Follow
Jin Wook Byun
Jin Wook Byun
Professor of Information and Communication, Pyeongtaek University
Verified email at ptu.ac.kr - Homepage
Title
Cited by
Cited by
Year
Off-line keyword guessing attacks on recent keyword search schemes over encrypted data
JW Byun, HS Rhee, HA Park, DH Lee
Workshop on secure data management, 75-83, 2006
4982006
Password-authenticated key exchange between clients with different passwords
JW Byun, IR Jeong, DH Lee, CS Park
Information and Communications Security: 4th International Conference, ICICS …, 2002
1382002
Efficient conjunctive keyword search on encrypted data storage system
JW Byun, DH Lee, J Lim
European Public Key Infrastructure Workshop, 184-196, 2006
1362006
EC2C-PAKA: An efficient client-to-client password-authenticated key agreement
JW Byun, DH Lee, JI Lim
Information Sciences 177 (19), 3995-4013, 2007
932007
N-party encrypted Diffie-Hellman key exchange using different passwords
JW Byun, DH Lee
Applied Cryptography and Network Security: Third International Conference …, 2005
542005
Security analysis and improvement of a gateway-oriented password-based authenticated key exchange protocol
JW Byun, DH Lee, JI Lim
IEEE Communications Letters 10 (9), 683-685, 2006
402006
Efficient and provably secure client-to-client password-based key exchange protocol
JW Byun, DH Lee, J Lim
Asia-Pacific Web Conference, 830-836, 2006
362006
On a security model of conjunctive keyword search over encrypted relational database
JW Byun, DH Lee
Journal of Systems and Software 84 (8), 1364-1372, 2011
312011
Secure index search for groups
HA Park, JW Byun, DH Lee
International conference on trust, privacy and security in digital business …, 2005
312005
End-to-end authenticated key exchange based on different physical unclonable functions
JW Byun
IEEE Access 7, 102951-102965, 2019
272019
Constant-round password-based group key generation for multi-layer ad-hoc networks
JW Byun, SM Lee, DH Lee, D Hong
International Conference on Security in Pervasive Computing, 3-17, 2006
262006
Oblivious conjunctive keyword search
HS Rhee, JW Byun, DH Lee, J Lim
International Workshop on Information Security Applications, 318-327, 2005
212005
Password-based group key exchange secure against insider guessing attacks
JW Byun, DH Lee, J Lim
International Conference on Computational and Information Science, 143-148, 2005
172005
Privacy preserving smartcard‐based authentication system with provable security
JW Byun
Security and Communication Networks 8 (17), 3028-3044, 2015
162015
Difference set attacks on conjunctive keyword search schemes
HS Rhee, IR Jeong, JW Byun, DH Lee
Workshop on Secure Data Management, 64-74, 2006
152006
An efficient multi-factor authenticated key exchange with physically unclonable function
JW Byun
2019 International Conference on Electronics, Information, and Communication …, 2019
102019
A generic multifactor authenticated key exchange with physical unclonable function
JW Byun
Security and Communication Networks 2019 (1), 5935292, 2019
92019
Key Agreement Between User and Drone With Forward Unlinkability in Internet of Drones
JY Jeong, JW Byun, IR Jeong
IEEE Access 10, 17134-17144, 2022
72022
PDAKE: a provably secure PUF-based device authenticated key exchange in cloud setting
JW Byun
IEEE Access 7, 181165-181177, 2019
72019
Password-authenticated key agreement between clients with different passwords, working draft of ISO
J Byun, I Jeong, D Lee, C Park
IEC, 2003
52003
The system can't perform the operation now. Try again later.
Articles 1–20