[go: up one dir, main page]

Follow
Taekyoung Kwon
Taekyoung Kwon
Verified email at yonsei.ac.kr - Homepage
Title
Cited by
Cited by
Year
Strong and robust RFID authentication enabling perfect ownership transfer
CH Lim, T Kwon
International conference on information and communications security, 1-20, 2006
2412006
An experimental study of hierarchical intrusion detection for wireless industrial sensor networks
S Shin, T Kwon, GY Jo, Y Park, H Rhy
IEEE transactions on industrial informatics 6 (4), 744-757, 2010
1952010
A privacy-preserving authentication, authorization, and key agreement scheme for wireless sensor networks in 5G-integrated Internet of Things
S Shin, T Kwon
IEEE access 8, 67555-67571, 2020
1402020
Authentication and key agreement via memorable password
T Kwon
NDSS (Network and Distributed System Security) Symposium, 2001
1372001
Covert attentional shoulder surfing: Human adversaries are more powerful than expected
T Kwon, S Shin, S Na
IEEE Transactions on Systems, Man, and Cybernetics: Systems 44 (6), 716-727, 2013
1062013
TinyLock: Affordable defense against smudge attacks on smartphone pattern lock systems
T Kwon, S Na
Computers & Security 42, 137-150, 2014
922014
A lightweight three-factor authentication and key agreement scheme in wireless sensor networks for smart homes
S Shin, T Kwon
Sensors 19 (9), 2012, 2019
782019
Intriguer: Field-level constraint solving for hybrid fuzzing
M Cho, S Kim, T Kwon
ACM CCS (Conference on Computer and Communications Security), 515-530, 2019
762019
Two-factor authenticated key agreement supporting unlinkability in 5G-integrated wireless sensor networks
S Shin, T Kwon
IEEE Access 6, 11229-11241, 2018
762018
Secure and efficient broadcast authentication in wireless sensor networks
T Kwon, J Hong
IEEE Transactions on Computers 59 (8), 1120-1133, 2009
762009
Analysis and improvement of a pin-entry method resilient to shoulder-surfing and recording attacks
T Kwon, J Hong
IEEE Transactions on Information Forensics and Security 10 (2), 278-292, 2014
732014
Group connectivity model for industrial wireless sensor networks
JH Lee, T Kwon, JS Song
IEEE Transactions on Industrial Electronics 57 (5), 1835-1844, 2009
692009
A time-based key management protocol for wireless sensor networks
J Jang, T Kwon, J Song
International conference on information security practice and experience …, 2007
682007
Location-based key management strong against insider threats in wireless sensor networks
J Choi, J Bang, LH Kim, M Ahn, T Kwon
IEEE Systems Journal 11 (2), 494-502, 2015
642015
An improvement of the password-based authentication protocol (K1P) on security against replay attacks
T Kwon, M Kang, S Jung, J Song
IEICE Transactions on Communications 82 (7), 991-997, 1999
631999
Draw it as shown: Behavioral pattern lock for mobile user authentication
Y Ku, LH Park, S Shin, T Kwon
IEEE Access 7, 69363-69378, 2019
552019
Secure agreement scheme for gxy via password authentication
Kwon, Song
Electronics Letters 35 (11), 892-893, 1999
541999
Classification and experimental analysis for clone detection approaches in wireless sensor networks
K Cho, M Jo, T Kwon, HH Chen, DH Lee
IEEE Systems Journal 7 (1), 26-35, 2012
462012
An adaptable and reliable authentication protocol for communication networks
T Kwon, M Kang, J Song
IEEE INFOCOM'97 2, 737-744, 1997
411997
A bitstream reverse engineering tool for FPGA hardware trojan detection
J Yoon, Y Seo, J Jang, M Cho, JG Kim, HS Kim, T Kwon
Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
402018
The system can't perform the operation now. Try again later.
Articles 1–20