Jin Wook Byun

836 total citations
15 papers, 139 citations indexed

About

Jin Wook Byun is a scholar working on Information Systems, Computer Networks and Communications and Hardware and Architecture. According to data from OpenAlex, Jin Wook Byun has authored 15 papers receiving a total of 139 indexed citations (citations by other indexed papers that have themselves been cited), including 14 papers in Information Systems, 10 papers in Computer Networks and Communications and 6 papers in Hardware and Architecture. Recurrent topics in Jin Wook Byun's work include User Authentication and Security Systems (12 papers), Advanced Authentication Protocols Security (10 papers) and Physical Unclonable Functions (PUFs) and Hardware Security (6 papers). Jin Wook Byun is often cited by papers focused on User Authentication and Security Systems (12 papers), Advanced Authentication Protocols Security (10 papers) and Physical Unclonable Functions (PUFs) and Hardware Security (6 papers). Jin Wook Byun collaborates with scholars based in South Korea. Jin Wook Byun's co-authors include Dong Hoon Lee, Jong In Lim and Ik Rae Jeong and has published in prestigious journals such as IEEE Access, Information Sciences and IEEE Internet of Things Journal.

In The Last Decade

Jin Wook Byun

15 papers receiving 127 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Jin Wook Byun South Korea 7 97 95 76 35 23 15 139
David Durham United States 7 72 0.7× 49 0.5× 72 0.9× 22 0.6× 17 0.7× 25 142
Bodo Möller Germany 4 66 0.7× 72 0.8× 104 1.4× 35 1.0× 53 2.3× 6 164
Mihir Nanavati Canada 7 108 1.1× 116 1.2× 110 1.4× 60 1.7× 34 1.5× 8 194
Joshua Fried United States 6 161 1.7× 111 1.2× 54 0.7× 58 1.7× 28 1.2× 10 211
Fabrizio De Santis Germany 8 47 0.5× 75 0.8× 130 1.7× 35 1.0× 16 0.7× 21 173
Vaggelis Atlidakis United States 6 110 1.1× 130 1.4× 50 0.7× 19 0.5× 57 2.5× 10 212
Gaël Thomas France 7 91 0.9× 57 0.6× 47 0.6× 67 1.9× 9 0.4× 21 138
Chenghuai Lu United States 9 100 1.0× 100 1.1× 212 2.8× 95 2.7× 60 2.6× 14 247
Thyla van der Merwe United Kingdom 5 122 1.3× 98 1.0× 119 1.6× 9 0.3× 21 0.9× 9 188
Ashley Flavel United States 7 258 2.7× 41 0.4× 85 1.1× 22 0.6× 20 0.9× 11 272

Countries citing papers authored by Jin Wook Byun

Since Specialization
Citations

This map shows the geographic impact of Jin Wook Byun's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Jin Wook Byun with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Jin Wook Byun more than expected).

Fields of papers citing papers by Jin Wook Byun

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Jin Wook Byun. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Jin Wook Byun. The network helps show where Jin Wook Byun may publish in the future.

Co-authorship network of co-authors of Jin Wook Byun

This figure shows the co-authorship network connecting the top 25 collaborators of Jin Wook Byun. A scholar is included among the top collaborators of Jin Wook Byun based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Jin Wook Byun. Jin Wook Byun is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

15 of 15 papers shown
1.
Byun, Jin Wook. (2023). PUFDid: PUF-based Drone IDentifier and Its Application. 342–346. 1 indexed citations
2.
Jeong, Ik Rae, et al.. (2023). Identity-Based Multiproxy Signature With Proxy Signing Key for Internet of Drones. IEEE Internet of Things Journal. 11(3). 4191–4205. 4 indexed citations
3.
Byun, Jin Wook. (2022). Towards serverless fast one round authentication with two mobile end devices. The Journal of Supercomputing. 79(5). 5684–5704. 1 indexed citations
4.
Byun, Jin Wook, et al.. (2022). Key Agreement Between User and Drone With Forward Unlinkability in Internet of Drones. IEEE Access. 10. 17134–17144. 5 indexed citations
5.
Byun, Jin Wook. (2019). A Generic Multifactor Authenticated Key Exchange with Physical Unclonable Function. Security and Communication Networks. 2019. 1–15. 7 indexed citations
6.
Byun, Jin Wook. (2019). On the Secure Design of Hash-Based Authenticator in the Smartcard Authentication System. Wireless Personal Communications. 109(4). 2329–2352. 4 indexed citations
7.
Byun, Jin Wook. (2019). PDAKE: A Provably Secure PUF-Based Device Authenticated Key Exchange in Cloud Setting. IEEE Access. 7. 181165–181177. 4 indexed citations
8.
Byun, Jin Wook & Ik Rae Jeong. (2019). Comments on Physically Unclonable Function Based Two-Factor Authentication Protocols. Wireless Personal Communications. 106(3). 1243–1252. 2 indexed citations
10.
Byun, Jin Wook. (2019). End-to-End Authenticated Key Exchange Based on Different Physical Unclonable Functions. IEEE Access. 7. 102951–102965. 22 indexed citations
11.
Byun, Jin Wook. (2016). A Brief Consideration on the Security of Hash-Based Authenticator. Journal of the Korea Institute of Information Security and Cryptology. 26(3). 609–612. 1 indexed citations
12.
Byun, Jin Wook. (2015). Privacy preserving smartcard-based authentication system with provable security. Security and Communication Networks. 8(17). 3028–3044. 12 indexed citations
13.
Byun, Jin Wook & Dong Hoon Lee. (2011). On a security model of conjunctive keyword search over encrypted relational database. Journal of Systems and Software. 84(8). 1364–1372. 9 indexed citations
14.
Byun, Jin Wook, Dong Hoon Lee, & Jong In Lim. (2007). EC2C-PAKA: An efficient client-to-client password-authenticated key agreement. Information Sciences. 177(19). 3995–4013. 37 indexed citations
15.
Byun, Jin Wook, Dong Hoon Lee, & Jong In Lim. (2006). Security analysis and improvement of a gateway-oriented password-based authenticated key exchange protocol. IEEE Communications Letters. 10(9). 683–685. 22 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026