default search action
Taekyoung Kwon 0002
Person information
- affiliation: Yonsei University, Graduate School of Information, Seoul, South Korea
- affiliation (2001 - 2013): Sejong University, Dept. of Computer Engineering, Seoul, South Korea
- affiliation (1999 - 2000): University of California, Berkeley
- affiliation (PhD 1999): Yonsei University, Seoul, South Korea
- not to be confused with: Ted Taekyoung Kwon
Other persons with the same name
- Ted Taekyoung Kwon (aka: Ted "Taekyoung" Kwon, Taekyoung Kwon 0001) — Seoul National University, School of Computer Science and Engineering, Seoul, South Korea (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j56]Jaewoo Park, Leo Hyun Park, Hong Eun Ahn, Taekyoung Kwon:
Coexistence of Deepfake Defenses: Addressing the Poisoning Challenge. IEEE Access 12: 11674-11687 (2024) - [j55]Yoonsik Kim, Eunji Lim, Taekyoung Kwon:
On the Impact of Deployment Errors in Location-Based Key Predistribution Protocols for Wireless Sensor Networks. IEEE Access 12: 35765-35778 (2024) - [c73]Gun Il Kim, Jae Heon Kim, Minkyoung Kim, Taekyoung Kwon, Beakcheol Jang:
An Approach on Improving the Recommender System: Predicting Movie Genres Based on Plot Summaries. ICAIIC 2024: 270-274 - [c72]Jueon Eom, Seyeon Jeong, Taekyoung Kwon:
Fuzzing JavaScript Interpreters with Coverage-Guided Reinforcement Learning for LLM-Based Mutation. ISSTA 2024: 1656-1668 - [c71]Hyunjoon Kim, Jaehee Lee, Leo Hyun Park, Taekyoung Kwon:
On the Correlation Between Deepfake Detection Performance and Image Quality Metrics. WDC@AsiaCCS 2024 - [i8]Leo Hyun Park, Jaeuk Kim, Myung Gyo Oh, Jaewoo Park, Taekyoung Kwon:
Adversarial Feature Alignment: Balancing Robustness and Accuracy in Deep Learning via Adversarial Training. CoRR abs/2402.12187 (2024) - [i7]Myung Gyo Oh, Hong Eun Ahn, Leo Hyun Park, Taekyoung Kwon:
Amplifying Training Data Exposure through Fine-Tuning with Pseudo-Labeled Memberships. CoRR abs/2402.12189 (2024) - [i6]Jueon Eom, Seyeon Jeong, Taekyoung Kwon:
CovRL: Fuzzing JavaScript Engines with Coverage-Guided Reinforcement Learning for LLM-based Mutation. CoRR abs/2402.12222 (2024) - 2023
- [j54]Myung Gyo Oh, Leo Hyun Park, Jaeuk Kim, Jaewoo Park, Taekyoung Kwon:
Membership Inference Attacks With Token-Level Deduplication on Korean Language Models. IEEE Access 11: 10207-10217 (2023) - [j53]Leo Hyun Park, Soochang Chung, Jaeuk Kim, Taekyoung Kwon:
GradFuzz: Fuzzing deep neural networks with gradient vector coverage for adversarial examples. Neurocomputing 522: 165-180 (2023) - [c70]Seyeon Jeong, Eunbi Hwang, Yeongpil Cho, Taekyoung Kwon:
PHI: Pseudo-HAL Identification for Scalable Firmware Fuzzing. ICISC (2) 2023: 60-80 - [c69]Mingi Cho, Dohyeon An, Hoyong Jin, Taekyoung Kwon:
BoKASAN: Binary-only Kernel Address Sanitizer for Effective Kernel Fuzzing. USENIX Security Symposium 2023: 4985-5002 - [c68]Jaewoo Park, Hong Eun Ahn, Leo Hyun Park, Taekyoung Kwon:
Robust Training for Deepfake Detection Models Against Disruption-Induced Data Poisoning. WISA 2023: 175-187 - 2022
- [j52]Leo Hyun Park, Jaeuk Kim, Jaewoo Park, Taekyoung Kwon:
Mixed and constrained input mutation for effective fuzzing of deep learning systems. Inf. Sci. 614: 497-517 (2022) - [c67]Leo Hyun Park, Jaewoo Park, Soochang Chung, Jaeuk Kim, Myung Gyo Oh, Taekyoung Kwon:
Poster: Adversarial Defense with Deep Learning Coverage on MagNet's Purification. CCS 2022: 3439-3441 - [c66]Leo Hyun Park, Eunbi Hwang, Donggun Lee, Taekyoung Kwon:
Towards Constructing Consistent Pattern Strength Meters with User's Visual Perception. ICISC 2022: 81-99 - [c65]Hoyong Jin, Dohyeon An, Taekyoung Kwon:
Differential Testing of Cryptographic Libraries with Hybrid Fuzzing. ICISC 2022: 124-144 - [c64]Myung Gyo Oh, Leo Hyun Park, Jaeuk Kim, Jaewoo Park, Taekyoung Kwon:
On Membership Inference Attacks to Generative Language Models Across Language Domains. WISA 2022: 143-155 - 2021
- [j51]Eunbi Hwang, Hyunseok Lee, Seyeon Jeong, Mingi Cho, Taekyoung Kwon:
Toward Fast and Scalable Firmware Fuzzing With Dual-Level Peripheral Modeling. IEEE Access 9: 141790-141799 (2021) - [j50]Mingi Cho, Hoyong Jin, Dohyeon An, Taekyoung Kwon:
Evaluating Code Coverage for Kernel Fuzzers via Function Call Graph. IEEE Access 9: 157267-157277 (2021) - [j49]Mingi Cho, Jaedong Jang, Yezee Seo, Seyeon Jeong, Soochang Chung, Taekyoung Kwon:
Towards bidirectional LUT-level detection of hardware Trojans. Comput. Secur. 104: 102223 (2021) - [j48]Pyung Kim, Younho Lee, Youn-Sik Hong, Taekyoung Kwon:
A Password Meter without Password Exposure. Sensors 21(2): 345 (2021) - [j47]JongHyup Lee, Taekyoung Kwon:
Distributed Watchdogs Based on Blockchain for Securing Industrial Internet of Things. Sensors 21(13): 4393 (2021) - 2020
- [j46]Sooyeon Shin, Taekyoung Kwon:
A Privacy-Preserving Authentication, Authorization, and Key Agreement Scheme for Wireless Sensor Networks in 5G-Integrated Internet of Things. IEEE Access 8: 67555-67571 (2020) - [j45]Leo Hyun Park, JungBeen Yu, Hong-Koo Kang, Taejin Lee, Taekyoung Kwon:
Birds of a Feature: Intrafamily Clustering for Version Identification of Packed Malware. IEEE Syst. J. 14(3): 4545-4556 (2020)
2010 – 2019
- 2019
- [j44]Yeeun Ku, Leo Hyun Park, Sooyeon Shin, Taekyoung Kwon:
Draw It As Shown: Behavioral Pattern Lock for Mobile User Authentication. IEEE Access 7: 69363-69378 (2019) - [j43]Sooyeon Shin, Kyounghoon Kim, Taekyoung Kwon:
Detection of malicious packet dropping attacks in RPL-based internet of things. Int. J. Ad Hoc Ubiquitous Comput. 31(2): 133-141 (2019) - [j42]Sooyeon Shin, Taekyoung Kwon:
A Lightweight Three-Factor Authentication and Key Agreement Scheme in Wireless Sensor Networks for Smart Homes. Sensors 19(9): 2012 (2019) - [j41]Sangbong Yoo, Hong Ryeol Ryu, Hanbyul Yeon, Taekyoung Kwon, Yun Jang:
Visual analytics and visualization for android security risk. J. Comput. Lang. 53: 9-21 (2019) - [c63]Mingi Cho, Seoyoung Kim, Taekyoung Kwon:
Intriguer: Field-Level Constraint Solving for Hybrid Fuzzing. CCS 2019: 515-530 - [c62]Leo Hyun Park, Sangjin Oh, Jaeuk Kim, Soochang Chung, Taekyoung Kwon:
Poster: Effective Layers in Coverage Metrics for Deep Neural Networks. CCS 2019: 2681-2683 - [c61]Seoyoung Kim, Seyeon Jeong, Mingi Cho, Soochang Chung, Taekyoung Kwon:
Poster: Evaluating Code Coverage for System Call Fuzzers. CCS 2019: 2689-2691 - 2018
- [j40]Sooyeon Shin, Taekyoung Kwon:
Two-Factor Authenticated Key Agreement Supporting Unlinkability in 5G-Integrated Wireless Sensor Networks. IEEE Access 6: 11229-11241 (2018) - [j39]Youngjoo Lee, WonSeok Yang, Taekyoung Kwon:
Data Transfusion: Pairing Wearable Devices and Its Implication on Security for Internet of Things. IEEE Access 6: 48994-49006 (2018) - [c60]Yeeun Ku, Leo Hyun Park, Sooyeon Shin, Taekyoung Kwon:
A Guided Approach to Behavioral Authentication. CCS 2018: 2237-2239 - [c59]Junghwan Yoon, Yezee Seo, Jaedong Jang, Mingi Cho, JinGoog Kim, HyeonSook Kim, Taekyoung Kwon:
A Bitstream Reverse Engineering Tool for FPGA Hardware Trojan Detection. CCS 2018: 2318-2320 - [c58]Jung Yeon Hwang, Stanislaw Jarecki, Taekyoung Kwon, Joohee Lee, Ji Sun Shin, Jiayu Xu:
Round-Reduced Modular Construction of Asymmetric Password-Authenticated Key Exchange. SCN 2018: 485-504 - 2017
- [j38]Sooyeon Shin, Taekyoung Kwon:
A corrupted cloud and corrupted multi-cloud identification method for batch auditing in cloud storage services. Comput. Syst. Sci. Eng. 32(2) (2017) - [j37]Sooyeon Shin, Minwoo Kim, Taekyoung Kwon:
Experimental performance analysis of lightweight block ciphers and message authentication codes for wireless sensor networks. Int. J. Distributed Sens. Networks 13(11) (2017) - [j36]Jaewoo Choi, Jihyun Bang, LeeHyung Kim, Mirim Ahn, Taekyoung Kwon:
Location-Based Key Management Strong Against Insider Threats in Wireless Sensor Networks. IEEE Syst. J. 11(2): 494-502 (2017) - [c57]Hoyeon Lee, Seungyeon Kim, Taekyoung Kwon:
Here Is Your Fingerprint!: Actual Risk versus User Perception of Latent Fingerprints and Smudges Remaining on Smartphones. ACSAC 2017: 512-527 - [c56]Seungyeon Kim, Hoyeon Lee, Taekyoung Kwon:
POSTER: Rethinking Fingerprint Identification on Smartphones. CCS 2017: 2515-2517 - [c55]Youngjoo Lee, WonSeok Yang, Taekyoung Kwon:
POSTER: Watch Out Your Smart Watch When Paired. CCS 2017: 2527-2529 - [c54]MinSik Shin, JungBeen Yu, Youngjin Yoon, Taekyoung Kwon:
The Fuzzing Awakens: File Format-Aware Mutational Fuzzing on Smartphone Media Server Daemons. SEC 2017: 219-232 - [c53]Sangbong Yoo, Hong Ryeol Ryu, Hanbyul Yeon, Taekyoung Kwon, Yun Jang:
Personal visual analytics for android security risk lifelog. VINCI 2017: 29-36 - [c52]Jungwoo Joh, Yezee Seo, Hoon-Kyu Kim, Taekyoung Kwon:
Glitch Recall: A Hardware Trojan Exploiting Natural Glitches in Logic Circuits. WISA 2017: 150-161 - 2016
- [j35]JongHyup Lee, Taekyoung Kwon:
Secure dissemination of software updates for intelligent mobility in future wireless networks. EURASIP J. Wirel. Commun. Netw. 2016: 250 (2016) - [j34]Minwoo Kim, Jihyun Bang, Taekyoung Kwon:
LinkA: A Link Layer Anonymization Method Based on Bloom Filter for Authenticated IoT Devices. Intell. Autom. Soft Comput. 22(3): 365-369 (2016) - [j33]Taekyoung Kwon, Sarang Na:
SteganoPIN: Two-Faced Human-Machine Interface for Practical Enforcement of PIN Entry Security. IEEE Trans. Hum. Mach. Syst. 46(1): 143-150 (2016) - [j32]JongHyup Lee, LeeHyung Kim, Taekyoung Kwon:
FlexiCast: Energy-Efficient Software Integrity Checks to Build Secure Industrial Wireless Active Sensor Networks. IEEE Trans. Ind. Informatics 12(1): 6-14 (2016) - 2015
- [j31]Sooyeon Shin, Taekyoung Kwon:
A Survey of Public Provable Data Possession Schemes with Batch Verification in Cloud Storage. J. Internet Serv. Inf. Secur. 5(3): 37-47 (2015) - [j30]Taekyoung Kwon, Jin Hong:
Analysis and Improvement of a PIN-Entry Method Resilient to Shoulder-Surfing and Recording Attacks. IEEE Trans. Inf. Forensics Secur. 10(2): 278-292 (2015) - [c51]Sooyeon Shin, Seungyeon Kim, Taekyoung Kwon:
Identification of Corrupted Cloud Storage in Batch Auditing for Multi-Cloud Environments. ICT-EurAsia/CONFENIS 2015: 221-225 - [c50]Kyu Young Choi, Jihoon Cho, Jung Yeon Hwang, Taekyoung Kwon:
Constructing Efficient PAKE Protocols from Identity-Based KEM/DEM. WISA 2015: 411-422 - [i5]Kyu Young Choi, Jihoon Cho, Jung Yeon Hwang, Taekyoung Kwon:
Constructing Efficient PAKE Protocols from Identity-Based KEM/DEM. IACR Cryptol. ePrint Arch. 2015: 606 (2015) - 2014
- [j29]Taekyoung Kwon, Sarang Na:
TinyLock: Affordable defense against smudge attacks on smartphone pattern lock systems. Comput. Secur. 42: 137-150 (2014) - [j28]JongHyup Lee, Taekyoung Kwon:
GENDEP: Location-Aware Key Management for General Deployment of Wireless Sensor Networks. Int. J. Distributed Sens. Networks 10 (2014) - [j27]Sooyeon Shin, Taekyoung Kwon:
AAnA: Anonymous authentication and authorization based on short traceable signatures. Int. J. Inf. Sec. 13(5): 477-495 (2014) - [j26]Sangho Park, Jihyun Bang, Mirim Ahn, Woomin Lee, Taekyoung Kwon:
A Method for Hiding Link Layer Addresses Using Bloom Filter in Wireless Sensor Networks. J. Internet Serv. Inf. Secur. 4(4): 71-81 (2014) - [j25]Taekyoung Kwon, Sarang Na, Sang-ho Park:
Drag-and-type: a new method for typing with virtual keyboards on small touchscreens. IEEE Trans. Consumer Electron. 60(1): 99-106 (2014) - [j24]Taekyoung Kwon, Sarang Na, Sooyeon Shin:
Touch pointer: rethink point-and-click for accurate indirect touch interactions on small touchscreens. IEEE Trans. Consumer Electron. 60(3): 285-293 (2014) - [j23]Taekyoung Kwon, Sooyeon Shin, Sarang Na:
Covert Attentional Shoulder Surfing: Human Adversaries Are More Powerful Than Expected. IEEE Trans. Syst. Man Cybern. Syst. 44(6): 716-727 (2014) - [c49]Sarang Na, Taekyoung Kwon:
RIK: A virtual keyboard resilient to spyware in smartphones. ICCE 2014: 21-22 - [c48]Taekyoung Kwon, Sarang Na:
SwitchPIN: Securing smartphone PIN entry with switchable keypads. ICCE 2014: 23-24 - [i4]Dirk Kutscher, Taekyoung Kwon, Ignacio Solis:
Information-Centric Networking 3 (Dagstuhl Seminar 14291). Dagstuhl Reports 4(7): 52-61 (2014) - 2013
- [j22]Kwantae Cho, Minho Jo, Taekyoung Kwon, Hsiao-Hwa Chen, Dong Hoon Lee:
Classification and Experimental Analysis for Clone Detection Approaches in Wireless Sensor Networks. IEEE Syst. J. 7(1): 26-35 (2013) - [c47]Taekyoung Kwon, Sarang Na, Sang-ho Park:
Drag-and-Type: A new method for typing with virtual keyboards on small touchscreens. ICCE 2013: 458-459 - [c46]Taekyoung Kwon, Sarang Na, Sooyeon Shin:
Touch pointer: Rethink point-and-click for accurate indirect touch interactions on small touchscreens. ICCE 2013: 598-599 - [e2]Taekyoung Kwon, Mun-Kyu Lee, Daesung Kwon:
Information Security and Cryptology - ICISC 2012 - 15th International Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers. Lecture Notes in Computer Science 7839, Springer 2013, ISBN 978-3-642-37681-8 [contents] - 2012
- [c45]Wei Cai, Gene Cheung, Sung-Ju Lee, Taekyoung Kwon:
Optimal frame structure design using landmarks for interactive light field streaming. ICASSP 2012: 1445-1448 - 2011
- [j21]JongHyup Lee, Taekyoung Kwon:
Secure Authentication Scheme with Improved Anonymity for Wireless Environments. IEICE Trans. Commun. 94-B(2): 554-557 (2011) - [j20]Taekyoung Kwon:
Privacy preservation with X.509 standard certificates. Inf. Sci. 181(13): 2906-2921 (2011) - [j19]Jung Hee Cheon, Stanislaw Jarecki, Taekyoung Kwon, Mun-Kyu Lee:
Fast Exponentiation Using Split Exponents. IEEE Trans. Inf. Theory 57(3): 1816-1826 (2011) - [c44]Wei Cai, Gene Cheung, Taekyoung Kwon, Sung-Ju Lee:
Optimized frame structure for interactive light field streaming with cooperative caching. ICME 2011: 1-6 - [c43]Ashwin Ashok, Marco Gruteser, Narayan B. Mandayam, Taekyoung Kwon, Wenjia Yuan, Michael Varga, Kristin J. Dana:
Rate adaptation in visual MIMO. SECON 2011: 583-591 - [i3]DaeHun Nyang, Abedelaziz Mohaisen, Taekyoung Kwon, Brent ByungHoon Kang, Angelos Stavrou:
Decryptable to Your Eyes: Visualization of Security Protocols at the User Interface. CoRR abs/1112.2245 (2011) - 2010
- [j18]Taekyoung Kwon, Jin Hong:
Secure and Efficient Broadcast Authentication in Wireless Sensor Networks. IEEE Trans. Computers 59(8): 1120-1133 (2010) - [j17]JongHyup Lee, Taekyoung Kwon, JooSeok Song:
Group Connectivity Model for Industrial Wireless Sensor Networks. IEEE Trans. Ind. Electron. 57(5): 1835-1844 (2010) - [j16]Sooyeon Shin, Gil-yong Jo, Taekyoung Kwon, Youngman Park, Haekyu Rhee:
An Experimental Study of Hierarchical Intrusion Detection for Wireless Industrial Sensor Networks. IEEE Trans. Ind. Informatics 6(4): 744-757 (2010)
2000 – 2009
- 2009
- [j15]Taekyoung Kwon, JongHyup Lee, JooSeok Song:
Location-based pairwise key predistribution for wireless sensor networks. IEEE Trans. Wirel. Commun. 8(11): 5436-5442 (2009) - [c42]Taekyoung Kwon, JongHyup Lee, JooSeok Song:
On the Privacy-Preserving HCI Issues. HCI (5) 2009: 544-549 - 2008
- [j14]Soonhak Kwon, Taekyoung Kwon, Young-Ho Park:
New Hardware Architecture for Multiplication over GF(2m) and Comparisons with Normal and Polynomial Basis Multipliers for Elliptic Curve Cryptography. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(1): 236-243 (2008) - [j13]Taek-Young Youn, Young-Ho Park, Taekyoung Kwon, Soonhak Kwon, Jongin Lim:
Efficient Flexible Batch Signing Techniques for Imbalanced Communication Applications. IEICE Trans. Inf. Syst. 91-D(5): 1481-1484 (2008) - [j12]Taekyoung Kwon, Hyeonjoon Moon:
Biometric Authentication for Border Control Applications. IEEE Trans. Knowl. Data Eng. 20(8): 1091-1096 (2008) - 2007
- [j11]Taekyoung Kwon, Hyung-Woo Lee, Jaeil Lee:
A Practical Method for Generating Digital Signatures Using Biometrics. IEICE Trans. Commun. 90-B(6): 1381-1389 (2007) - [j10]Sooyeon Shin, Taekyoung Kwon:
Efficient and Secure Key Agreement for Merging Clusters in Ad-Hoc Networking Environments. IEICE Trans. Commun. 90-B(7): 1575-1583 (2007) - [c41]Taekyoung Kwon, Sang-ho Park, Sooyeon Shin:
Multi-modal Authentication for Ubiquitous Computing Environments. HCI (6) 2007: 113-121 - [c40]Taekyoung Kwon, Hyeonjoon Moon:
Knowledge-Based User Authentication Associated with Biometrics. HCI (5) 2007: 414-419 - [c39]Hyung-Woo Lee, Taekyoung Kwon:
Biometric Digital Key Mechanisms for Telebiometric Authentication Based on Biometric Certificate. HCI (5) 2007: 428-437 - [c38]Hyeonjoon Moon, Taekyoung Kwon:
Biometric Person Authentication for Access Control Scenario Based on Face Recognition. HCI (5) 2007: 463-472 - [c37]Jiyong Jang, Taekyoung Kwon, JooSeok Song:
A Time-Based Key Management Protocol for Wireless Sensor Networks. ISPEC 2007: 314-328 - [c36]Kwangkyu Park, JongHyup Lee, Taekyoung Kwon, JooSeok Song:
Secure Dynamic Network Reprogramming Using Supplementary Hash in Wireless Sensor Networks. UIC 2007: 653-662 - 2006
- [j9]Hee Jung Lee, Young-Ho Park, Taekyoung Kwon:
Partial Key Exposure Attacks on Unbalanced RSA with the CRT. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 89-A(2): 626-629 (2006) - [j8]Sang-ho Park, Jaewoon Jeong, Taekyoung Kwon:
Contents distribution system based on MPEG-4 ISMACryp in IP set-top box environments. IEEE Trans. Consumer Electron. 52(2): 660-668 (2006) - [c35]JongHyup Lee, Taekyoung Kwon, JooSeok Song:
Location-Aware Key Management Using Multi-layer Grids for Wireless Sensor Networks. ACNS 2006: 390-404 - [c34]GeneBeck Hahn, Taekyoung Kwon, Sinkyu Kim, JooSeok Song:
Cluster-Based Certificate Chain for Mobile Ad Hoc Networks. ICCSA (2) 2006: 769-778 - [c33]Youngkwon Lee, Taekyoung Kwon:
An Improved Fingerprint-Based Remote User Authentication Scheme Using Smart Cards. ICCSA (2) 2006: 915-922 - [c32]Chae Hoon Lim, Taekyoung Kwon:
Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer. ICICS 2006: 1-20 - [c31]Taekyoung Kwon, Sang-ho Park:
Experimental Study on Wireless Sensor Network Security. ISI 2006: 741-743 - [c30]Hyunsoo Song, Taekyoung Kwon:
Security Analysis of Secure Password Authentication for Keystroke Dynamics. KES (1) 2006: 916-923 - [c29]Taekyoung Kwon, Jung Hee Cheon, Yongdae Kim, Jaeil Lee:
Privacy Protection in PKIs: A Separation-of-Authority Approach. WISA 2006: 297-311 - [c28]Taekyoung Kwon, Dong Hoon Lee:
Three-Party Password Authenticated Key Agreement Resistant to Server Compromise. WISA 2006: 312-323 - [e1]JooSeok Song, Taekyoung Kwon, Moti Yung:
Information Security Applications, 6th International Workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers. Lecture Notes in Computer Science 3786, Springer 2006, ISBN 3-540-31012-6 [contents] - 2005
- [j7]Taekyoung Kwon, Young-Ho Park, Hee Jung Lee:
Security analysis and improvement of the efficient password-based authentication protocol. IEEE Commun. Lett. 9(1): 93-95 (2005) - [c27]Peng Wang, Yongdae Kim, Vishal Kher, Taekyoung Kwon:
Strengthening Password-Based Authentication Protocols Against Online Dictionary Attacks. ACNS 2005: 17-32 - [c26]Sang-ho Park, Taekyoung Kwon:
An Efficient Message Broadcast Authentication Scheme for Sensor Networks. CIS (2) 2005: 427-432 - [c25]Sooyeon Shin, Taekyoung Kwon:
Efficient Key Agreement for Merging Clusters in Ad-Hoc Networking Environments. EUC Workshops 2005: 996-1005 - [c24]Taekyoung Kwon, Hyeonjoon Moon:
Multi-modal Techniques for Identity Theft Prevention. Human.Society@Internet 2005: 291-300 - [c23]Taekyoung Kwon:
Authenticated Key Agreement Without Subgroup Element Verification. ICCSA (1) 2005: 577-583 - [c22]Taekyoung Kwon, Hyeonjoon Moon:
Multi-modal Biometrics with PKIs for Border Control Applications. ICCSA (1) 2005: 584-590 - [c21]Soonhak Kwon, Taekyoung Kwon, Young-Ho Park:
New Architecture for Multiplication in GF(2m) and Comparisons with Normal and Polynomial Basis Multipliers for Elliptic Curve Cryptography. ICISC 2005: 335-351 - [c20]Taekyoung Kwon, Hyeonjoon Moon:
Multi-modal Biometrics with PKI Technologies for Border Control Applications. ISI 2005: 99-114 - [c19]Soonhak Kwon, Taekyoung Kwon, Young-Ho Park:
Efficient Linear Array for Multiplication over NIST Recommended Binary Fields. WILF 2005: 427-436 - 2004
- [j6]Taekyoung Kwon:
Refinement and improvement of virtual software token protocols. IEEE Commun. Lett. 8(1): 75-77 (2004) - [c18]Hyung-Woo Lee, Taekyoung Kwon, Hyung-Jong Kim:
NS-2 Based IP Traceback Simulation Against Reflector Based DDoS Attack. AIS 2004: 90-99 - [c17]Yong-Guk Kim, Taekyoung Kwon:
An Authentication Scheme Based Upon Face Recognition for the Mobile Environment. CIS 2004: 274-279 - [c16]Taekyoung Kwon, Jaeil Lee:
Practical Digital Signature Generation Using Biometrics. ICCSA (1) 2004: 728-737 - [c15]Hyung-Woo Lee, Sung-Hyun Yun, Taekyoung Kwon, Jae-Sung Kim, Hee-Un Park, Nam-Ho Oh:
Reflector Attack Traceback System with Pushback Based iTrace Mechanism. ICICS 2004: 236-248 - [c14]Taekyoung Kwon:
Practical Authenticated Key Agreement Using Passwords. ISC 2004: 1-12 - [c13]Sanghoon Song, Taekyoung Kwon:
Domain-Based Proxy for Efficient Location Tracking of Mobile Agents. NPC 2004: 205-212 - [c12]GeneBeck Hahn, Taekyoung Kwon, Sinkyu Kim, JooSeok Song:
Design and Analysis of Improved GSM Authentication Protocol for Roaming Users. NPC 2004: 451-458 - 2003
- [j5]Taekyoung Kwon:
Erratum to: "Digital signature algorithm for securing digital identities": [Information Processing Letters 82 (2002) 247-252]. Inf. Process. Lett. 88(4): 201-202 (2003) - [c11]Taekyoung Kwon:
Robust Software Tokens - Yet Another Method for Securing User's Digital Identity. ACISP 2003: 476-487 - [c10]Sanghoon Song, Taekyoung Kwon, Ki Song Yoon:
Practical Security Improvement of PKCS#5. ISCIS 2003: 869-876 - [c9]Taekyoung Kwon, Seongan Lim:
Automation-Considered Logic of Authentication and Key Distribution. WISA 2003: 442-457 - 2002
- [j4]Taekyoung Kwon:
Impersonation attacks on software-only two-factor authentication schemes. IEEE Commun. Lett. 6(8): 358-360 (2002) - [j3]Taekyoung Kwon:
Digital signature algorithm for securing digital identities. Inf. Process. Lett. 82(5): 247-252 (2002) - [c8]Jaeil Lee, Taekyoung Kwon, Sanghoon Song, JooSeok Song:
A Model for Embedding and Authorizing Digital Signatures in Printed Documents. ICISC 2002: 465-477 - [c7]Taekyoung Kwon:
Virtual Software Tokens - A Practical Way to Secure PKI Roaming. InfraSec 2002: 288-302 - [c6]Taekyoung Kwon:
On the Difficulty of Protecting Private Keys in Software. ISC 2002: 17-31 - 2001
- [c5]Taekyoung Kwon:
Authentication and Key Agreement Via Memorable Passwords. NDSS 2001 - [i2]Taekyoung Kwon:
Robust Software Tokens: Towards Securing a Digital Identity. IACR Cryptol. ePrint Arch. 2001: 39 (2001) - 2000
- [i1]Taekyoung Kwon:
Authentication and Key Agreement via Memorable Password. IACR Cryptol. ePrint Arch. 2000: 26 (2000)
1990 – 1999
- 1999
- [j2]Taekyoung Kwon, JooSeok Song:
Clarifying Straight Replays and Forced Delays. ACM SIGOPS Oper. Syst. Rev. 33(1): 47-52 (1999) - 1998
- [j1]Taekyoung Kwon, JooSeok Song:
Efficient and secure password-based authentication protocols against guessing attacks. Comput. Commun. 21(9): 853-861 (1998) - 1997
- [c4]Taekyoung Kwon, Myeongho Kang, JooSeok Song:
An Adaptable and Reliable Authentication Protocol for Communication Networks. INFOCOM 1997: 737-744 - [c3]Taekyoung Kwon, Myungkeun Yoon, Jiwon Kang, JooSeok Song, Chang-Goo Kang:
A modeling of security management system for electronic data interchange. ISCC 1997: 518-522 - [c2]Taekyoung Kwon, JooSeok Song:
Security and efficiency in authentication protocols resistant to password guessing attack. LCN 1997: 245-252 - 1996
- [c1]Myeongho Kang, Taekyoung Kwon, Changyong Yang, JooSeok Song:
The Design and Verification of Services Feature Interaction Manager on AIN Using Z Schema. COMPSAC 1996: 477-482
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint