International Journal
Zeinab Rezaeifar and Changhee Hahn. “Securing Multi-Client Range Queries over Encrypted Data,” Cluster Computing, DOI: 10.1007/s10586-024-04472-w, online published on 26 April 2024.
Hyundo Yoon, Muncheon Yu, Chaewon Kwak, Changhee Hahn, Dongyoung Koo, and Junbeom Hur. “Shedding Light on Blind Spot of Backward Privacy in Dynamic Searchable Symmetric Encryption,” IEEE Access, DOI: 10.1109/ACCESS.2023.3345024, online published on 19 December 2023.
Hodong Kim, Changhee Hahn, Hyunwoo J. Kim, Youngjoo Shin, and Junbeom Hur. “Deep Learning based Detection for Multiple Cache Side-channel Attacks,” IEEE Transactions on Information Forensics and Security, DOI: 10.1109/TIFS.2023.3340088, online published on 05 December 2023.
Jaehwan Park and Changhee Hahn. “Priest: Adversarial Attack Detection Techniques for Signal Injection Attacks,” IEEE Access, DOI: 10.1109/ACCESS.2023.3307133, online published on 22 August 2023.
Changhee Hahn, Hyundo Yoon, and Junbeom Hur. “Multi-Key Similar Data Search on Encrypted Storage with Secure Pay-Per-Query,” IEEE Transactions on Information Forensics and Security, DOI: 10.1109/TIFS.2023.3236178, online published on 11 January 2023.
Hyunsoo Kwon, Sangtae Lee, Minjae Kim, Changhee Hahn, and Junbeom Hur. “Certificate Transparency with Enhanced Privacy,” IEEE Transactions on Dependable and Secure Computing, DOI: 10.1109/TDSC.2022.3214235, online published on 13 October 2022.
Hyunsoo Kwon and Changhee Hahn. “Asymptotically Optimal and Secure Multiwriter/Multireader Similarity Search,” IEEE Access, DOI: 10.1109/ACCESS.2022.3208962, online published on 22 September 2022.
Changhee Hahn, Hyunsoo Kwon, Daeyeong Kim, and Junbeom Hur. “Enabling Fast Public Auditing and Data Dynamics in Cloud Services,” IEEE Transactions on Services Computing, DOI: 10.1109/TSC.2020.3030947, published on 8 August 2022.
Changhee Hahn and Junbeom Hur. “Delegatable Order-Revealing Encryption for Reliable Cross-Database Query,” IEEE Transactions on Services Computing, DOI: 10.1109/TSC.2022.3192551, online published on 20 July 2022.
Hyunsoo Kwon, Junbeom Hur, and Changhee Hahn. “Order-Hiding Range Query over Encrypted Cloud Data,” IEEE Access, DOI: 10.1109/ACCESS.2022.3192421, online published on 19 July 2022.
Changhee Hahn and Jongkil Kim. “Verifiable Outsourced Decryption of Encrypted Data from Heterogeneous Trust Networks,” IEEE Internet of Things Journal, DOI: 10.1109/JIOT.2022.3181684, online published on 09 June 2022.
Changhee Hahn, Hodong Kim, Minjae Kim, and Junbeom Hur. “VERSA: Verifiable Secure Aggregation for Cross-Device Federated Learning,” IEEE Transactions on Dependable and Secure Computing, DOI: 10.1109/TDSC.2021.3126323, online published on 09 November 2021.
Hyundo Yoon, Soojung Moon, Youngki Kim, Changhee Hahn, Wonjun Lee, and Junbeom Hur. “SPEKS: Forward Private SGX-based Public Key Encryption with Keyword Search,” Applied Sciences, DOI: 10.3390/app10217842, online published on 05 November 2020.
Changhee Hahn, Jongkil Kim, Hyunsoo Kwon, and Junbeom Hur. “Efficient IoT Management with Resilience to Unauthorized Access to Cloud Storage,” IEEE Transactions on Cloud Computing, DOI: 10.1109/TCC.2020.2985046, online published on 03 April 2020.
Hyunsoo Kwon, Hyunjae Nam, Sangtae Lee, Changhee Hahn, and Junbeom Hur. “(In-)Security of Cookies in HTTPS: Cookie Theft by Removing Cookie Flags,” IEEE Transactions on Information Forensics and Security, Vol. 15, pp. 1204-1215, 2020. DOI: 10.1109/TIFS.2019.2938416
Changhee Hahn, Hyunsoo Kwon, and Junbeom Hur. “Trustworthy Delegation toward Securing Mobile Healthcare Cyber-Physical Systems,” IEEE Internet of Things Journal, Vol. 6, No. 4, pp. 6301-6309, 2019. DOI: 10.1109/JIOT.2018.2878216
Hyunsoo Kwon, Changhee Hahn, Kyungtae Kang, and Junbeom Hur. “Secure Deduplication with Reliable and Revocable Key Management in Fog Computing,” Peer-to-Peer Networking and Applications, Vol. 12, No. 4, pp. 850-864, 2019. DOI: 10.1007/s12083-018-0682-9
Changhee Hahn, Hyungjune Shin, Hyunsoo Kwon, and Junbeom Hur. “Efficient Multi-User Similarity Search over Encrypted Data in Cloud Storage,” Wireless Personal Communications, 107(3), pp. 1337-135, 2018. DOI: 10.1007/s11277-018-5744-z
Changhee Hahn, Hyunsoo Kwon, and Junbeom Hur. “Efficient attribute-based secure data sharing with hidden policies and traceability in mobile health networks,” Mobile Information Systems, 2016. DOI: 10.1155/2016/6545873
Hyunsoo Kwon, Daeyoung Kim, Changhee Hahn, and Junbeom Hur. “Secure authentication using ciphertext policy attribute-based encryption in mobile multi-hop networks,” Multimedia Tools and Applications, 76(19), pp. 19507-19521, 2016. DOI: 10.1007/s11042-015-3187-z
Daeyoung Kim, Hyunsoo Kwon, Changhee Hahn, and Junbeom Hur. “Privacy-preserving public auditing for educational multimedia data in cloud computing,” Multimedia Tools and Applications, 75(21), pp. 13077-13091, 2015. DOI: 10.1007/s11042-015-2594-5
Hyunsoo Kwon, Changhee Hahn, Daeyoung Kim, and Junbeom Hur. “Secure deduplication for multimedia data with user revocation in cloud storage,” Multimedia Tools and Applications, 76(4) pp. 5889-5903, 2015. DOI: 10.1007/s11042-015-2595-4
Changhee Hahn, Hyunsoo Kwon, Daeyoung Kim, and Junbeom Hur. “Enhanced authentication for outsourced educational contents through provable block possession,” Multimedia Tools and Applications, 75(21), pp. 13057-13076, 2015. DOI: 10.1007/s11042-015-2593-6