default search action
Sooyeon Shin
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c6]Sooyeon Shin:
The Day Spring Comes. SIGGRAPH Asia Computer Animation Festival 2023: 14:1 - 2020
- [j13]Sooyeon Shin, Taekyoung Kwon:
A Privacy-Preserving Authentication, Authorization, and Key Agreement Scheme for Wireless Sensor Networks in 5G-Integrated Internet of Things. IEEE Access 8: 67555-67571 (2020)
2010 – 2019
- 2019
- [j12]Yeeun Ku, Leo Hyun Park, Sooyeon Shin, Taekyoung Kwon:
Draw It As Shown: Behavioral Pattern Lock for Mobile User Authentication. IEEE Access 7: 69363-69378 (2019) - [j11]Sooyeon Shin, Kyounghoon Kim, Taekyoung Kwon:
Detection of malicious packet dropping attacks in RPL-based internet of things. Int. J. Ad Hoc Ubiquitous Comput. 31(2): 133-141 (2019) - [j10]Sooyeon Shin, Taekyoung Kwon:
A Lightweight Three-Factor Authentication and Key Agreement Scheme in Wireless Sensor Networks for Smart Homes. Sensors 19(9): 2012 (2019) - 2018
- [j9]Sooyeon Shin, Taekyoung Kwon:
Two-Factor Authenticated Key Agreement Supporting Unlinkability in 5G-Integrated Wireless Sensor Networks. IEEE Access 6: 11229-11241 (2018) - [c5]Yeeun Ku, Leo Hyun Park, Sooyeon Shin, Taekyoung Kwon:
A Guided Approach to Behavioral Authentication. CCS 2018: 2237-2239 - 2017
- [j8]Sooyeon Shin, Taekyoung Kwon:
A corrupted cloud and corrupted multi-cloud identification method for batch auditing in cloud storage services. Comput. Syst. Sci. Eng. 32(2) (2017) - [j7]Sooyeon Shin, Minwoo Kim, Taekyoung Kwon:
Experimental performance analysis of lightweight block ciphers and message authentication codes for wireless sensor networks. Int. J. Distributed Sens. Networks 13(11) (2017) - 2015
- [j6]Sooyeon Shin, Taekyoung Kwon:
A Survey of Public Provable Data Possession Schemes with Batch Verification in Cloud Storage. J. Internet Serv. Inf. Secur. 5(3): 37-47 (2015) - [c4]Sooyeon Shin, Seungyeon Kim, Taekyoung Kwon:
Identification of Corrupted Cloud Storage in Batch Auditing for Multi-Cloud Environments. ICT-EurAsia/CONFENIS 2015: 221-225 - 2014
- [j5]Sooyeon Shin, Taekyoung Kwon:
AAnA: Anonymous authentication and authorization based on short traceable signatures. Int. J. Inf. Sec. 13(5): 477-495 (2014) - [j4]Taekyoung Kwon, Sarang Na, Sooyeon Shin:
Touch pointer: rethink point-and-click for accurate indirect touch interactions on small touchscreens. IEEE Trans. Consumer Electron. 60(3): 285-293 (2014) - [j3]Taekyoung Kwon, Sooyeon Shin, Sarang Na:
Covert Attentional Shoulder Surfing: Human Adversaries Are More Powerful Than Expected. IEEE Trans. Syst. Man Cybern. Syst. 44(6): 716-727 (2014) - 2013
- [c3]Taekyoung Kwon, Sarang Na, Sooyeon Shin:
Touch pointer: Rethink point-and-click for accurate indirect touch interactions on small touchscreens. ICCE 2013: 598-599 - 2010
- [j2]Sooyeon Shin, Gil-yong Jo, Taekyoung Kwon, Youngman Park, Haekyu Rhee:
An Experimental Study of Hierarchical Intrusion Detection for Wireless Industrial Sensor Networks. IEEE Trans. Ind. Informatics 6(4): 744-757 (2010)
2000 – 2009
- 2007
- [j1]Sooyeon Shin, Taekyoung Kwon:
Efficient and Secure Key Agreement for Merging Clusters in Ad-Hoc Networking Environments. IEICE Trans. Commun. 90-B(7): 1575-1583 (2007) - [c2]Taekyoung Kwon, Sang-ho Park, Sooyeon Shin:
Multi-modal Authentication for Ubiquitous Computing Environments. HCI (6) 2007: 113-121 - 2005
- [c1]Sooyeon Shin, Taekyoung Kwon:
Efficient Key Agreement for Merging Clusters in Ad-Hoc Networking Environments. EUC Workshops 2005: 996-1005
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:49 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint