International Journals (SCI/SCIE)
Sangsoo Han, Eunbi Hwang, YoonSik Kim, and Taekyoung Kwon, “A Continuous Authentication Framework for Securing Metaverse Identities,” IEEE Transactions on Services Computing (IEEE TSC), Mar. 2025.
Yoonsik Kim, Eunji Lim, and Taekyoung Kwon, “On the Impact of Deployment Errors in Location-based Key Predistribution Protocols for Wireless Sensor Networks,” IEEE Access, Vol.12, pp.35765 – 35778, Mar. 2024.
Jaewoo Park, Leohyun Park, Hongeun Ahn, and Taekyoung Kwon, “Coexistence of Deepfake Defenses: Addressing the Poisoning Challenge,” IEEE Access, Vol.12, pp.11674 – 11687, Jan. 2024.
Leo Hyun Park, Soochang Chung, Jaeuk Kim, and Taekyoung Kwon, “GradFuzz: Fuzzing Deep Neural Networks with Gradient Vector Coverage for Adversarial Examples,” Neurocomputing, Elsevier, Vol. 522, pp. 165-180, Feb. 2023.
Myung Gyo Oh, Leo Hyun Park, Jaeuk Kim, Jaewoo Park, and Taekyoung Kwon, “Membership Inference Attacks with Token-Level Deduplication on Korean Language Models,” IEEE Access, Vol.11, pp.10207 – 10217, Jan. 2023.
Leo Hyun Park, Jaeuk Kim, Jaewoo Park, and Taekyoung Kwon, “Mixed and Constrained Input Mutation for Effective Fuzzing of Deep Learning Systems,” Information Sciences, Elsevier, Vol. 614, pp. 497-517, Oct. 2022.
Mingi Cho, Hoyoung Jin, Dohyeon An and Taekyoung Kwon “Evaluating Code Coverage for Kernel Fuzzers via Function Call Graph”, IEEE Access, vol. 9, pp. 157267-157277, Nov. 2021
Eunbi Hwang, Hyunseok Lee, Seyeon Jeong, Mingi Cho, and Taekyoung Kwon “Toward Fast and Scalable Firmware Fuzzing with Dual-Level Peripheral Modeling”, IEEE Access Vol.9, Oct. 2021
Mingi Cho, Jaedong Jang, Yezee Seo, Seyeon Jeong, Soochang Chung, and Taekyoung Kwon, “Towards Bidirectional LUT-level Detection of Hardware Trojans” Computers & Security, Elsevier, Vol.104, May. 2021
Pyung Kim, Younho Lee, Youn-Sik Hong, and Taekyoung Kwon, “A Password Meter without Password Exposure” Sensors, Vol. 21, No. 2, pp. 345-370, Jan. 2021.
JongHyup Lee, and Taekyoung Kwon, “Distributed Watchdogs Based on Blockchain for Securing Industrial Internet of Things,” Sensors, MDPI, Vol. 21, No. 13, June. 2021.
Leo Hyun Park, Jungbeen Yu, Hong-Koo Kang, Taejin Lee, Taekyoung Kwon, “Birds of a Feature: Intrafamily Clustering for Version Identification of Packed Malware,” IEEE Systems Journal, Vol. 14, pp. 4545-4556, Sep. 2020.
Sooyeon Shin, Taekyoung Kwon, “A Privacy-Preserving Authentication, Authorization, and Key Agreement Scheme for Wireless Sensor Networks in 5G-Integrated Internet of Things,” IEEE Access, Vol. 8, pp. 67555-67571, Apr. 2020.
Sooyeon Shin, Kyounghoon Kim, and Taekyoung Kwon, “Detection of malicious packet dropping attacks in RPL-based Internet of Things,” International Journal of Ad Hoc and Ubiquitous Computing, Vol. 31, pp. 133-141, Jun. 2019.
Yeeun Ku, Leo Hyun Park, Sooyeon Shin, and Taekyoung Kwon, “Draw It As Shown: Behavioral Pattern Lock for Mobile User Authentication,” IEEE Access, Vol. 7, pp. 69363-69378, May. 2019.
Sooyeon Shin and Taekyoung Kwon, “A Lightweight Three-Factor Authentication and Key Agreement Scheme in Wireless Sensor Networks for Smart Homes,” Sensors, MDPI, Vol. 19, No. 9, Apr. 2019.
Sangbong Yoo, Hong Ryeol Ryu, Hanbyul Yeon, Taekyoung Kwon, and Yun Jang, “Visual Analytics and Visualization for Android Security Risk,” Elsevier Journal of Computer Languages, Vol. 53, pp. 9-21, Aug. 2019.
Youngjoo Lee, Wonseok Yang, and Taekyoung Kwon, “Data Transfusion: Pairing Wearable Devices and Its Implication on Security for Internet of Things,” IEEE Access, Vol. 6, pp. 48994-49006, Jul. 2018.
Sooyeon Shin and Taekyoung Kwon, “Two-Factor Authenticated Key Agreement Supporting Unlinkability in 5G-Integrated Wireless Sensor Networks,” IEEE Access, Vol. 6, pp. 11229-11241, Jan. 2018.
Sooyeon Shin, Minwoo Kim, and Taekyoung Kwon, “Experimental Performance Analysis of Lightweight Block Ciphers and Message Authentication Codes for Wireless Sensor Networks,” International Journal of Distributed Sensor Networks, Vol. 13, No. 11, Nov. 2017.
Jaewoo Choi, Jihyun Bang, LeeHyung Kim, Mirim Ahn, and Taekyoung Kwon, “Location-Based Key Management Strong Against Insider Threats in Wireless Sensor Networks,” IEEE Systems Journal, Vol. 11, Iss. 2, pp. 494-502, Jun. 2017.
Sooyeon Shin and Taekyoung Kwon, “A Corrupted Cloud and Corrupted Multi-Cloud Identification Method for Batch Auditing in Cloud Storage Services,” Computer Systems Science & Engineering, Vol. 32, No. 2, Mar. 2017.
JongHyup Lee and Taekyoung Kwon, “Secure dissemination of software updates for intelligent mobility in future wireless networks,” EURASIP Journal on Wireless Communications and Networking, Vol. 2016, No. 1, pp. 250, Oct. 2016.
Minwoo Kim, Jihyun Bang, and Taekyoung Kwon, “LinkA: A link layer anonymization method based on bloom filter for authenticated IoT devices,” Intelligent Automation & Soft Computing, Vol. 22, Iss. 3, pp. 365-369, 2016.
Taekyoung Kwon and Sarang Na, “SteganoPIN: Two-Faced Human-Machine Interface for Practical Enforcement of PIN Entry Security,” IEEE Transactions on Human-Machine Systems, Vol. 46, No. 1, pp. 143-150, Feb. 2016.
JongHyup Lee, LeeHyung Kim, and Taekyoung Kwon, “FlexiCast: Energy-Efficient Software Integrity Checks to Build Secure Industrial Wireless Active Sensor Networks,” IEEE Transactions on Industrial Informatics, Vol. 12, No. 1, pp. 6-14, Feb. 2016.
Taekyoung Kwon and Jin Hong, “Analysis and Improvement of a PIN-Entry Method Resilient to Shoulder-Surfing and Recording Attacks,” IEEE Transactions on Information Forensics and Security, Vol. 10, Iss. 2, pp. 278-292, Feb. 2015.
Sooyeon Shin and Taekyoung Kwon, “AAnA: Anonymous Authentication and Authorization based on Short Traceable Signatures,” International Journal of Information Security, Springer, Vol. 13, No. 5, pp. 477-495, Oct. 2014.
Taekyoung Kwon, Sarang Na, and Sooyeon Shin, “Touch Pointer: Rethink Point-and-Click for Accurate Indirect Touch Interactions on Small Touchscreens,” IEEE Transactions on Consumer Electronics, Vol. 60, Iss. 3, pp. 285-293, Aug. 2014.
Taekyoung Kwon, Sooyeon Shin, and Sarang Na, “Covert Attentional Shoulder Surfing: Human Adversaries Are More Powerful Than Expected,” IEEE Transactions on Systems, Man, and Cybernetics: Systems (Formerly, Part A), Vol. 44, No. 6, pp. 716-727, Jun. 2014.
Taekyoung Kwon and Sarang Na, “TinyLock: Affordable Defense Against Smudge Attacks on Smartphone Pattern Lock Systems,” Computers &Security, Elsevier, Vol. 42, pp. 137-150, May 2014.
JongHyup Lee and Taekyoung Kwon, “GENDEP: Location-Aware Key Management for General Deployment of Wireless Sensor Networks,” International Journal of Distributed Sensor Networks, Vol. 2014, Article ID. 490202, May 2014.
Taekyoung Kwon, Sarang Na, and Sang-ho Park, “Drag-and-Type: A New Method for Typing with Virtual Keyboards on Small Touchscreens,” IEEE Transactions on Consumer Electronics, Vol. 60, Iss. 1, pp. 99-106, Feb. 2014.
Kwantae Cho, Minho Jo, Taekyoung Kwon, Hsiao-Hwa Chen, and Dong Hoon Lee, “Classification and Experimental Analysis for Clone Detection Approaches in Wireless Sensor Networks,” IEEE Systems Journal, Vol. 7, No. 1, pp.26-35, Mar. 2013.
Taekyoung Kwon, “Privacy Preservation with X.509 Standard Certificates,” Information Sciences, Elsevier, Vol. 181, pp. 2906-2921, Jul. 2011.
Jung Hee Cheon, Stanislaw Jarecki, Taekyoung Kwon, and Mun-Kyu Lee, “Fast Exponentiation Using Split Exponents,” IEEE Transactions on Information Theory, Vol. 57, No. 3, pp. 1816-1826, Mar. 2011.
JongHyup Lee and Taekyoung Kwon, “Secure Authentication Scheme with Improved Anonymity for Wireless Environments,” IEICE Transactions on Communications, Vol. E94-B, No. 2, pp. 554-557, Feb. 2011.
Sooyeon Shin, Taekyoung Kwon, Gil-yong Jo, Youngman Park, and Haekyu Rhy, “An Experimental Study of Hierarchical Intrusion Detection for Wireless Industrial Sensor Networks,” IEEE Transactions on Industrial Informatics, Vol. 6, No. 4, pp. 744-757, Nov. 2010.
Taekyoung Kwon and Jin Hong, “Secure and Efficient Broadcast Authentication in Wireless Sensor Networks,” IEEE Transactions on Computers, Vol. 59, No. 8, pp. 1120-1133, Aug. 2010.
JongHyup Lee, Taekyoung Kwon, and JooSeok Song, “Group Connectivity Model for Industrial Wireless Sensor Networks,” IEEE Transactions on Industrial Electronics, Vol. 57, No. 5, pp. 1835-1844, Jul. 2010.
Taekyoung Kwon, JongHyup Lee, and JooSeok Song, “Location-based Pairwise Key Predistribution for Wireless Sensor Networks,” IEEE Transactions on Wireless Communications, Vol. 8, No. 11, pp. 5436-5442, 2009.
Taekyoung Kwon and Hyeonjoon Moon, “Biometric Authentication for Border Control Applications,” IEEE Transactions on Knowledge and Data Engineering, Vol. 20, No. 9, pp. 1091-1096, 2008.
Taeg-young Youn, Young-Ho Park, Taekyoung Kwon, Soonhak Kwon, and Jongin Lim, “Efficient flexible batch signing techniques for imbalanced communication applications,” IEICE Transactions On Information and Systems, Vol. E91-D, Iss. 5, pp. 1481-1484, 2008.
Soonhak Kwon, Taekyoung Kwon, and Young-Ho Park, “New hardware architecture for multiplication over GF(2^m) and comparisons with normal and polynomial basis multipliers for elliptic curve cryptography,” IEICE Transactions on Fundamentals, Vol. E91-A, No.1, pp.234-243, 2007.
Sooyeon Shin and Taekyoung Kwon, “Efficient and Secure Key Agreement for Merging Clusters in Ad-hoc Networking Environments,” IEICE Transactions on Communications, Vol. E90-B, No.7, pp. 1575-1583, 2007.
Taekyoung Kwon, Hyung-Woo Lee, and Jae-il Lee, “A Practical Method for Generating Digital Signatures Using Biometrics,” IEICE Transactions on Communications, Vol. E90-B, No.6, pp. 1381-1389, 2007.
Chae Hoon Lim and Taekyoung Kwon, “Strong and robust RFID authentication enabling perfect ownership transfer,” Information and Communications Security, Lecture Notes in Computer Science, Vol. 4307, Springer-Verlag, pp. 1-20, 2006.
JongHyup Lee, Taekyoung Kwon, and Jooseok Song, “Location-aware key management using multi-layer grids for wireless sensor networks,” Applied Cryptography and Network Security, Lecture Notes in Computer Science, Vol. 3989, Springer-Verlag, pp. 390-404, 2006.
Hyunsoo Song and Taekyoung Kwon, “Security analysis of secure password authentication for keystroke dynamics,” Knowledge-Based Intelligent Information Engineering Systems, Lecture Notes in Computer Science, pp.916-923, 2006.
Youngkwon Lee and Taekyoung Kwon, “An improved fingerprint-based remote user authentication scheme using smart cards,” Computational Science and Its Applications, Lecture Notes in Computer Science, Vol. 3981, Springer-Verlag, pp.915-922, 2006.
Sang-ho Park, Jaewoong Jeong, and Taekyoung Kwon, “Contents Distribution System based on MPEG-4 ISMACryp in Set-top Box Environments,” IEEE Transactions on Consumer Electronics, Vol. 52, No. 2, pp. 660- 668, May 2006.
GeneBeck Hahn, Taekyoung Kwon, SinKyu Kim, and Jooseok Song, “Cluster-based certificate chain for mobile ad hoc networks,” Computational Science and Its Applications, Lecture Notes in Computer Science, Vol. 3981, Springer-Verlag, pp.769-778, 2006.
Soonhak Kwon, Taekyoung Kwon, and Young-Ho Park, “New architecture for multiplication in GF(2^m) and comparisons with normal and polynomial basis multipliers for elliptic curve cryptography,” Information Security and Cryptology, Lecture Notes in Computer Science, Vol. 3935, Springer-Verlag, pp.335-351, 2006.
Hee Jung Lee, Young-Ho Park, and Taekyoung Kwon, “Partial key exposure attacks on unbalanced RSA with the CRT,” IEICE Transactions on Fundamentals, Vol.E89-A, No. 2, pp.626-629, 2006.
Sang-ho Park and Taekyoung Kwon, “An efficient message broadcast authentication scheme for sensor networks,” IEEE Computational Intelligence and Security, Lecture Notes in Artificial Intelligence, Vol.3802, Springer-Verlag, pp.427-432, 2005.
Sooyeon Shin and Taekyoung Kwon, “Efficient key agreement for merging clusters in ad-hoc networking environments,” Embedded and Ubiquitous Computing, Lecture Notes in Computer Science, Vol. 3823, Springer-Verlag, 2005.
Soonhak Kwon, Taekyoung Kwon, and Young-Ho Park, “Efficient linear array for multiplication over NIST recommended binary fields,” Fuzzy Logic and Applications, Lecture Notes in Artificial Intelligence, Vol.3849, Springer-Verlag, pp. 427-436, 2005.
Taekyoung Kwon and Hyeonjoon Moon, “Multi-modal techniques for Identity theft prevention, Human, Society@Internet,” Lecture Notes in Computer Science, Vol. 3597, Springer-Verlag, pp. 291-300, 2005.
Taekyoung Kwon and Hyeonjoon Moon, “Multi-modal Biometrics with PKI technologies for border control applications,” Intelligence and Security Informatics, Lecture Notes in Computer Science, Vol. 3695, Springer-Verlag, pp. 99-114, 2005.
Peng Wang, Yongdae Kim, Vishal Kher, and Taekyoung Kwon, “Strengthening password-based authentication protocols against online dictionary attacks,” Applied Cryptography and Network Security, Lecture Notes in Computer Science, Vol. 3531, Springer-Verlag, pp. 17-32, 2005.
Taekyoung Kwon, “Authenticated key agreement without subgroup element verification,” Computational Science and Its Applications, Lecture Notes in Computer Science, Vol. 3480, Springer-Verlag, pp. 577-583, 2005.
Taekyoung Kwon and Hyeonjoon Moon, “A model for multi-modal biometrics with PKIs for border control applications,” Computational Science and Its Applications, Lecture Notes in Computer Science, Vol. 3480, Springer-Verlag, pp. 584-590, 2005.
Taekyoung Kwon, Young-Ho Park, and Hee Jung Lee, “Security Analysis and Improvement of the Efficient Password-based Authentication Protocol,” IEEE Communications Letters, Vol. 9, No. 1, pp.93-95, January 2005. (Note: For security, K_A and K_B must be modified to g^{(x+e)y} mod p where e=h(X), instead of g^{(x+1)y} mod p. It’s easy. Read my ISC 2004 paper for more details.)
Yong-guk Kim and Taekyoung Kwon,” An authentication scheme based upon face recognition for the mobile environment,” Computer and Information Systems, Lecture Notes in Computer Science, Vol. 3314, Springer-Verlag, pp. 274-279, Dec. 2004.
Hyung-Woo Lee, Taekyoung Kwon, et al., “Reflector attack traceback system with pushback based iTrace mechanism,” Information and Communications Security, Lecture Notes in Computer Science, Vol. 3269, Springer-Verlag, pp. 236-248, Oct. 2004.
Genebeck Hahn, Taekyoung Kwon, and Jooseok Song, “Design and analysis of adapted authentication protocol for GSM roaming users,” Network and Parallel Computing, Lecture Notes in Computer Science, Vol. 3222, Springer-Verlag, pp. 451-458, Oct. 2004.
Sanghoon Song and Taekyoung Kwon, “Domain-based proxy for efficient location tracking of mobile agents,” Network and Parallel Computing, Lecture Notes in Computer Science, Vol. 3222, Springer-Verlag, pp. 205-212, Oct. 2004.
Hyung-Woo Lee, Taekyoung Kwon, and Hyung-Jong Kim, “NS-2 based IP traceback simulation against reflector based DDoS attack,” Artificial Intelligience and Simulation, Lecture Notes in Computer Science, Vol. 3397, Springer-Verlag, pp. 90-99, Oct. 2004.
Taekyoung Kwon, “Practical authenticated key agreement using passwords,” Information Security, Lecture Notes in Computer Science, Vol. 3225, Springer-Verlag, pp. 1-12, Sep. 2004.
Taekyoung Kwon and Jae-Il Lee, “Practical digital signature generation using biometrics,” Computational Science and Its Applications, Lecture Notes in Computer Science, Vol. 3043, Springer-Verlag, pp. 728-737, May 2004.
Taekyoung Kwon and Seongan Lim, “Automation-Considered Logic of Authentication and Key Distribution,” Information Security Applications, Lecture Notes in Computer Science, Vol. 2908, Springer-Verlag, pp. 442-457, Jan. 2004.
Taekyoung Kwon, “Refinement and Improvement of Virtual Software Token Protocols,” IEEE Communications Letters, Vol. 8, No. 1, pp. 75-77, Jan. 2004.
Sanghoon Song, Taekyoung Kwon, and Ki-Song Yoon, “Practical Security Improvement Of PKCS#5,” Computer and Information Sciences, Lecture Notes in Computer Science, Vol. 2869, Springer-Verlag, pp. 869-876, Nov. 2003.
Taekyoung Kwon, “Robust Software Tokens – Yet another method for securing user’s digital identity,” Information Security and Privacy, Lecture Notes in Computer Science, Vol. 2727, Springer-Verlag, pp. 476-487, Jul. 2003.
Jae-Il Lee, Taekyoung Kwon, Sanghoon Song, and Jooseok Song, “A model for embedding and authorizing digital signatures in printed documents,” Information Security and Cryptology, Lecture Notes in Computer Science, Vol. 2587, Springer-Verlag, pp. 465-477, Mar. 2003.
Taekyoung Kwon, “Virtual Software Tokens: A practical way to secure PKI roaming,” Infrastructure Security, Lecture Notes in Computer Science, Vol. 2437, Springer-Verlag, pp. 288-302, Oct. 2002.
Taekyoung Kwon, “On the difficulty of protecting private keys in software,” Information Security, Lecture Notes in Computer Science, Vol. 2433, Springer-Verlag, pp.17-31, Sep. 2002.
Taekyoung Kwon, Sangyoon Lee, Youngsik Choi, and Haekwang Kim, “Hybrid Networked Cryptographic Devices in Practice,” IEICE Transactions on Communications, Vol. E85-B, No.9, pp. 1832-1834, Sep. 2002.
Taekyoung Kwon, “Impersonation Attacks on Software-Only Two-Factor Authentication Schemes,” IEEE Communications Letters, Vol. 6, Iss. 8, pp. 358-360, Aug. 2002.
Sangyoon Lee, Youngsik Choi, Taekyoung Kwon, and Haekwang Kim, “Shape-Sequence-based Key Image Generation Algorithm for Browsing and Retrieval of Video Clips,” IEE Electronics Letters, Vol. 38, No. 12, pp. 549-550, Jun. 2002.
Taekyoung Kwon, “Digital signature algorithm for securing digital identities,” Information Processing Letters, Vol. 82, Iss. 5, pp. 247-252, Apr. 2002.
Taekyoung Kwon and Jooseok Song, “A Study on the Generalized Key Agreement and Password Authentication Protocol,” IEICE Transactions on Communications, Vol. E83-B, No.9, pp. 2044-2050, Sep. 2000.
Taekyoung Kwon, Myeongho Kang, Sangjoon Jung, and Jooseok Song, “An Improvement of K1P on Security Against Replay Attacks,” IEICE Transactions on Communications, Vol. E82-B, No. 7, pp. 991-997, Jul. 1999.
Taekyoung Kwon and Jooseok Song, “Secure Agreement Scheme for g^xy via Password Authentication,” IEE Electronics Letters, Vol. 35, No. 11, pp. 892-893, May 1999.
Taekyoung Kwon and Jooseok Song, “Clarifying straight replays and forced delays,” ACM Operating Systems Review, pp. 47-52, Vol. 33, No. 1, Jan. 1999.
등…