If you made any changes in Pure these will be visible here soon.

Research Output 2005 2019

  • 1173 Citations
  • 14 h-Index
  • 50 Article
  • 38 Conference contribution
  • 1 Editorial
Filter
Article
2019

(In-)Security of Cookies in HTTPS: Cookie Theft by Removing Cookie Flags

Kwon, H., Nam, H., Lee, S., Hahn, C. & Hur, J., 2019 Jan 1, (Accepted/In press) In : IEEE Transactions on Information Forensics and Security.

Research output: Contribution to journalArticle

HTTP
Servers
Web browsers
Authentication
Communication
1 Citation (Scopus)

A reliable adaptive forwarding approach in named data networking

Rezaeifar, Z., Wang, J., Oh, H., Lee, S. B. & Hur, J., 2019 Jul 1, In : Future Generation Computer Systems. 96, p. 538-551 14 p.

Research output: Contribution to journalArticle

Interfaces (computer)
Internet
Bandwidth
2018

Efficient Multi-user Similarity Search Over Encrypted Data in Cloud Storage

Hahn, C., Shin, H. J., Kwon, H. & Hur, J., 2018 Apr 17, (Accepted/In press) In : Wireless Personal Communications. p. 1-17 17 p.

Research output: Contribution to journalArticle

Outsourcing
Semantics
Communication
Testing
Costs
2 Citations (Scopus)

Improving security and reliability in Merkle tree-based online data authentication with leakage resilience

Koo, D., Shin, Y., Yun, J. & Hur, J., 2018 Dec 7, In : Applied Sciences (Switzerland). 8, 12, 2532.

Research output: Contribution to journalArticle

Open Access
resilience
Authentication
leakage
integrity
privacy

Password typographical error resilience in honey encryption

Choi, H., Jeong, J., Woo, S. S., Kang, K. & Hur, J., 2018 Jan 1, (Accepted/In press) In : Computers and Security.

Research output: Contribution to journalArticle

resilience
Cryptography
entropy
Entropy
performance
20 Citations (Scopus)

Privacy-preserving deduplication of encrypted data with dynamic ownership management in fog computing

Koo, D. & Hur, J., 2018 Jan 1, In : Future Generation Computer Systems. 78, p. 739-752 14 p.

Research output: Contribution to journalArticle

Fog
Communication
Outsourcing
Access control
Explosions

Secure deduplication with reliable and revocable key management in fog computing

Kwon, H., Hahn, C., Kang, K. & Hur, J., 2018 Jan 1, (Accepted/In press) In : Peer-to-Peer Networking and Applications.

Research output: Contribution to journalArticle

Fog
Cryptography
Costs

Trustworthy Delegation toward Securing Mobile Healthcare Cyber-Physical Systems

Hahn, C., Kwon, H. & Hur, J., 2018 Jan 1, (Accepted/In press) In : IEEE Internet of Things Journal.

Research output: Contribution to journalArticle

Authentication
Cryptography
Servers
Access control
Health
2017
5 Citations (Scopus)

CLDSafe: An efficient file backup system in cloud storage against ransomware

Yun, J., Hur, J., Shin, Y. & Koo, D., 2017 Sep 1, In : IEICE Transactions on Information and Systems. E100D, 9, p. 2228-2231 4 p.

Research output: Contribution to journalArticle

Open Access
Computer systems
Servers
Restoration
Malware
5 Citations (Scopus)

Decentralized Server-aided Encryption for Secure Deduplication in Cloud Storage

Shin, Y., Koo, D., Yun, J. & Hur, J., 2017 Sep 1, (Accepted/In press) In : IEEE Transactions on Services Computing.

Research output: Contribution to journalArticle

Cryptography
Servers
Scalability
Encryption
Redundancy
1 Citation (Scopus)

Efficient and secure identity-based onion routing

Hur, J. & Noh, D. K., 2017 Jan 1, In : International Journal of Applied Engineering Research. 12, 6, p. 1069-1074 6 p.

Research output: Contribution to journalArticle

Routing protocols
Routers
Networks (circuits)
Communication
Costs
7 Citations (Scopus)

Privacy-preserving aggregation and authentication of multi-source smart meters in a smart grid system

Koo, D., Shin, Y. & Hur, J., 2017 Sep 29, In : Applied Sciences (Switzerland). 7, 10, 1007.

Research output: Contribution to journalArticle

Open Access
Smart meters
privacy
Authentication
preserving
Agglomeration
7 Citations (Scopus)

Privacy-preserving electrocardiogram monitoring for intelligent arrhythmia detection

Son, J., Park, J., Oh, H., Bhuiyan, M. Z. A., Hur, J. & Kang, K., 2017 Jun 12, In : Sensors (Switzerland). 17, 6, 1360.

Research output: Contribution to journalArticle

Open Access
arrhythmia
electrocardiography
privacy
Privacy
Electrocardiography
8 Citations (Scopus)

Secure authentication using ciphertext policy attribute-based encryption in mobile multi-hop networks

Kwon, H., Kim, D., Hahn, C. & Hur, J., 2017 Oct 1, In : Multimedia Tools and Applications. 76, 19, p. 19507-19521 15 p.

Research output: Contribution to journalArticle

Authentication
Cryptography
Network protocols
Wi-Fi
Smartphones
9 Citations (Scopus)

Secure deduplication for multimedia data with user revocation in cloud storage

Kwon, H., Hahn, C., Kim, D. & Hur, J., 2017 Feb 1, In : Multimedia Tools and Applications. 76, 4, p. 5889-5903 15 p.

Research output: Contribution to journalArticle

Cryptography
Servers
Data storage equipment
3 Citations (Scopus)

Secure proof of storage with deduplication for cloud storage systems

Shin, Y., Koo, D., Hur, J. & Yun, J., 2017 Oct 1, In : Multimedia Tools and Applications. 76, 19, p. 19363-19378 16 p.

Research output: Contribution to journalArticle

Cloud computing
Data privacy
Outsourcing
Explosions
29 Citations (Scopus)

Survey of secure data deduplication schemes for cloud storage systems

Shin, Y., Koo, D. & Hur, J., 2017 Jan 1, In : ACM Computing Surveys. 49, 4, 3017428.

Research output: Contribution to journalArticle

Storage System
Privacy
Attack
Costs
Scenarios
2016
4 Citations (Scopus)

A reliable group key management scheme for broadcast encryption

Hur, J. & Lee, Y., 2016 Apr 1, In : Journal of Communications and Networks. 18, 2, p. 246-260 15 p., 7487982.

Research output: Contribution to journalArticle

Cryptography
Radio stations
Access control
Scalability
Feedback
11 Citations (Scopus)

Efficient and privacy-preserving biometric identification in cloud

Hahn, C. & Hur, J., 2016 Sep 1, In : ICT Express. 2, 3, p. 135-139 5 p.

Research output: Contribution to journalArticle

Open Access
Biometrics
Identification (control systems)
Servers
Cryptography
Sensors
7 Citations (Scopus)

Efficient attribute-based secure data sharing with hidden policies and traceability in mobile health networks

Hahn, C., Kwon, H. & Hur, J., 2016 Jan 1, In : Mobile Information Systems. 2016, 6545873.

Research output: Contribution to journalArticle

Open Access
Public health
Access control
Mobile devices
mHealth
Costs
1 Citation (Scopus)

Enhanced authentication for outsourced educational contents through provable block possession

Hahn, C., Kwon, H., Kim, D. & Hur, J., 2016 Nov 1, In : Multimedia Tools and Applications. 75, 21, p. 13057-13076 20 p.

Research output: Contribution to journalArticle

Authentication
Biometrics
Learning systems
Hardware
Degradation
15 Citations (Scopus)

Privacy-preserving public auditing for educational multimedia data in cloud computing

Kim, D., Kwon, H., Hahn, C. & Hur, J., 2016 Nov 1, In : Multimedia Tools and Applications. 75, 21, p. 13077-13091 15 p.

Research output: Contribution to journalArticle

Data privacy
Distance education
Cloud computing
Hash functions
Learning systems
1 Citation (Scopus)

Reputation-based collusion detection with majority of colluders

Hur, J., Guo, M., Park, Y., Lee, C. G. & Park, H. H., 2016 Jul 1, In : IEICE Transactions on Information and Systems. E99D, 7, p. 1822-1835 14 p.

Research output: Contribution to journalArticle

Open Access
Experiments
48 Citations (Scopus)

Secure Data Deduplication with Dynamic Ownership Management in Cloud Storage

Hur, J., Koo, D., Shin, Y. & Kang, K., 2016 Jan 1, In : IEEE Transactions on Knowledge and Data Engineering. 28, 11, p. 3113-3125 13 p., 7490366.

Research output: Contribution to journalArticle

Servers
Cryptography
Outsourcing
Access control
Bandwidth
2015
12 Citations (Scopus)

Medical-grade quality of service for real-time mobile healthcare

Kang, K., Wang, Q., Hur, J., Park, K. J. & Sha, L., 2015 Feb 1, Computer, 48, 2, p. 41-49 9 p.

Research output: Contribution to specialist publicationArticle

3G mobile communication systems
Telemetering
Electrocardiography
Quality of service
Network protocols
10 Citations (Scopus)

Privacy-preserving smart metering with authentication in a smart grid

Hur, J., Koo, D. Y. & Shin, Y. J., 2015 Jan 1, In : Applied Sciences (Switzerland). 5, 4, p. 1503-1527 25 p.

Research output: Contribution to journalArticle

Open Access
Smart meters
privacy
Authentication
preserving
grids
2014
1 Citation (Scopus)

An enhanced remote data checking scheme for dynamic updates

Dong, L., Park, J., Hur, J. & Park, H. H., 2014 Jan 1, In : KSII Transactions on Internet and Information Systems. 8, 5, p. 1744-1765 22 p.

Research output: Contribution to journalArticle

Communication
Degradation

Efficient and secure identity-based onion routing

Hur, J. & Noh, D. K., 2014 Aug 1, In : Journal of Research and Practice in Information Technology. 46, 2-3, p. 93-105 13 p.

Research output: Contribution to journalArticle

Routing protocols
Routers
Networks (circuits)
Communication
Costs
42 Citations (Scopus)

Secure data retrieval for decentralized disruption-tolerant military networks

Hur, J. & Kang, K., 2014 Feb 1, In : IEEE/ACM Transactions on Networking. 22, 1, p. 16-26 11 p., 6269094.

Research output: Contribution to journalArticle

Cryptography
Access control
2013
48 Citations (Scopus)

Attribute-based secure data sharing with hidden policies in smart grid

Hur, J., 2013 Oct 14, In : IEEE Transactions on Parallel and Distributed Systems. 24, 11, p. 2171-2180 10 p., 6613499.

Research output: Contribution to journalArticle

Intelligent networks
Data privacy
Wide area networks
Electric power transmission networks
Electric power distribution

Cross-layer analysis of protocol delay in mobile devices receiving BCMCS

Kang, K., Park, J. & Hur, J., 2013 Oct 1, In : Wireless Networks. 19, 7, p. 1497-1509 13 p.

Research output: Contribution to journalArticle

Mobile devices
Medium access control
Network protocols
3G mobile communication systems
Forward error correction
13 Citations (Scopus)

Design and QoS of a wireless system for real-time remote electrocardiography

Kang, K., Ryu, J., Hur, J. & Sha, L., 2013 Oct 14, In : IEEE Journal of Biomedical and Health Informatics. 17, 3, p. 745-755 11 p.

Research output: Contribution to journalArticle

Computer Systems
Electrocardiography
Quality of service
Physiologic Monitoring
Cardiac Arrhythmias
137 Citations (Scopus)

Improving security and efficiency in attribute-based data sharing

Hur, J., 2013 Sep 5, In : IEEE Transactions on Knowledge and Data Engineering. 25, 10, p. 2271-2282 12 p., 5740890.

Research output: Contribution to journalArticle

Cryptography
Security of data
Cloud computing
14 Citations (Scopus)

Removing escrow from ciphertext policy attribute-based encryption

Hur, J., Koo, D., Hwang, S. O. & Kang, K., 2013 May 1, In : Computers and Mathematics with Applications. 65, 9, p. 1310-1317 8 p.

Research output: Contribution to journalArticle

Open Access
Encryption
Cryptography
Attribute
Access control
Policy
53 Citations (Scopus)

Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage

Koo, D., Hur, J. & Yoon, H., 2013 Jan 1, In : Computers and Electrical Engineering. 39, 1, p. 34-46 13 p.

Research output: Contribution to journalArticle

Security of data
Information retrieval
Access control
Cryptography
Costs
2012
7 Citations (Scopus)

Authenticated public key broadcast encryption scheme secure against insiders' attack

Park, C., Hur, J., Hwang, S. & Yoon, H., 2012 Jan 1, In : Mathematical and Computer Modelling. 55, 1-2, p. 113-122 10 p.

Research output: Contribution to journalArticle

Open Access
Broadcast Encryption
Public Key Encryption
Cryptography
Attack
Authentication
10 Citations (Scopus)

Dependable and secure computing in medical information systems

Hur, J. & Kang, K., 2012 Dec 1, In : Computer Communications. 36, 1, p. 20-28 9 p.

Research output: Contribution to journalArticle

Medical information systems
Controllers
Access control
Alarm systems
Computational efficiency
7 Citations (Scopus)

Fine-grained user access control in ciphertext-policy attribute-based encryption

Hur, J., Park, C. & Hwang, S. O., 2012 Jan 1, In : Security and Communication Networks. 5, 3, p. 253-261 9 p.

Research output: Contribution to journalArticle

Access control
Cryptography
Scalability
41 Citations (Scopus)

Privacy-preserving identity-based broadcast encryption

Hur, J., Park, C. & Hwang, S. O., 2012 Oct 1, In : Information Fusion. 13, 4, p. 296-303 8 p.

Research output: Contribution to journalArticle

Cryptography
Broadcasting
Costs
4 Citations (Scopus)

Scalable and efficient approach for secure group communication using proxy cryptography

Shin, Y. & Hur, J., 2012 May 1, In : Wireless Networks. 18, 4, p. 413-425 13 p.

Research output: Contribution to journalArticle

Cryptography
Scalability
Communication
Data communication systems
1 Citation (Scopus)

Toward energy-efficient error control in 3G broadcast video

Kang, K., Ryu, J., Choi, S., Park, K. J. & Hur, J., 2012 Dec 1, In : IEEE Wireless Communications. 19, 6, p. 60-67 8 p., 6393519.

Research output: Contribution to journalArticle

Reed-Solomon codes
Mobile devices
Energy utilization
Defects
13 Citations (Scopus)

Using a dynamic backbone for efficient data delivery in solar-powered WSNs

Noh, D. K. & Hur, J., 2012 Jul 1, In : Journal of Network and Computer Applications. 35, 4, p. 1277-1284 8 p.

Research output: Contribution to journalArticle

Wireless sensor networks
Energy utilization
Solar energy
Topology
Availability
2011
347 Citations (Scopus)

Attribute-based access control with efficient revocation in data outsourcing systems

Hur, J. & Noh, D. K., 2011 May 3, In : IEEE Transactions on Parallel and Distributed Systems. 22, 7, p. 1214-1221 8 p., 5629339.

Research output: Contribution to journalArticle

Outsourcing
Access control
Cryptography
14 Citations (Scopus)

Fine-grained data access control for distributed sensor networks

Hur, J., 2011 Jul 1, In : Wireless Networks. 17, 5, p. 1235-1249 15 p.

Research output: Contribution to journalArticle

Access control
Sensor networks
Cryptography
Sensors
Sensor nodes
2010
5 Citations (Scopus)

A multi-service group key management scheme for stateless receivers in wireless mesh networks

Hur, J. & Yoon, H., 2010 Oct 1, In : Mobile Networks and Applications. 15, 5, p. 680-692 13 p.

Research output: Contribution to journalArticle

Wireless mesh networks (WMN)
Communication
Access control
Cryptography
Topology
4 Citations (Scopus)

Chosen ciphertext secure authenticated group communication using identity-based signcryption

Hur, J., Park, C. & Yoon, H., 2010 Jul 1, In : Computers and Mathematics with Applications. 60, 2, p. 362-375 14 p.

Research output: Contribution to journalArticle

Open Access
Signcryption
Group Communication
Identity-based
Receiver
Communication

Self-healing key distribution scheme with long service time

Park, C., Hur, J., Kweon, K. & Yoon, H., 2010 Jul 10, In : ieice electronics express. 7, 13, p. 913-919 7 p.

Research output: Contribution to journalArticle

Open Access
healing
Cryptography
Communication
attack
communication
2009
1 Citation (Scopus)

A decentralized multi-group key management scheme

Hur, J. & Yoon, H., 2009 Jan 1, In : IEICE Transactions on Communications. E92-B, 2, p. 632-635 4 p.

Research output: Contribution to journalArticle

Scalability
Communication
5 Citations (Scopus)

Improved batch exponentiation

Chung, B., Hur, J., Kim, H., Hong, S. M. & Yoon, H., 2009 Jul 16, In : Information Processing Letters. 109, 15, p. 832-837 6 p.

Research output: Contribution to journalArticle

Exponentiation
Batch
Workload
Exponent
2007
4 Citations (Scopus)

A new binary image authentication scheme with small distortion and low false negative rates

Lee, Y., Hur, J., Kim, H., Park, Y. & Yoon, H., 2007 Jan 1, In : IEICE Transactions on Communications. E90-B, 11, p. 3259-3262 4 p.

Research output: Contribution to journalArticle

Binary images
Authentication