Search filters

Authors whose works are in public domain in at least one jurisdiction

List of works by Hyoungshick Kim

<i>Blind-Match:</i> Efficient Homomorphic Encryption-Based 1:N Matching for Privacy-Preserving Biometric Identification

scientific article published on 20 October 2024

A Secure and Lightweight Three-Factor-Based Authentication Scheme for Smart Healthcare Systems

scientific article published on 12 December 2020

AdFlush: A Real-World Deployable Machine Learning Solution for Effective Advertisement and Web Tracker Prevention

scientific article published on 08 May 2024

AppSniffer: Towards Robust Mobile App Fingerprinting Against VPN

scientific article published on 26 April 2023

Design and analysis of enumeration attacks on finding friends with phone numbers: A case study with KakaoTalk

scientific article published in 2015

Efficient Privacy-Preserving Fingerprint-Based Authentication System Using Fully Homomorphic Encryption

scientific article published in 2020

Evaluation and Optimization of Distributed Machine Learning Techniques for Internet of Things

scientific article published in 2022

Hy-Bridge: A Hybrid Blockchain for Privacy-Preserving and Trustful Energy Transactions in Internet-of-Things Platforms

scientific article published on 10 February 2020

LocAuth: A fine-grained indoor location-based authentication system using wireless networks characteristics

scientific article published in 2020

Neural network laundering: Removing black-box backdoor watermarks from deep neural networks

scientific article published in 2021

O2TR: Offline OTR messaging system under network disruption

scientific article published in 2019

Secure and Efficient Three-Factor Protocol for Wireless Sensor Networks

Security challenges with network functions virtualization

scientific article published in 2017

Two-Thumbs-Up: Physical protection for PIN entry secure against recording attacks

scientific article published in 2018

Why Johnny Can’t Use Secure Docker Images: Investigating the Usability Challenges in Using Docker Image Vulnerability Scanners through Heuristic Evaluation

scientific article published on 03 October 2023