Taekyoung Kwon
Taekyoung Kwon
Verified email at - Homepage
Cited by
Cited by
Strong and robust RFID authentication enabling perfect ownership transfer
CH Lim, T Kwon
Information and Communications Security: 8th International Conference, ICICS …, 2006
An experimental study of hierarchical intrusion detection for wireless industrial sensor networks
S Shin, T Kwon, GY Jo, Y Park, H Rhy
IEEE transactions on industrial informatics 6 (4), 744-757, 2010
Authentication and key agreement via memorable password
T Kwon
NDSS (Network and Distributed System Security) Symposium, 2001
Covert attentional shoulder surfing: Human adversaries are more powerful than expected
T Kwon, S Shin, S Na
IEEE Transactions on Systems, Man, and Cybernetics: Systems 44 (6), 716-727, 2013
A privacy-preserving authentication, authorization, and key agreement scheme for wireless sensor networks in 5G-integrated Internet of Things
S Shin, T Kwon
IEEE access 8, 67555-67571, 2020
TinyLock: Affordable defense against smudge attacks on smartphone pattern lock systems
T Kwon, S Na
Computers & Security 42, 137-150, 2014
Secure and efficient broadcast authentication in wireless sensor networks
T Kwon, J Hong
IEEE Transactions on Computers 59 (8), 1120-1133, 2009
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface
T Kwon, MK Lee, D Kwon
Lecture Notes in Computer Science (including subseries Lecture Notes in …, 2013
Group connectivity model for industrial wireless sensor networks
JH Lee, T Kwon, JS Song
IEEE Transactions on Industrial Electronics 57 (5), 1835-1844, 2009
A time-based key management protocol for wireless sensor networks
J Jang, T Kwon, J Song
International conference on information security practice and experience …, 2007
A lightweight three-factor authentication and key agreement scheme in wireless sensor networks for smart homes
S Shin, T Kwon
Sensors 19 (9), 2012, 2019
Two-factor authenticated key agreement supporting unlinkability in 5G-integrated wireless sensor networks
S Shin, T Kwon
IEEE Access 6, 11229-11241, 2018
Analysis and improvement of a pin-entry method resilient to shoulder-surfing and recording attacks
T Kwon, J Hong
IEEE Transactions on Information Forensics and Security 10 (2), 278-292, 2014
An improvement of the password-based authentication protocol (K1P) on security against replay attacks
T Kwon, M Kang, S Jung, J Song
IEICE Transactions on Communications 82 (7), 991-997, 1999
Location-based key management strong against insider threats in wireless sensor networks
J Choi, J Bang, LH Kim, M Ahn, T Kwon
IEEE Systems Journal 11 (2), 494-502, 2015
Secure agreement scheme for gxy via password authentication
T Kwon, J Song
Electronics Letters 35 (11), 892-893, 1999
Intriguer: Field-level constraint solving for hybrid fuzzing
M Cho, S Kim, T Kwon
ACM CCS (Conference on Computer and Communications Security), 515-530, 2019
Draw it as shown: Behavioral pattern lock for mobile user authentication
Y Ku, LH Park, S Shin, T Kwon
IEEE Access 7, 69363-69378, 2019
Practical authenticated key agreement using passwords
T Kwon
International Conference on Information Security, 1-12, 2004
Classification and experimental analysis for clone detection approaches in wireless sensor networks
K Cho, M Jo, T Kwon, HH Chen, DH Lee
IEEE Systems Journal 7 (1), 26-35, 2012
The system can't perform the operation now. Try again later.
Articles 1–20