Follow
Jin Kwak
Jin Kwak
Professor @ Ajou University, Korea
Verified email at ajou.ac.kr - Homepage
Title
Cited by
Cited by
Year
Challenge-response based RFID authentication protocol for distributed database environment
K Rhee, J Kwak, S Kim, D Won
Security in Pervasive Computing: Second International Conference, SPC 2005 …, 2005
3602005
WIPI mobile platform with secure service for mobile RFID network environment
N Park, J Kwak, S Kim, D Won, H Kim
Advanced Web and Network Technologies, and Applications: APWeb 2006 …, 2006
2112006
Enhancing privacy of universal re-encryption scheme for RFID tags
J Saito, JC Ryou, K Sakurai
Embedded and Ubiquitous Computing: International Conference EUC 2004, Aizu …, 2004
1812004
IGRF-RFE: a hybrid feature selection method for MLP-based network intrusion detection on UNSW-NB15 dataset
Y Yin, J Jang-Jaccard, W Xu, A Singh, J Zhu, F Sabrina, J Kwak
Journal of Big data 10 (1), 15, 2023
812023
System hardening and security monitoring for IoT devices to mitigate IoT security vulnerabilities and threats
SK Choi, CH Yang, J Kwak
KSII Transactions on Internet and Information Systems (TIIS) 12 (2), 906-918, 2018
692018
Electrical bistabilities and carrier transport mechanisms of write-once-read-many-times memory devices fabricated utilizing ZnO nanoparticles embedded in a polystyrene layer
DY Yun, JK Kwak, JH Jung, TW Kim, DI Son
Applied Physics Letters 95 (14), 2009
642009
Cryptanalysis and improvement of password authenticated key exchange scheme between clients with different passwords
J Kim, S Kim, J Kwak, D Won
Computational Science and Its Applications–ICCSA 2004: International …, 2004
632004
Smart card-based secure authentication protocol in multi-server IoT environment
W Bae, J Kwak
Multimedia Tools and Applications 79 (23), 15793-15811, 2020
562020
Performance improvement of a movie recommendation system based on personal propensity and secure collaborative filtering
W Jeong, S Kim, D Park, J Kwak
Journal of Information Processing Systems 9 (1), 157-172, 2013
532013
Automatic malware mutant detection and group classification based on the n-gram and clustering coefficient
T Lee, B Choi, Y Shin, J Kwak
The Journal of Supercomputing 74, 3489-3503, 2018
462018
Microstrucural and optical properties of SnO {sub 2} nanoparticles formed by using a solvothermal synthesis method
JK Kwak, KH Park, DY Yun, DU Lee, TW Kim, DI Son, JH Han, JY Lee
Journal of the Korean Physical Society 57, 2010
412010
Digital forensics investigation methodology applicable for social network services
YJ Jang, J Kwak
Multimedia Tools and Applications 74, 5029-5040, 2015
402015
Improved secure anonymous authentication scheme for roaming service in global mobility networks
JS Kim, J Kwak
International Journal of Security and Its Applications 6 (3), 45-54, 2012
312012
Construction of a secure two-factor user authentication system using fingerprint information and password
W Go, K Lee, J Kwak
Journal of Intelligent Manufacturing 25, 217-230, 2014
302014
Dwroiddump: Executable code extraction from android applications for malware analysis
D Kim, J Kwak, J Ryou
International Journal of Distributed Sensor Networks 11 (9), 379682, 2015
292015
A study on IoT device authentication protocol for high speed and lightweight
SK Choi, JS Ko, J Kwak
2019 international conference on platform technology and service (PlatCon), 1-5, 2019
252019
Routing protocol for heterogeneous hierarchical wireless multimedia sensor networks
JM Kim, HS Seo, J Kwak
Wireless Personal Communications 60, 559-569, 2011
242011
A study on user authentication methodology using numeric password and fingerprint biometric information
S Ju, H Seo, S Han, J Ryou, J Kwak
BioMed research international 2013, 2013
222013
Effective and reliable malware group classification for a massive malware environment
T Lee, J Kwak
International Journal of Distributed Sensor Networks 12 (5), 4601847, 2016
212016
Enhanced SDIoT security framework models
S Choi, J Kwak
International Journal of Distributed Sensor Networks 12 (5), 4807804, 2016
182016
The system can't perform the operation now. Try again later.
Articles 1–20