default search action
Changhee Hahn
Person information
- affiliation: Chung-Ang University, Seoul, School of Computer Science and Engineering
- affiliation: Korea University, Department of Computer Science and Engineering
- not to be confused with: Changhee Han 0002
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j23]Jaehwan Park, Zeinab Rezaeifar, Changhee Hahn:
Securing multi-client range queries over encrypted data. Clust. Comput. 27(7): 9679-9692 (2024) - [j22]Hodong Kim, Changhee Hahn, Hyunwoo J. Kim, Youngjoo Shin, Junbeom Hur:
Deep Learning-Based Detection for Multiple Cache Side-Channel Attacks. IEEE Trans. Inf. Forensics Secur. 19: 1672-1686 (2024) - [c15]SeokHee Kim, Changhee Hahn:
Detecting Backdoors Embedded in Ensembles. ICEIC 2024: 1-3 - [c14]Chaewon Kwak, Kangmo Ahn, Changhee Hahn, Dongyoung Koo, Junbeom Hur:
Revisiting Secure Multi-Server Oblivious RAMs. ICOIN 2024: 469-472 - 2023
- [j21]Jaehwan Park, Changhee Hahn:
Priest: Adversarial Attack Detection Techniques for Signal Injection Attacks. IEEE Access 11: 89409-89422 (2023) - [j20]Hyundo Yoon, Muncheon Yu, Chaewon Kwak, Changhee Hahn, Dongyoung Koo, Junbeom Hur:
Shedding Light on Blind Spot of Backward Privacy in Dynamic Searchable Symmetric Encryption. IEEE Access 11: 146223-146237 (2023) - [j19]Changhee Hahn, Hodong Kim, Minjae Kim, Junbeom Hur:
VerSA: Verifiable Secure Aggregation for Cross-Device Federated Learning. IEEE Trans. Dependable Secur. Comput. 20(1): 36-52 (2023) - [j18]Hyunsoo Kwon, Sangtae Lee, Minjae Kim, Changhee Hahn, Junbeom Hur:
Certificate Transparency With Enhanced Privacy. IEEE Trans. Dependable Secur. Comput. 20(5): 3860-3872 (2023) - [j17]Changhee Hahn, Hyundo Yoon, Junbeom Hur:
Multi-Key Similar Data Search on Encrypted Storage With Secure Pay-Per-Query. IEEE Trans. Inf. Forensics Secur. 18: 1169-1181 (2023) - [j16]Changhee Hahn, Junbeom Hur:
Delegatable Order-Revealing Encryption for Reliable Cross-Database Query. IEEE Trans. Serv. Comput. 16(3): 1763-1777 (2023) - 2022
- [j15]Hyunsoo Kwon, Junbeom Hur, Changhee Hahn:
Order-Hiding Range Query Over Encrypted Cloud Data. IEEE Access 10: 75604-75618 (2022) - [j14]Hyunsoo Kwon, Changhee Hahn:
Asymptotically Optimal and Secure Multiwriter/Multireader Similarity Search. IEEE Access 10: 101957-101971 (2022) - [j13]Changhee Hahn, Jongkil Kim:
Verifiable Outsourced Decryption of Encrypted Data From Heterogeneous Trust Networks. IEEE Internet Things J. 9(22): 22559-22570 (2022) - [j12]Changhee Hahn, Jongkil Kim, Hyunsoo Kwon, Junbeom Hur:
Efficient IoT Management With Resilience to Unauthorized Access to Cloud Storage. IEEE Trans. Cloud Comput. 10(2): 1008-1020 (2022) - [j11]Changhee Hahn, Hyunsoo Kwon, Daeyeong Kim, Junbeom Hur:
Enabling Fast Public Auditing and Data Dynamics in Cloud Services. IEEE Trans. Serv. Comput. 15(4): 2047-2059 (2022) - [c13]Muncheon Yoo, Hyundo Yoon, Changhee Hahn, Dongyoung Koo, Junbeom Hur:
Downgrading Backward Privacy of Searchable Encryption. ICOIN 2022: 324-328 - 2021
- [c12]Hodong Kim, Changhee Hahn, Junbeom Hur:
Real-time Detection of Cache Side-channel Attack Using Non-cache Hardware Events. ICOIN 2021: 28-31 - [c11]Changhee Hahn, Hyunsoo Kwon, Daeyoung Kim, Junbeom Hur:
Enabling Fast Public Auditing and Data Dynamics in Cloud Services. SERVICES 2021: 4 - 2020
- [j10]Hyunsoo Kwon, Hyunjae Nam, Sangtae Lee, Changhee Hahn, Junbeom Hur:
(In-)Security of Cookies in HTTPS: Cookie Theft by Removing Cookie Flags. IEEE Trans. Inf. Forensics Secur. 15: 1204-1215 (2020) - [c10]Hyeongseob Kim, Changhee Hahn, Junbeom Hur:
Forward Secure Public Key Encryption with Keyword Search for Cloud-assisted IoT. CLOUD 2020: 549-556
2010 – 2019
- 2019
- [j9]Changhee Hahn, Hyunsoo Kwon, Junbeom Hur:
Trustworthy Delegation Toward Securing Mobile Healthcare Cyber-Physical Systems. IEEE Internet Things J. 6(4): 6301-6309 (2019) - [j8]Hyunsoo Kwon, Changhee Hahn, Kyungtae Kang, Junbeom Hur:
Secure deduplication with reliable and revocable key management in fog computing. Peer-to-Peer Netw. Appl. 12(4): 850-864 (2019) - [j7]Changhee Hahn, Hyungjune Shin, Hyunsoo Kwon, Junbeom Hur:
Efficient Multi-user Similarity Search Over Encrypted Data in Cloud Storage. Wirel. Pers. Commun. 107(3): 1337-1353 (2019) - [c9]Hyeongseob Kim, Changhee Hahn, Junbeom Hur:
Analysis of Forward Private Searchable Encryption and Its Application to Multi-Client Settings. ICUFN 2019: 529-531 - 2018
- [c8]Changhee Hahn, Hyunsoo Kwon, Junbeom Hur:
Toward Trustworthy Delegation: Verifiable Outsourced Decryption with Tamper-Resistance in Public Cloud Storage. IEEE CLOUD 2018: 920-923 - 2017
- [j6]Hyunsoo Kwon, Changhee Hahn, Daeyoung Kim, Junbeom Hur:
Secure deduplication for multimedia data with user revocation in cloud storage. Multim. Tools Appl. 76(4): 5889-5903 (2017) - [j5]Hyunsoo Kwon, Daeyeong Kim, Changhee Hahn, Junbeom Hur:
Secure authentication using ciphertext policy attribute-based encryption in mobile multi-hop networks. Multim. Tools Appl. 76(19): 19507-19521 (2017) - [c7]Hyunsoo Kwon, Changhee Hahn, Dongyoung Koo, Junbeom Hur:
Scalable and Reliable Key Management for Secure Deduplication in Cloud Storage. CLOUD 2017: 391-398 - [c6]Changhee Hahn, Hyungjune Shin, Junbeom Hur:
Cloud-based biometrics processing for privacy-preserving identification. ICUFN 2017: 595-600 - 2016
- [j4]Changhee Hahn, Junbeom Hur:
Efficient and privacy-preserving biometric identification in cloud. ICT Express 2(3): 135-139 (2016) - [j3]Changhee Hahn, Hyunsoo Kwon, Junbeom Hur:
Efficient Attribute-Based Secure Data Sharing with Hidden Policies and Traceability in Mobile Health Networks. Mob. Inf. Syst. 2016: 6545873:1-6545873:13 (2016) - [j2]Changhee Hahn, Hyunsoo Kwon, Daeyoung Kim, Junbeom Hur:
Enhanced authentication for outsourced educational contents through provable block possession. Multim. Tools Appl. 75(21): 13057-13076 (2016) - [j1]Daeyeong Kim, Hyunsoo Kwon, Changhee Hahn, Junbeom Hur:
Privacy-preserving public auditing for educational multimedia data in cloud computing. Multim. Tools Appl. 75(21): 13077-13091 (2016) - [c5]Changhee Hahn, Junbeom Hur:
Scalable and secure Private Set intersection for big data. BigComp 2016: 285-288 - [c4]Changhee Hahn, Junbeom Hur:
POSTER: Towards Privacy-Preserving Biometric Identification in Cloud Computing. CCS 2016: 1826-1828 - [c3]Seung-Woo Han, Hyunsoo Kwon, Changhee Hahn, Dongyoug Koo, Junbeom Hur:
A survey on MITM and its countermeasures in the TLS handshake protocol. ICUFN 2016: 724-729 - 2014
- [c2]Hyunsoo Kwon, Changhee Hahn, Daeyoung Kim, Kyungtae Kang, Junbeom Hur:
Secure Device-to-Device Authentication in Mobile Multi-hop Networks. WASA 2014: 267-278 - [c1]Changhee Hahn, Hyunsoo Kwon, Daeyoung Kim, Kyungtae Kang, Junbeom Hur:
A Privacy Threat in 4th Generation Mobile Telephony and Its Countermeasure. WASA 2014: 624-635
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-26 01:54 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint