default search action
Jung Yeon Hwang
Person information
- affiliation: Electronics and Telecommunications Research Institute (ETRI), Daejeon, South Korea
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j39]Jung Yeon Hwang:
Dynamic Anonymous Credential Systems With Controllable Anonymity and Unlinkability. IEEE Access 11: 142015-142029 (2023) - 2022
- [j38]Jingyeom Kim, Doyeon Kim, Joohyung Lee, Jungyeon Hwang:
A Novel Joint Dataset and Computation Management Scheme for Energy-Efficient Federated Learning in Mobile Edge Computing. IEEE Wirel. Commun. Lett. 11(5): 898-902 (2022) - 2021
- [j37]Ji Young Chun, Soohyung Kim, Jung Yeon Hwang:
Comments on "Identity-Based Revocation From Subset Difference Methods Under Simple Assumptions". IEEE Access 9: 62038-62042 (2021) - [j36]Ji Sun Shin, Minjae Jo, Jung Yeon Hwang, Jaehwan Lee:
A Verifier-Based Password-Authenticated Key Exchange Using Tamper-Proof Hardware. Comput. J. 64(8): 1293-1302 (2021) - [j35]Yen-Lung Lai, Jung Yeon Hwang, Zhe Jin, Soohyong Kim, Sangrae Cho, Andrew Beng Jin Teoh:
Secure Secret Sharing Enabled b-band Mini Vaults Bio-Cryptosystem for Vectorial Biometrics. IEEE Trans. Dependable Secur. Comput. 18(1): 58-71 (2021) - [j34]Xingbo Dong, Soohyong Kim, Zhe Jin, Jung Yeon Hwang, Sangrae Cho, Andrew Beng Jin Teoh:
Secure Chaff-less Fuzzy Vault for Face Identification Systems. ACM Trans. Multim. Comput. Commun. Appl. 17(3): 79:1-79:22 (2021) - [j33]Yong-Jun Seo, Joohyung Lee, Jungyeon Hwang, Dusit Niyato, Hong-Shik Park, Jun Kyun Choi:
A Novel Joint Mobile Cache and Power Management Scheme for Energy-Efficient Mobile Augmented Reality Service in Mobile Edge Computing. IEEE Wirel. Commun. Lett. 10(5): 1061-1065 (2021) - [j32]Sanghyun Lee, Joohyung Lee, Jungyeon Hwang, Jun Kyun Choi:
A Novel Deep Learning-Based IoT Device Transmission Interval Management Scheme for Enhanced Scalability in LoRa Networks. IEEE Wirel. Commun. Lett. 10(11): 2538-2542 (2021) - 2020
- [j31]Sung-Hoon Lee, Seung-Hyun Kim, Jung Yeon Hwang, Soohyung Kim, Seung-Hun Jin:
Is Your Android App Insecure? Patching Security Functions With Dynamic Policy Based on a Java Reflection Technique. IEEE Access 8: 83248-83264 (2020) - [j30]Xingbo Dong, Soohyung Kim, Zhe Jin, Jung Yeon Hwang, Sangrae Cho, Andrew Beng Jin Teoh:
Open-set face identification with index-of-max hashing by learning. Pattern Recognit. 103: 107277 (2020)
2010 – 2019
- 2019
- [j29]Minhye Seo, Jung Yeon Hwang, Dong Hoon Lee, Soohyung Kim, Seung-Hyun Kim, Jong Hwan Park:
Fuzzy Vector Signature and Its Application to Privacy-Preserving Authentication. IEEE Access 7: 69892-69906 (2019) - [j28]Hyunil Kim, Seung-Hyun Kim, Jung Yeon Hwang, Changho Seo:
Efficient Privacy-Preserving Machine Learning for Blockchain Network. IEEE Access 7: 136481-136495 (2019) - [j27]Yen-Lung Lai, Jung Yeon Hwang, Zhe Jin, Soohyong Kim, Sangrae Cho, Andrew Beng Jin Teoh:
Symmetric keyring encryption scheme for biometric cryptosystem. Inf. Sci. 502: 492-509 (2019) - [j26]Hyun-Gu Lee, Jung Yeon Hwang, Shincheol Lee, Dong In Kim, Sung-Hoon Lee, Jaehwan Lee, Ji Sun Shin:
A parameterized model to select discriminating features on keystroke dynamics authentication on smartphones. Pervasive Mob. Comput. 54: 45-57 (2019) - [c21]Tae Yeon Kim, Pyungkoo Park, Hosun Yoon, Sung Hyun Yoon, Jung Yeon Hwang, Sungback Hong:
Viewpoint Networking for Trusted Reality. ICUFN 2019: 538-540 - [i4]Jeonghyuk Lee, Jungyeon Hwang, Jaekyung Choi, Hyunok Oh, Jihye Kim:
SIMS : Self Sovereign Identity Management System with Preserving Privacy in Blockchain. IACR Cryptol. ePrint Arch. 2019: 1241 (2019) - 2018
- [j25]Hyun-Gu Lee, Jung Yeon Hwang, Dong In Kim, Shincheol Lee, Sung-Hoon Lee, Ji Sun Shin:
Understanding Keystroke Dynamics for Smartphone Users Authentication and Keystroke Dynamics on Smartphones Built-In Motion Sensors. Secur. Commun. Networks 2018: 2567463:1-2567463:10 (2018) - [j24]Minhye Seo, Jong Hwan Park, Youngsam Kim, Sangrae Cho, Dong Hoon Lee, Jung Yeon Hwang:
Construction of a New Biometric-Based Key Derivation Function and Its Application. Secur. Commun. Networks 2018: 6107912:1-6107912:14 (2018) - [j23]Zhe Jin, Jung Yeon Hwang, Yen-Lung Lai, Soohyung Kim, Andrew Beng Jin Teoh:
Ranking-Based Locality Sensitive Hashing-Enabled Cancelable Biometrics: Index-of-Max Hashing. IEEE Trans. Inf. Forensics Secur. 13(2): 393-407 (2018) - [c20]Jung Yeon Hwang, Stanislaw Jarecki, Taekyoung Kwon, Joohee Lee, Ji Sun Shin, Jiayu Xu:
Round-Reduced Modular Construction of Asymmetric Password-Authenticated Key Exchange. SCN 2018: 485-504 - [i3]Yen-Lung Lai, Jung Yeon Hwang, Zhe Jin, Soohyong Kim, Sangrae Cho, Andrew Beng Jin Teoh:
A Symmetric Keyring Encryption Scheme for Biometric Cryptosystems. CoRR abs/1809.11045 (2018) - 2017
- [j22]Jung Yeon Hwang, Boyeon Song, Daeseon Choi, Seung-Hun Jin, Hyun Sook Cho, Mun-Kyu Lee:
Simplified small exponent test for batch verification. Theor. Comput. Sci. 662: 48-58 (2017) - [c19]Zhe Jin, Jung Yeon Hwang, Soohyung Kim, Sangrae Cho, Yen-Lung Lai, Andrew Beng Jin Teoh:
A Cancellable Ranking Based Hashing Method for Fingerprint Template Protection. MONAMI 2017: 378-389 - [i2]Zhe Jin, Yen-Lung Lai, Jung Yeon Hwang, Soohyung Kim, Andrew Beng Jin Teoh:
A New and Practical Design of Cancellable Biometrics: Index-of-Max Hashing. CoRR abs/1703.05455 (2017) - 2016
- [j21]Jung Yeon Hwang, Sungwook Eom, Ku-Young Chang, Pil Joong Lee, DaeHun Nyang:
Anonymity-based authenticated key agreement with full binding property. J. Commun. Networks 18(2): 190-200 (2016) - 2015
- [j20]Jung Yeon Hwang, Ku-Young Chang, Hyun Sook Cho, Boyeon Song, Willy Susilo:
Collusion-resistant convertible ring signature schemes. Sci. China Inf. Sci. 58(1): 1-16 (2015) - [j19]Jung Yeon Hwang, Dooho Choi, Hyun Sook Cho, Boyeon Song:
New efficient batch verification for an identity-based signature scheme. Secur. Commun. Networks 8(15): 2524-2535 (2015) - [j18]Jung Yeon Hwang, Liqun Chen, Hyun Sook Cho, DaeHun Nyang:
Short Dynamic Group Signature Scheme Supporting Controllable Linkability. IEEE Trans. Inf. Forensics Secur. 10(6): 1109-1124 (2015) - [c18]Jung Yeon Hwang, Seung-Hyun Kim, Daeseon Choi, Seung-Hun Jin, Boyeon Song:
Robust Authenticated Key Exchange Using Passwords and Identity-Based Signatures. SSR 2015: 43-69 - [c17]Kyu Young Choi, Jihoon Cho, Jung Yeon Hwang, Taekyoung Kwon:
Constructing Efficient PAKE Protocols from Identity-Based KEM/DEM. WISA 2015: 411-422 - [i1]Kyu Young Choi, Jihoon Cho, Jung Yeon Hwang, Taekyoung Kwon:
Constructing Efficient PAKE Protocols from Identity-Based KEM/DEM. IACR Cryptol. ePrint Arch. 2015: 606 (2015) - 2014
- [j17]Jung Yeon Hwang, Hyoung Joong Kim, Dong Hoon Lee, Boyeon Song:
An enhanced (t, n) threshold directed signature scheme. Inf. Sci. 275: 284-292 (2014) - 2013
- [j16]Jung Yeon Hwang, Sokjoon Lee, Byung-Ho Chung, Hyun Sook Cho, DaeHun Nyang:
Group signatures with controllable linkability for dynamic membership. Inf. Sci. 222: 761-778 (2013) - 2012
- [j15]Seung-Hyun Seo, Kyu Young Choi, Jung Yeon Hwang, Seungjoo Kim:
Efficient certificateless proxy signature scheme with provable security. Inf. Sci. 188: 322-337 (2012) - [j14]JuHee Ki, Jung Yeon Hwang, Dong Hoon Lee:
Identity-Based Ring Signature Schemes for Multiple Domains. KSII Trans. Internet Inf. Syst. 6(10): 2692-2707 (2012) - [c16]Jung Yeon Hwang, Sungwook Eom, Ku-Young Chang, Pil Joong Lee, DaeHun Nyang:
Anonymity-Based Authenticated Key Agreement with Full Binding Property. WISA 2012: 177-191 - 2011
- [j13]Boyeon Song, Jung Yeon Hwang, Kyung-Ah Shim:
Security Improvement of an RFID Security Protocol of ISO/IEC WD 29167-6. IEEE Commun. Lett. 15(12): 1375-1377 (2011) - [j12]Ji Young Chun, Jung Yeon Hwang, Dong Hoon Lee:
RFID tag search protocol preserving privacy of mobile reader holders. IEICE Electron. Express 8(2): 50-56 (2011) - [j11]Jung Yeon Hwang:
A note on an identity-based ring signature scheme with signer verifiability. Theor. Comput. Sci. 412(8-10): 796-804 (2011) - [c15]JuHee Ki, Jung Yeon Hwang, DaeHun Nyang, Dong Hoon Lee, Jongin Lim:
Privacy-Enhanced Deniable Authentication E-Mail Service. DEIS 2011: 16-29 - 2010
- [c14]Hyeran Mun, Sinhyo Kim, Jung Yeon Hwang, Byung-Ho Chung:
A Privacy-Enhanced Contents Sharing Mechanism with Secure Removable Media(SRM). MUE 2010: 1-5
2000 – 2009
- 2009
- [j10]Jung Yeon Hwang, Taek-Young Youn, Willy Susilo:
Security Vulnerability of ID-Based Key Sharing Schemes. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(10): 2641-2643 (2009) - [j9]Seung Geol Choi, Javier Herranz, Dennis Hofheinz, Jung Yeon Hwang, Eike Kiltz, Dong Hoon Lee, Moti Yung:
The Kurosawa-Desmedt key encapsulation is not chosen-ciphertext secure. Inf. Process. Lett. 109(16): 897-901 (2009) - [j8]Woo Kwon Koo, Jung Yeon Hwang, Dong Hoon Lee:
Security vulnerability in a non-interactive ID-based proxy re-encryption scheme. Inf. Process. Lett. 109(23-24): 1260-1262 (2009) - [j7]Jung Yeon Hwang, Ji Young Chun, Dong Hoon Lee:
A note on leakage-resilient authenticated key exchange. IEEE Trans. Wirel. Commun. 8(5): 2274-2279 (2009) - [j6]Jung Yeon Hwang, Ji Young Chun, Dong Hoon Lee:
Weaknesses in the Hur-Shin-Yoon decentralized group key management. Wirel. Commun. Mob. Comput. 9(12): 1565-1571 (2009) - [c13]Ji Young Chun, Yong Ho Kim, Jung Yeon Hwang, Dong Hoon Lee:
Security Enhancing Compiler for Localization Schemes in Pervasive Sensor Networks. ACIS-ICIS 2009: 307-312 - [c12]Jung Yeon Hwang, Dong Hoon Lee, Moti Yung:
Universal forgery of the identity-based sequential aggregate signature scheme. AsiaCCS 2009: 157-160 - [c11]Bongen Gu, Yun-Sik Kwak, Seung-Kook Cheong, Jung-Yeon Hwang, Kijeong Khil:
Configurations of Dual RAID System. FGIT-FGCN 2009: 517-521 - 2008
- [j5]Jung Yeon Hwang, Kyu Young Choi, Dong Hoon Lee:
Security weakness in an authenticated group key agreement protocol in two rounds. Comput. Commun. 31(15): 3719-3724 (2008) - [j4]Seung-Hyun Seo, Jung Yeon Hwang, Kyu Young Choi, Dong Hoon Lee:
Identity-based universal designated multi-verifiers signature schemes. Comput. Stand. Interfaces 30(5): 288-295 (2008) - [j3]Kyu Young Choi, Jung Yeon Hwang, Dong Hoon Lee:
ID-Based Authenticated Group Key Agreement Secure against Insider Attacks. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(7): 1828-1830 (2008) - [j2]Jung Yeon Hwang, Jongin Lim, Dong Hoon Lee:
Impersonation Attack on a Strong ID-Based Key Distribution. IEICE Trans. Commun. 91-B(8): 2702-2703 (2008) - [c10]Kwangsu Lee, Jung Yeon Hwang, Dong Hoon Lee:
Non-interactive Identity-Based DNF Signature Scheme and Its Extensions. ICISC 2008: 166-183 - 2007
- [c9]Kyu Young Choi, Jong Hwan Park, Jung Yeon Hwang, Dong Hoon Lee:
Efficient Certificateless Signature Schemes. ACNS 2007: 443-458 - [c8]Jong Hwan Park, Kyu Young Choi, Jung Yeon Hwang, Dong Hoon Lee:
Certificateless Public Key Encryption in the Selective-ID Security Model (Without Random Oracles). Pairing 2007: 60-82 - 2005
- [j1]Jeong Ok Kwon, Jung Yeon Hwang, Changwook Kim, Dong Hoon Lee:
Cryptanalysis of Lee-Kim-Yoo password-based key agreement scheme. Appl. Math. Comput. 168(2): 858-865 (2005) - [c7]Kyu Young Choi, Jung Yeon Hwang, Dong Hoon Lee, In Seog Seo:
ID-based Authenticated Key Agreement for Low-Power Mobile Devices. ACISP 2005: 494-505 - [c6]Jung Yeon Hwang, Dong Hoon Lee, Jongin Lim:
Generic Transformation for Scalable Broadcast Encryption Schemes. CRYPTO 2005: 276-292 - [c5]Nam-Su Jho, Jung Yeon Hwang, Jung Hee Cheon, Myung-Hwan Kim, Dong Hoon Lee, Eun Sun Yoo:
One-Way Chain Based Broadcast Encryption Schemes. EUROCRYPT 2005: 559-574 - 2004
- [c4]Kyu Young Choi, Jung Yeon Hwang, Dong Hoon Lee:
Efficient ID-based Group Key Agreement with Bilinear Maps. Public Key Cryptography 2004: 130-144 - [c3]Su-Mi Lee, Jung Yeon Hwang, Dong Hoon Lee:
Efficient Password-Based Group Key Exchange. TrustBus 2004: 191-199 - 2003
- [c2]Jung Yeon Hwang, Hyun-Jeong Kim, Dong Hoon Lee, Jong In Lim:
Digital Signature Schemes with Restriction on Signing Capability. ACISP 2003: 324-335 - [c1]Eun Young Choi, Jung Yeon Hwang, Dong Hoon Lee:
An Anonymous Asymmetric Public Key Traitor Tracing Scheme. EC-Web 2003: 104-114
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 21:11 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint