and Reliable Key Management for Secure Deduplication in Cloud Storage

Kwon, H., Hahn, C., Koo, D. & Hur, J., 2017 Sep 8, Proceedings - 2017 IEEE 10th International Conference on Cloud Computing, CLOUD 2017. Fox, G. C. (ed.). IEEE Computer Society, p. 391-398 8 p. 8030613. (IEEE International Conference on Cloud Computing, CLOUD; vol. 2017-June).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
Scalability
Costs
1 Citation (Scopus)

Secure data deduplication with dynamic ownership management in cloud storage (Extended abstract)

Hur, J., Koo, D., Shin, Y. & Kang, K., 2017 May 16, Proceedings - 2017 IEEE 33rd International Conference on Data Engineering, ICDE 2017. IEEE Computer Society, p. 69-70 2 p. 7929937. (Proceedings - International Conference on Data Engineering).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
Servers
Bandwidth

SEED: Enabling serverless and efficient encrypted deduplication for cloud storage

Shin, Y., Koo, D., Yun, J. & Hur, J., 2017 Jan 23, Proceedings - 8th IEEE International Conference on Cloud Computing Technology and Science, CloudCom 2016. IEEE Computer Society, p. 482-487 6 p. 7830725. (Proceedings of the International Conference on Cloud Computing Technology and Science, CloudCom).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
Redundancy
Confidentiality
Servers
Encryption
2 Citations (Scopus)

TrapFetch: A breakpoint-based prefetcher for both launch and run-time

Won, J., Kwon, O., Ryu, J., Hur, J., Lee, I. & Kang, K., 2017 Nov 27, 2017 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2017. Institute of Electrical and Electronics Engineers Inc., p. 2766-2771 6 p. (2017 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2017; vol. 2017-January).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Burst
Eternity
Cache
Consecutive
Interference
2016
2 Citations (Scopus)

A survey on MITM and its countermeasures in the TLS handshake protocol

Han, S. W., Kwon, H., Hahn, C., Koo, D. & Hur, J., 2016 Aug 9, ICUFN 2016 - 8th International Conference on Ubiquitous and Future Networks. IEEE Computer Society, p. 724-729 6 p. 7537132. (International Conference on Ubiquitous and Future Networks, ICUFN; vol. 2016-August).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Network protocols
Servers
2 Citations (Scopus)

POSTER: Towards privacy-preserving biometric identification in cloud computing

Hahn, C. & Hur, J., 2016 Oct 24, CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1826-1828 3 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 24-28-October-2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Biometrics
Cloud computing
Identification (control systems)
3 Citations (Scopus)

Recommendations for antiarrhythmic drugs based on latent semantic analysis with fc-means clustering

Park, J., Kang, M., Hur, J. & Kang, K., 2016 Oct 13, 2016 38th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, EMBC 2016. Institute of Electrical and Electronics Engineers Inc., p. 4423-4426 4 p. 7591708. (Proceedings of the Annual International Conference of the IEEE Engineering in Medicine and Biology Society, EMBS; vol. 2016-October).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Anti-Arrhythmia Agents
Semantics
Cluster Analysis
Cardiac Arrhythmias
Databases
3 Citations (Scopus)

Scalable and secure Private Set intersection for big data

Hahn, C. & Hur, J., 2016 Jan 1, 2016 International Conference on Big Data and Smart Computing, BigComp 2016. Institute of Electrical and Electronics Engineers Inc., p. 285-288 4 p. 7425929. (2016 International Conference on Big Data and Smart Computing, BigComp 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Servers
Big data
Filter
Degradation
Countermeasures
2015
4 Citations (Scopus)

A secure OTP algorithm using a smartphone application

Choi, H., Kwon, H. & Hur, J., 2015 Aug 7, ICUFN 2015 - 7th International Conference on Ubiquitous and Future Networks. IEEE Computer Society, p. 476-481 6 p. 7182589. (International Conference on Ubiquitous and Future Networks, ICUFN; vol. 2015-August).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Smartphones
Authentication
6 Citations (Scopus)

Secure pattern-based authentication against shoulder surfing attack in smart devices

Shin, H., Kim, D. & Hur, J., 2015 Aug 7, ICUFN 2015 - 7th International Conference on Ubiquitous and Future Networks. IEEE Computer Society, p. 13-18 6 p. 7182486. (International Conference on Ubiquitous and Future Networks, ICUFN; vol. 2015-August).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authentication
2014
6 Citations (Scopus)

A privacy threat in 4th generation mobile telephony and its countermeasure

Hahn, C., Kwon, H., Kim, D., Kang, K. & Hur, J., 2014 Jan 1, Wireless Algorithms, Systems and Applications - 9th International Conference, WASA 2014, Proceedings. Cheng, S., Wang, H., Gao, H., Wang, C. & Cai, Z. (eds.). Springer Verlag, p. 624-635 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8491).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Countermeasures
Privacy
Mobile Devices
Mobile devices
Authentication
3 Citations (Scopus)

Fully-distributed multicast routing protocol for IEEE 802.15.8 peer-aware communications

Yu, J., Kim, T., Na, W., Bae, H., Lee, Y., Lee, J., Vatandas, Z., Cho, S. & Hur, J., 2014 Jan 1, International Conference on Information Networking 2014, ICOIN 2014. IEEE Computer Society, p. 64-69 6 p. 6799666. (International Conference on Information Networking).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Routing protocols
Communication
Telecommunication networks
Personal communication systems
Mobile ad hoc networks
6 Citations (Scopus)

Secure and efficient deduplication over encrypted data with dynamic updates in cloud storage

Koo, D., Hur, J. & Yoon, H., 2014 Jan 1, Frontier and Innovation in Future Computing and Communications. Zomaya, A., Park, J. J., Jeong, H-Y. & Obaidat, M. (eds.). Springer Verlag, p. 229-235 7 p. (Lecture Notes in Electrical Engineering; vol. 301).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Metadata
Costs
11 Citations (Scopus)

Secure device-to-device authentication in mobile multi-hop networks

Kwon, H., Hahn, C., Kim, D., Kang, K. & Hur, J., 2014 Jan 1, Wireless Algorithms, Systems and Applications - 9th International Conference, WASA 2014, Proceedings. Cheng, S., Wang, H., Gao, H., Wang, C. & Cai, Z. (eds.). Springer Verlag, p. 267-278 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8491).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Multi-hop
Authentication
Cryptography
Encryption
Bluetooth
2012

Extending service coverage using FGS-aware blind repetition

Park, J., Lee, J., Hur, J. & Kang, K., 2012 Dec 14, Proceedings of the 2012 15th International Conference on Network-Based Information Systems, NBIS 2012. p. 180-186 7 p. 6354824. (Proceedings of the 2012 15th International Conference on Network-Based Information Systems, NBIS 2012).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Scalability
Forward error correction
Mobile devices
Decoding
Energy utilization
2009
3 Citations (Scopus)

A distributed deterministic and resilient replication attack detection protocol in wireless sensor networks

Kim, C., Park, C., Hur, J., Lee, H. & Yoon, H., 2009 Dec 1, Communication and Networking: International Conference, FGCN/ACN 2009, Held as Part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009. Pro. Slezak, D., Kim, T., Chang, A. C-C., Vasilakos, T., Li, M. & Sakurai, K. (eds.). p. 405-412 8 p. (Communications in Computer and Information Science; vol. 56).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Replication
Wireless Sensor Networks
Wireless sensor networks
Replica
Attack
5 Citations (Scopus)

Bandwidth efficient key distribution for secure multicast in dynamic wireless mesh networks

Shin, S., Hur, J., Lee, H. & Yoon, H., 2009 Sep 22, 2009 IEEE Wireless Communications and Networking Conference, WCNC 2009 - Proceedings. 4917606. (IEEE Wireless Communications and Networking Conference, WCNC).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Wireless mesh networks (WMN)
Bandwidth

Scalable and efficient approach for secure group communication

Shin, Y., Hur, J. & Yoon, H., 2009 Dec 1, 2009 9th International Symposium on Communications and Information Technology, ISCIT 2009. p. 1201-1206 6 p. 5341114. (2009 9th International Symposium on Communications and Information Technology, ISCIT 2009).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Scalability
Cryptography
Communication
Data communication systems
2008
5 Citations (Scopus)

An efficient proactive key distribution scheme for fast handoff in IEEE 802.11 wireless networks

Hur, J., Park, C., Shin, Y. & Yoon, H., 2008 Dec 31, Information Networking: Towards Ubiquitous Networking and Services - International Conference, ICOIN 2007, Revised Selected Papers. p. 629-638 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5200 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Key Distribution
Handoff
IEEE 802.11
Authentication
Wireless Networks
28 Citations (Scopus)

Security considerations for handover schemes in mobile WiMAX networks

Hur, J., Shim, H., Kim, P., Yoon, H. & Song, N. O., 2008 Sep 18, WCNC 2008 - IEEE Wireless Communications and Networking Conference, Conference Proceedings. p. 2531-2536 6 p. 4489476. (IEEE Wireless Communications and Networking Conference, WCNC).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Wireless networks
Network protocols
Authentication
Defects
2007
12 Citations (Scopus)

An efficient pre-authentication scheme for IEEE 802.11-based vehicular networks

Hur, J., Park, C. & Yoon, H., 2007 Dec 1, Advances in Information and Computer Security - Second International Workshop on Security, IWSEC 2007, Proceedings. p. 121-136 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4752 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Vehicular Networks
Handoff
IEEE 802.11
Authentication
Key Pre-distribution
14 Citations (Scopus)

Decentralized group key management for dynamic networks using proxy cryptography

Hur, J., Shin, Y. & Yoon, H., 2007 Dec 1, Q2SWinet'07: Proceedings of the Third ACM Workshop on Q2S and Security for Wireless and Mobile Networks. p. 123-129 7 p. (Q2SWinet'07: Proceedings of the Third ACM Workshop on Q2S and Security for Wireless and Mobile Networks).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
Communication
Scalability
Topology
Controllers
4 Citations (Scopus)

Pre-authentication for fast handoff in wireless mesh networks with mobile APs

Park, C., Hur, J., Kim, C., Shin, Y. J. & Yoon, H., 2007 Dec 1, Information Security Applications - 7th International Workshop, WISA 2006 Revised Selected Papers. p. 349-363 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4298 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Wireless Mesh Networks
Handoff
Wireless mesh networks (WMN)
Authentication
Local area networks
2006
25 Citations (Scopus)

Trust management for resilient wireless sensor networks

Hur, J., Lee, Y., Hong, S. M. & Yoon, H., 2006 Jan 1, Information Security and Cryptology, ICISC 2005 - 8th International Conference, Revised Selected Papers. Springer Verlag, p. 56-68 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3935 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Trust Management
Sensor networks
Sensor Networks
Wireless Sensor Networks
Wireless sensor networks
2005
15 Citations (Scopus)

Trust-based secure aggregation in wireless sensor networks

Hur, J., Lee, Y., Hong, S. & Yoon, H., 2005 Jan 1, 3rd International Conference on Computing, Communications and Control Technologies, CCCT 2005, Proceedings. International Institute of Informatics and Systemics, IIIS, p. 1-6 6 p. (3rd International Conference on Computing, Communications and Control Technologies, CCCT 2005, Proceedings; vol. 3).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Wireless sensor networks
Agglomeration
Sensors
Sensor nodes
Authentication