• Source: Scopus
  • Calculated based on no. of publications stored in Pure and citations from Scopus
19962021

Research activity per year

If you made any changes in Pure these will be visible here soon.
Filter
Conference contribution

Search results

  • 2019

    Intriguer: Field-level constraint solving for hybrid fuzzing

    Cho, M., Kim, S. & Kwon, T., 2019 Nov 6, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 515-530 16 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Poster: Effective layers in coverage metrics for deep neural networks

    Park, L. H., Oh, S., Kim, J., Chung, S. & Kwon, T., 2019 Nov 6, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 2681-2683 3 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Poster: Evaluating code coverage for system call fuzzers

    Kim, S., Jeong, S., Cho, M., Chung, S. & Kwon, T., 2019 Nov 6, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 2689-2691 3 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2018

    Glitch Recall: A Hardware Trojan Exploiting Natural Glitches in Logic Circuits

    Joh, J., Seo, Y., Kim, H. K. & Kwon, T., 2018, Information Security Applications - 18th International Conference, WISA 2017, Revised Selected Papers. Kang, B. B. & Kim, T. (eds.). Springer Verlag, p. 150-161 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10763 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Round-reduced modular construction of asymmetric password-authenticated key exchange

    Hwang, J. Y., Jarecki, S., Kwon, T., Lee, J., Shin, J. S. & Xu, J., 2018, Security and Cryptography for Networks - 11th International Conference, SCN 2018, Proceedings. Catalano, D. & De Prisco, R. (eds.). Springer Verlag, p. 485-504 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11035 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • 2017

    Here is your fingerprint! actual risk versus user perception of latent fingerprints and smudges remaining on smartphones

    Lee, H., Kim, S. & Kwon, T., 2017 Dec 4, Proceedings - 33rd Annual Computer Security Applications Conference, ACSAC 2017. Association for Computing Machinery, p. 512-527 16 p. (ACM International Conference Proceeding Series; vol. Part F132521).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Personal visual analytics for android security risk lifelog

    Yoo, S., Ryu, H. R., Yeon, H., Kwon, T. & Jang, Y., 2017 Aug 14, VINCI 2017 - 10th International Symposium on Visual Information Communication and Interaction. Takahashi, S. & Li, J. (eds.). Association for Computing Machinery, p. 29-36 8 p. (ACM International Conference Proceeding Series; vol. Part F130152).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Poster: Rethinking fingerprint identification on smartphones

    Kim, S., Lee, H. & Kwon, T., 2017 Oct 30, CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 2515-2517 3 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Poster:Watch out your smartwatch when paired

    Lee, Y., Yang, W. S. & Kwon, T., 2017 Oct 30, CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 2527-2529 3 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • The fuzzing awakens: File format-aware mutational fuzzing on smartphone media server daemons

    Shin, M. S., Yu, J. B., Yoon, Y. J. & Kwon, T., 2017, ICT Systems Security and Privacy Protection - 32nd IFIP TC 11 International Conference, SEC 2017, Proceedings. De Capitani di Vimercati, S. & Martinelli, F. (eds.). Springer New York LLC, p. 219-232 14 p. (IFIP Advances in Information and Communication Technology; vol. 502).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2016

    Constructing efficient PAKE protocols from identity-based KEM/DEM

    Choi, K. Y., Cho, J., Hwang, J. Y. & Kwon, T., 2016, Information Security Applications - 16th International Workshop, WISA 2015, Revised Selected Papers. Choi, D. & Kim, H-W. (eds.). Springer Verlag, p. 411-422 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9503).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • 2015

    Identification of corrupted cloud storage in batch auditing for multi-cloud environments

    Shin, S., Kim, S. & Kwon, T., 2015, Information and Communication Technology - 3rd IFIP TC 5/8 International Conference, ICT-EurAsia 2015 and 9th IFIP WG 8.9 Working Conference, CONFENIS 2015 Held as Part of WCC 2015, Proceedings. You, I., Xu, L. D., Neuhold, E., Tjoa, A. M. & Khalil, I. (eds.). Springer Verlag, p. 221-225 5 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9357).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • 2014

    RIK: A virtual keyboard resilient to spyware in smartphones

    Na, S. & Kwon, T., 2014, 2014 IEEE International Conference on Consumer Electronics, ICCE 2014. Institute of Electrical and Electronics Engineers Inc., p. 21-22 2 p. 6775891. (Digest of Technical Papers - IEEE International Conference on Consumer Electronics).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • SwitchPIN: Securing smartphone PIN entry with switchable keypads

    Kwon, T. & Na, S., 2014, 2014 IEEE International Conference on Consumer Electronics, ICCE 2014. Institute of Electrical and Electronics Engineers Inc., p. 23-24 2 p. 6775892. (Digest of Technical Papers - IEEE International Conference on Consumer Electronics).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    12 Citations (Scopus)
  • 2013

    Drag-And-Type: A new method for typing with virtual keyboards on small touchscreens

    Kwon, T., Na, S. & Park, S. H., 2013, 2013 IEEE International Conference on Consumer Electronics, ICCE 2013. p. 458-459 2 p. 6486974. (Digest of Technical Papers - IEEE International Conference on Consumer Electronics).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • Touch pointer: Rethink point-and-click for accurate indirect touch interactions on small touchscreens

    Kwon, T., Na, S. & Shin, S., 2013, 2013 IEEE International Conference on Consumer Electronics, ICCE 2013. p. 598-599 2 p. 6487034. (Digest of Technical Papers - IEEE International Conference on Consumer Electronics).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • 2010

    A study of mobile proxy for privacy enhancement

    Kim, E., Kwon, T. & Yi, J. H., 2010, ICCE 2010 - 2010 Digest of Technical Papers International Conference on Consumer Electronics. p. 177-178 2 p. 5418783. (ICCE 2010 - 2010 Digest of Technical Papers International Conference on Consumer Electronics).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • 2009

    On the privacy-preserving HCI issues

    Kwon, T., Lee, J. & Song, J., 2009, Universal Access in Human-Computer Interaction: Addressing Diversity - 5th International Conference, UAHCI 2009, Held as Part of HCI International 2009, Proceedings. PART 1 ed. p. 544-549 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5614 LNCS, no. PART 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • 2007

    A time-based key management protocol for wireless sensor networks

    Jang, J., Kwon, T. & Song, J., 2007, Information Security Practice and Experience - Third International Conference, ISPEC 2007, Proceedings. Springer Verlag, p. 314-328 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4464 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    33 Citations (Scopus)
  • Biometric digital key mechanisms for telebiometric authentication based on biometric certificate

    Lee, H. W. & Kwon, T., 2007, Universal Access in Human-Computer Interaction: Coping with Diversity - 4th International Conference on Universal Access in Human-Computer Interaction, UAHCI 2007. Held as Part of HCI Int. 2007 Proc.. PART 1 ed. Springer Verlag, p. 428-437 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4554 LNCS, no. PART 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Biometric person authentication for access control scenario based on face recognition

    Moon, H. & Kwon, T., 2007, Universal Access in Human-Computer Interaction: Coping with Diversity - 4th International Conference on Universal Access in Human-Computer Interaction, UAHCI 2007. Held as Part of HCI Int. 2007 Proc.. PART 1 ed. Springer Verlag, p. 463-472 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4554 LNCS, no. PART 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Deriving the virtual world from wireless sensor networks for interaction with consumer electronic devices

    Kwon, T. & Choi, S. M., 2007, Digest of Technical Papers - 2007 International Conference on Consumer Electronics, ICCE 2007. 4146240. (Digest of Technical Papers - IEEE International Conference on Consumer Electronics).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Knowledge-based user authentication associated with biometrics

    Kwon, T. & Moon, H., 2007, Universal Access in Human-Computer Interaction: Coping with Diversity - 4th International Conference on Universal Access in Human-Computer Interaction, UAHCI 2007. Held as Part of HCI Int. 2007 Proc.. PART 1 ed. Springer Verlag, p. 414-419 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4554 LNCS, no. PART 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Multi-modal authentication for ubiquitous computing environments

    Kwon, T., Park, S. H. & Shin, S., 2007, Universal Access in Human-Computer Interaction: Ambient Interaction - 4th International Conference on Universal Access in Human-Computer Interaction, UAHCI 2007. Held as Part of HCI Int. 2007 Proc.. PART 2 ed. Springer Verlag, p. 113-121 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4555 LNCS, no. PART 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Privacy protection in PKIs: A separation-of-authority approach

    Kwon, T., Cheon, J. H., Kim, Y. & Lee, J. I., 2007, Information Security Applications - 7th International Workshop, WISA 2006 Revised Selected Papers. Springer Verlag, p. 297-311 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4298 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • Secure dynamic network reprogramming using supplementary hash in wireless sensor networks

    Park, K., Lee, J. H., Kwon, T. & Song, J., 2007, Ubiquitous Intelligence and Computing - 4th International Conference, UIC 2007, Proceedings. Springer Verlag, p. 653-662 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4611 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    11 Citations (Scopus)
  • Three-party password authenticated key agreement resistant to server compromise

    Kwon, T. & Lee, D. H., 2007, Information Security Applications - 7th International Workshop, WISA 2006 Revised Selected Papers. Springer Verlag, p. 312-323 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4298 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • 2006

    An improved fingerprint-based remote user authentication scheme using smart cards

    Lee, Y. & Kwon, T., 2006, Computational Science and Its Applications - ICCSA 2006: International Conference, Proceedings - Part II. Springer Verlag, p. 915-922 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3981 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Cluster-based certificate chain for mobile ad hoc networks

    Hahn, G., Kwon, T., Kim, S. & Song, J., 2006, Computational Science and Its Applications - ICCSA 2006: International Conference, Proceedings - Part II. Springer Verlag, p. 769-778 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3981 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Citations (Scopus)
  • Content distribution system based on MPEG-4 ISMACryp in set-top box environments

    Park, S. H., Jeong, J. & Kwon, T., 2006, 2006 Digest of Technical Papers - International Conference on Consumer Electronics, ICCE '06. p. 235-236 2 p. 1598397. (Digest of Technical Papers - IEEE International Conference on Consumer Electronics; vol. 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Efficient linear array for multiplication over NIST recommended binary fields

    Kwon, S., Kwon, T. & Park, Y. H., 2006, Fuzzy Logic and Applications - 6th International Workshop, WILF 2005, Revised Selected Papers. p. 427-436 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3849 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Experimental study on wireless sensor network security

    Kwon, T. & Park, S. H., 2006, Intelligence and Security Informatics - IEEE International Conference on Intelligence and Security Informatics, ISI 2006, Proceedings. Springer Verlag, p. 741-743 3 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3975 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Location-aware key management using multi-layer grids for wireless sensor networks

    Lee, J. H., Kwon, T. & Song, J., 2006, Applied Cryptography and Network Security - 4th International Conference, ACNS 2006, Proceedings. Springer Verlag, p. 390-404 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3989 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    1 Citation (Scopus)
  • New architecture for multiplication in GF(2m) and comparisons with normal and polynomial basis multipliers for elliptic curve cryptography

    Kwon, S., Kwon, T. & Park, Y. H., 2006 Jan 1, Information Security and Cryptology, ICISC 2005 - 8th International Conference, Revised Selected Papers. Springer Verlag, p. 335-351 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3935 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Security analysis of secure password authentication for keystroke dynamics

    Song, H. & Kwon, T., 2006, Knowledge-Based Intelligent Information and Engineering Systems - 10th International Conference, KES 2006, Proceedings. Springer Verlag, p. 916-923 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4251 LNAI - I).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Strong and robust RFID authentication enabling perfect ownership transfer

    Lim, C. H. & Kwon, T., 2006, Information and Communications Security - 8th International Conference, ICICS 2006, Proceedings. Ning, P., Qing, S. & Li, N. (eds.). Springer Verlag, p. 1-20 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4307 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    120 Citations (Scopus)
  • 2005

    An authentication scheme based upon face recognition for the mobile environment

    Kim, Y. G. & Kwon, T., 2005, Computational and Information Science - 1st International Symposium, CIS 2004, Proceedings. Zhang, J., He, J-H. & Fu, Y. (eds.). Springer Verlag, p. 274-279 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3314 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • An efficient message broadcast authentication scheme for sensor networks

    Park, S. H. & Kwon, T., 2005, Computational Intelligence and Security - International Conference, CIS 2005, Proceedings. Springer Verlag, p. 427-432 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3802 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Efficient key agreement for merging clusters in ad-hoc networking environments

    Shin, S. & Kwon, T., 2005, Embedded and Ubiquitous Computing - EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Proceedings. p. 996-1005 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3823 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • 2002

    On the difficulty of protecting private keys in software

    Kwon, T., 2002, Information Security - 5th International Conference, ISC 2002, Proceedings. Chan, A. H. & Gligor, V. (eds.). Springer Verlag, p. 17-31 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2433).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Virtual software tokens - A practical way to secure PKI roaming

    Kwon, T., 2002, Infrastructure Security - International Conference, InfraSec 2002, Proceedings. Davida, G., Frankel, Y., Rees, O. & Davida, G. (eds.). Springer Verlag, p. 288-302 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2437).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    16 Citations (Scopus)