International Papers

2021

  • [115]

    Mohammed Abuhamad, Tamer Abuhmed, David Mohaisen, DaeHun Nyang

    , "Large-Scale and Robust Code Authorship Identification with Deep Feature Learning" ACM Transactions on Privacy and Security,  Just Accepted, October 2021
  • [114]

    Changhun Jung, Jinchun Choi, Rhongho Jang, David Mohaisen, DaeHun Nyang

    , "A Network-independent Tool-based Usable Authentication System for Internet of Things Devices" Computers and Security,  Just Accepted, October 2021
  • [113]

    Muhammad Saad, Zhan Qin, Kui Ren, DaeHun Nyang, David Mohaisen

    , "e-PoS: Making Proof-of-Stake Decentralized and Fair" IEEE Transactions on Parallel and Distributed Systems,  Early Access available at IeeeXplore, December 2021
  • [112]

    Muhammad Saad, Joongheon Kim, DaeHun Nyang, David Mohaisen

    , "Contra-*: Mechanisms for Countering Spam Attacks on Blockchain’s Memory Pools" Journal of Network and Computer Applications,  Preprint available at ScienceDirect, December 2021
  • [111]

    Rhongho Jang, Changhun Jung, David Mohaisen, Kyunghee Lee, DaeHun Nyang

    , "A One-Page Text Entry Method Optimized for Rectangle Smartwatches" IEEE Transactions on Mobile Computing,  Early Access available at IeeeXplore, December 2021
  • [110]

    Ashar Ahmad, Abdulrahman Alabduljabbar, Muhammad Saad, Joongheon Kim, DaeHun Nyang, David Mohaisen

    , "Empirically Comparing the Performance of Blockchain’s Consensus Algorithms" IET Blockchain,  Just Accepted, December 2021
  • [109]

    Ashar Ahmad, Muhammad Saad, Mohammed Al Ghamdi, DaeHun Nyang, David Mohaisen

    , "BlockTrail: A Service for Secure and Transparent Blockchain-Driven Audit Trails" IEEE Systems Journal,  Just accepted, July 2021
  • [108]

    Hisham Alasmary, Afsah Anwar, Ahmed Abusnaina, Abdulrahman Alabduljabbar, Mohammed Abuhamad, An Wang, DaeHun Nyang, Amro Awad, and David Mohaisen

    , "SHELLCORE: Automating Malicious IoT Software Detection by Using Shell Commands Representation" IEEE Internet of Things Journal,  Early Access available at IeeeXplore, June 2021 Link
  • [107]

    Ahmed Abusnaina, Mohammed Abuhamad, Hisham Alasmary, Afsah Anwar, Rhongho Jang, Saeed Salem, DaeHun Nyang, David Mohaisen

    , "DL-FHMC: Deep Learning-based Fine-grained Hierarchical Learning Approach for Robust Malware Classification" IEEE Transactions on Dependable and Secure Computing,  Just Accepted, June 2021
  • [106]

    Sultan Alshamrani, Ahmed Abusnaina, Mohammed Abuhamad, DaeHun Nyang, David Mohaisen

    , "Hate, Obscenity, and Insults: Measuring the Exposure of Children to Inappropriate Comments in YouTube" The 9th International Workshop on Natural Language Processing for Social Media (SocialNLP 2021),  April 2021
  • [105]

    Mohammed Abuhamad, Ahmed Abusnaina, DaeHun Nyang, David Mohaisen

    , "Sensor-based Continuous Authentication of Smartphones’ Users Using Behavioral Biometrics: A Contemporary Survey" IEEE Internet of Things Journal,  Vol. 8, No. 1, pp. 65-84, January 2021

2020

  • [104]

    Sungha Baek, Youngdon Jung, David Mohaisen, Sungjin Lee, DaeHun Nyang

    , "SSD-assisted Ransomware Detection and Data Recovery Techniques" IEEE Transactions on Computers,  Early Access available at IeeeXplore, December 2020
  • [103]

    Aminollah Khormali, Ahmed Abusnaina, Songqing Chen, DaeHun Nyang, David Mohaisen

    , "From Blue-Sky to Practical Adversarial Learning" IEEE International Conference on Collaboration and Internet Computing,  December 2020
  • [102]

    Muhammad Saad, Jeffrey Spaulding, Laurent Njilla, Charles Kamhoua, Sachin Shetty, DaeHun Nyang, Aziz Mohaisen

    , "Exploring the Attack Surface of Blockchain: A Comprehensive Survey" IEEE Communications Surveys and Tutorials,  Vol. 22, No. 3, pp. 1977-2008, September 2020
  • [101]

    Aziz Mohaisen, Zhongshu Gu, Kui Ren, Charles Kamhoua, Laurent Njilla, DaeHun Nyang

    , "Look-aside At Your Own Risk: Privacy Implications of DNSSEC Look-aside Validation" IEEE Transactions on Dependable and Secure Computing,  August 2020
  • [100]

    Ahmed Abusnaina, Mohammed Abuhamad, DaeHun Nyang, Songqing Chen, An Wang, David Mohaisen

    , "Insights into Attacks’ Progression: Prediction of Spatio-Temporal Behavior of DDoS Attacks" World conference on Information Security Applications (WISA 2020),  August 2020
  • [99]

    RhongHo Jang, DaeHong Min, SeongKwang, Aziz Mohaisen, DaeHun Nyang

    , "SketchFlow: Per-Flow Systematic Sampling Using Sketch Saturation Event" IEEE INFOCOM 2020,  July 2020
  • [98]

    RhongHo Jang, Ahmed Abusnaina, Aminollah Khormali, DaeHun Nyang, Aziz Mohaisen

    , "DFD: Adversarial Learning-based Approach to Defend Against Website Fingerprinting" IEEE INFOCOM 2020,  July 2020
  • [97]

    Mohammed Abuhamad, Tamer Abuhmed, Aziz Mohaisen, DaeHun Nyang

    , "Multi-χ: Identifying Multiple Authors from Source Code Files" Privacy Enhancing Technologies Symposium 2020,  July 2020
  • [96]

    Hisham Alasmary, Ahmed Abusnaina, Rhongho Jang, Mohammed Abuhamad, Afsah Anwar, DaeHun Nyang and David Mohaisen

    , "Soteria: Detecting Adversarial Examples in Control Flow Graph-based Malware Classifiers" IEEE International Conference on Distributed Computing Systems (ICDCS 2020),  July 2020
  • [95]

    Mohammed Abuhamad, Tamer Abuhmed, David Mohaisen, DaeHun Nyang

    , "AUToSen: Deep Learning-based Implicit Continuous Authentication Using Smartphone Sensors" IEEE Internet of Things Journal,  Vol. 7, No. 6, pp. 5008-5020, June 2020
  • [94]

    Jinchun Choi, Mohammed Abuhamad, Ahmed Abusnaina, Afsah Anwar, Sultan Alshamrani, Jeman Park, DaeHun Nyang, David Mohaisen

    , "Understanding the Proxy Ecosystem: A Comparative Analysis of Residential and Open Proxies on the Internet" IEEE Access,  Vol. 8, June 2020
  • [93]

    David Mohaisen, Jeman Park, Manar Mohaisen, DaeHun Nyang

    , "Assessing the Effectiveness of Pulsing Denial of Service Attacks under Realistic Network Synchronization Assumptions" Computer Networks,  Vol. 173, May 2020

2019

  • [92]

    Muhammad Saad, Jinchun Choi, Joongheon Kim, DaeHun Nyang, Aziz Mohaisen

    , "Towards Characterizing Blockchain-based Cryptocurrencies for Highly-Accurate Predictions" IEEE Systems Journal,  (2020 Best paper awards -- selection rate is less than 1%), December 2019 Link
  • [91]

    Jeman Park, Jinchun Choi, DaeHun Nyang, Aziz Mohaisen

    , "Transparency in the New gTLD Era: Evaluating the DNS Centralized Zone Data Service" IEEE Transactions on Network and Service Management,  December 2019 Link
  • [90]

    Rhongho Jang, Jeonil Kang, Aziz Mohaisen, DaeHun Nyang

    , "Catch Me If You Can: Rogue Access Point Detection Using Intentional Channel Interference" IEEE Transactions on Mobile Computing,  December 2019 Link
  • [89]

    Changhun Jung, Mohammed Abuhamad, Jumabek Alikhanov, Kyungja Han, Aziz Mohaisen, DaeHun Nyang

    , "W-Net: A CNN-based Architecture for White Blood Cells Image Classification" AAAI 2019 Fall Symposium on AI for Social Good,  November 2019
  • [88]

    Ahmed Abusnaina, Aminollah Khormali, DaeHun Nyang, Murat Yuksel, Aziz Mohaisen

    , "Examining the Robustness of Learning-Based DDoS Detection in Software Defined Networks" IEEE Conference on Dependable and Secure Computing,  November 2019
  • [87]

    Jinchun Choi, Ahmed Abusnaina, Afsah Anwar, An Wang, Songqing Chen, DaeHun Nyang, Aziz Mohaisen

    , "Honor Among Thieves: Towards Understanding the Dynamics and Interdependencies in IoT Botnets" IEEE Conference on Dependable and Secure Computing,  November 2019
  • [86]

    Hisham Alasmary, Aminollah Khormali, Afsah Anwar, Jeman Park, Jinchun Choi, Ahmed Abusnaina, Amro Awad, DaeHun Nyang, Aziz Mohaisen

    , "Analyzing and Detecting Emerging Internet of Things Malware: A Graph-based Approach" IEEE Internet Things of Journal,  Vol. 6, No. 5, pp. 8977-8988, October 2019 Link
  • [85]

    Rhongho Jang, SungKwang Moon, Youngtae Noh, Aziz Mohaisen, DaeHun Nyang

    , "InstaMeasure: Instant Per-flow Detection Using Large In-DRAM Working Set of Active Flows" ICDCS 2019,  July 2019 Link
  • [84]

    Baavai Dagvatur Zayabaatar, Aziz Mohaisen, KyungHee Lee, DaeHun Nyang

    , "Secure Human Authentication with Graphical Passwords" Journal of Internet Technology,  Vol. 20, No. 4, July 2019 Link
  • [83]

    Mohammed Abuhamad, Ji-su Rhim, Tamer AbuHmed, Sana Ullah, Sanggil Kang, DaeHun Nyang

    , "Code authorship identification using convolutional neural networks" Future Generation Computer Systems,  Vol. 95, pp. 104-115, June 2019 Link
  • [82]

    Muhammad Saad, Laurent Njilla, Charles Kamhoua, Joongheon Kim, DaeHun Nyang, Aziz Mohaisen

    , "Mempool Optimization for Defending Against DDoS Attacks in PoW-based Blockchain Systems" IEEE International Conference on Blockchain and Cryptocurrency (ICBC 2019),  May 2019 Link

2018

  • [81]

    Aziz Mohaisen, Omar Alrawi, Jeman Park, Joongheon Kim, DaeHun Nyang, Manar Mohaisen

    , "Network-based Analysis and Classification of Malware using Behavioral Artifacts Ordering" EAI Transactions on Security and Safety,  December 2018
  • [80]

    Hisham Alasmary, Afsah Anwar, Jeman Park, Jinchun Choi, DaeHun Nyang, Aziz Mohaisen

    , "Graph-based Comparison of IoT and Android Malware" International Conference on Computational Data & Social Networks (CSoNet 2018),  December 2018
  • [79]

    Mohammed Abuhamad, Tamer AbuHmed, Aziz Mohaisen, DaeHun Nyang

    , "Large-Scale and Language-Oblivious Code Authorship Identification" ACM Conference on Computer and Communications Security,  October 2018
  • [78]

    DaeHun Nyang, Hyoungshick Kim, Woojoo Lee, Sung-bae Kang, Geumhwan Cho, Mun-Kyu Lee, Aziz Mohaisen

    , "Two-Thumbs-Up: Physical Protection for PIN Entry Secure against Recording Attacks" Computers and Security,  Vol. 78, pp. 1-15, September 2018
  • [77]

    Jeman Park, DaeHun Nyang, Aziz Mohaisen

    , "Timing is almost everything: Realistic of the Very Short Intermittent DDoS Attacks" PST 2018 : The Sixteen International Conference on Privacy, Security and Trust (PST),  August 2018
  • [76] Afsah Anwar, Aminollah Khormali, DaeHun Nyang, Aziz Mohaisen, "Understanding the Hidden Cost of Software Vulnerabilities: Measurements and Predictions" SecureComm 2018 - 14th EAI International Conference on Security and Privacy in Communication Networks,  August 2018
  • [75] Sungha Baek, Youngdon Jung, Aziz Mohaisen, Sungjin Lee, DaeHun Nyang, "SSD-Insider: Internal Defense of Solid-State Drive against Ransomware with Perfect Data Recovery" ICDCS 2018,  July 2018
  • [74]

    ChangHun Jung, Jeonil Kang, Aziz Mohaisen, DaeHun Nyang

    , "DIGITALSEAL: A transaction authentication tool for online and offline transactions" 2018 IEEE International Conference on Acoustics, Speech and Signal Processing(ICASSP),  Calgary, Alberta, Canada, April 2018

2017

  • [73]

    Jeffrey Spaulding, DaeHun Nyang, Aziz Mohaisen

    , "Understanding the Effectiveness of Typosquatting Techniques" ACM HotWeb,  October 2017
  • [72]

    Joongheon Kim, Yeongjong Mo, Woojoo Lee, DaeHun Nyang

    , "Dynamic Security-Level Maximization for Stabilized Parallel Deep Learning Architectures in Surveillance Applications" 2017 IEEE Symposium on Privacy-Aware Computing (PAC),  pp. 192-193, Poster, August 2017
  • [71]

    Jeonil Kang, DaeHun Nyang

    , "A Privacy-Preserving Mobile Payment System for Mass Transit" IEEE Transactions on Intelligent Transportation Systems,  Vol. 18, No. 8, pp. 2192-2205, August 2017
  • [70]

    Rhongho Jang, Jeonil Kang, Aziz Mohaisen, DaeHun Nyang

    , "Highly-Accurate Rogue Access Point Detection using Intentional Channel Interference" WiSec 2017,  Poster, July 2017
  • [69]

    Rhongho Jang, DongGyu Cho, Aziz Mohaisen, Youngtae Noh, DaeHun Nyang

    , "Two-level Network Monitoring and Management in WLAN using Software-Defined Networking" WiSec 2017,  Poster, July 2017
  • [68]

    Rhongho Jang, Jeonil Kang, Aziz Mohaisen, DaeHun Nyang

    , "Rogue Access Point Detector Using Characteristics of Channel Overlapping in 802.11n" ICDCS 2017,  Demo track, June 2017
  • [67]

    Rhongho Jang, DongGyu Cho, Youngtae Noh, DaeHun Nyang

    , "RFlow+: An SDN-based WLAN Monitoring and Management Framework" IEEE INFOCOM 2017,  Best-in-session Presentation Award, Atlanta, May 2017

2016

  • [66] Mun-Kyu Lee, Pierre Michaud, Jeong Seop Sim, DaeHun Nyang, "A simple proof of optimality for the MIN cache replacement policy" Information Processing Letters,  Vol. 116, No. 2, pp. 168-170, December 2016
  • [65]

    DaeHun Nyang, DongOh Shin

    , "Recyclable Counter with Confinement for Realtime Per-flow Measurement" IEEE/ACM Transactions on Networking,  Vol. 24, No. 5, pp. 3191-3203, October 2016
  • [64] Jong-Hyuk Im, Jinchun Choi, DaeHun Nyang, Mun-Kyu Lee, "Privacy-Preserving Palm Print Authentication using Homomorphic Encryption" IEEE DataCom 2016,  pp. 878-881, Poster, August 2016
  • [63] Jung Yeon Hwang, Seongwook Eom, Ku-Young Chang, Pil Joong Lee, DaeHun Nyang, "Anonymity-Based Authenticated Key Agreement with Full Binding Property" Journal of Communications and Networks,  Vol. 18, No. 2, pp. 190-200, April 2016

2015

  • [62] Tamer AbuHmed, KyungHee Lee, DaeHun Nyang, "UOIT Keyboard: A Constructive Keyboard for Small Touchscreen Devices" IEEE Transactions on Human-Machine Systems,  Vol. 45, No. 6, pp. 782-789, December 2015
  • [61] Jung Yeon Hwang, Liqun Chen, HyunSook Cho, DaeHun Nyang, "Short Dynamic Group Signature Scheme Supporting Controllable Linkability" IEEE Transactions on Information Forensic and Security,  Vol. 10, No. 6, pp. 1109-1124, June 2015
  • [60]

    YoungJae Maeng, Aziz Mohaisen, Mun-Kyu Lee, DaeHun Nyang

    , "Transaction Authentication Using Complementary Colors" Computer and Security,  Vol. 48, pp. 167-181, February 2015

2014

  • [59]

    DaeHun Nyang, Aziz Mohaisen, Jeonil Kang

    , "Keylogging-resistant Visual Authentication Protocols" IEEE Transactions on Mobile Computing,  Vol. 13, No. 11, pp. 2566-2579, August 2014
  • [58]

    Jeonil Kang, DaeHun Nyang, KyungHee Lee

    , "Two-Factor Face Authentication using Matrix Permutation Transformation and a User Password" Information Sciences,  Vol. 269, pp. 1-20, June 2014

2013

  • [57]

    Jung Yeon Hwang, SokJoon Lee, ByungHo Chung, HyunSook Cho, DaeHun Nyang

    , "Group Signatures with Controllable Linkability for Dynamic Membership" Information Sciences,  Vol. 222, pp. 761-778, February 2013
  • [56]

    Jung Yeon Hwang, Sungwook Eom, Ku-Young Chang, Pil Joong Lee, DaeHun Nyang

    , "Anonymity-Based Authenticated Key Agreement with Full Binding Property" WISA 2012,  pp. 177-191, LNCS 7690, August 2012
  • [55]

    JuHee Ki, Jung Yeon Hwang, DaeHun Nyang, Beom-Hwan Chang, Dong Hoon Lee, Jong-in Lim

    , "Constructing Strong Identity-Based Designated Verifier Signatures with Self-Unverifiability" ETRI Journal,  Vol. 34, No. 2, pp. 235-244, April 2012
  • [54]

    Kitae Kim, Ikkwon Yie, Seongan Lim, DaeHun Nyang

    , "Batch Verification and Finding Invalid Signatures in a Group Signature Scheme" International Journal of Network Security,  Vol. 13, No. 2, pp. 61-70, September 2011
  • [53]

    Aziz Mohaisen, Tamer AbuHmed, Hun Jeong Kang, Yongdae Kim, DaeHun Nyang

    , "Mistaking friends for foes: an analysis of a social network-based Sybil defense in mobile networks" ACM International Conference on Ubiquitous Information Management and Communication,  ICUIMC 11, Article No. 28, February 2011
  • [52] Tamer AbuHmed, Jeonil Kang, DaeHun Nyang, KyungHee Lee, "A Software-Based Group Attestation for Wireless Sensor Networks" Adhoc & Sensor Wireless Networks Journal,  Vol. 13, No. 43467, pp. 121-154, January 2011
  • [51] JuHee Ki, Jung Yeon Hwang, DaeHun Nyang, Dong Hoon Lee, Jong-in Lim, "Privacy-Enhanced Deniable Authentication E-Mail Service" International Conference on Digital Enterprise and Information Systems, DEIS 2011,  pp. 16-29, CCIS 194, December 2010
  • [50]

    Kitae Kim, Ikkwon Yie, DaeHun Nyang

    , "On the Security of Two Group Signature Schemes with Forward Security" Informatica (Ljubljana),  Vol. 34, No. 2, pp. 237-242, May 2010
  • [49] Aziz Mohaisen, Nam-Su Jho, Dowon Hong, DaeHun Nyang, "Privacy Preserving Association Rule Mining Revisited: Privacy Enhancement and Resources Efficiency" IEICE Transactions on Information and System,  Vol. E93-D, No. 2, pp. 315-325, February 2010
  • [48]

    Aziz Mohaisen, DaeHun Nyang

    , "On the Inefficiency of the Resources Optimal Key Pre-Distribution Scheme for Wireless Sensor Network" Journal of Communications,  Vol. 5, No. 2, pp. 164-168, February 2010
  • [47]

    Kitae Kim, DaeHun Nyang

    , "Security Analysis of a Threshold Proxy Signature Scheme" IACR Cryptology ePrint Archive,  No. 2-3, January 2010
  • [46]

    DaeHun Nyang, Mun-Kyu Lee

    , "Improvement of Das’s Two-Factor Authentication Protocol in Wireless Sensor Networks" IACR Cryptology ePrint Archive,  No. 631, December 2009
  • [45]

    Tamer AbuHmed, Nandinbold NYAMAA, DaeHun Nyang

    , "Software-Based Remote Code Attestation in Wireless Sensor Network" IEEE conference on Global telecommunications,  pp. 4680-4687, GLOBECOM 2009, November 2009
  • [44]

    YongQing Ni, DaeHun Nyang, Xu Wang

    , "A-Kad: an anonymous P2P protocol based on Kad network" IEEE International Conference on Mobile Adhoc and Sensor Systems,  pp. 747-752, MASS 09, October 2009
  • [43]

    Tamer AbuHmed, DaeHun Nyang

    , "A Dynamic Level-based Secure Data Aggregation in Wireless Sensor Network" Joint Workshop on Information Security,  JWIS 2009, August 2009
  • [42]

    DaeHun Nyang, Akihiro Yamamura

    , "More Efficient Threshold Signature Scheme in Gap Diffie-Hellman Group" IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences,  Vol. E92-A, No. 7, pp. 1720-1723, July 2009
  • [41]

    Aziz Mohaisen, DaeHun Nyang, KyungHee Lee

    , "Hierarchical Grid-based Pairwise Key Pre-distribution in Wireless Sensor Networks" International Journal of Network Security,  Vol. 8, No. 3, pp. 282-292, May 2009
  • [40]

    Aziz Mohaisen, DaeHun Nyang, YoungJae Maeng, KyungHee Lee, Dowon Hong

    , "Grid-Based Key Pre-Distribution in Wireless Sensor Networks" KSII Transactions on Internet and Information Systems,  Vol. 3, No. 2, pp. 195-208, April 2009
  • [39]

    Aziz Mohaisen, DaeHun Nyang, Tamer AbuHmed

    , "Two-level Key Pool Design-based Random Key Pre-distribution in Wireless Sensor Networks" KSII Transactions on Internet and Information Systems,  Vol. 2, No. 5, pp. 222-238, October 2008
  • [38]

    Aziz Mohaisen, Dowon Hong, DaeHun Nyang

    , "Privacy in Location Based Services: Primitives Toward the Solution" International Conference on Networked Computing and Advanced Information Management,  pp. 572-579, NCM 08, September 2008
  • [37]

    Aziz Mohaisen, Ik Rae Jeong, Dowon Hong, Nam-Su Jho, DaeHun Nyang

    , "Data Randomization for Lightweight Secure Data Aggregation in Sensor Network" UIC 2008,  pp. 338-351, LNCS 5061, December 2007
  • [36]

    Aziz Mohaisen, YoungJae Maeng, Jeonil Kang, DaeHun Nyang, KyungHee Lee, Dowon Hong, JongWook Han

    , "Protection Techniques of Secret Information in Non-Tamper Proof Devices of Smart Home Network" UIC 2008,  pp. 548-562, LNCS 5061, December 2007
  • [35]

    Jeonil Kang, DaeHun Nyang, Aziz Mohaisen, YoungGeun Choi, KoonSoon Kim

    , "Certificate Issuing Using Proxy and Threshold Signatures in Self-initialized Ad Hoc Network" ICCSA 2007,  pp. 886-899, LNCS 4707, Part III, August 2007
  • [34]

    YoungGeun Choi, Jeonil Kang, DaeHun Nyang

    , "Proactive Code Verification Protocol in Wireless Sensor Network" ICCSA 2007,  pp. 1085-1096, LNCS 4706, Part II, August 2007
  • [33] Sin-Kyu Kim, Jaewoo Choi, DaeHun Nyang, GeneBeck Hahn, JooSeok Song, "Smart Proactive Caching Scheme for Fast Authenticated Handoff in Wireless LAN" Journal of Computer Science and Technology,  Vol. 22, No. 3, pp. 476-480, May 2007
  • [32]

    Aziz Mohaisen, YoungJae Maeng, DaeHun Nyang

    , "On Grid-Based Key Pre-Distribution: Toward Better Connectivity in Wireless Sensor Network" PAKDD 2007,  pp. 527-537, LNAI 4819, December 2006
  • [31]

    Zhul Lei, DaeHun Nyang, KyungHee Lee, HyoTaek Lim

    , "Fair Reputation Evaluating Protocol for Mobile Ad Hoc Network" CIS 2006,  pp. 683-693, LNAI 4456, December 2006
  • [30]

    Aziz Mohaisen, DaeHun Nyang, YoungJae Maeng, KyungHee Lee

    , "Structures for communication-efficient public key revocation in ubiquitous sensor network" MSN 2007,  pp. 822-833, LNCS 4864, December 2006
  • [29]

    YoungJae Maeng, Aziz Mohaisen, DaeHun Nyang

    , "Secret Key Revocation in Sensor Networks" UIC 2007,  pp. 1222-1232, LNCS 4611, December 2006
  • [28]

    DaeHun Nyang, KyungHee Lee

    , "Fuzzy Face Vault: How to Implement Fuzzy Vault with Weighted Features" HCII 2007,  pp. 491-496, LNCS 4554, December 2006
  • [27]

    Aziz Mohaisen, DaeHun Nyang

    , "Hierarchical Grid-Based Pairwise Key Predistribution Scheme for Wireless Sensor Networks" EWSN 2006,  pp. 83-98, LNCS 3868, December 2005
  • [26]

    HongKi Lee, DaeHun Nyang, JooSeok Song

    , "Message and Its Origin authentication Protocol for Data Aggregation in Sensor Networks" EUC Workshops 2006,  pp. 281-290, LNCS 4097, December 2005
  • [25]

    DaeHun Nyang, Aziz Mohaisen

    , "Cooperative Public Key Authentication Protocol in Wireless Sensor Network" UIC 2006,  pp. 864-873, LNCS 4159, December 2005
  • [24] Jihyung Lim, DaeHun Nyang, Jeonil Kang, KyungHee Lee, HyoTaek Lim, "Distributed Certificate Authority Under the Grid-Location Aided Routing Protocol" ICCSA 2006,  pp. 380-387, LNCS 3983, December 2005
  • [23] HyoTaek Lim, SaeBom Choi, DaeHun Nyang, "Implementation and Performance Analysis of ISCSI-Based Virtual Storage System with Wireless Networks" International Symposium on Computer and Information Sciences,  pp. 154-164, New Trends In Computer Networks, October 2005
  • [22]

    Jeonil Kang, DaeHun Nyang

    , "RFID Authentication Protocol with Strong Resistance against Traceability and Denial of Service Attacks" ESAS 2005,  pp. 164-175, LNCS 3813, December 2004
  • [21]

    Jeonil Kang, DaeHun Nyang, KyungHee Lee

    , "Two Factor Face Authentication Scheme with Cancelable Feature" IWBRS 2005,  pp. 67-76, LNCS 3781, December 2004
  • [20]

    JuSung Park, Jeonil Kang, DaeHun Nyang

    , "Selective Collision Based Medium Access Control Protocol for Proactive Protection of Privacy for RFID" EUC Workshops 2005,  pp. 383-392, LNCS 3823, December 2004
  • [19] GeneBeck Hahn, DaeHun Nyang, JooSeok Song, JaeIl Lee, BaeHyo Park, "Secure Cluster Based Routing Protocol Incorporating the Distributed PKI Mechanisms" IEEE Mediterranean Electrotechnical Conference,  pp. 787-790, MELECON 2004, Vol. 2, May 2004
  • [18] YouSung Kang, KyungHee Oh, ByungHo Chung, Kyoil Chung, DaeHun Nyang, "Analysis and Countermeasure on Vulnerability of WPA Key Exchange Mechanism" ICOIN 2004,  pp. 915-924, LNCS 3090, December 2003
  • [17] HyoTaek Lim, DaeHun Nyang, David Hung-Chang Du, "An Efficient Video Prefix-Caching Scheme in Wide Area Networks" ICOIN 2004,  pp. 679-688, LNCS 3090, December 2003
  • [16] DaeHun Nyang, "Armoring password based protocol using zero-knowledge with secret coin tossing" IEEE International Symposium on Information Theory,  p. 139, June 2001
  • [15] DaeHun Nyang, JooSeok Song, "Knowledge-Proof Based Versatile Smart Card Verification Protocol" ACM SIGCOMM Computer Communication Review,  Vol. 30, No. 3, pp. 39-44, July 2000
  • [14] DaeHun Nyang, JooSeok Song, "Preventing Double-Spent Coins from Revealing User’s Whole Secret" ICISC 1999,  pp. 30-37, LNCS 1787, December 1999
  • [13] DaeHun Nyang, JooSeok Song, "Symmetric identity-proving protocol for smart cards" ELECTRONICS LETTERS,  Vol. 35, No. 23, pp. 2022-2024, November 1999
  • [12] DaeHun Nyang, SangYong Lim, JooSeok Song, "A complete test sequence using cyclic sequence for conformance testing" Computer Communications,  Vol. 22, pp. 1447-1456, October 1999
  • [11] HongSe Son, DaeHun Nyang, HyungJae Cho, JaeHong Min, JooSeok Song, "Modified TCP Congestion Window Management Scheme Considering the ABR Traffic Behavior" ICOIN-13,  pp. 1D-4.1-6, January 1999
  • [10] DaeHun Nyang, JooSeok Song, "Method for hiding information in lattice" ELECTRONICS LETTERS,  Vol. 34, No. 23, pp. 2226-2228, November 1998
  • [9] DaeHun Nyang, JooSeok Song, "An interactive proof based identification and signature scheme using Euler’s totient function" IEEE International Symposium on Information Theory,  p. 82, August 1998
  • [8] HongSe Son, DaeHun Nyang, SangYong Lim, JinHo Park, Young-Han Choe, ByungMoon Chin, JooSeok Song, "An optimized test sequence satisfying the completeness criteria" International Conference on Information Networking,  pp. 621-625, ICOIN 98, January 1998
  • [7] SeungJoon Park, DaeHun Nyang, JooSeok Song, "An improved location tracking mechanism using call locality relation in personal communications services" International Conference on Information, Communications and Signal Processing,  pp. 30-34, ICICS 1997, September 1997
  • [6] SeungJoon Park, DongChun Lee, ChangYong Yang, DaeHun Nyang, JooSeok Song, "Locality based Location Tracking using Virtually Hierarchical Link in Personal Communications Services" 1997 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing,  pp. 190-193, Vol. 1, August 1997
  • [5] HongSe Son, DaeHun Nyang, JinHo Park, SangYong Lim, ByungMoon Chin, JunWon Lee, JooSeok Song, "A test sequence generation scheme satisfying the completeness criteria" 1997 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing,  pp. 560-563, Vol. 2, August 1997
  • [4] DaeHun Nyang, EaGu Kim, JooSeok Song, "An Interactive Identification Scheme Based on Quadratic Residue Problem" IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences,  Vol. E80-A, No. 7, pp. 1330-1335, July 1997
  • [3] HyoTaek Lim, DaeHun Nyang, JooSeok Song, "New Sequence Number for AAL 3-4 in ATM Networks" IEICE Transactions on Communications,  Vol. E80-B, No. 2, pp. 379-380, February 1997
  • [2] DaeHun Nyang, JooSeok Song, "Fast digital signature scheme based on the quadratic residue problem" ELECTRONICS LETTERS,  Vol. 33, No. 3, pp. 205-206, January 1997
  • [1] HyoTaek Lim, DaeHun Nyang, JooSeok Song, "Improving the performance of cell-loss recovery in ATM networks" ELECTRONICS LETTERS,  Vol. 32, No. 17, pp. 1540-1542, August 1996