default search action
Seung-Hyun Seo
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j22]Sungbin Park, Chang-Bae Seo, Xueqiang Wang, Yeonjoon Lee, Seung-Hyun Seo:
Exclusively in-store: Acoustic location authentication for stationary business devices. J. Netw. Comput. Appl. 232: 104028 (2024) - 2023
- [c23]Xuemei Wang, Seung-Hyun Seo, Changda Wang:
The core nodes identification method through adjustable network topology information. APNet 2023: 187-189 - [c22]Yan Zhang, Yuhao Bai, Soojin Lee, Ming Li, Seung-Hyun Seo:
A Blockchain-Based Mobile Crowdsensing and Its Incentive Mechanism. WISA 2023: 67-78 - [e2]Seung-Hyun Seo, Hwajeong Seo:
Information Security and Cryptology - ICISC 2022 - 25th International Conference, ICISC 2022, Seoul, South Korea, November 30 - December 2, 2022, Revised Selected Papers. Lecture Notes in Computer Science 13849, Springer 2023, ISBN 978-3-031-29370-2 [contents] - 2022
- [j21]Yuhao Bai, Qin Hu, Seung-Hyun Seo, Kyubyung Kang, John J. Lee:
Public Participation Consortium Blockchain for Smart City Governance. IEEE Internet Things J. 9(3): 2094-2108 (2022) - [j20]Soojin Lee, Seung-Hyun Seo:
Design of a Two Layered Blockchain-Based Reputation System in Vehicular Networks. IEEE Trans. Veh. Technol. 71(2): 1209-1223 (2022) - [c21]Seong-Min Cho, Aeyoung Kim, Seung-Hyun Seo:
Multivariate Quadratic Solver in GF(31) with Grover's Algorithm. ICEIC 2022: 1-4 - [e1]Jong Hwan Park, Seung-Hyun Seo:
Information Security and Cryptology - ICISC 2021 - 24th International Conference, Seoul, South Korea, December 1-3, 2021, Revised Selected Papers. Lecture Notes in Computer Science 13218, Springer 2022, ISBN 978-3-031-08895-7 [contents] - 2021
- [j19]Eungi Hong, Sangjae Lee, Mi-Kyung Oh, Seung-Hyun Seo:
Two-Factor Device DNA-Based Fuzzy Vault for Industrial IoT Device Security. IEEE Access 9: 99009-99023 (2021) - [c20]Chang-Bae Seo, Gyuseop Lee, Yeonjoon Lee, Seung-Hyun Seo:
Echo-Guard: Acoustic-Based Anomaly Detection System for Smart Manufacturing Environments. WISA 2021: 64-75 - [c19]Jane Kim, Soojin Lee, Seung-Hyun Seo:
A Privacy-Preserving Payment Model for EV Charging. WISA 2021: 255-264 - 2020
- [j18]Seong-Min Cho, Eungi Hong, Seung-Hyun Seo:
Random Number Generator Using Sensors for Drone. IEEE Access 8: 30343-30354 (2020) - [j17]Seong-Min Cho, Aeyoung Kim, Dooho Choi, Byung-Soo Choi, Seung-Hyun Seo:
Quantum Modular Multiplication. IEEE Access 8: 213244-213252 (2020) - [j16]Aeyoung Kim, Changda Wang, Seung-Hyun Seo:
PCA-CIA Ensemble-based Feature Extraction for Bio-Key Generation. KSII Trans. Internet Inf. Syst. 14(7): 2919-2937 (2020) - [j15]Jongho Won, Seung-Hyun Seo, Elisa Bertino:
A Secure Shuffling Mechanism for White-Box Attack-Resistant Unmanned Vehicles. IEEE Trans. Mob. Comput. 19(5): 1023-1039 (2020)
2010 – 2019
- 2019
- [j14]Dooho Choi, Seung-Hyun Seo, Yoon-Seok Oh, Yousung Kang:
Two-Factor Fuzzy Commitment for Unmanned IoT Devices Security. IEEE Internet Things J. 6(1): 335-348 (2019) - [c18]Yuhao Bai, Aeyoung Kim, Seung-Hyun Seo:
A Comparison of NIST 2nd Round Candidates' MQ-based Signature Schemes. ICTC 2019: 41-46 - 2018
- [j13]Xing Zhang, Seung-Hyun Seo, Changda Wang:
A Lightweight Encryption Method for Privacy Protection in Surveillance Videos. IEEE Access 6: 18074-18087 (2018) - 2017
- [j12]Jongho Won, Seung-Hyun Seo, Elisa Bertino:
Certificateless Cryptographic Protocols for Efficient Drone-Based Smart City Applications. IEEE Access 5: 3721-3749 (2017) - [j11]Aeyoung Kim, Geunshik Han, Seung-Hyun Seo:
Secure and Usable Bio-Passwords based on Confidence Interval. J. Internet Serv. Inf. Secur. 7(1): 14-27 (2017) - [j10]Seung-Hyun Seo, Jung-In Choi, Jinseok Song:
Secure Utilization of Beacons and UAVs in Emergency Response Systems for Building Fire Hazard. Sensors 17(10): 2200 (2017) - [c17]Jung-In Choi, Seung-Hyun Seo, Taenam Cho:
The Congestion Control Model for Unmanned Aircraft System Traffic Management. CSA/CUTE 2017: 1174-1179 - 2016
- [j9]Seungsoo Baek, Seung-Hyun Seo, Seungjoo Kim:
Preserving Patient's Anonymity for Mobile Healthcare System in IoT Environment. Int. J. Distributed Sens. Networks 12(9): 2171642 (2016) - [j8]Seung-Hyun Seo, Jongho Won, Elisa Bertino:
pCLSC-TKEM: a Pairing-free Certificateless Signcryption-tag Key Encapsulation Mechanism for a Privacy-Preserving IoT. Trans. Data Priv. 9(2): 101-130 (2016) - [c16]Seung-Hyun Seo, Jongho Won, Elisa Bertino, You Sung Kang, Dooho Choi:
A Security Framework for a Drone Delivery Service. DroNet@MobiSys 2016: 29-34 - 2015
- [j7]Mohamed Nabeel, Xiaoyu Ding, Seung-Hyun Seo, Elisa Bertino:
Scalable end-to-end security for advanced metering infrastructures. Inf. Syst. 53: 213-223 (2015) - [j6]Taenam Cho, Seung-Hyun Seo:
A Strengthened Android Signature Management Method. KSII Trans. Internet Inf. Syst. 9(3): 1210-1230 (2015) - [j5]Seung-Hyun Seo, Jongho Won, Salmin Sultana, Elisa Bertino:
Effective Key Management in Dynamic Wireless Sensor Networks. IEEE Trans. Inf. Forensics Secur. 10(2): 371-383 (2015) - [c15]Jongho Won, Seung-Hyun Seo, Elisa Bertino:
A Secure Communication Protocol for Drones and Smart Objects. AsiaCCS 2015: 249-260 - [c14]Seungsoo Baek, Seung-Hyun Seo, Seungjoo Kim:
Preserving biosensor users' anonymity over wireless cellular network. ICUFN 2015: 470-475 - 2014
- [j4]Seung-Hyun Seo, Aditi Gupta, Asmaa Mohamed Sallam, Elisa Bertino, Kangbin Yim:
Detecting mobile malware threats to homeland security through static analysis. J. Netw. Comput. Appl. 38: 43-53 (2014) - [j3]Seung-Hyun Seo, Mohamed Nabeel, Xiaoyu Ding, Elisa Bertino:
An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds. IEEE Trans. Knowl. Data Eng. 26(9): 2107-2119 (2014) - [c13]Seung-Hyun Seo, Jongho Won, Elisa Bertino:
POSTER: a pairing-free certificateless hybrid sign-cryption scheme for advanced metering infrastructures. CODASPY 2014: 143-146 - 2013
- [c12]Seung-Hyun Seo, Mohamed Nabeel, Xiaoyu Ding, Elisa Bertino:
An efficient certificateless cryptography scheme without pairing. CODASPY 2013: 181-184 - [c11]Taenam Cho, Yunki Kim, SungBong Han, Seung-Hyun Seo:
Potential vulnerability analysis of mobile banking applications. ICTC 2013: 1114-1115 - [c10]Seung-Hyun Seo, Xiaoyu Ding, Elisa Bertino:
Encryption key management for secure communication in smart advanced metering infrastructures. SmartGridComm 2013: 498-503 - 2012
- [j2]Seung-Hyun Seo, Kyu Young Choi, Jung Yeon Hwang, Seungjoo Kim:
Efficient certificateless proxy signature scheme with provable security. Inf. Sci. 188: 322-337 (2012) - [c9]Seung-Hyun Seo, Kangbin Yim, Ilsun You:
Mobile Malware Threats and Defenses for Homeland Security. CD-ARES 2012: 516-524 - [c8]Seung-Hyun Seo, Taenam Cho:
An Access Control Mechanism for Remote Control of Home Security System. IMIS 2012: 93-98 - [c7]Seung-Hyun Seo, Dong-Guen Lee, Kangbin Yim:
Analysis on Maliciousness for Mobile Applications. IMIS 2012: 126-129
2000 – 2009
- 2008
- [j1]Seung-Hyun Seo, Jung Yeon Hwang, Kyu Young Choi, Dong Hoon Lee:
Identity-based universal designated multi-verifiers signature schemes. Comput. Stand. Interfaces 30(5): 288-295 (2008) - 2006
- [c6]Kyung-Ah Shim, Seung-Hyun Seo:
Cryptanalysis of ID-Based Authenticated Key Agreement Protocols from Bilinear Pairings (Short Paper). ICICS 2006: 410-419 - 2005
- [c5]Kyung-Ah Shim, Seung-Hyun Seo:
Security Analysis of Password-Authenticated Key Agreement Protocols. CANS 2005: 49-58 - [c4]Seung-Hyun Seo, Taenam Cho, Sang-Ho Lee:
A Secure Mobile Agent Protocol for AMR Systems in Home Network Environments. ICOIN 2005: 814-823 - [c3]Seung-Hyun Seo, Kyung-Ah Shim, Sang-Ho Lee:
A Mediated Proxy Signature Scheme with Fast Revocation for Electronic Transactions. TrustBus 2005: 216-225 - 2004
- [c2]Seung-Hyun Seo, Sang-Ho Lee:
A Secure and Flexible Multi-signcryption Scheme. ICCSA (4) 2004: 689-697 - 2003
- [c1]Seung-Hyun Seo, Sang-Ho Lee:
A Secure Mobile Agent System Using Multi-signature Scheme in Electronic Commerce. Human.Society@Internet 2003 2003: 527-536
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-16 20:28 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint