Jung Yeon Hwang

841 total citations
20 papers, 212 citations indexed

About

Jung Yeon Hwang is a scholar working on Artificial Intelligence, Computer Networks and Communications and Information Systems. According to data from OpenAlex, Jung Yeon Hwang has authored 20 papers receiving a total of 212 indexed citations (citations by other indexed papers that have themselves been cited), including 18 papers in Artificial Intelligence, 12 papers in Computer Networks and Communications and 6 papers in Information Systems. Recurrent topics in Jung Yeon Hwang's work include Cryptography and Data Security (18 papers), Advanced Authentication Protocols Security (9 papers) and Security in Wireless Sensor Networks (5 papers). Jung Yeon Hwang is often cited by papers focused on Cryptography and Data Security (18 papers), Advanced Authentication Protocols Security (9 papers) and Security in Wireless Sensor Networks (5 papers). Jung Yeon Hwang collaborates with scholars based in South Korea, United States and Netherlands. Jung Yeon Hwang's co-authors include DaeHun Nyang, Dong Hoon Lee, Kyu Young Choi, Seung-Hyun Seo, Liqun Chen, Moti Yung, Seungjoo Kim, Boyeon Song, Daeseon Choi and Mun‐Kyu Lee and has published in prestigious journals such as Information Sciences, IEEE Transactions on Information Forensics and Security and Applied Mathematics and Computation.

In The Last Decade

Jung Yeon Hwang

20 papers receiving 203 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Jung Yeon Hwang South Korea 8 191 99 84 39 24 20 212
Damien Vergnaud France 8 243 1.3× 124 1.3× 65 0.8× 46 1.2× 31 1.3× 26 280
Emmanuela Orsini Italy 5 219 1.1× 53 0.5× 38 0.5× 73 1.9× 45 1.9× 10 226
Jacob C. N. Schuldt Japan 7 129 0.7× 44 0.4× 33 0.4× 19 0.5× 28 1.2× 23 158
Benjamin Beurdouche France 3 182 1.0× 94 0.9× 105 1.3× 17 0.4× 19 0.8× 3 249
David Derler Austria 7 226 1.2× 175 1.8× 71 0.8× 27 0.7× 17 0.7× 11 274
Noel McCullagh Ireland 2 245 1.3× 107 1.1× 115 1.4× 80 2.1× 38 1.6× 2 271
David Mandell Freeman United States 5 193 1.0× 194 2.0× 63 0.8× 32 0.8× 18 0.8× 6 273
Yu Long China 9 258 1.4× 116 1.2× 106 1.3× 95 2.4× 45 1.9× 41 293
Hongzhen Du China 10 268 1.4× 143 1.4× 122 1.5× 94 2.4× 56 2.3× 17 308
Dung Hoang Duong Australia 9 176 0.9× 80 0.8× 26 0.3× 52 1.3× 9 0.4× 31 197

Countries citing papers authored by Jung Yeon Hwang

Since Specialization
Citations

This map shows the geographic impact of Jung Yeon Hwang's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Jung Yeon Hwang with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Jung Yeon Hwang more than expected).

Fields of papers citing papers by Jung Yeon Hwang

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Jung Yeon Hwang. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Jung Yeon Hwang. The network helps show where Jung Yeon Hwang may publish in the future.

Co-authorship network of co-authors of Jung Yeon Hwang

This figure shows the co-authorship network connecting the top 25 collaborators of Jung Yeon Hwang. A scholar is included among the top collaborators of Jung Yeon Hwang based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Jung Yeon Hwang. Jung Yeon Hwang is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Shin, Ji Sun, et al.. (2020). A Verifier-Based Password-Authenticated Key Exchange Using Tamper-Proof Hardware. The Computer Journal. 64(8). 1293–1302. 3 indexed citations
2.
Hwang, Jung Yeon, et al.. (2016). Simplified small exponent test for batch verification. Theoretical Computer Science. 662. 48–58. 12 indexed citations
3.
Hwang, Jung Yeon, et al.. (2016). Anonymity-based authenticated key agreement with full binding property. Journal of Communications and Networks. 18(2). 190–200. 2 indexed citations
4.
Hwang, Jung Yeon, et al.. (2015). Short Dynamic Group Signature Scheme Supporting Controllable Linkability. IEEE Transactions on Information Forensics and Security. 10(6). 1109–1124. 41 indexed citations
5.
Hwang, Jung Yeon, et al.. (2015). New efficient batch verification for an identity‐based signature scheme. Security and Communication Networks. 8(15). 2524–2535. 3 indexed citations
6.
Hwang, Jung Yeon, et al.. (2014). Collusion-resistant convertible ring signature schemes. Science China Information Sciences. 58(1). 1–16. 1 indexed citations
7.
Hwang, Jung Yeon, Hyoung Joong Kim, Dong Hoon Lee, & Boyeon Song. (2014). An enhanced (t,n) threshold directed signature scheme. Information Sciences. 275. 284–292. 5 indexed citations
8.
Hwang, Jung Yeon, et al.. (2012). Constructing Strong Identity-Based Designated Verifier Signatures with Self-Unverifiability. ETRI Journal. 34(2). 235–244. 14 indexed citations
9.
Hwang, Jung Yeon, et al.. (2012). Group signatures with controllable linkability for dynamic membership. Information Sciences. 222. 761–778. 29 indexed citations
10.
Hwang, Jung Yeon, et al.. (2011). Short Group Signatures with Controllable Linkability. 44–52. 17 indexed citations
11.
Seo, Seung-Hyun, Kyu Young Choi, Jung Yeon Hwang, & Seungjoo Kim. (2011). Efficient certificateless proxy signature scheme with provable security. Information Sciences. 188. 322–337. 27 indexed citations
12.
Hwang, Jung Yeon. (2010). A note on an identity-based ring signature scheme with signer verifiability. Theoretical Computer Science. 412(8-10). 796–804. 4 indexed citations
13.
Hwang, Jung Yeon, et al.. (2009). Weaknesses in the Hur–Shin–Yoon decentralized group key management. Wireless Communications and Mobile Computing. 9(12). 1565–1571. 1 indexed citations
14.
Hwang, Jung Yeon, et al.. (2009). Security vulnerability in a non-interactive ID-based proxy re-encryption scheme. Information Processing Letters. 109(23-24). 1260–1262. 7 indexed citations
15.
Choi, Seung Geol, Javier Herranz, Dennis Hofheinz, et al.. (2009). The Kurosawa–Desmedt key encapsulation is not chosen-ciphertext secure. Information Processing Letters. 109(16). 897–901. 6 indexed citations
16.
Hwang, Jung Yeon, Dong Hoon Lee, & Moti Yung. (2009). Universal forgery of the identity-based sequential aggregate signature scheme. 157–160. 17 indexed citations
17.
Hwang, Jung Yeon, Kyu Young Choi, & Dong Hoon Lee. (2008). Security weakness in an authenticated group key agreement protocol in two rounds. Computer Communications. 31(15). 3719–3724. 1 indexed citations
18.
Park, Jong Hwan, Kyu Young Choi, Jung Yeon Hwang, & Dong Hoon Lee. (2007). Certificateless public key encryption in the selective-ID security model. 60–82. 2 indexed citations
19.
Seo, Seung-Hyun, Jung Yeon Hwang, Kyu Young Choi, & Dong Hoon Lee. (2007). Identity-based universal designated multi-verifiers signature schemes. Computer Standards & Interfaces. 30(5). 288–295. 17 indexed citations
20.
Hwang, Jung Yeon, et al.. (2004). Cryptanalysis of Lee–Kim–Yoo password-based key agreement scheme. Applied Mathematics and Computation. 168(2). 858–865. 3 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026