Jong-Hyuk Im
Jong-Hyuk Im
inha.eduÀÇ À̸ÞÀÏ È®ÀεÊ
Á¦¸ñ
Àοë
Àοë
¿¬µµ
Security analysis and improvement of fingerprint authentication for smartphones
YH Jo, SY Jeon, JH Im, MK Lee
Mobile Information Systems 2016, 2016
252016
Privacy-preserving palm print authentication using homomorphic encryption
JH Im, JC Choi, DH Nyang, MK Lee
2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th ¡¦, 2016
72016
Privacy-preserving peer-to-peer energy trading in blockchain-enabled smart grids using functional encryption
YB Son, JH Im, HY Kwon, SY Jeon, MK Lee
Energies 13 (6), 1321, 2020
62020
Vulnerability analysis on smartphone fingerprint templates
YH Jo, SY Jeon, JH Im, MK Lee
Advanced Multimedia and Ubiquitous Engineering, 71-77, 2016
42016
Practical Privacy-Preserving Face Authentication for Smartphones Secure Against Malicious Clients
JH Im, SY Jeon, MK Lee
IEEE Transactions on Information Forensics and Security 15, 2386-2401, 2020
32020
Privacy-Preserving Electricity Billing System Using Functional Encryption
JH Im, HY Kwon, SY Jeon, MK Lee
Energies 12 (7), 1237, 2019
32019
Requirement for Secure Biometric System Design on Smartphones.
JH Im, MK Lee
Proceedings of the Korea Information Processing Society Conference, 870-871, 2015
12015
ÇÔ¼ö ¾ÏÈ£ ±â¹ÝÀÇ ¹ÙÀÌ¿ÀÀÎÁõ ±¸Çö ¹× ¼º´É Æò°¡
Àü¼ºÀ±£¬ ÀÓÁ¾Çõ£¬ À̹®±Ô
Çѱ¹Åë½ÅÇÐȸ Çмú´ëȸ³í¹®Áý, 778-779, 2019
2019
ȸ±Í ºÐ¼®À» ÀÌ¿ëÇÑ Intel SGX »óÀÇ ¾ÈÀüÇÑ Àü·Â ¼ö¿ä ¿¹Ãø
À±¿¹Áø£¬ ÀÓÁ¾Çõ£¬ À̹®±Ô
Çѱ¹Â÷¼¼´ëÄÄÇ»ÆÃÇÐȸ ³í¹®Áö 13 (4), 7-18, 2017
2017
Password Authentication Using One-Time Key-Based Signature and Homomorphic Encryption
JH Im, MK Lee
International Conference on Broadband and Wireless Computing, Communication ¡¦, 2016
2016
On-line Voting System with Illegal Ballot Filtering Using Homomorphic Encryption
MK Lee, JH Im
International Conference on Broadband and Wireless Computing, Communication ¡¦, 2016
2016
Privacy-Preserving Blind Auction Protocol Using Fully Homomorphic Encryption
JH Im, TY Youn, MK Lee
Advanced Science Letters 22 (9), 2598-2600, 2016
2016
½º¸¶Æ®Æù »óÀÇ ¾ÈÀüÇÑ ¹ÙÀÌ¿ÀÀÎ½Ä ½Ã½ºÅÛ ¼³°è¸¦ À§ÇÑ ÇÁ·¹ÀÓ¿öÅ©
ÀÓÁ¾Çõ£¬ ±ÇÈñ¿ë£¬ À̹®±Ô
Á¤º¸Ã³¸®ÇÐȸ³í¹®Áö. ÄÄÇ»ÅÍ ¹× Åë½Å½Ã½ºÅÛ 5 (2), 41-46, 2016
2016
Framework for Secure Biometric System Design on Smartphones
JH Im, HY Kwon, MK Lee
KIPS Transactions on Computer and Communication Systems 5 (2), 41-46, 2016
2016
Á¤¼ö ±â¹Ý Àϰý µ¿Çü ¾ÏÈ£ ÀÀ¿ëÀÇ ±¸Çö ¹× ¼º´É ºñ±³
ÀÓÁ¾Çõ£¬ À̹®±Ô
Çѱ¹Â÷¼¼´ëÄÄÇ»ÆÃÇÐȸ ³í¹®Áö 11 (6), 19-28, 2015
2015
¼Ò¼È ³×Æ®¿öÅ© ¼­ºñ½º »ó¿¡¼­ÀÇ Ãֱ٠Ŭ¸¯ÀçÅ· °ø°Ý µ¿Ç⠺м®
Àü¼ºÀ±£¬ Á¶°æ¹Î£¬ ÀÓÁ¾Çõ£¬ À̹®±Ô
Çѱ¹Á¤º¸°úÇÐȸ Çмú¹ßÇ¥³í¹®Áý, 2120-2122, 2015
2015
Á¤¼ö »óÀÇ ºÎºÐ µ¿Çü ¾ÏÈ£¸¦ À§ÇÑ ¾Ïȣȭ ¿¬»ê °¡¼ÓÈ­
ÀÓÁ¾Çõ£¬ ¼ÛÁ¤Àº£¬ À̹®±Ô
Çѱ¹Â÷¼¼´ëÄÄÇ»ÆÃÇÐȸ ³í¹®Áö 10 (2), 6-18, 2014
2014
´ÙÁß Å¬¶óÀÌ¾ðÆ® È¯°æ¿¡¼­ µ¿Çü ¾ÏÈ£¸¦ ÀÌ¿ëÇÑ ÇÁ¶óÀ̹ö½Ã º¸ÀåÇü K-Æò±Õ Ŭ·¯½ºÅ͸µ
±ÇÈñ¿ë£¬ ÀÓÁ¾Çõ£¬ À̹®±Ô
Çѱ¹Â÷¼¼´ëÄÄÇ»ÆÃÇÐȸ ³í¹®Áö 15 (4), 7-17, 0
ÇöÀç ½Ã½ºÅÛÀÌ ÀÛµ¿µÇÁö ¾Ê½À´Ï´Ù. ³ªÁß¿¡ ´Ù½Ã ½ÃµµÇØ ÁÖ¼¼¿ä.
ÇмúÀÚ·á 1–18