default search action
Ji Sun Shin
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j20]Alimov Abdulboriy, Ji Sun Shin:
An Incremental Majority Voting Approach for Intrusion Detection System Based on Machine Learning. IEEE Access 12: 18972-18986 (2024) - 2023
- [j19]Joohee Lee, Jihoon Kwon, Ji Sun Shin:
Efficient Continuous Key Agreement With Reduced Bandwidth From a Decomposable KEM. IEEE Access 11: 33224-33235 (2023) - [j18]Shincheol Lee, Ji Sun Shin:
A new location verification protocol and blockchain-based drone rental mechanism in smart farming. Comput. Electron. Agric. 214: 108267 (2023) - 2021
- [j17]Ji Sun Shin, Minjae Jo, Jung Yeon Hwang, Jaehwan Lee:
A Verifier-Based Password-Authenticated Key Exchange Using Tamper-Proof Hardware. Comput. J. 64(8): 1293-1302 (2021) - [j16]Ji Sun Shin, Shincheol Lee, Seoyun Choi, Minjae Jo, Sung-Hoon Lee:
A New Distributed, Decentralized Privacy-Preserving ID Registration System. IEEE Commun. Mag. 59(6): 138-144 (2021) - [j15]Maro Choi, Shincheol Lee, Minjae Jo, Ji Sun Shin:
Keystroke Dynamics-Based Authentication Using Unique Keypad. Sensors 21(6): 2242 (2021) - 2020
- [j14]Dong In Kim, Shincheol Lee, Ji Sun Shin:
A New Feature Scoring Method in Keystroke Dynamics-Based User Authentications. IEEE Access 8: 27901-27914 (2020) - [j13]Ankitha Vaddeti, Deepthi Vidiyala, Vineetha Puritipati, Raveendra Babu Ponnuru, Ji Sun Shin, Goutham Reddy Alavalapati:
Graphical passwords: Behind the attainment of goals. Secur. Priv. 3(6) (2020)
2010 – 2019
- 2019
- [j12]Jung Hee Cheon, Jinhyuck Jeong, Ji Sun Shin:
Cryptoanalysis on 'A round-optimal lattice-based blind signature scheme for cloud services'. Future Gener. Comput. Syst. 95: 100-103 (2019) - [j11]Goutham Reddy Alavalapati, Ashok Kumar Das, Vanga Odelu, Awais Ahmad, Ji Sun Shin:
A Privacy Preserving three-factor authenticated key agreement protocol for client-server environment. J. Ambient Intell. Humaniz. Comput. 10(2): 661-680 (2019) - [j10]Hyun-Gu Lee, Jung Yeon Hwang, Shincheol Lee, Dong In Kim, Sung-Hoon Lee, Jaehwan Lee, Ji Sun Shin:
A parameterized model to select discriminating features on keystroke dynamics authentication on smartphones. Pervasive Mob. Comput. 54: 45-57 (2019) - 2018
- [j9]Jaehwan Lee, Youngrang Kim, Ji Sun Shin:
In-Storage Anti-Virus System via On-Demand Inspection. IEICE Trans. Inf. Syst. 101-D(8): 2132-2135 (2018) - [j8]Hyunok Oh, Jihye Kim, Ji Sun Shin:
Forward-secure ID based digital signature scheme with forward-secure private key generator. Inf. Sci. 454-455: 96-109 (2018) - [j7]Jaehwan Lee, June Choi, Hongchan Roh, Ji Sun Shin:
An Empirical Performance Analysis on Hadoop via Optimizing the Network Heartbeat Period. KSII Trans. Internet Inf. Syst. 12(11): 5252-5268 (2018) - [j6]Hyun-Gu Lee, Jung Yeon Hwang, Dong In Kim, Shincheol Lee, Sung-Hoon Lee, Ji Sun Shin:
Understanding Keystroke Dynamics for Smartphone Users Authentication and Keystroke Dynamics on Smartphones Built-In Motion Sensors. Secur. Commun. Networks 2018: 2567463:1-2567463:10 (2018) - [c6]Jung Yeon Hwang, Stanislaw Jarecki, Taekyoung Kwon, Joohee Lee, Ji Sun Shin, Jiayu Xu:
Round-Reduced Modular Construction of Asymmetric Password-Authenticated Key Exchange. SCN 2018: 485-504 - 2017
- [j5]Jaehwan Lee, Joohwan Kim, Ji Sun Shin:
DiSC: A Distributed In-Storage Computing Platform Using Cost-Effective Hardware Devices. IEICE Trans. Inf. Syst. 100-D(12): 3018-3021 (2017) - [c5]Minsu Lee, Hyun-Gu Lee, Ji Sun Shin:
Evolution of Spamming Attacks on Facebook. WISA 2017: 101-111 - 2016
- [j4]Jaehwan Lee, Min Jae Jo, Ji Sun Shin:
LigeroAV: A Light-Weight, Signature-Based Antivirus for Mobile Environment. IEICE Trans. Inf. Syst. 99-D(12): 3185-3187 (2016) - 2015
- [j3]Virgil D. Gligor, Bryan Parno, Ji Sun Shin:
Network Adversary Attacks against Secure Encryption Schemes. IEICE Trans. Commun. 98-B(2): 267-279 (2015) - 2013
- [j2]Ji Sun Shin, Virgil D. Gligor:
A New Privacy-Enhanced Matchmaking Protocol. IEICE Trans. Commun. 96-B(8): 2049-2059 (2013) - 2012
- [c4]Wook Park, Ji Sun Shin, Yoon-Kyung Lee, Joong-Sun Won:
Tidal flat reflectance model accommodating tidal conditions using Geostationary Ocean Color Imager (GOCI): Preliminary results. IGARSS 2012: 7629-7631 - 2010
- [j1]Jonathan Katz, Ji Sun Shin, Adam D. Smith:
Parallel and Concurrent Security of the HB and HB+ Protocols. J. Cryptol. 23(3): 402-421 (2010)
2000 – 2009
- 2009
- [b1]Ji Sun Shin:
Enhancing Privacy in Cryptographic Protocols. University of Maryland, College Park, MD, USA, 2009 - 2008
- [c3]Ji Sun Shin, Virgil D. Gligor:
A New Privacy-Enhanced Matchmaking Protocol. NDSS 2008 - 2006
- [c2]Jonathan Katz, Ji Sun Shin:
Parallel and Concurrent Security of the HB and HB+ Protocols. EUROCRYPT 2006: 73-87 - 2005
- [c1]Jonathan Katz, Ji Sun Shin:
Modeling insider attacks on group key-exchange protocols. CCS 2005: 180-189 - [i2]Jonathan Katz, Ji Sun Shin:
Modeling Insider Attacks on Group Key-Exchange Protocols. IACR Cryptol. ePrint Arch. 2005: 163 (2005) - [i1]Jonathan Katz, Ji Sun Shin:
Parallel and Concurrent Security of the HB and HB+ Protocols. IACR Cryptol. ePrint Arch. 2005: 461 (2005)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-21 20:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint