Strong and robust RFID authentication enabling perfect ownership transfer CH Lim, T Kwon Information and Communications Security: 8th International Conference, ICICS …, 2006 | 243 | 2006 |
An experimental study of hierarchical intrusion detection for wireless industrial sensor networks S Shin, T Kwon, GY Jo, Y Park, H Rhy IEEE transactions on industrial informatics 6 (4), 744-757, 2010 | 193 | 2010 |
Authentication and key agreement via memorable password T Kwon NDSS (Network and Distributed System Security) Symposium, 2001 | 138 | 2001 |
A privacy-preserving authentication, authorization, and key agreement scheme for wireless sensor networks in 5G-integrated Internet of Things S Shin, T Kwon IEEE access 8, 67555-67571, 2020 | 119 | 2020 |
Covert attentional shoulder surfing: Human adversaries are more powerful than expected T Kwon, S Shin, S Na IEEE Transactions on Systems, Man, and Cybernetics: Systems 44 (6), 716-727, 2013 | 104 | 2013 |
TinyLock: Affordable defense against smudge attacks on smartphone pattern lock systems T Kwon, S Na Computers & Security 42, 137-150, 2014 | 87 | 2014 |
Secure and efficient broadcast authentication in wireless sensor networks T Kwon, J Hong IEEE Transactions on Computers 59 (8), 1120-1133, 2009 | 76 | 2009 |
A lightweight three-factor authentication and key agreement scheme in wireless sensor networks for smart homes S Shin, T Kwon Sensors 19 (9), 2012, 2019 | 75 | 2019 |
Analysis and improvement of a pin-entry method resilient to shoulder-surfing and recording attacks T Kwon, J Hong IEEE Transactions on Information Forensics and Security 10 (2), 278-292, 2014 | 71 | 2014 |
Group connectivity model for industrial wireless sensor networks JH Lee, T Kwon, JS Song IEEE Transactions on Industrial Electronics 57 (5), 1835-1844, 2009 | 71 | 2009 |
Two-factor authenticated key agreement supporting unlinkability in 5G-integrated wireless sensor networks S Shin, T Kwon IEEE Access 6, 11229-11241, 2018 | 68 | 2018 |
A time-based key management protocol for wireless sensor networks J Jang, T Kwon, J Song International conference on information security practice and experience …, 2007 | 68 | 2007 |
An improvement of the password-based authentication protocol (K1P) on security against replay attacks T Kwon, M Kang, S Jung, J Song IEICE Transactions on Communications 82 (7), 991-997, 1999 | 63 | 1999 |
Location-based key management strong against insider threats in wireless sensor networks J Choi, J Bang, LH Kim, M Ahn, T Kwon IEEE Systems Journal 11 (2), 494-502, 2015 | 60 | 2015 |
Intriguer: Field-level constraint solving for hybrid fuzzing M Cho, S Kim, T Kwon ACM CCS (Conference on Computer and Communications Security), 515-530, 2019 | 58 | 2019 |
Secure agreement scheme for gxy via password authentication Kwon, Song Electronics Letters 35 (11), 892-893, 1999 | 54 | 1999 |
Draw it as shown: Behavioral pattern lock for mobile user authentication Y Ku, LH Park, S Shin, T Kwon IEEE Access 7, 69363-69378, 2019 | 49 | 2019 |
Classification and experimental analysis for clone detection approaches in wireless sensor networks K Cho, M Jo, T Kwon, HH Chen, DH Lee IEEE Systems Journal 7 (1), 26-35, 2012 | 44 | 2012 |
An adaptable and reliable authentication protocol for communication networks T Kwon, M Kang, J Song IEEE INFOCOM'97 2, 737-744, 1997 | 41 | 1997 |
Practical authenticated key agreement using passwords T Kwon International Conference on Information Security, 1-12, 2004 | 40 | 2004 |