image001Junbeom Hur

Associate Professor

Information System Security Laboratory

Department of Computer Science and Engineering

College of Informatics, Korea University

 

Address: Anam-dong 5-ga, Seonbuk-gu, Seoul 136-713, Republic of Korea

Email: jbhur at korea.ac.kr

Office: Room 609B, Science Library Bldg

Tel: +82-2-3290-4603

 

Research Lab.

ü  Information System Security Lab.

 

Research Interests

ü  Applied Cryptography

ü  Network Security (TLS, web security, wireless security, etc.)

ü  Cloud and Edge Computing Security

ü  Cyber Security

 

Education

ü  Ph.D.: Computer Science, KAIST, Daejeon, Korea, 2009. 8.

ü  M.S.: Computer Science, KAIST, Daejeon, Korea, 2005. 8.

ü  B.S.: Computer Science, Korea University, Seoul, 2001. 2. (Summa Cum Laude)

 

Professional Experience

ü  Associate Professor, Department of Computer Science and Engineering, Korea University, Seoul, Korea, 2016.9 – present

ü  Assistant Professor, Department of Computer Science and Engineering, Korea University, Seoul, Korea, 2015.2 – 2016.8

ü  Assistant Professor, School of Computer Science and Engineering, Chung-Ang University, Seoul, Korea, 2011.9 – 2015.2

ü  Postdoctoral Researcher, Computer Science Department, University of Illinois at Urbana-Champaign, IL, USA, 2009.9 – 2011.8

 

Ongoing Projects

ü  Developing security and privacy architecture in distributed cloud/edge/fog computing

ü  Network security & SW vulnerability detection

ü  Developing active security control system for safe public cloud service

ü  Satellite communication security and vulnerability detection

 

International Journal Publications

ü  Youngjoo Shin, Dongyoung Koo, Junbeom Hur, "A Survey of Secure Data Deduplication Schemes for Cloud Storage Systems", ACM Computing Surveys, accepted, 2016. 12.

ü  Junbeom Hur, Dongyoung Koo, Youngjoo Shin, Kyungtae Kang, ¡°Secure Data Deduplication with Dynamic Ownership Management in Cloud Storage¡±, IEEE Transactions on Knowledge and Data Engineering, Vol. 28, No. 11, pp. 3113-3125, 2016. 11.

ü  Changhee Hahn and Junbeom Hur. "Efficient and privacy-preserving biometric identification in cloud," ICT Express, vol. 2, issue 3, pp. 135-139, 2016. 9.

ü  Changhee Hahn, Hyunsoo Kwon, Junbeom Hur, "Efficient Attribute-based Secure Data Sharing with Hidden Policies and Traceability in Mobile Health Networks", Mobile Information Systems, Vol. 2016, Article ID 6545873, 13 pages, 2016. doi:10.1155/2016/6545873 , 2016. 7. 19.

ü  Junbeom Hur, Mengxue Guo, Younsoo Park, Chan-Gun Lee, Ho-Hyun Park, ¡°Reputation-Based Collusion Detection with Majority of Colluders¡±, IEICE Transactions on Information and systems, Vol.E99-D, No.7, 2016. 7

ü  Hyunsoo Kwon, Daeyoung Kim, Changhee Hahn, Junbeom Hur, ¡°Secure Authentication using Ciphertext Policy Attribute-based Encryption in Mobile Multi-hop Networks¡±, Multimedia Tools and Applications, online publish, DOI: 10.1007/s11042-015-3187-z, 2016.1.9

ü  Junbeom Hur, Dongyoung Koo, Youngjoo Shin, ¡°Privacy-Preserving Smart Metering with Authentication in a Smart Grid¡±, Applied Sciences, Vol. 5, No.4, pp. 1503-1527, doi:10.3390/app5041503, 2015.12.1

ü  Youngjoo Shin, Dongyoung Koo, Junbeom Hur, Joobeom Yun, ¡°Secure Proof of Storage with Deduplication for Cloud Storage Systems¡±, Multimedia Tools and Applications, online publish, DOI 10.1007/s11042-015-2956-z, 2015. 9

ü  Junbeom Hur, Younho Lee, "A Reliable Group Key Management Scheme for Broadcast Encryption", Journal of Communications and Networks, accept, 2015. 8.

ü  Daeyoung Kim, Changhee Hahn, Hyunsoo Kwon, Junbeom Hur, ¡°Privacy-Preserving Public Auditing for Educational Multimedia Data in Cloud Computing¡±, Multimedia Tools and Applications, online publish, DOI 10.1007/s11042-015-2594-5, 2015. 4.

ü  Hyunsoo Kwon, Changhee Hahn, Daeyoung Kim, Junbeom Hur, ¡°Secure Deduplication for Multimedia Data with User Revocation in Cloud Storage¡±, Multimedia Tools and Applications, online publish, DOI 10.1007/s11042-015-2595-4, 2015. 4.

ü  Changhee Hahn, Hyunsoo Kwon, Daeyoung Kim, Junbeom Hur, ¡°Enhanced Authentication for Outsourced Educational Contents through Provable Block Possession¡±, Multimedia Tools and Applications, online publish, DOI 10.1007/s11042-015-2593-6, 2015. 4.

ü  Kyungtae Kang, Qixin Wang, Junbeom Hur, Kyung-Joon Park, Lui Sha, ¡°Medical-Grade Quality of Service for Real-Time Mobile Healthcare¡±, Computer, Vol. 48, No. 2, pp. 41-49, 2015. 2.

ü  Lin Dong, Jinwoo Park, Junbeom Hur, Ho-Hyun Park, ¡°An Enhanced Remote Data Checking Scheme for Dynamic Updates¡±, KSII Transactions on Internet and Information Systems, Vol. 8, No. 5, pp. 1744-1765, 2014. 5.

ü  Junbeom Hur, Kyungtae Kang, ¡°Secure Data Retrieval for Decentralized Disruption Tolerant Military Networks¡±, IEEE/ACM Transactions on Networking, Vol. 22, No. 1, pp. 16-26, 2014. 2.

ü  Junbeom Hur, ¡°Attribute-Based Secure Data Sharing with Hidden Policies in Smart Grid¡±, IEEE Transactions on Parallel and Distributed Systems, Vol. 24, No. 11, pp. 2171-2180, 2013. 11.

ü  Dong Kun Noh, Junbeom Hur, ¡°Energy-aware topology control for reliable data delivery in solar-powered WSNs¡±, EURASIP Journal on Wireless Communications and Networking, Vol. 2013 No. 258, pp. 1-13, 2013. 11. 9

ü  Junbeom Hur, ¡°Improving Security and Efficiency in Attribute-Based Data Sharing¡±, IEEE Transactions on Knowledge and Data Engineering, Vol. 25, No. 10, pp. 2271-2282, 2013. 10.

ü  Kyungtae Kang, Juyoung Park, Junbeom Hur, ¡°Cross-Layer Analysis of Protocol Delay in Mobile Devices Receiving BCMCS¡±, Wireless Networks, Vol. 19, No.7 pp 1497-1509, 2013. 10.

ü  Junbeom Hur, Dongyoung Koo, Seong Oun Hwang, Kyungtae Kang, ¡°Removing Escrow from Ciphertext Policy Attribute-Based Encryption¡±, Computers & Mathematics with Applications, Vol. 65, No. 9, pp. 1310-1317, 2013. 5.

ü  Kyungtae Kang, Junhee Ryu, Junbeom Hur, Lui Sha, ¡°Design and QoS of a Wireless System for Real-Time Remote Electrocardiography¡±, IEEE Journal of Biomedical and Health Informatics, Vol. 17, No. 3, pp. 745-755, 2013. 5.

ü  Dongyoung Koo, Junbeom Hur, Hyunsoo Yoon, ¡°Secure and Efficient Data Retrieval over Encrypted Data Using Attribute-Based Encryption in Cloud Storage¡±, Computers & Electrical Engineering, Vol. 39, No. 1, pp. 34 – 46, 2013. 1.

ü  Kyungtae Kang, Junhee Ryu, Sunghyun Choi, Kyung-Joon Park, Junbeom Hur, ¡°Towards energy-efficient error control in 3G broadcast video¡±, IEEE Wireless Communications, Vol. 19, No. 6, pp. 60-67, 2012. 12.

ü  Junbeom Hur, Kyungtae Kang, ¡°Dependable and Secure Computing in Medical Information Systems¡±, Computer Communications, Vol. 36, No.1, pp.20-38, 2012.12.

ü  Junbeom Hur, Chanil Park, Seong Oun Hwang, ¡°Privacy-Preserving Identity-Based Broadcast Encryption¡±, Information Fusion, Elsevier, vol. 13, no. 4, pp. 296-303, 2012. 10.

ü  Dong Kun Noh, Junbeom Hur, ¡°Using a dynamic backbone for efficient data delivery in solar-powered WSNs¡±, Journal of Network and Computer Applications, Vol. 35, No. 4, pp. 1277 – 1284, 2012. 7.

ü  Youngjoo Shin, Junbeom Hur (corresponding author), ¡°Scalable and efficient approach for secure group communication using proxy cryptography¡±, Wireless Networks, Vol. 18, No. 4, pp. 413–425, 2012. 5.

ü  Junbeom Hur, Chanil Park, Seong Oun Hwang, ¡°Fine-Grained User Access Control in Ciphertext-Policy Attribute-Based Encryption¡±, Security and Communication Networks, Wiley, Vol. 5, No. 3, pp. 253-261, 2012. 3.

ü  Chanil Park, Junbeom Hur (corresponding author), Seong Oun Hwang, Hyunsoo Yoon, ¡°Authenticated Public Key Broadcast Encryption Scheme Secure Against Insiders' Attack¡±, Mathematical and Computer Modelling, Elsevier, Vol. 55, No. 1-2, pp. 113-122, 2012. 1.

ü  Junbeom Hur, Dong Kun Noh, ¡°Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems¡±, IEEE Transactions on Parallel and Distributed Systems, Vol. 22, No. 7, pp. 1214-1221, 2011. 7. 1.

ü  Junbeom Hur, ¡°Fine-grained data access control for distributed sensor networks¡±, Wireless Networks, Vol. 17, No. 5, pp. 1235-1249, 2011.6.13.

ü  Junbeom Hur, Dongyoung Koo, Hyunsoo Yoon, ¡°Secure Many-to-Many Multicast in Heterogeneous Networks¡±, Journal of Internet Technology, Vol. 12, No. 2, pp. 859-866, 2010. 11.

ü  Junbeom Hur and Hyunsoo Yoon, ¡°A Multi-Service Group Key Management Scheme for Stateless Receivers in Wireless Mesh Networks¡±, ACM Mobile Networks and Applications, Vol. 15, No. 5, pp. 680-692, 2010. 10.

ü  Chanil Park, Junbeom Hur (corresponding author), Kisuk Kweon, Hyunsoo Yoon, ¡°Self-Healing Key Distribution Scheme with Long Service Time¡±, IEICE Electronics Express, Vol. 7, No. 13, pp. 913-919, 2010. 7. 10.

ü  Junbeom Hur, Chanil Park, Hyunsoo Yoon, ¡°Chosen-Ciphertext Secure Authenticated Group Communication Using Identity-based Signcryption¡±, Computers & Mathematics with Applications, Elsevier, Vol.60, No.2, pp. 362-375, 2010. 7.

ü  Byungchun Chung, Junbeom Hur, Heeyoul Kim, Seong-Min Hong, and Hyunsoo Yoon, ¡°Improved Batch Exponentiation¡±, Information Processing Letters, Vol. 109, No. 15, pp. 832-837, 2009. 7.

ü  Junbeom Hur and Hyunsoo Yoon, ¡°A Decentralized Multi-Group Key Management Scheme¡±, IEICE Transactions on Communications, Vol. E92-B, No. 02, pp. 632-635,  2009. 2.

ü  Younho Lee, Junbeom Hur, Heeyoul Kim, Yongsu Park, and Hyunsoo Yoon, ¡°A New Binary Image Authentication Scheme with Small Distortion and Low False Negative Rate¡±, IEICE Transactions on Communications, Vol. E90-B, No. 11, pp. 3259-3262, 2007. 11.

 

 

International Conference Publications

ü  Dongyoung Koo, Youngjoo Shin, Junbeom Hur, "Practical Data Outsourcing Framework with Provably Secure Deduplication in Untrusted Remote Storage", 2017 International Conference on Platform Technology and Service (PlatCon), 2017. 2. 13-15, Busan, Korea.

ü  Hoyul Choi, Hunjae Nam, Junbeom Hur, "Password Typos Resilience in Honey Encryption", International Conference on Information Networking (ICOIN), 2017. 1. 11-13, Da Nang, Vietnam.

ü  Dongyoung Koo, Youngjoo Shin, Junbeom Hur, ¡°HoneyDedup: Provably Secure Deduplication with Practical Data Outsourcing in Untrusted Remote Storage¡±, 2016 Annual Computer Security Applications Conference (ACSAC), 2016. 12. 5-9, Los Angeles, USA.

ü  Dongyoung Koo, Youngjoo Shin, Joobeom Yoon, Junbeom Hur, "A Hybrid Deduplication for Secure and Efficient Data Outsourcing in Fog Computing", 8th IEEE International Conference on Cloud Computing Technology and Science (CloudCom), 2016. 12. 12~15, Luxembourg.

ü  Youngjoo Shin, Dongyoung Koo, Joobeom Yoon, Junbeom Hur, "SEED: Enabling Serverless and Efficient Encrypted Deduplication for Cloud Storage", 8th IEEE International Conference on Cloud Computing Technology and Science (CloudCom), 2016. 12. 12~15, Luxembourg.

ü  Changhee Hahn and Junbeom Hur, "POSTER: Towards Privacy-Preserving Biometric Identification in Cloud Computing," 23rd ACM Conference on Computer and Communications Security (ACM CCS), 2016. 10. 24~28, Vienna, Austria.

ü  Jongmin Jeong, Hyunsoo Kwon, Hyungjune Shin, Junbeom Hur, "A Practical Analysis of TLS Vulnerabilityies in Korea Web Environment", 17th World Conference on Information Security Applications (WISA), 2016. 8. 25~27, Jeju Island, Korea.

ü  Juyoung Park, Mingon Kang, Junbeom Hur, Kyungtae Kang, "Recommendations for Antiarrhythmic Drugs Based on Latent Semantic Analysis with k-Means Clustering", 38th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2016.8.16-20, Orlando, USA.

ü  Seung-Woo Han, Hyunsoo Kwon, Changhee Hahn, Dongyoug Koo, Junbeom Hur, ¡°A Survey on MITM and its Countermeasures in the TLS Handshake Protocol¡±, International Conference on Ubiquitous and Future Networks, 2016. 7. 5~8, Vienna, Austria.

ü  Changhee Hahn, Junbeom Hur, ¡°Scalable and Secure Private Set Intersection for Big Data¡±, International Conference on Big Data and Smart Computing (BigComp2016), 2016. 1. 18~20, Hong Kong, China.

ü  Hyungjoon Shin, Daeyoung Kim, Junbeom Hur, ¡°Secure Pattern-based Authentication Against Shoulder Surfing Attack in Smart Devices¡±, International Conference on Ubiquitous and Future Networks, 2015. 7. 7~10, Sapporo, Japan.

ü  Hoyul Choi, Hyunsoo Kwon, Junbeom Hur, ¡°A Secure OTP Algorithm Using a Smartphone Application¡±, International Conference on Ubiquitous and Future Networks, 2015. 7. 7~10, Sapporo, Japan.

ü  Jina Hong, Junbeom Hur, Namgi Kim, ¡°An Empirical Study on Channel Characteristics of Wireless Body Sensor Networks¡±, The 8th International Conference on Future Generation Communication and Networking (FGCN 2014), 2014. 12. 20~23, Hainan, China.

ü  Hyunsoo Kwon, Changhee Hahn, Daeyoung Kim, Kyungtae Kang, Junbeom Hur, ¡°Secure Device-to-Device Authentication in Mobile Multi-hop Networks¡±, The 9th International Conference on Wireless Algorithms, Systems, and Applications (WASA 2014), 2014. 6. 23~25, Harbin, China., LNCS 8491, pp. 267-278.

ü  Changhee Hahn, Hyunsoo Kwon, Daeyoung Kim, Kyungtae Kang, Junbeom Hur, ¡°A Privacy Threat in 4th Generation Mobile Telephony and Its Countermeasure¡±, The 9th International Conference on Wireless Algorithms, Systems, and Applications (WASA 2014), 2014. 6. 23~25, Harbin, China., LNCS 8491, pp. 624-635.

ü  Jeongseok Yu, Taejin Kim, Woongsoo Na, Hyoungchel Bae, Yunseong Lee, Juho Lee, Zeynep Vatandas, Sungrae Cho and Junbeom Hur, ¡°Fully-Distributed Multicast Routing Protocol for IEEE 802.15.8 Peer-Aware Communications¡±, The International Conference on Information Networking 2014 (ICOIN 2014), 2014. 2.10~12, Phuket, Thailand.

ü  Dongyoung Koo, Junbeom Hur, Hyunsoo Yoon, ¡°Secure and Efficient Deduplication over Encrypted Data with Dynamic Updates in Cloud Storage¡±, The 2014 FTRA International Symposium on Frontier and Innovation in Future Computing and Communications (FCC 2014), 2014. 1.13~16, Auckland, New Zealand. Lecture Notes in Electrical Engineering (LNEE) Vol. 301, pp. 229-235. 2014. 4. 19.

ü  Juyoung Park, Jaemyoun Lee, Kyungtae Kang, Junbeom Hur, ¡°Extending Service Coverage using FGS-Aware Blind Repetition¡±, International Conference on Network-Based Information Systems, 2012. 9. 26 – 28, Melbourne, Australia.

ü  Dongyoung Koo, Junbeom Hur, Hyunsoo Yoon, ¡°Secure and Efficient Data Retrieval over Encrypted Data Using Attribute-Based Encryption in Cloud Storage¡±, The 2011 FTRA International Symposium on Advances in Cryptography, Security and Applications for Future Computing, 2011. 12. 12~15, Jeju, Korea.

ü  Chano Kim, Chanil Park, Junbeom Hur, Hanjin Lee, Hyunsoo Yoon, ¡°A Distributed Deterministic and Resilient Replica Detection Protocol in Wireless Sensor Networks¡±, The 2009 International Conference on Future Generation Communication and Networking 2009, Communications in Computer and Information Science (CCIS) Vol. 56, pp. 405-412, 2009. 12. 10-12, Jeju, Korea.

ü  Junbeom Hur, Dongyoung Koo, Hyunsoo Yoon, ¡°Secure Many-to-many Multicast in Heterogeneous Networks¡±, The 2009 FTRG International Workshop on Advances in Cryptography, Security and Applications for Future Computing (ACSA-09), 2009. 12. 11-12, Jeju, Korea.

ü  Youngjoo Shin, Junbeom Hur, Hyunsoo Yoon, ¡°Scalable and Efficient Approach for Secure Group Communication¡±, International Symposium on Communications and Information Technology 2009 (ISCIT 2009), pp. 1201-1206, 2009. 9. 28-30, Icheon, Korea.

ü  Seungjae Shin, Junbeom Hur, Hanjin Lee, Hyunsoo Yoon, "Bandwidth Efficient Key Distribution for Secure Multicast in Dynamic Wireless Mesh Networks", IEEE Wireless Communications & Networking Conference (WCNC 2009), 2009. 4.5 - 4.8, Budapest, Hungary.

ü  Junbeom Hur, Hyungseop Shim, Pyung, Kim, Hyunsoo Yoon, Nah-Oak Song, "Security Considerations for Handover Schemes in Mobile WiMAX Networks", IEEE Wireless Communications & Networking Conference (WCNC 2008), 2008. 3.31 - 4.3, Las Vegas, USA.

ü  Junbeom Hur, Chanil Park, Hyunsoo Yoon, "An Efficient Pre-authentication Scheme for IEEE 802.11-based Vehicular Networks", The 2nd International Workshop on Security (IWSEC), LNCS vol.4751 pp.121-136, 2007.10.29-31, New Public Hall, Nara, Japan.

ü  Junbeom Hur, Youngjoo Shin, Hyunsoo Yoon, "Decentralized Group Key Management for Dynamic Networks Using Proxy Cryptography", The 3rd ACM International Workshop on QoS and Security for Wireless and Mobile Networks (Q2SWinet), 2007.10.22. Chania, Crete Island, Greece.

ü  Junbeom Hur, Chanil Park, Youngjoo Shin, Hyunsoo Yoon, "An Efficient Proactive Key Distribution Scheme for Fast Handoff in IEEE 802.11 Wireless Networks", The International Conference on Information Networking (ICOIN 2007), LNCS vol.5200 (2008.2) pp. 629-638, 2007.1.23-25, Estoril, Portugal.

ü  Chanil Park, Junbeom Hur, Chanoe Kim, Youngjoo Shin, Hyunsoo Yoon, "Pre-authentication for Fast Handoff in Wireless mesh Networks with Mobile APs", The 7th International Workshop on Information Security Applications (WISA), LNCS vol. 4298 (2006.12), pp. 349-363, 2006.8.28-30, Jeju Island, Korea.

ü  Junbeom Hur, Younho Lee, Seong-Min Hong, Hyunsoo Yoon, "Trust Management for Resilient Wireless Sensor Networks", The 8th International Conference on Information Security and Cryptology (ICISC), LNCS vol.3935 (2006.2) pp.56-68, 2005.12. Seoul, Korea.

ü  Junbeom Hur, Younho Lee, Seong-Min Hong, Hyunsoo Yoon, "Trust-based Secure Aggregation in Wireless Sensor Networks", The 3rd International Conference on Computing, Communication and Control Technologies(CCCT), 2005.7.24-27, Austin, Texas, USA.

ü  Junbeom Hur, Younho Lee, Hyunsoo Yoon, "Trust Evaluation Model for Wireless Sensor Networks", The 7th International Conference on Advanced Communication Technology(ICACT), 2005.2.21-23, Phoenix Park, Korea.

 

 

Other Publications

ü  13 Domestic journal papers

ü  21 Domestic patent

 

Lecture

ü  [2016 Fall] Cloud Security (AAA608)

ü  [2016 Fall] Information Security (COSE354)

ü  [2016 Spring] Network Security (CRE606)

ü  [2016 Spring] Computer Programming I (COSE101)

ü  [2015 Fall] Programming Languages (COSE212)

ü  [2015 Fall] Cloud Security (AAA608)

ü  [2015 Fall] Special Topics in Computer Applications (EEI551)

ü  [2015 Spring] Distributed Processing (COSE443)

ü  [2015 Spring] Network Security (CRE606)

ü  [2011 Fall ~ 2014 Fall] Computer Security, Information Security Theory, C Programming, Concept of Programming Languages, Advanced Computer Security (Formerly at Chuang-Ang University)

 

Invited Talk

ü  Secure Data Deduplication with Dynamic Ownership Management in Cloud Storage (TKDE session @ IEEE International Conference on Data Engineering – 2017. 4.19-22, San Diego, USA)

ü  Secure deduplication in cloud computing (Inha University – 2016. 11. 18)

ü  Transport layer security (TLS) vulnerabilities in Korea web environment (Chung-Ang University – 2016. 11. 14)

ü  Data access control and deduplication for secure cloud computing (Chung-Ang University – 2015. 11. 16)

ü  Network authentication and its applications (KICS Future Network Lecture Series Workshop – 2015. 9. 22)

ü  Research on secure cloud computing (SWCC – 2014. 8. 21)

ü  Security considerations for handover schemes in mobile WiMAX networks (KICS Future Network Lecture Series Workshop - 2014. 7. 22)

ü  Attribute-based access control in cloud computing (Inha University – 2013. 2. 21)

ü  Attribute-based encryption and its applications (KIISE Winter Workshop – 2013.1.4)

ü  Data Access Control and Deduplication for Secure Cloud Computing (Chung-Ang University – 2015. 11. 16)

 

Distinctions and Awards

ü  Korea University Academic Excellence Scholarship (1997.9 ~ 2001. 2.) - Summa Cum Laude

ü  IIIS(International Institute of Informatics and Systemics) CCCT 2005 Best Paper Award (2005. 7. 25)

ü  Best Student Paper Award at The 25th Korean Institute of Information Scientists and Engineers (KIISE) – Microsoft Research Paper Competition (2006. 6)

ü  Best Paper Award at The 3rd ACM International Workshop on QoS and Security for Wireless and Mobile Networks (Q2SWinet 2007) (2007. 10. 24)

ü  Best Student Paper Award at The 27th Korean Institute of Information Scientists and Engineers (KIISE) – Microsoft Research Paper Competition (2008. 7. 1)

ü  Best Graduate Student Scholarship from Seok-Rim Research Foundation at KAIST (2007. 12. 28)

ü  Korea Science and Engineering Graduate Student Research Scholarship from Korea Science and Engineering Foundation (KOSEF) (2008.9 ~ 2009. 8)

ü  Best Student Paper Award at The 28th Korean Institute of Information Scientists and Engineers (KIISE) – Microsoft Research Paper Competition (2009. 7.2)

ü  Citation in Biography Book ¡®Who¡¯s Who in the World 2009/2010¡¯

ü  Citation in Biography Book ¡®2000 Outstanding Intellectuals of the 21st Century 2009/2010¡¯

 

Academic Activities

ü  Editor

-     Journal of Information Processing Systems

-     Journal of the Korea Institute of Information Security & Cryptology

-     Journal of the Korean Institute of Information Scientists and Engineers

-     Journal of KTCCS

 

ü  Member

-     IEEE, ACM, KIISE, KIISC, KIPS

 

ü  Journal Reviewer

-     ACM Transactions on Information and System Security, IEEE Transactions on Mobile Computing, IEEE Transactions on Parallel and Distributed System, IEEE Transactions on Knowledge and Data Engineering, IEEE Transactions on Dependable and Secure Computing, IEEE Transactions on Computers, Computers & Mathematics with Applications, Wireless Communications and Mobile Computing, Wireless Networks, Information Processing Letters, etc.

 

ü  International Conference Committee

-     Organizing Committee

1.     ICISC 2014, 2015, 2016, 2017

2.     ICUFN 2015, 2016, 2017

-     Technical Program Committee

1.     ESORICS 2014

2.     PMECT 2013, 2014, 2015

3.     ICOIN 2013, 2014, 2015, 2016

4.     IEEE BigDataService 2017

 

Announcement

ü  We have several positions for outstanding post-doctoral researchers and Ph.D. candidates. If you are interested in working with our lab, please do not hesitate to contact me.