• 1033 Citations
  • 16 h-Index
19962020

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

2020

A privacy-preserving authentication, authorization, and key agreement scheme for wireless sensor networks in 5G-integrated internet of things

Shin, S. & Kwon, T., 2020 Jan 1, In : IEEE Access. 8, p. 67555-67571 17 p., 9057455.

Research output: Contribution to journalArticle

Open Access
1 Citation (Scopus)
2019
Open Access
8 Citations (Scopus)

Detection of malicious packet dropping attacks in RPL-based internet of things

Shin, S., Kim, K. & Kwon, T., 2019 Jan 1, In : International Journal of Ad Hoc and Ubiquitous Computing. 31, 2, p. 133-141 9 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Draw It As Shown: Behavioral Pattern Lock for Mobile User Authentication

Ku, Y., Park, L. H., Shin, S. & Kwon, T., 2019 Jan 1, In : IEEE Access. 7, p. 69363-69378 16 p., 8721054.

Research output: Contribution to journalArticle

2 Citations (Scopus)

Intriguer: Field-level constraint solving for hybrid fuzzing

Cho, M., Kim, S. & Kwon, T., 2019 Nov 6, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 515-530 16 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Poster: Evaluating code coverage for system call fuzzers

Kim, S., Jeong, S., Cho, M., Chung, S. & Kwon, T., 2019 Nov 6, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 2689-2691 3 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Poster: Effective layers in coverage metrics for deep neural networks

Park, L. H., Oh, S., Kim, J., Chung, S. & Kwon, T., 2019 Nov 6, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 2681-2683 3 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Visual analytics and visualization for android security risk

Yoo, S., Ryu, H. R., Yeon, H., Kwon, T. & Jang, Y., 2019 Aug, In : Journal of Computer Languages. 53, p. 9-21 13 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)
2018

Data Transfusion: Pairing Wearable Devices and Its Implication on Security for Internet of Things

Lee, Y., Yang, W. & Kwon, T., 2018 Jul 21, In : IEEE Access. 6, p. 48994-49006 13 p., 8418356.

Research output: Contribution to journalArticle

Open Access
4 Citations (Scopus)

Glitch Recall: A Hardware Trojan Exploiting Natural Glitches in Logic Circuits

Joh, J., Seo, Y., Kim, H. K. & Kwon, T., 2018, Information Security Applications - 18th International Conference, WISA 2017, Revised Selected Papers. Kang, B. B. & Kim, T. (eds.). Springer Verlag, p. 150-161 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10763 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Round-reduced modular construction of asymmetric password-authenticated key exchange

Hwang, J. Y., Jarecki, S., Kwon, T., Lee, J., Shin, J. S. & Xu, J., 2018, Security and Cryptography for Networks - 11th International Conference, SCN 2018, Proceedings. Catalano, D. & De Prisco, R. (eds.). Springer Verlag, p. 485-504 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11035 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Two-factor authenticated key agreement supporting unlinkability in 5G-integrated wireless sensor networks

Shin, S. & Kwon, T., 2018 Jan 22, In : IEEE Access. 6, p. 11229-11241 13 p.

Research output: Contribution to journalArticle

Open Access
19 Citations (Scopus)
2017
5 Citations (Scopus)

Here is your fingerprint! actual risk versus user perception of latent fingerprints and smudges remaining on smartphones

Lee, H., Kim, S. & Kwon, T., 2017 Dec 4, Proceedings - 33rd Annual Computer Security Applications Conference, ACSAC 2017. Association for Computing Machinery, p. 512-527 16 p. (ACM International Conference Proceeding Series; vol. Part F132521).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Location-Based Key Management Strong Against Insider Threats in Wireless Sensor Networks

Choi, J., Bang, J., Kim, L., Ahn, M. & Kwon, T., 2017 Jun, In : IEEE Systems Journal. 11, 2, p. 494-502 9 p.

Research output: Contribution to journalArticle

15 Citations (Scopus)

Personal visual analytics for android security risk lifelog

Yoo, S., Ryu, H. R., Yeon, H., Kwon, T. & Jang, Y., 2017 Aug 14, VINCI 2017 - 10th International Symposium on Visual Information Communication and Interaction. Takahashi, S. & Li, J. (eds.). Association for Computing Machinery, p. 29-36 8 p. (ACM International Conference Proceeding Series; vol. Part F130152).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Poster: Rethinking fingerprint identification on smartphones

Kim, S., Lee, H. & Kwon, T., 2017 Oct 30, CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 2515-2517 3 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Poster:Watch out your smartwatch when paired

Lee, Y., Yang, W. S. & Kwon, T., 2017 Oct 30, CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 2527-2529 3 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

The fuzzing awakens: File format-aware mutational fuzzing on smartphone media server daemons

Shin, M. S., Yu, J. B., Yoon, Y. J. & Kwon, T., 2017 Jan 1, ICT Systems Security and Privacy Protection - 32nd IFIP TC 11 International Conference, SEC 2017, Proceedings. De Capitani di Vimercati, S. & Martinelli, F. (eds.). Springer New York LLC, p. 219-232 14 p. (IFIP Advances in Information and Communication Technology; vol. 502).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2016

Constructing efficient PAKE protocols from identity-based KEM/DEM

Choi, K. Y., Cho, J., Hwang, J. Y. & Kwon, T., 2016 Jan 1, Information Security Applications - 16th International Workshop, WISA 2015, Revised Selected Papers. Choi, D. & Kim, H-W. (eds.). Springer Verlag, p. 411-422 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9503).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

FlexiCast: Energy-Efficient Software Integrity Checks to Build Secure Industrial Wireless Active Sensor Networks

Lee, J., Kim, L. & Kwon, T., 2016 Feb, In : IEEE Transactions on Industrial Informatics. 12, 1, p. 6-14 9 p., 7208869.

Research output: Contribution to journalArticle

11 Citations (Scopus)

LinkA: A Link Layer Anonymization Method Based on Bloom Filter for Authenticated IoT Devices

Kim, M., Bang, J. & Kwon, T., 2016 Jul 2, In : Intelligent Automation and Soft Computing. 22, 3, p. 365-369 5 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)
3 Citations (Scopus)

SteganoPIN: Two-Faced Human-Machine Interface for Practical Enforcement of PIN Entry Security

Kwon, T. & Na, S., 2016 Feb, In : IEEE Transactions on Human-Machine Systems. 46, 1, p. 143-150 8 p., 7167675.

Research output: Contribution to journalArticle

9 Citations (Scopus)
2015

Analysis and improvement of a PIN-Entry method resilient to shoulder-surfing and recording attacks

Kwon, T. & Hong, J., 2015 Feb 1, In : IEEE Transactions on Information Forensics and Security. 10, 2, p. 278-292 15 p., A6.

Research output: Contribution to journalArticle

23 Citations (Scopus)

Identification of corrupted cloud storage in batch auditing for multi-cloud environments

Shin, S., Kim, S. & Kwon, T., 2015, Information and Communication Technology - 3rd IFIP TC 5/8 International Conference, ICT-EurAsia 2015 and 9th IFIP WG 8.9 Working Conference, CONFENIS 2015 Held as Part of WCC 2015, Proceedings. You, I., Xu, L. D., Neuhold, E., Tjoa, A. M. & Khalil, I. (eds.). Springer Verlag, p. 221-225 5 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9357).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)
2014

AAnA: Anonymous authentication and authorization based on short traceable signatures

Shin, S. & Kwon, T., 2014 Oct 1, In : International Journal of Information Security. 13, 5, p. 477-495 19 p.

Research output: Contribution to journalArticle

5 Citations (Scopus)

Covert attentional shoulder surfing: Human adversaries are more powerful than expected

Kwon, T., Shin, S. & Na, S., 2014 Jun, In : IEEE Transactions on Systems, Man, and Cybernetics: Systems. 44, 6, p. 716-727 12 p., 6814830.

Research output: Contribution to journalArticle

37 Citations (Scopus)

Drag-and-type: A new method for typing with virtual keyboards on small touchscreens

Kwon, T., Na, S. & Park, S. H., 2014 Feb, In : IEEE Transactions on Consumer Electronics. 60, 1, p. 99-106 8 p., 6780931.

Research output: Contribution to journalArticle

7 Citations (Scopus)
5 Citations (Scopus)

RIK: A virtual keyboard resilient to spyware in smartphones

Na, S. & Kwon, T., 2014 Jan 1, 2014 IEEE International Conference on Consumer Electronics, ICCE 2014. Institute of Electrical and Electronics Engineers Inc., p. 21-22 2 p. 6775891. (Digest of Technical Papers - IEEE International Conference on Consumer Electronics).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

SwitchPIN: Securing smartphone PIN entry with switchable keypads

Kwon, T. & Na, S., 2014 Jan 1, 2014 IEEE International Conference on Consumer Electronics, ICCE 2014. Institute of Electrical and Electronics Engineers Inc., p. 23-24 2 p. 6775892

Research output: Chapter in Book/Report/Conference proceedingConference contribution

11 Citations (Scopus)

TinyLock: Affordable defense against smudge attacks on smartphone pattern lock systems

Kwon, T. & Na, S., 2014 May, In : Computers and Security. 42, p. 137-150 14 p.

Research output: Contribution to journalArticle

43 Citations (Scopus)

Touch pointer: Rethink point-and-click for accurate indirect touch interactions on small touchscreens

Kwon, T., Na, S. & Shin, S., 2014 Aug 1, In : IEEE Transactions on Consumer Electronics. 60, 3, p. 285-293 9 p., 6937310.

Research output: Contribution to journalArticle

2 Citations (Scopus)
2013

Classification and experimental analysis for clone detection approaches in wireless sensor networks

Cho, K., Jo, M., Kwon, T., Chen, H. H. & Lee, D. H., 2013 Jan 1, In : IEEE Systems Journal. 7, 1, p. 26-35 10 p., 6175923.

Research output: Contribution to journalArticle

22 Citations (Scopus)

Drag-And-Type: A new method for typing with virtual keyboards on small touchscreens

Kwon, T., Na, S. & Park, S. H., 2013 Apr 24, 2013 IEEE International Conference on Consumer Electronics, ICCE 2013. p. 458-459 2 p. 6486974

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Touch pointer: Rethink point-and-click for accurate indirect touch interactions on small touchscreens

Kwon, T., Na, S. & Shin, S., 2013 Apr 24, 2013 IEEE International Conference on Consumer Electronics, ICCE 2013. p. 598-599 2 p. 6487034. (Digest of Technical Papers - IEEE International Conference on Consumer Electronics).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)
2011

Fast exponentiation using split exponents

Cheon, J. H., Jarecki, S., Kwon, T. & Lee, M. K., 2011 Mar 1, In : IEEE Transactions on Information Theory. 57, 3, p. 1816-1826 11 p., 5714254.

Research output: Contribution to journalArticle

4 Citations (Scopus)

Privacy preservation with X.509 standard certificates

Kwon, T., 2011 Jul 1, In : Information sciences. 181, 13, p. 2906-2921 16 p.

Research output: Contribution to journalArticle

16 Citations (Scopus)

Secure authentication scheme with improved anonymity for wireless environments

Lee, J. H. & Kwon, T. Y., 2011 Feb, In : IEICE Transactions on Communications. E94-B, 2, p. 554-557 4 p.

Research output: Contribution to journalArticle

6 Citations (Scopus)
2010

An experimental study of hierarchical intrusion detection for wireless industrial sensor networks

Shin, S., Kwon, T., Jo, G. Y., Park, Y. & Rhy, H., 2010 Nov 1, In : IEEE Transactions on Industrial Informatics. 6, 4, p. 744-757 14 p., 5560697.

Research output: Contribution to journalArticle

113 Citations (Scopus)

A study of mobile proxy for privacy enhancement

Kim, E., Kwon, T. & Yi, J. H., 2010 Apr 1, ICCE 2010 - 2010 Digest of Technical Papers International Conference on Consumer Electronics. p. 177-178 2 p. 5418783. (ICCE 2010 - 2010 Digest of Technical Papers International Conference on Consumer Electronics).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Group connectivity model for industrial wireless sensor networks

Lee, J., Kwon, T. & Song, J., 2010 May 1, In : IEEE Transactions on Industrial Electronics. 57, 5, p. 1835-1844 10 p., 5280194.

Research output: Contribution to journalArticle

47 Citations (Scopus)

Secure and efficient broadcast authentication in wireless sensor networks

Kwon, T. & Hong, J., 2010 Jul 6, In : IEEE Transactions on Computers. 59, 8, p. 1120-1133 14 p., 5313804.

Research output: Contribution to journalArticle

47 Citations (Scopus)
2009

Location-based pairwise key predistribution for wireless sensor networks

Kwon, T., Lee, J. & Song, J., 2009 Nov 1, In : IEEE Transactions on Wireless Communications. 8, 11, p. 5436-5442 7 p., 5336767.

Research output: Contribution to journalArticle

26 Citations (Scopus)

On the privacy-preserving HCI issues

Kwon, T., Lee, J. & Song, J., 2009 Dec 1, Universal Access in Human-Computer Interaction: Addressing Diversity - 5th International Conference, UAHCI 2009, Held as Part of HCI International 2009, Proceedings. PART 1 ed. p. 544-549 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5614 LNCS, no. PART 1).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)
2008

Biometric authentication for border control applications

Kwon, T. & Moon, H., 2008 Aug 1, In : IEEE Transactions on Knowledge and Data Engineering. 20, 8, p. 1091-1096 6 p., 4384481.

Research output: Contribution to journalArticle

9 Citations (Scopus)

Efficient flexible batch signing techniques for imbalanced communication applications

Youn, T. Y., Park, Y. H., Kwon, T., Kwon, S. & Lim, J., 2008 May, In : IEICE Transactions on Information and Systems. E91-D, 5, p. 1481-1484 4 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)