Research

International Journal 36

  1. Jeonil Kang and DaeHun Nyang, “A Privacy-Preserving Mobile Payment System for Mass Transit,” IEEE Transactions on Intelligent Transportation Systems, Accepted, Dec 9999.
  2. DaeHun Nyang and DongOh Shin, “Recyclable Counter with Confinement for Realtime Per-flow Measurement,” IEEE/ACM Transactions on Networking, Vol. 24, No. 5, Accepted, pp. 3191-3203, Dec 2016.
  3. Mun-Kyu Lee, Pierre Michaud, Jeong Seop Sim, and DaeHun Nyang, “A Simple Proof of Optimality for The MIN Cache Replacement Policy,” Information Processing Letters, Vol. 116, No. 2, pp. 168-170, Dec 2016.
  4. Jung Yeon Hwang, Seongwook Eom, Ku-Young Chang, Pil Joong Lee, and DaeHun Nyang, “Anonymity-Based Authenticated Key Agreement with Full Binding Property,” Journal of Communications and Networks, Vol. 18, No. 2, pp. 190-200, Apr 2016.
  5. Tamer AbuHmed, KyungHee Lee, and DaeHun Nyang, “UOIT Keyboard: A Constructive Keyboard for Small Touchscreen Devices,” IEEE Transactions on Human-Machine Systems, Vol. 45, No. 6, pp. 782-789, Dec 2015.
  6. Jung Yeon Hwang, Liqun Chen, HyunSook Cho, and DaeHun Nyang, “Short Dynamic Group Signature Scheme Supporting Controllable Linkability,” IEEE Transactions on Information Forensic and Security, Vol. 10, No. 6, pp. 1109-1124, Jun 2015.
  7. YoungJae Maeng, Abedelaziz Mohaisen, Mun-Kyu Lee, and DaeHun Nyang, “Transaction Authentication Using Complementary Colors,” Computer and Security, Vol. 48, pp. 167-181, Feb 2015.
  8. DaeHun Nyang, Abedelaziz Mohaisen, and Jeonil Kang, “Keylogging-resistant Visual Authentication Protocols,” IEEE Transactions on Mobile Computing, Vol. 13, No. 11, pp. 2566-2579, Nov 2014.
  9. Jeonil Kang, DaeHun Nyang, and KyungHee Lee, “Two-Factor Face Authentication Using Matrix Permutation Transformation And A User Password,” Information Sciences, Vol. 269, pp. 1-20, Jun 2014.
  10. Jung Yeon Hwang, SokJoon Lee, ByungHo Chung, HyunSook Cho, and DaeHun Nyang, “Group Signatures with Controllable Linkability for Dynamic Membership,” Information Sciences, Vol. 222, pp. 761-778, Feb 2013.
  11. JuHee Ki, Jung Yeon Hwang, DaeHun Nyang, Beom-Hwan Chang, Dong Hoon Lee, and Jong-in Lim, “Constructing Strong Identity-Based Designated Verifier Signatures with Self-Unverifiability,” ETRI Journal, Vol. 34, No. 2, pp. 235-244, Apr 2012.
  12. Tamer AbuHmed, Jeonil Kang, DaeHun Nyang, and KyungHee Lee, “A Software-Based Group Attestation for Wireless Sensor Networks,” Adhoc & Sensor Wireless Networks Journal, Vol. 13, No. 1-2, pp. 121-154, Jan 2011.
  13. Kitae Kim, Ikkwon Yie, and DaeHun Nyang, “On The Security of Two Group Signature Schemes with Forward Security,” Informatica (Ljubljana), Vol. 34, No. 2, pp. 237-242, May 2010.
  14. Abedelaziz Mohaisen, Nam-Su Jho, Dowon Hong, and DaeHun Nyang, “Privacy Preserving Association Rule Mining Revisited: Privacy Enhancement And Resources Efficiency,” IEICE Transactions on Information and System, Vol. E93-D, No. 2, pp. 315-325, Feb 2010.
  15. DaeHun Nyang and Akihiro Yamamura, “More Efficient Threshold Signature Scheme in Gap Diffie-Hellman Group,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E92-A, No. 7, pp. 1720-1723, Jul 2009.
  16. Abedelaziz Mohaisen, DaeHun Nyang, YoungJae Maeng, KyungHee Lee, and Dowon Hong, “Grid-Based Key Pre-Distribution in Wireless Sensor Networks,” KSII Transactions on Internet and Information Systems, Vol. 3, No. 2, pp. 195-208, Apr 2009.
  17. Abedelaziz Mohaisen, DaeHun Nyang, and Tamer AbuHmed, “Two-level Key Pool Design-based Random Key Pre-distribution in Wireless Sensor Networks,” KSII Transactions on Internet and Information Systems, Vol. 2, No. 5, pp. 222-238, Oct 2008.
  18. Sin-Kyu Kim, Jaewoo Choi, DaeHun Nyang, GeneBeck Hahn, and JooSeok Song, “Smart Proactive Caching Scheme for Fast Authenticated Handoff in Wireless LAN,” Journal of Computer Science and Technology, Vol. 22, No. 3, pp. 476-480, May 2007.
  19. Abedelaziz Mohaisen and DaeHun Nyang, “Hierarchical Grid-Based Pairwise Key Predistribution Scheme for Wireless Sensor Networks,” EWSN 2006, LNCS 3868, pp. 83-98, 2006.
  20. HongKi Lee, DaeHun Nyang, and JooSeok Song, “Message And Its Origin Authentication Protocol for Data Aggregation in Sensor Networks,” EUC Workshops 2006, LNCS 4097, pp. 281-290, 2006.
  21. DaeHun Nyang and Abedelaziz Mohaisen, “Cooperative Public Key Authentication Protocol in Wireless Sensor Network,” UIC 2006, LNCS 4159, pp. 864-873, 2006.
  22. Jihyung Lim, DaeHun Nyang, Jeonil Kang, KyungHee Lee, and HyoTaek Lim, “Distributed Certificate Authority Under The Grid-Location Aided Routing Protocol,” ICCSA 2006, LNCS 3983, pp. 380-387, 2006.
  23. Jeonil Kang and DaeHun Nyang, “RFID Authentication Protocol with Strong Resistance Against Traceability And Denial of Service Attacks,” ESAS 2005, LNCS 3813, pp. 164-175, 2005.
  24. Jeonil Kang, DaeHun Nyang, and KyungHee Lee, “Two Factor Face Authentication Scheme with Cancelable Feature,” IWBRS 2005, LNCS 3781, pp. 67-76, 2005.
  25. JuSung Park, Jeonil Kang, and DaeHun Nyang, “Selective Collision Based Medium Access Control Protocol for Proactive Protection of Privacy for RFID,” EUC Workshops 2005, LNCS 3823, pp. 383-392, 2005.
  26. YouSung Kang, KyungHee Oh, ByungHo Chung, Kyoil Chung, and DaeHun Nyang, “Analysis And Countermeasure on Vulnerability of WPA Key Exchange Mechanism,” ICOIN 2004, LNCS 3090, pp. 915-924, 2004.
  27. HyoTaek Lim, DaeHun Nyang, and David Hung-Chang Du, “An Efficient Video Prefix-Caching Scheme in Wide Area Networks,” ICOIN 2004, LNCS 3090, pp. 679-688, 2004.
  28. DaeHun Nyang and JooSeok Song, “Knowledge-Proof Based Versatile Smart Card Verification Protocol,” ACM SIGCOMM Computer Communication Review, Vol. 30, No. 3, pp. 39-44, Jul 2000.
  29. DaeHun Nyang and JooSeok Song, “Preventing Double-Spent Coins From Revealing User’s Whole Secret,” ICISC 1999, LNCS 1787, pp. 30-37, 2000.
  30. DaeHun Nyang and JooSeok Song, “Symmetric Identity-proving Protocol for Smart Cards,” ELECTRONICS LETTERS, Vol. 35, No. 23, pp. 2022-2024, Nov 1999.
  31. DaeHun Nyang, SangYong Lim, and JooSeok Song, “A Complete Test Sequence Using Cyclic Sequence for Conformance Testing,” Computer Communications, Vol. 22, pp. 1447-1456, Oct 1999.
  32. DaeHun Nyang and JooSeok Song, “Method for Hiding Information in Lattice,” ELECTRONICS LETTERS, Vol. 34, No. 23, pp. 2226-2228, Nov 1998.
  33. DaeHun Nyang, EaGu Kim, and JooSeok Song, “An Interactive Identification Scheme Based on Quadratic Residue Problem,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E80-A, No. 7, pp. 1330-1335, Jul 1997.
  34. HyoTaek Lim, DaeHun Nyang, and JooSeok Song, “New Sequence Number for AAL 3-4 in ATM Networks,” IEICE Transactions on Communications, Vol. E80-B, No. 2, pp. 379-380, Feb 1997.
  35. DaeHun Nyang and JooSeok Song, “Fast Digital Signature Scheme Based on The Quadratic Residue Problem,” ELECTRONICS LETTERS, Vol. 33, No. 3, pp. 205-206, Jan 1997.
  36. HyoTaek Lim, DaeHun Nyang, and JooSeok Song, “Improving The Performance of Cell-loss Recovery in ATM Networks,” ELECTRONICS LETTERS, Vol. 32, No. 17, pp. 1540-1542, Aug 1996.

International Journal/Review/Magazine 5

  1. Kitae Kim, Ikkwon Yie, Seongan Lim, and DaeHun Nyang, “Batch Verification And Finding Invalid Signatures in A Group Signature Scheme,” International Journal of Network Security, Vol. 13, No. 2, pp. 61-70, Sep 2011.
  2. Kitae Kim and DaeHun Nyang, “Security Analysis of A Threshold Proxy Signature Scheme,” IACR Cryptology ePrint Archive, No. 400, Jul 2010.
  3. Abedelaziz Mohaisen and DaeHun Nyang, “On The Inefficiency of The Resources Optimal Key Pre-Distribution Scheme for Wireless Sensor Network,” Journal of Communications, Vol. 5, No. 2, pp. 164-168, Feb 2010.
  4. DaeHun Nyang and Mun-Kyu Lee, “Improvement of Das’s Two-Factor Authentication Protocol in Wireless Sensor Networks,” IACR Cryptology ePrint Archive, No. 631, Dec 2009.
  5. Abedelaziz Mohaisen, DaeHun Nyang, and KyungHee Lee, “Hierarchical Grid-based Pairwise Key Pre-distribution in Wireless Sensor Networks,” International Journal of Network Security, Vol. 8, No. 3, pp. 282-292, May 2009.

International Conference 31

  1. Rhongho Jang, Jeonil Kang, Abedelaziz Mohaisen, and DaeHun Nyang, “Highly-Accurate Rogue Access Point Detection Using Intentional Channel Interference,” Proceedings of WiSec 2017, Poster, Jul 2017.
  2. Rhongho Jang, DongGyu Cho, Abedelaziz Mohaisen, Youngtae Noh, and DaeHun Nyang, “Two-level Network Monitoring And Management in WLAN Using Software-Defined Networking,” Proceedings of WiSec 2017, Poster, Jul 2017.
  3. Rhongho Jang, Jeonil Kang, Abedelaziz Mohaisen, and DaeHun Nyang, “Rogue Access Point Detector Using Characteristics of Channel Overlapping in 802.11n,” Proceedings of ICDCS 2017, Demo track, Jun 2017.
  4. Rhongho Jang, DongGyu Cho, Youngtae Noh, and DaeHun Nyang, “RFlow+: An SDN-based WLAN Monitoring And Management Framework,” Proceedings of IEEE INFOCOM 2017, Best-in-session Presentation Award, Atlanta, pp. 00-00, May 2017.
  5. Jeffrey Spaulding, DaeHun Nyang, and Abedelaziz Mohaisen, “Understanding The E Ectiveness of Typosqua Ing Techniques,” Proceedings of ACM HotWeb, Jan 2017.
  6. Jong-Hyuk Im, Jinchun Choi, DaeHun Nyang, and Mun-Kyu Lee, “Privacy-Preserving Palm Print Authentication Using Homomorphic Encryption,” Proceedings of IEEE DataCom 2016, Poster, pp. 878-881, Aug 2016.
  7. Jung Yeon Hwang, Sungwook Eom, Ku-Young Chang, Pil Joong Lee, and DaeHun Nyang, “Anonymity-Based Authenticated Key Agreement with Full Binding Property,” WISA 2012, LNCS 7690, pp. 177-191, 2012.
  8. Abedelaziz Mohaisen, Tamer AbuHmed, Hun Jeong Kang, Yongdae Kim, and DaeHun Nyang, “Mistaking Friends for Foes: An Analysis of A Social Network-based Sybil Defense in Mobile Networks,” Proceedings of ACM International Conference on Ubiquitous Information Management and Communication, ICUIMC 11, Article No. 28, Feb 2011.
  9. JuHee Ki, Jung Yeon Hwang, DaeHun Nyang, Dong Hoon Lee, and Jong-in Lim, “Privacy-Enhanced Deniable Authentication E-Mail Service,” Proceedings of International Conference on Digital Enterprise and Information Systems, DEIS 2011, CCIS 194, pp. 16-29, 2011.
  10. Tamer AbuHmed, Nandinbold NYAMAA, and DaeHun Nyang, “Software-Based Remote Code Attestation in Wireless Sensor Network,” Proceedings of IEEE conference on Global telecommunications, GLOBECOM 09, pp. 4680-4687, Nov 2009.
  11. YongQing Ni, DaeHun Nyang, and Xu Wang, “A-Kad: An Anonymous P2P Protocol Based on Kad Network,” Proceedings of IEEE International Conference on Mobile Adhoc and Sensor Systems, MASS 09, pp. 747-752, Oct 2009.
  12. Tamer AbuHmed and DaeHun Nyang, “A Dynamic Level-based Secure Data Aggregation in Wireless Sensor Network,” Proceedings of Joint Workshop on Information Security, JWIS 2009, Aug 2009.
  13. Abedelaziz Mohaisen, Dowon Hong, and DaeHun Nyang, “Privacy in Location Based Services: Primitives Toward The Solution,” Proceedings of International Conference on Networked Computing and Advanced Information Management, NCM 08, pp. 572-579, Sep 2008.
  14. Abedelaziz Mohaisen, Ik Rae Jeong, Dowon Hong, Nam-Su Jho, and DaeHun Nyang, “Data Randomization for Lightweight Secure Data Aggregation in Sensor Network,” UIC 2008, LNCS 5061, pp. 338-351, 2008.
  15. Abedelaziz Mohaisen, YoungJae Maeng, Jeonil Kang, DaeHun Nyang, KyungHee Lee, Dowon Hong, and JongWook Han, “Protection Techniques of Secret Information in Non-Tamper Proof Devices of Smart Home Network,” UIC 2008, LNCS 5061, pp. 548-562, 2008.
  16. Jeonil Kang, DaeHun Nyang, Abedelaziz Mohaisen, YoungGeun Choi, and KoonSoon Kim, “Certificate Issuing Using Proxy And Threshold Signatures in Self-initialized Ad Hoc Network,” ICCSA 2007, LNCS 4707, Part III, pp. 886-899, 2007.
  17. YoungGeun Choi, Jeonil Kang, and DaeHun Nyang, “Proactive Code Verification Protocol in Wireless Sensor Network,” ICCSA 2007, LNCS 4706, Part II, pp. 1085-1096, 2007.
  18. Abedelaziz Mohaisen, YoungJae Maeng, and DaeHun Nyang, “On Grid-Based Key Pre-Distribution: Toward Better Connectivity in Wireless Sensor Network,” PAKDD 2007, LNAI 4819, pp. 527-537, 2007.
  19. Zhul Lei, DaeHun Nyang, KyungHee Lee, and HyoTaek Lim, “Fair Reputation Evaluating Protocol for Mobile Ad Hoc Network,” CIS 2006, LNAI 4456, pp. 683-693, 2007.
  20. Abedelaziz Mohaisen, DaeHun Nyang, YoungJae Maeng, and KyungHee Lee, “Structures for Communication-efficient Public Key Revocation in Ubiquitous Sensor Network,” MSN 2007, LNCS 4864, pp. 822-833, 2007.
  21. YoungJae Maeng, Abedelaziz Mohaisen, and DaeHun Nyang, “Secret Key Revocation in Sensor Networks,” UIC 2007, LNCS 4611, pp. 1222-1232, 2007.
  22. DaeHun Nyang and KyungHee Lee, “Fuzzy Face Vault: How to Implement Fuzzy Vault with Weighted Features,” HCII 2007, LNCS 4554, pp. 491-496, 2007.
  23. HyoTaek Lim, SaeBom Choi, and DaeHun Nyang, “Implementation And Performance Analysis of ISCSI-Based Virtual Storage System with Wireless Networks,” Proceedings of International Symposium on Computer and Information Sciences, New Trends In Computer Networks, pp. 154-164, Oct 2005.
  24. GeneBeck Hahn, DaeHun Nyang, JooSeok Song, JaeIl Lee, and BaeHyo Park, “Secure Cluster Based Routing Protocol Incorporating The Distributed PKI Mechanisms,” Proceedings of IEEE Mediterranean Electrotechnical Conference, MELECON 2004, Vol. 2, pp. 787-790, May 2004.
  25. DaeHun Nyang, “Armoring Password Based Protocol Using Zero-knowledge with Secret Coin Tossing,” Proceedings of IEEE International Symposium on Information Theory, p. 139, Jun 2001.
  26. HongSe Son, DaeHun Nyang, HyungJae Cho, JaeHong Min, and JooSeok Song, “Modified TCP Congestion Window Management Scheme Considering The ABR Traffic Behavior,” Proceedings of ICOIN-13, pp. 1D-4.1-6, Jan 1999.
  27. DaeHun Nyang and JooSeok Song, “An Interactive Proof Based Identification And Signature Scheme Using Euler’s Totient Function,” Proceedings of IEEE International Symposium on Information Theory, p. 82, Aug 1998.
  28. HongSe Son, DaeHun Nyang, SangYong Lim, JinHo Park, Young-Han Choe, ByungMoon Chin, and JooSeok Song, “An Optimized Test Sequence Satisfying The Completeness Criteria,” Proceedings of International Conference on Information Networking, ICOIN 98, pp. 621-625, Jan 1998.
  29. SeungJoon Park, DaeHun Nyang, and JooSeok Song, “An Improved Location Tracking Mechanism Using Call Locality Relation in Personal Communications Services,” Proceedings of International Conference on Information, Communications and Signal Processing, ICICS 1997, pp. 30-34, Sep 1997.
  30. SeungJoon Park, DongChun Lee, ChangYong Yang, DaeHun Nyang, and JooSeok Song, “Locality Based Location Tracking Using Virtually Hierarchical Link in Personal Communications Services,” Proceedings of 1997 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, Vol. 1, pp. 190-193, Aug 1997.
  31. HongSe Son, DaeHun Nyang, JinHo Park, SangYong Lim, ByungMoon Chin, JunWon Lee, and JooSeok Song, “A Test Sequence Generation Scheme Satisfying The Completeness Criteria,” Proceedings of 1997 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, Vol. 2, pp. 560-563, Aug 1997.

International Award 2

  1. Rhongho Jang, DongGyu Cho, Youngtae Noh, and DaeHun Nyang, “RFlow+: An SDN-based WLAN Monitoring And Management Framework,” Proceedings of IEEE INFOCOM 2017, Best-in-session Presentation Award, May 2017.
  2. Jong-Hyuk Im, Jinchun Choi, DaeHun Nyang, and Mun-Kyu Lee, “Privacy-Preserving Palm Print Authentication Using Homomorphic Encryption,” IEEE DataCom 2016, Best Poster Award, Aug 2016.