International Journal

1. Youngjoo Shin, Dongyoung Koo, Joobeom Yun, Junbeom Hur, Decentralized Server-aided Encryption for Secure Deduplication in Cloud Storage, IEEE Transactions on Services Computing, accept, 2017

2. Dongyoung Koo, Youngjoo Shin, Junbeom Hur, Privacy-Preserving Aggregation and Authentication of Multi-source Smart Meters in a Smart Grid System, Applied Sciences, Vol. 7, No.10, 2017. 9

3. Junggab Son, Juyoung Park, Heekuck Oh, Md Zakirul Alam Bhuiyan, Junbeom Hur, Privacy-Preserving Electrocardiogram Monitoring for Intelligent Arrhythmia Detection, Sensors, Vol. 17, No. 6, pp. 1~21, 2017. 6. 12.

4. Joobeom Yun, Junbeom Hur, Youngjoo Shin, Dongyoung Koo, CLDSafe: An Efficient File Backup System in Cloud Storage against Ransomware, IEICE Transactions on Information and systems, Vol. E100–D, No. 9, pp. 2228-2231, 2017.9

5. Junbeom Hur, Dong Kun Noh, Efficient and Secure Identity-Based Onion Routing, International Journal of Applied Engineering Research, Vol. 12, No. 6, pp. 1069-1074, 2017. 3.

6. Dongyoung Koo, Junbeom Hur, Privacy-preserving deduplication of encrypted data with dynamic ownership management in fog computing, Future Generation Computer Systems, Vol. 78, No. 2, pp. 739-752, 2018. 1

7. Hyunsoo Kwon, Changhee Hahn, Daeyoung Kim, Junbeom Hur, Secure Deduplication for Multimedia Data with User Revocation in Cloud Storage, Multimedia Tools and Applications, DOI 10.1007/s11042-015-2595-4, Vol. 76, No. 4, pp. 5889-5903, 2017. 2.

8. Youngjoo Shin, Dongyoung Koo, Junbeom Hur, A Survey of Secure Data Deduplication Schemes for Cloud Storage Systems, ACM Computing Surveys (CSUR), Vol. 49, No. 4, pp. 74:1-74:38, 2017. 1.

9. Junbeom Hur, Dongyoung Koo, Youngjoo Shin, Kyungtae Kang, Secure Data Deduplication with Dynamic Ownership Management in Cloud Storage, IEEE Transactions on Knowledge and Data Engineering, Vol. 28, No. 11, pp. 3113-3125, 2016.11.

10. Changhee Hahn, Hyunsoo Kwon, Daeyoung Kim, Junbeom Hur, Enhanced Authentication for Outsourced Educational Contents through Provable Block Possession, Multimedia Tools and Applications, Vol. 75, No. 21, pp. 13057-13076, DOI 10.1007/s11042-015-2593-6, 2016. 11.

11. Daeyoung Kim, Changhee Hahn, Hyunsoo Kwon, Junbeom Hur, Privacy-Preserving Public Auditing for Educational Multimedia Data in Cloud Computing, Multimedia Tools and Applications, Vol. 75, No. 21, pp. 13077-13091, DOI 10.1007/s11042-015-2594-5, 2016. 11.

12. Changhee Hahn, Junbeom Hur, Efficient and Privacy-Preserving Biometric Identification in the Cloud, ICT Express, Vol. 2, No. 3, pp. 135-139, 2016. 9.

13. Changhee Hahn, Hyunsoo Kwon, Junbeom Hur, Efficient Attribute-based Secure Data Sharing with Hidden Policies and Traceability in Mobile Health Networks, Mobile Information Systems, Vol. 2016, Article ID 6545873, 13 pages, 2016. doi:10.1155/2016/6545873 , 2016. 7. 19.

14. Junbeom Hur, Mengxue Guo, Younsoo Park, Chan-Gun Lee, Ho-Hyun Park, Reputation-Based Collusion Detection with Majority of Colluders, IEICE Transactions on Information and systems, Vol.E99-D, No.7, 2016. 7.

15. Junbeom Hur, Dongyoung Koo, Youngjoo Shin, Privacy-Preserving Smart Metering with Authentication in a Smart Grid, Applied Sciences, Vol. 5, No.4, pp. 1503-1527, doi:10.3390/app5041503, 2015.12.1.

16. Hyunsoo Kwon, Daeyoung Kim, Changhee Hahn, Junbeom Hur, Secure Authentication using Ciphertext Policy Attribute-based Encryption in Mobile Multi-hop Networks, Multimedia Tools and Applications, Vol. 76, No. 19, pp. 19507-19521, 2017. 10

17. Youngjoo Shin, Dongyoung Koo, Junbeom Hur, Joobeom Yun, Secure Proof of Storage with Deduplication for Cloud Storage Systems, Multimedia Tools and Applications, Vol. 76, No. 19, pp. 19363-19378, 2017. 10

18. Junbeom Hur, Younho Lee, A Reliable Group Key Management Scheme for Broadcast Encryption, Journal of Communications and Networks, Vol. 18, No. 2, pp. 246-260, 2016. 4.

19. Kyungtae Kang, Qixin Wang, Junbeom Hur, Kyung-Joon Park, Lui Sha, Medical-Grade Quality of Service for Real-Time Mobile Healthcare, Computer, Vol. 48, No. 2, pp. 41-49, 2015. 2.

20. Lin Dong, Jinwoo Park, Junbeom Hur, Ho-Hyun Park, An Enhanced Remote Data Checking Scheme for Dynamic Updates, KSII Transactions on Internet and Information Systems, Vol. 8, No. 5, pp. 1744-1765, 2014. 5.

21. Junbeom Hur, Kyungtae Kang, Secure Data Retrieval for Decentralized Disruption Tolerant Military Networks, IEEE/ACM Transactions on Networking, Vol. 22, No. 1, pp. 16-26, 2014. 2.

22. Junbeom Hur, Attribute-Based Secure Data Sharing with Hidden Policies in Smart Grid, IEEE Transactions on Parallel and Distributed Systems, Vol. 24, No. 11, pp. 2171-2180, 2013. 11.

23. Dong Kun Noh, Junbeom Hur, Energy-aware topology control for reliable data delivery in solar-powered WSNs, EURASIP Journal on Wireless Communications and Networking, Vol. 2013 No. 258, pp. 1-13, 2013. 11. 9.

24. Junbeom Hur, Improving Security and Efficiency in Attribute-Based Data Sharing, IEEE Transactions on Knowledge and Data Engineering, Vol. 25, No. 10, pp. 2271-2282, 2013. 10.

25. Kyungtae Kang, Juyoung Park, Junbeom Hur, Cross-Layer Analysis of Protocol Delay in Mobile Devices Receiving BCMCS, Wireless Networks, Vol. 19, No.7 pp 1497-1509, 2013. 10.

26. Junbeom Hur, Dongyoung Koo, Seong Oun Hwang, Kyungtae Kang, Removing Escrow from Ciphertext Policy Attribute-Based Encryption, Computers & Mathematics with Applications, Vol. 65, No. 9, pp. 1310-1317, 2013. 5.

27. Kyungtae Kang, Junhee Ryu, Junbeom Hur, Lui Sha, Design and QoS of a Wireless System for Real-Time Remote Electrocardiography, IEEE Journal of Biomedical and Health Informatics, Vol. 17, No. 3, pp. 745-755, 2013. 5.

28. Dongyoung Koo, Junbeom Hur, Hyunsoo Yoon, Secure and Efficient Data Retrieval over Encrypted Data Using Attribute-Based Encryption in Cloud Storage, Computers & Electrical Engineering, Vol. 39, No. 1, pp. 34 – 46, 2013. 1.

29. Kyungtae Kang, Junhee Ryu, Sunghyun Choi, Kyung-Joon Park, Junbeom Hur, Towards energy-efficient error control in 3G broadcast video, IEEE Wireless Communications, Vol. 19, No. 6, pp. 60-67, 2012. 12.

30. Junbeom Hur, Kyungtae Kang, Dependable and Secure Computing in Medical Information Systems, Computer Communications, Vol. 36, No.1, pp.20-38, 2012.12.

31. Junbeom Hur, Chanil Park, Seong Oun Hwang, Privacy-Preserving Identity-Based Broadcast Encryption, Information Fusion, Elsevier, vol. 13, no. 4, pp. 296-303, 2012. 10.

32. Dong Kun Noh, Junbeom Hur, Using a dynamic backbone for efficient data delivery in solar-powered WSNs, Journal of Network and Computer Applications, Vol. 35, No. 4, pp. 1277 – 1284, 2012. 7.

33. Youngjoo Shin, Junbeom Hur, Scalable and efficient approach for secure group communication using proxy cryptography, Wireless Networks, Vol. 18, No. 4, pp. 413–425, 2012. 5.

34. Junbeom Hur, Chanil Park, Seong Oun Hwang, Fine-Grained User Access Control in Ciphertext-Policy Attribute-Based Encryption, Security and Communication Networks, Wiley, Vol. 5, No. 3, pp. 253-261, 2012. 3.

35. Chanil Park, Junbeom Hur, Seong Oun Hwang, Hyunsoo Yoon, Authenticated Public Key Broadcast Encryption Scheme Secure Against Insiders' Attack, Mathematical and Computer Modelling, Elsevier, Vol. 55, No. 1-2, pp. 113-122, 2012. 1.

36. Junbeom Hur, Dong Kun Noh, Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems, IEEE Transactions on Parallel and Distributed Systems, Vol. 22, No. 7, pp. 1214-1221, 2011. 7. 1.

37. Junbeom Hur, Fine-grained data access control for distributed sensor networks, Wireless Networks, Vol. 17, No. 5, pp. 1235-1249, 2011.6.13.

38. Junbeom Hur, Dongyoung Koo, Hyunsoo Yoon, Secure Many-to-Many Multicast in Heterogeneous Networks, Journal of Internet Technology, Vol. 12, No. 2, pp. 859-866, 2010. 11.

39. Junbeom Hur and Hyunsoo Yoon, A Multi-Service Group Key Management Scheme for Stateless Receivers in Wireless Mesh Networks, ACM Mobile Networks and Applications, Vol. 15, No. 5, pp. 680-692, 2010. 10.

40. Chanil Park, Junbeom Hur, Kisuk Kweon, Hyunsoo Yoon, Self-Healing Key Distribution Scheme with Long Service Time, IEICE Electronics Express, Vol. 7, No. 13, pp. 913-919, 2010. 7. 10.

41. Junbeom Hur, Chanil Park, Hyunsoo Yoon, Chosen-Ciphertext Secure Authenticated Group Communication Using Identity-based Signcryption, Computers & Mathematics with Applications, Elsevier, Vol.60, No.2, pp. 362-375, 2010. 7.

42. Byungchun Chung, Junbeom Hur, Heeyoul Kim, Seong-Min Hong, and Hyunsoo Yoon, Improved Batch Exponentiation, Information Processing Letters, Vol. 109, No. 15, pp. 832-837, 2009. 7.

43. Junbeom Hur and Hyunsoo Yoon, A Decentralized Multi-Group Key Management Scheme, IEICE Transactions on Communications, Vol. E92-B, No. 02, pp. 632-635, 2009. 2.

44. Younho Lee, Junbeom Hur, Heeyoul Kim, Yongsu Park, and Hyunsoo Yoon, A New Binary Image Authentication Scheme with Small Distortion and Low False Negative Rate, IEICE Transactions on Communications, Vol. E90-B, No. 11, pp. 3259-3262, 2007. 11.

International Conference

1. Jiwoong Won, Oseok Kwon, Junhee Ryu, Junbeom Hur, Insup Lee, Kyungtae Kang, TrapFetch: A Breakpoint-based Prefetcher for Both Launch and Run-time, 2017 IEEE International Conference on Systems, Man, and Cybernetics (IEEE SMC), October 5~8, 2017, Banff, Canada.

2. Xiaolong Sun, Juyoung Park, Kyungtae Kang, Junbeom Hur, Novel Hybrid CNN-SVM Model for Recognition of Functional Magnetic Resonance Images, 2017 IEEE International Conference on Systems, Man, and Cybernetics (IEEE SMC), October 5~8, 2017, Banff, Canada.

3. Hyunjae Nam, Hyunsoo Kwon, Hyungjun Shin, Jongmin Jeong, Changhee Hahn, Junbeom Hur, Cookie Theft Attacks in HTTPS by Invalidating Cookie Flags, USENIX Security Symposium, July 16~18, 2017, Vancouver, BC, CANADA.

4. Changhee Hahn, Hyungjune Shin, Junbeom Hur, Cloud-based Biometrics Processing for Privacy-Preserving Identification, The 9th International Conference on Ubiquitous and Future Networks (ICUFN), 7. 4~7, 2017, Milan, Italy.

5. Hyunsoo Kwon, Changhee Hahn, Dongyoung Koo, Junbeom Hur, Scalable and Reliable Key Management for Secure Deduplication in Cloud Storage, 10th IEEE International Conference on Cloud Computing (IEEE CLOUD), 6. 25~30, 2017, Honolulu, Hawaii, USA.

6. Dongyoung Koo, Youngjoo Shin, Joobeom Yun, Junbeom Hur, An Online Data-Oriented Authentication based on Merkle Tree with Improved Reliability, 24th IEEE International Conference on Web Services (IEEE ICWS), 2017. 6. 25~30, Honolulu, Hawaii, USA.

7. Junbeom Hur, Dongyoung Koo, Youngjoo Shin, Kyungtae Kang, Secure Data Deduplication with Dynamic Ownership Management in Cloud Storage (Extended Abstract), 2017 IEEE International Conference on Data Engineering (IEEE ICDE), 2017. 4. 19~22, San Diego, USA.

8. Dongyoung Koo, Youngjoo Shin, Junbeom Hur, Practical Data Outsourcing Framework with Provably Secure Deduplication in Untrusted Remote Storage, International Conference on Platform Technology and Service (Platcon), 2017. 2. 13-15, Busan, Korea

9. Hoyul Choi, Hunjae Nam, Junbeom Hur, Password Typos Resilience in Honey Encryption, International Conference on Information Networking (ICOIN), 2017. 1. 11 ~ 13, Da Nang, Vietnam.

10. Youngjoo Shin, Dongyoung Koo, Joobeom Yoon, Junbeom Hur, SEED: Enabling Serverless and Efficient Encrypted Deduplication for Cloud Storage, 8th IEEE International Conference on Cloud Computing Technology and Science, pp. 482-487, 2016. 12. 12~15, Luxembourg.

11. Dongyoung Koo, Youngjoo Shin, Joobeom Yoon, Junbeom Hur, A Hybrid Deduplication for Secure and Efficient Data Outsourcing in Fog Computing, 8th IEEE International Conference on Cloud Computing Technology and Science, pp. 285-293, 2016. 12. 12~15, Luxembourg.

12. Dongyoung Koo, Youngjoo Shin, Junbeom Hur, HoneyDedup: Provably Secure Deduplication with Practical Data Outsourcing in Untrusted Remote Storage, 2016 Annual Computer Security Applications Conference (ACSAC), 2016. 12. 5~9, Los Angeles, USA.

13. Changhee Hahn, Junbeom Hur, POSTER: Towards Privacy-Preserving Biometric Identification in Cloud Computing, 23rd ACM Conference on Computer and Communications Security (ACM CCS), 2016, October 24~28, Vienna, Austria.

14. Jongmin Jung, Hyunsoo Kwon, Hyungjune Shin, Junbeom Hur, A Practical Analysis of TLS Vulnerabilities in Korea Web Environment, The 17th World Conference on Information Security Applications, 2016. 8. 25-27, Jeju Isalnd, Korea.

15. Juyoung Park, Mingon Kang, Junbeom Hur, Kyungtae Kang, Recommendations for Antiarrhythmic Drugs Based on Latent Semantic Analysis with k-Means Clustering, 38th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2016.8.16-20, Orlando, USA.

16. Seung-Woo Han, Hyunsoo Kwon, Changhee Hahn, Dongyoug Koo, Junbeom Hur, A Survey on MITM and its Countermeasures in the TLS Handshake Protocol, International Conference on Ubiquitous and Future Networks, 2016. 7. 5~8, Vienna, Austria

17. Changhee Hahn, Junbeom Hur, Scalable and Secure Private Set Intersection for Big Data, International Conference on Big Data and Smart Computing (BigComp2016), 2016. 1. 18~20, Hong Kong, China.

18. Hyungjoon Shin, Daeyoung Kim, Junbeom Hur, Secure Pattern-based Authentication Against Shoulder Surfing Attack in Smart Devices, International Conference on Ubiquitous and Future Networks, 2015. 7. 7~10, Sapporo, Japan.

19. Hoyul Choi, Hyunsoo Kwon, Junbeom Hur, A Secure OTP Algorithm Using a Smartphone Application, International Conference on Ubiquitous and Future Networks, 2015. 7. 7~10, Sapporo, Japan.

20. Jina Hong, Junbeom Hur, Namgi Kim, An Empirical Study on Channel Characteristics of Wireless Body Sensor Networks, The 8th International Conference on Future Generation Communication and Networking (FGCN 2014), 2014. 12. 20~23, Hainan, China.

21. Changhee Hahn, Junbeom Hur, Enhanced User Authentication for Outsourced Multimedia Data through Provable Block Possession, International Conference on Multimedia Technology for Intelligent Computing (MuTeC 2014), 2014. 12. 5~8.

22. Daeyoung Kim, Hyunsoo Kwon, Changhee Hahn, Junbeom Hur, Privacy-Preserving Public Auditing for Multimedia Data in Cloud Storage, International Conference on Multimedia Technology for Intelligent Computing (MuTeC 2014), 2014. 12. 5~8.

23. Hyunsoo Kwon, Changhee Hahn, Daeyoung Kim, Junbeom Hur, Secure Deduplication for Multimedia Data with User Revocation in Cloud Storage, , International Conference on Multimedia Technology for Intelligent Computing (MuTeC 2014), 2014. 12. 5~8.

24. Hyunsoo Kwon, Changhee Hahn, Daeyoung Kim, Kyungtae Kang, Junbeom Hur, Secure Device-to-Device Authentication in Mobile Multi-hop Networks, The 9th International Conference on Wireless Algorithms, Systems, and Applications (WASA 2014), 2014. 6. 23~25, Harbin, China., LNCS 8491, pp. 267-278.

25. Changhee Hahn, Hyunsoo Kwon, Daeyoung Kim, Kyungtae Kang, Junbeom Hur, A Privacy Threat in 4th Generation Mobile Telephony and Its Countermeasure, The 9th International Conference on Wireless Algorithms, Systems, and Applications (WASA 2014), 2014. 6. 23~25, Harbin, China., LNCS 8491, pp. 624-635

26. Jeongseok Yu, Taejin Kim, Woongsoo Na, Hyoungchel Bae, Yunseong Lee, Juho Lee, Zeynep Vatandas, Sungrae Cho and Junbeom Hur, Fully-Distributed Multicast Routing Protocol for IEEE 802.15.8 Peer-Aware Communications, The International Conference on Information Networking 2014 (ICOIN 2014), 2014. 2.10~12, Phuket, Thailand.

27. Dongyoung Koo, Junbeom Hur, Hyunsoo Yoon, Secure and Efficient Deduplication over Encrypted Data with Dynamic Updates in Cloud Storage, The 2014 FTRA International Symposium on Frontier and Innovation in Future Computing and Communications (FCC 2014), 2014. 1.13~16, Auckland, New Zealand. Lecture Notes in Electrical Engineering (LNEE) Vol. 301, pp. 229-235. 2014. 4. 19.

28. Juyoung Park, Jaemyoun Lee, Kyungtae Kang, Junbeom Hur, Extending Service Coverage using FGS-Aware Blind Repetition, International Conference on Network-Based Information Systems, 2012. 9. 26 – 28, Melbourne, Australia.

29. Dongyoung Koo, Junbeom Hur, Hyunsoo Yoon, Secure and Efficient Data Retrieval over Encrypted Data Using Attribute-Based Encryption in Cloud Storage, The 2011 FTRA International Symposium on Advances in Cryptography, Security and Applications for Future Computing, 2011. 12. 12~15, Jeju, Korea.

30. Junbeom Hur, Dongyoung Koo, Seong Oun Hwang, Kyungtae Kang, Removing Escrow from Ciphertext Policy Attribute-Based Encryption, The 2011 FTRA International Symposium on Advances in Cryptography, Security and Applications for Future Computing, 2011. 12. 12~15, Jeju, Korea.

31. Junbeom Hur, Dong Kun Noh, Efficient Identity-Based Onion Routing, International Conference on Computer Convergence Technology (ICCCT 2011), pp. 10-15, 2011. 10. 20~22, Seoul, Korea

32. Chanil Park, Junbeom Hur, Seong Oun Hwang, Authenticated Public Key Broadcast Encryption Scheme Secure Against Insiders' Attack, The 2010 FTRA International Symposium on Advances in Cryptography, Security and Applications for Future Computing (ACSA-10), 2010. 12. 9-11, Gwangju, Korea.

33. Junbeom Hur, Chanil Park, Seong Oun Hwang, Fine-Grained User Access Control in Ciphertext-Policy Attribute-Based Encryption, The 2010 FTRA International Symposium on Advances in Cryptography, Security and Applications for Future Computing (ACSA-10), 2010. 12. 9-11, Gwangju, Korea.

34. Chano Kim, Chanil Park, Junbeom Hur, Hanjin Lee, Hyunsoo Yoon, A Distributed Deterministic and Resilient Replica Detection Protocol in Wireless Sensor Networks, The 2009 International Conference on Future Generation Communication and Networking 2009, Communications in Computer and Information Science (CCIS) Vol. 56, pp. 405-412, 2009. 12. 10-12, Jeju, Korea.

35. Junbeom Hur, Dongyoung Koo, Hyunsoo Yoon, Secure Many-to-many Multicast in Heterogeneous Networks, The 2009 FTRG International Workshop on Advances in Cryptography, Security and Applications for Future Computing (ACSA-09), 2009. 12. 11-12, Jeju, Korea.

36. Junbeom Hur, Chanil Park, Hyunsoo Yoon, Chosen-Ciphertext Secure Authenticated Group Communication Using Identity-based Signcryption, The 2009 FTRG International Workshop on Advances in Cryptography, Security and Applications for Future Computing (ACSA-09), 2009. 12. 11-12, Jeju, Korea.

37. Youngjoo Shin, Junbeom Hur, Hyunsoo Yoon, Scalable and Efficient Approach for Secure Group Communication, International Symposium on Communications and Information Technology 2009 (ISCIT 2009), pp. 1201-1206, 2009. 9. 28-30, Icheon, Korea.

38. Seungjae Shin, Junbeom Hur, Hanjin Lee, Hyunsoo Yoon, Bandwidth Efficient Key Distribution for Secure Multicast in Dynamic Wireless Mesh Networks, IEEE Wireless Communications & Networking Conference (WCNC 2009), 2009. 4.5 - 4.8, Budapest, Hungary.

39. Junbeom Hur, Hyungseop Shim, Pyung, Kim, Hyunsoo Yoon, Nah-Oak Song, Security Considerations for Handover Schemes in Mobile WiMAX Networks, IEEE Wireless Communications & Networking Conference (WCNC 2008), 2008. 3.31 - 4.3, Las Vegas, USA.

40. Junbeom Hur, Chanil Park, Hyunsoo Yoon, "An Efficient Pre-authentication Scheme for IEEE 802.11-based Vehicular Networks, The 2nd International Workshop on Security (IWSEC), LNCS vol.4751 pp.121-136, 2007.10.29-31, New Public Hall, Nara, Japan.

41. Junbeom Hur, Youngjoo Shin, Hyunsoo Yoon, Decentralized Group Key Management for Dynamic Networks Using Proxy Cryptography, The 3rd ACM International Workshop on QoS and Security for Wireless and Mobile Networks (Q2SWinet), 2007.10.22. Chania, Crete Island, Greece.

42. Junbeom Hur, Chanil Park, Youngjoo Shin, Hyunsoo Yoon, An Efficient Proactive Key Distribution Scheme for Fast Handoff in IEEE 802.11 Wireless Networks, The International Conference on Information Networking (ICOIN 2007), LNCS vol.5200 (2008.2) pp. 629-638, 2007.1.23-25, Estoril, Portugal.

43. Chanil Park, Junbeom Hur, Chanoe Kim, Youngjoo Shin, Hyunsoo Yoon, Pre-authentication for Fast Handoff in Wireless mesh Networks with Mobile APs, The 7th International Workshop on Information Security Applications (WISA), LNCS vol. 4298 (2006.12), pp. 349-363, 2006.8.28-30, Jeju Island, Korea.

44. Junbeom Hur, Younho Lee, Seong-Min Hong, Hyunsoo Yoon, Trust Management for Resilient Wireless Sensor Networks, The 8th International Conference on Information Security and Cryptology (ICISC), LNCS vol.3935 (2006.2) pp.56-68, 2005.12. Seoul, Korea.

45. Junbeom Hur, Younho Lee, Seong-Min Hong, Hyunsoo Yoon, Trust-based Secure Aggregation in Wireless Sensor Networks, The 3rd International Conference on Computing, Communication and Control Technologies(CCCT), 2005.7.24-27, Austin, Texas, USA.

46. Junbeom Hur, Younho Lee, Hyunsoo Yoon, Trust Evaluation Model for Wireless Sensor Networks, The 7th International Conference on Advanced Communication Technology(ICACT), 2005.2.21-23, Phoenix Park, Korea.

Domestic Journal

1. 신형준, 허준범, 암호화된 클라우드 데이터의 중복제거 기법에 대한 부채널 공격, 정보보호학회논문지, accept, 2017

2. 한창희, 신형준, 허준범, 클라우드 환경에서 검색 효율성 개선과 프라이버시를 보장하는 유사 중복 검출 기법에 관한 연구, 정보과학회논문지, accept, 2017

3. 남현재, 최호열, 신형준, 권현수, 정종민, 한창희, 허준범, 포그 컴퓨팅 환경에서의 보안 및 프라이버시 이슈에 대한 연구, 한국통신학회논문지, Vol. 42, No. 1, pp. 257~267, 2017. 1.

4. 한창희, 허준범, 고정 크기 암호 정책 속성 기반의 데이터 접근과 복호 연산 아웃소싱 기법, 정보과학회논문지, Vol. 43, No. 8, pp. 933-945, 2016. 8.

5. 한창희, 권현수, 김대영, 허준범, 아웃소싱 데이터 보호를 위한 데이터 블록 기반의 상호 인증 프로토콜, 정보과학회논문지, Vol.42, No.9, 2015.9.

6. 신형준, 허준범, 패턴 기반 사용자 인증 시스템 기술 연구 동향 및 비교, 정보보호학회지, 제25권, 제3호, pp. 36~43, 2015. 6.

7. 한창희, 권현수, 허준범, LTE에서 사용자 위치 정보 보호를 위한 보안 향상 인증 프로토콜, 정보과학회논문지, vol. 41, no. 9, pp. 715-727, 2014. 9.

8. 구동영, 허준범, 스마트기기를 활용한 클라우드서비스 환경에서 안전한 데이터 중복제거 기술 동향, 전자공학회논문지, vol. 50, no. 10, pp. 989-996, 2013. 10.

9. 김평, 허준범, 윤현수, 브로드캐스팅 통신 환경 하에서의 비상태 수신자를 위한 대역폭 효율성을 고려한 탈퇴 기법 (A Bandwidth-Efficient Revocation Scheme for Stateless Receivers in Broadcasting Communication Environment), 정보과학회논문지: 정보통신 제37권 제5호, pp. 327-338, 2010. 10.

10. 허준범, 윤현수, 무선 메쉬 네트워크에서의 아이디기반 프록시암호화를 이용한 안전한 다대다 멀티캐스트 기법 (Identity-Based Secure Many-to-Many Multicast in Wireless Mesh Networks), 정보과학회논문지: 정보통신 제37권 제1호, pp. 72-83, 2010. 2.

11. 허준범, 윤현수, 신뢰성 있는 브로드캐스트 암호화를 위한 자가 키 복구 기법 (A Self-Recovering Key Management Scheme for Reliable Broadcast Encryption), 정보과학회논문지: 정보통신 제36권 제6호, pp. 471-480, 2009. 12.

12. 신승재, 허준범, 이한진, 윤현수, 클러스터화된 무선 네트워크에서 전송량을 고려한 효율적인 멀티캐스트 키관리 기법 (Bandwidth Efficient Key Management for Secure Multicast in Clustered Wireless Networks), 정보과학회논문지: 정보통신 제36권 제5호, pp. 437-455, 2009. 10.

13. 허준범, 윤현수, 신뢰할 수 없는 동적 네트워크 환경을 위한 비중앙화 그룹키 관리 기법 (Decentralized Group Key Management for Untrusted Dynamic Networks), 정보과학회논문지 : 정보통신, 제36권 제4호, pp. 263-274, 2009. 8.

14. 허준범, 이윤호, 윤현수, 신뢰도 평가를 통한 무선 센서 네트워크에서의 거짓 데이터 제거 (Trust-based Filtering of False Data in Wireless Sensor Networks), 정보과학회논문지 : 정보통신 제35권 제1호, pp. 76-90, Journal of KIISE (Korean Institute of Information Scientists and Engineers), vol. 35, no. 1, pp. 76-90, Feb. 2008.

Domestic Conference

1. 김형섭, 허준범, 포그 컴퓨팅 환경에서 안전한 서비스 탐색 기법, 한국컴퓨터종합학술대회, 라마다프라자 제주호텔, 제주, 2017. 6. 18~20

2. 신형준, 허준범, 전술네트워크에서의 안전한 데이터 검색 기법 동향 조사, 한국군사과학기술학회 종합학술대회, 제주 국제컨벤션센터 (ICC JEJU), 2017.6.8~9

3. 권현수, 허준범, Secure Deduplication with Scalable Convergent Encryption Key Management in the Cloud, 한국정보보호학회 동계학술대회, 연세대학교, 2016. 12. 3.

4. 한창희, 허준범, Secure and Efficient Near-Duplicate Detection in the Cloud, 한국정보보호학회 동계학술대회, 연세대학교, 2016. 12. 3.

5. 민정기, 허준범, 랭킹기반의 검색가능한 암호화 알고리즘 분석, 한국정보처리학회 추계학술발표대회, 부산대학교, 2016. 11.4~5.

6. 장영진, 한승우, 허준범, 하트블리드 탐지 및 대응방안, 한국정보처리학회 추계학술발표대회, 제주한라대학교, 2015. 10.30~31.

7. 홍기대, 이상태, 허준범, 모바일 메신저를 이용한 개선된 2-Factor 인증기법, 한국정보처리학회 제40회 추계학술발표대회, 제주한라대학교, 2013. 11.8-9.

8. 허준범, 조성래, 안전한 대상인식통신을 위한 보안프로토콜 설계, 표준학회 2013년도 춘계학술대회, 서울르네상스호텔, 2013. 6. 27.

9. 신영주, 허준범, 윤현수, 확장성과 효율성을 갖는 프락시 암호 기반 안전한 그룹 통신, 한국정보과학회 학술발표논문집 한국정보과학회 2007 가을 학술발표 논문집 제34권 제2호(D), 2007. 10, pp. 1 ~ 6.