• 1037 Citations
  • 16 h-Index
19962020

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

AAnA: Anonymous authentication and authorization based on short traceable signatures

Shin, S. & Kwon, T., 2014 Oct 1, In : International Journal of Information Security. 13, 5, p. 477-495 19 p.

Research output: Contribution to journalArticle

6 Citations (Scopus)

Adaptable and reliable authentication protocol for communication networks

Kwon, T., Kang, M. & Song, J., 1997, In : Proceedings - IEEE INFOCOM. 2, p. 737-744 8 p.

Research output: Contribution to journalConference article

26 Citations (Scopus)
Open Access
8 Citations (Scopus)

A model for embedding and authorizing digital signatures in printed documents

Lee, J. I., Kwon, T., Song, S. & Song, J., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Lee, P. J. & Lim, C. H. (eds.). Springer Verlag, p. 465-477 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2587).

Research output: Chapter in Book/Report/Conference proceedingChapter

Analysis and improvement of a PIN-Entry method resilient to shoulder-surfing and recording attacks

Kwon, T. & Hong, J., 2015 Feb 1, In : IEEE Transactions on Information Forensics and Security. 10, 2, p. 278-292 15 p., A6.

Research output: Contribution to journalArticle

24 Citations (Scopus)

An authentication scheme based upon face recognition for the mobile environment

Kim, Y. G. & Kwon, T., 2005, Computational and Information Science - 1st International Symposium, CIS 2004, Proceedings. Zhang, J., He, J-H. & Fu, Y. (eds.). Springer Verlag, p. 274-279 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3314 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

An efficient message broadcast authentication scheme for sensor networks

Park, S. H. & Kwon, T., 2005, Computational Intelligence and Security - International Conference, CIS 2005, Proceedings. Springer Verlag, p. 427-432 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3802 LNAI).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

An experimental study of hierarchical intrusion detection for wireless industrial sensor networks

Shin, S., Kwon, T., Jo, G. Y., Park, Y. & Rhy, H., 2010 Nov, In : IEEE Transactions on Industrial Informatics. 6, 4, p. 744-757 14 p., 5560697.

Research output: Contribution to journalArticle

113 Citations (Scopus)

An improved fingerprint-based remote user authentication scheme using smart cards

Lee, Y. & Kwon, T., 2006, Computational Science and Its Applications - ICCSA 2006: International Conference, Proceedings - Part II. Springer Verlag, p. 915-922 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3981 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

An improvement of the password-based authentication protocol (KIP) on security against replay attacks

Kwon, T., Kang, M., Jung, S. & Song, J., 1999, In : IEICE Transactions on Communications. E82-B, 7, p. 991-997 7 p.

Research output: Contribution to journalArticle

48 Citations (Scopus)

A practical method for generating digital signatures using biometrics

Kwon, T., Lee, H. W. & Lee, J. I., 2007 Jun, In : IEICE Transactions on Communications. E90-B, 6, p. 1381-1389 9 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)

A privacy-preserving authentication, authorization, and key agreement scheme for wireless sensor networks in 5G-integrated internet of things

Shin, S. & Kwon, T., 2020, In : IEEE Access. 8, p. 67555-67571 17 p., 9057455.

Research output: Contribution to journalArticle

Open Access
1 Citation (Scopus)

A study of mobile proxy for privacy enhancement

Kim, E., Kwon, T. & Yi, J. H., 2010, ICCE 2010 - 2010 Digest of Technical Papers International Conference on Consumer Electronics. p. 177-178 2 p. 5418783. (ICCE 2010 - 2010 Digest of Technical Papers International Conference on Consumer Electronics).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

A study on the generalized key agreement and password authentication protocol

Kwon, T., 2000, In : IEICE Transactions on Communications. E83-B, 9, p. 2044-2050 7 p.

Research output: Contribution to journalArticle

13 Citations (Scopus)

A time-based key management protocol for wireless sensor networks

Jang, J., Kwon, T. & Song, J., 2007, Information Security Practice and Experience - Third International Conference, ISPEC 2007, Proceedings. Springer Verlag, p. 314-328 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4464 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

32 Citations (Scopus)

Authenticated key agreement without subgroup element verification

Kwon, T., 2005, In : Lecture Notes in Computer Science. 3480, I, p. 577-583 7 p.

Research output: Contribution to journalConference article

Authenticated key exchange protocols resistant to password guessing attacks

Kwon, T. & Song, J., 1998, In : IEE Proceedings: Communications. 145, 5, p. 304-308 5 p.

Research output: Contribution to journalArticle

22 Citations (Scopus)

Automation-considered logic of authentication and key distribution

Kwon, T. & Lim, S., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Chae, K. & Yung, M. (eds.). Springer Verlag, p. 442-457 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2908).

Research output: Chapter in Book/Report/Conference proceedingChapter

Biometric authentication for border control applications

Kwon, T. & Moon, H., 2008 Aug, In : IEEE Transactions on Knowledge and Data Engineering. 20, 8, p. 1091-1096 6 p., 4384481.

Research output: Contribution to journalArticle

9 Citations (Scopus)

Biometric digital key mechanisms for telebiometric authentication based on biometric certificate

Lee, H. W. & Kwon, T., 2007, Universal Access in Human-Computer Interaction: Coping with Diversity - 4th International Conference on Universal Access in Human-Computer Interaction, UAHCI 2007. Held as Part of HCI Int. 2007 Proc.. PART 1 ed. Springer Verlag, p. 428-437 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4554 LNCS, no. PART 1).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Biometric person authentication for access control scenario based on face recognition

Moon, H. & Kwon, T., 2007, Universal Access in Human-Computer Interaction: Coping with Diversity - 4th International Conference on Universal Access in Human-Computer Interaction, UAHCI 2007. Held as Part of HCI Int. 2007 Proc.. PART 1 ed. Springer Verlag, p. 463-472 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4554 LNCS, no. PART 1).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Clarifying straight replays and forced delays

Kwon, T. & Song, J., 1999 Jan, In : Operating Systems Review (ACM). 33, 1, p. 47-52 6 p.

Research output: Contribution to journalArticle

6 Citations (Scopus)

Classification and experimental analysis for clone detection approaches in wireless sensor networks

Cho, K., Jo, M., Kwon, T., Chen, H. H. & Lee, D. H., 2013, In : IEEE Systems Journal. 7, 1, p. 26-35 10 p., 6175923.

Research output: Contribution to journalArticle

23 Citations (Scopus)

Cluster-based certificate chain for mobile ad hoc networks

Hahn, G., Kwon, T., Kim, S. & Song, J., 2006, Computational Science and Its Applications - ICCSA 2006: International Conference, Proceedings - Part II. Springer Verlag, p. 769-778 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3981 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Citations (Scopus)

Constructing efficient PAKE protocols from identity-based KEM/DEM

Choi, K. Y., Cho, J., Hwang, J. Y. & Kwon, T., 2016, Information Security Applications - 16th International Workshop, WISA 2015, Revised Selected Papers. Choi, D. & Kim, H-W. (eds.). Springer Verlag, p. 411-422 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9503).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Content distribution system based on MPEG-4 ISMACryp in set-top box environments

Park, S. H., Jeong, J. & Kwon, T., 2006, 2006 Digest of Technical Papers - International Conference on Consumer Electronics, ICCE '06. p. 235-236 2 p. 1598397. (Digest of Technical Papers - IEEE International Conference on Consumer Electronics; vol. 2006).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Contents distribution system based on MPEG-4 ISMACryp in IP set-top box environments

Park, S. H., Jeong, J. & Kwon, T., 2006 May, In : IEEE Transactions on Consumer Electronics. 52, 2, p. 660-668 9 p.

Research output: Contribution to journalArticle

12 Citations (Scopus)

Covert attentional shoulder surfing: Human adversaries are more powerful than expected

Kwon, T., Shin, S. & Na, S., 2014 Jun, In : IEEE Transactions on Systems, Man, and Cybernetics: Systems. 44, 6, p. 716-727 12 p., 6814830.

Research output: Contribution to journalArticle

37 Citations (Scopus)

Data Transfusion: Pairing Wearable Devices and Its Implication on Security for Internet of Things

Lee, Y., Yang, W. & Kwon, T., 2018 Jul 21, In : IEEE Access. 6, p. 48994-49006 13 p., 8418356.

Research output: Contribution to journalArticle

Open Access
4 Citations (Scopus)

Deriving the virtual world from wireless sensor networks for interaction with consumer electronic devices

Kwon, T. & Choi, S. M., 2007, Digest of Technical Papers - 2007 International Conference on Consumer Electronics, ICCE 2007. 4146240. (Digest of Technical Papers - IEEE International Conference on Consumer Electronics).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Design and analysis of improved gsm authentication protocol for roaming users

Hahn, G., Kwon, T., Kim, S. & Song, J., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Jin, H., Chen, H., Gao, G. R. & Xu, Z. (eds.). Springer Verlag, p. 451-458 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3222).

Research output: Chapter in Book/Report/Conference proceedingChapter

Open Access
3 Citations (Scopus)

Design of service feature interaction manager in AIN

Song, J., Kang, M., Kwon, T., Yang, C., Hong, S., Kim, T. & Choi, G., 1996, p. 6. 6 p.

Research output: Contribution to conferencePaper

Detection of malicious packet dropping attacks in RPL-based internet of things

Shin, S., Kim, K. & Kwon, T., 2019, In : International Journal of Ad Hoc and Ubiquitous Computing. 31, 2, p. 133-141 9 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Digital signature algorithm for securing digital identities

Kwon, T., 2002 Jun 15, In : Information Processing Letters. 82, 5, p. 247-252 6 p.

Research output: Contribution to journalArticle

5 Citations (Scopus)

Domain-based proxy for efficient location tracking of mobile agents

Song, S. & Kwon, T., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Jin, H., Chen, H., Gao, G. R. & Xu, Z. (eds.). Springer Verlag, p. 205-212 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3222).

Research output: Chapter in Book/Report/Conference proceedingChapter

Open Access

Drag-and-type: A new method for typing with virtual keyboards on small touchscreens

Kwon, T., Na, S. & Park, S. H., 2014 Feb, In : IEEE Transactions on Consumer Electronics. 60, 1, p. 99-106 8 p., 6780931.

Research output: Contribution to journalArticle

7 Citations (Scopus)

Drag-And-Type: A new method for typing with virtual keyboards on small touchscreens

Kwon, T., Na, S. & Park, S. H., 2013, 2013 IEEE International Conference on Consumer Electronics, ICCE 2013. p. 458-459 2 p. 6486974. (Digest of Technical Papers - IEEE International Conference on Consumer Electronics).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Draw It As Shown: Behavioral Pattern Lock for Mobile User Authentication

Ku, Y., Park, L. H., Shin, S. & Kwon, T., 2019, In : IEEE Access. 7, p. 69363-69378 16 p., 8721054.

Research output: Contribution to journalArticle

2 Citations (Scopus)

Efficient and secure key agreement for merging clusters in Ad-Hoc networking environments

Shin, S. & Kwon, T., 2007 Jul, In : IEICE Transactions on Communications. E90-B, 7, p. 1575-1583 9 p.

Research output: Contribution to journalArticle

6 Citations (Scopus)

Efficient and secure password-based authentication protocols against guessing attacks

Kwon, T. & Song, J., 1998 Jul 1, In : Computer Communications. 21, 9, p. 853-861 9 p.

Research output: Contribution to journalArticle

16 Citations (Scopus)

Efficient flexible batch signing techniques for imbalanced communication applications

Youn, T. Y., Park, Y. H., Kwon, T., Kwon, S. & Lim, J., 2008 May, In : IEICE Transactions on Information and Systems. E91-D, 5, p. 1481-1484 4 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)

Efficient key agreement for merging clusters in ad-hoc networking environments

Shin, S. & Kwon, T., 2005, Embedded and Ubiquitous Computing - EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Proceedings. p. 996-1005 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3823 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)
27 Citations (Scopus)

Efficient linear array for multiplication over NIST recommended binary fields

Kwon, S., Kwon, T. & Park, Y. H., 2006, Fuzzy Logic and Applications - 6th International Workshop, WILF 2005, Revised Selected Papers. p. 427-436 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3849 LNAI).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

Experimental study on wireless sensor network security

Kwon, T. & Park, S. H., 2006, Intelligence and Security Informatics - IEEE International Conference on Intelligence and Security Informatics, ISI 2006, Proceedings. Springer Verlag, p. 741-743 3 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3975 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)