• 1033 Citations
  • 16 h-Index
19962020

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

Filter
Article
2020

A privacy-preserving authentication, authorization, and key agreement scheme for wireless sensor networks in 5G-integrated internet of things

Shin, S. & Kwon, T., 2020 Jan 1, In : IEEE Access. 8, p. 67555-67571 17 p., 9057455.

Research output: Contribution to journalArticle

Open Access
1 Citation (Scopus)
2019
Open Access
8 Citations (Scopus)

Detection of malicious packet dropping attacks in RPL-based internet of things

Shin, S., Kim, K. & Kwon, T., 2019 Jan 1, In : International Journal of Ad Hoc and Ubiquitous Computing. 31, 2, p. 133-141 9 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Draw It As Shown: Behavioral Pattern Lock for Mobile User Authentication

Ku, Y., Park, L. H., Shin, S. & Kwon, T., 2019 Jan 1, In : IEEE Access. 7, p. 69363-69378 16 p., 8721054.

Research output: Contribution to journalArticle

2 Citations (Scopus)

Visual analytics and visualization for android security risk

Yoo, S., Ryu, H. R., Yeon, H., Kwon, T. & Jang, Y., 2019 Aug, In : Journal of Computer Languages. 53, p. 9-21 13 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)
2018

Data Transfusion: Pairing Wearable Devices and Its Implication on Security for Internet of Things

Lee, Y., Yang, W. & Kwon, T., 2018 Jul 21, In : IEEE Access. 6, p. 48994-49006 13 p., 8418356.

Research output: Contribution to journalArticle

Open Access
4 Citations (Scopus)

Two-factor authenticated key agreement supporting unlinkability in 5G-integrated wireless sensor networks

Shin, S. & Kwon, T., 2018 Jan 22, In : IEEE Access. 6, p. 11229-11241 13 p.

Research output: Contribution to journalArticle

Open Access
19 Citations (Scopus)
2017
5 Citations (Scopus)

Location-Based Key Management Strong Against Insider Threats in Wireless Sensor Networks

Choi, J., Bang, J., Kim, L., Ahn, M. & Kwon, T., 2017 Jun, In : IEEE Systems Journal. 11, 2, p. 494-502 9 p.

Research output: Contribution to journalArticle

15 Citations (Scopus)
2016

FlexiCast: Energy-Efficient Software Integrity Checks to Build Secure Industrial Wireless Active Sensor Networks

Lee, J., Kim, L. & Kwon, T., 2016 Feb, In : IEEE Transactions on Industrial Informatics. 12, 1, p. 6-14 9 p., 7208869.

Research output: Contribution to journalArticle

11 Citations (Scopus)

LinkA: A Link Layer Anonymization Method Based on Bloom Filter for Authenticated IoT Devices

Kim, M., Bang, J. & Kwon, T., 2016 Jul 2, In : Intelligent Automation and Soft Computing. 22, 3, p. 365-369 5 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)
3 Citations (Scopus)

SteganoPIN: Two-Faced Human-Machine Interface for Practical Enforcement of PIN Entry Security

Kwon, T. & Na, S., 2016 Feb, In : IEEE Transactions on Human-Machine Systems. 46, 1, p. 143-150 8 p., 7167675.

Research output: Contribution to journalArticle

9 Citations (Scopus)
2015

Analysis and improvement of a PIN-Entry method resilient to shoulder-surfing and recording attacks

Kwon, T. & Hong, J., 2015 Feb 1, In : IEEE Transactions on Information Forensics and Security. 10, 2, p. 278-292 15 p., A6.

Research output: Contribution to journalArticle

23 Citations (Scopus)
2014

AAnA: Anonymous authentication and authorization based on short traceable signatures

Shin, S. & Kwon, T., 2014 Oct 1, In : International Journal of Information Security. 13, 5, p. 477-495 19 p.

Research output: Contribution to journalArticle

5 Citations (Scopus)

Covert attentional shoulder surfing: Human adversaries are more powerful than expected

Kwon, T., Shin, S. & Na, S., 2014 Jun, In : IEEE Transactions on Systems, Man, and Cybernetics: Systems. 44, 6, p. 716-727 12 p., 6814830.

Research output: Contribution to journalArticle

37 Citations (Scopus)

Drag-and-type: A new method for typing with virtual keyboards on small touchscreens

Kwon, T., Na, S. & Park, S. H., 2014 Feb, In : IEEE Transactions on Consumer Electronics. 60, 1, p. 99-106 8 p., 6780931.

Research output: Contribution to journalArticle

7 Citations (Scopus)
5 Citations (Scopus)

TinyLock: Affordable defense against smudge attacks on smartphone pattern lock systems

Kwon, T. & Na, S., 2014 May, In : Computers and Security. 42, p. 137-150 14 p.

Research output: Contribution to journalArticle

43 Citations (Scopus)

Touch pointer: Rethink point-and-click for accurate indirect touch interactions on small touchscreens

Kwon, T., Na, S. & Shin, S., 2014 Aug 1, In : IEEE Transactions on Consumer Electronics. 60, 3, p. 285-293 9 p., 6937310.

Research output: Contribution to journalArticle

2 Citations (Scopus)
2013

Classification and experimental analysis for clone detection approaches in wireless sensor networks

Cho, K., Jo, M., Kwon, T., Chen, H. H. & Lee, D. H., 2013 Jan 1, In : IEEE Systems Journal. 7, 1, p. 26-35 10 p., 6175923.

Research output: Contribution to journalArticle

22 Citations (Scopus)
2011

Fast exponentiation using split exponents

Cheon, J. H., Jarecki, S., Kwon, T. & Lee, M. K., 2011 Mar 1, In : IEEE Transactions on Information Theory. 57, 3, p. 1816-1826 11 p., 5714254.

Research output: Contribution to journalArticle

4 Citations (Scopus)

Privacy preservation with X.509 standard certificates

Kwon, T., 2011 Jul 1, In : Information sciences. 181, 13, p. 2906-2921 16 p.

Research output: Contribution to journalArticle

16 Citations (Scopus)

Secure authentication scheme with improved anonymity for wireless environments

Lee, J. H. & Kwon, T. Y., 2011 Feb, In : IEICE Transactions on Communications. E94-B, 2, p. 554-557 4 p.

Research output: Contribution to journalArticle

6 Citations (Scopus)
2010

An experimental study of hierarchical intrusion detection for wireless industrial sensor networks

Shin, S., Kwon, T., Jo, G. Y., Park, Y. & Rhy, H., 2010 Nov 1, In : IEEE Transactions on Industrial Informatics. 6, 4, p. 744-757 14 p., 5560697.

Research output: Contribution to journalArticle

113 Citations (Scopus)

Group connectivity model for industrial wireless sensor networks

Lee, J., Kwon, T. & Song, J., 2010 May 1, In : IEEE Transactions on Industrial Electronics. 57, 5, p. 1835-1844 10 p., 5280194.

Research output: Contribution to journalArticle

47 Citations (Scopus)

Secure and efficient broadcast authentication in wireless sensor networks

Kwon, T. & Hong, J., 2010 Jul 6, In : IEEE Transactions on Computers. 59, 8, p. 1120-1133 14 p., 5313804.

Research output: Contribution to journalArticle

47 Citations (Scopus)
2009

Location-based pairwise key predistribution for wireless sensor networks

Kwon, T., Lee, J. & Song, J., 2009 Nov 1, In : IEEE Transactions on Wireless Communications. 8, 11, p. 5436-5442 7 p., 5336767.

Research output: Contribution to journalArticle

26 Citations (Scopus)
2008

Biometric authentication for border control applications

Kwon, T. & Moon, H., 2008 Aug 1, In : IEEE Transactions on Knowledge and Data Engineering. 20, 8, p. 1091-1096 6 p., 4384481.

Research output: Contribution to journalArticle

9 Citations (Scopus)

Efficient flexible batch signing techniques for imbalanced communication applications

Youn, T. Y., Park, Y. H., Kwon, T., Kwon, S. & Lim, J., 2008 May, In : IEICE Transactions on Information and Systems. E91-D, 5, p. 1481-1484 4 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)
2007

A practical method for generating digital signatures using biometrics

Kwon, T., Lee, H. W. & Lee, J. I., 2007 Jun, In : IEICE Transactions on Communications. E90-B, 6, p. 1381-1389 9 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)

Efficient and secure key agreement for merging clusters in Ad-Hoc networking environments

Shin, S. & Kwon, T., 2007 Jul, In : IEICE Transactions on Communications. E90-B, 7, p. 1575-1583 9 p.

Research output: Contribution to journalArticle

6 Citations (Scopus)
2006

Contents distribution system based on MPEG-4 ISMACryp in IP set-top box environments

Park, S. H., Jeong, J. & Kwon, T., 2006 May, In : IEEE Transactions on Consumer Electronics. 52, 2, p. 660-668 9 p.

Research output: Contribution to journalArticle

12 Citations (Scopus)

Partial key exposure attacks on unbalanced RSA with the CRT

Lee, H. J., Park, Y. H. & Kwon, T., 2006 Jan 1, In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E89-A, 2, p. 626-629 4 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)
2005

Security analysis and improvement of the efficient password-based authentication protocol

Kwon, T., Park, Y. H. & Lee, H. J., 2005 Jan 1, In : IEEE Communications Letters. 9, 1, p. 93-95 3 p.

Research output: Contribution to journalArticle

14 Citations (Scopus)
2004
12 Citations (Scopus)

Refinement and Improvement of Virtual Software Token Protocols

Kwon, T., 2004 Jan 1, In : IEEE Communications Letters. 8, 1, p. 75-77 3 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)
2003
6 Citations (Scopus)
2002

Digital signature algorithm for securing digital identities

Kwon, T., 2002 Jun 15, In : Information Processing Letters. 82, 5, p. 247-252 6 p.

Research output: Contribution to journalArticle

5 Citations (Scopus)

Hybrid networked cryptographic devices in practice

Kwon, T., Lee, S. Y., Choi, Y. S. & Kim, H., 2002 Sep, In : IEICE Transactions on Communications. E85-B, 9, p. 1832-1834 3 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Impersonation attacks on software-only two-factor authentication schemes

Kwon, T., 2002 Aug 1, In : IEEE Communications Letters. 6, 8, p. 358-360 3 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)

Shape-sequence-based key image generation algorithm for browsing and retrieval of video clips

Lee, S., Choi, Y. S., Lim, W., Kwon, T. K. & Kim, H. K., 2002 Jun 6, In : Electronics Letters. 38, 12, p. 549-550 2 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)
2000

A study on the generalized key agreement and password authentication protocol

Kwon, T., 2000 Jan 1, In : IEICE Transactions on Communications. E83-B, 9, p. 2044-2050 7 p.

Research output: Contribution to journalArticle

13 Citations (Scopus)
1999

An improvement of the password-based authentication protocol (KIP) on security against replay attacks

Kwon, T., Kang, M., Jung, S. & Song, J., 1999 Jan 1, In : IEICE Transactions on Communications. E82-B, 7, p. 991-997 7 p.

Research output: Contribution to journalArticle

48 Citations (Scopus)

Clarifying straight replays and forced delays

Kwon, T. & Song, J., 1999 Jan, In : Operating Systems Review (ACM). 33, 1, p. 47-52 6 p.

Research output: Contribution to journalArticle

6 Citations (Scopus)

Secure agreement scheme for gxy via password authentication

Kwon, T. & Song, J., 1999 May 27, In : Electronics Letters. 35, 11, p. 892-893 2 p.

Research output: Contribution to journalArticle

24 Citations (Scopus)
1998

Authenticated key exchange protocols resistant to password guessing attacks

Kwon, T. & Song, J., 1998 Jan 1, In : IEE Proceedings: Communications. 145, 5, p. 304-308 5 p.

Research output: Contribution to journalArticle

22 Citations (Scopus)