Nam-Su Jho

563 total citations
26 papers, 301 citations indexed

About

Nam-Su Jho is a scholar working on Artificial Intelligence, Computer Networks and Communications and Information Systems. According to data from OpenAlex, Nam-Su Jho has authored 26 papers receiving a total of 301 indexed citations (citations by other indexed papers that have themselves been cited), including 17 papers in Artificial Intelligence, 9 papers in Computer Networks and Communications and 9 papers in Information Systems. Recurrent topics in Nam-Su Jho's work include Cryptography and Data Security (11 papers), Cryptographic Implementations and Security (8 papers) and Chaos-based Image/Signal Encryption (7 papers). Nam-Su Jho is often cited by papers focused on Cryptography and Data Security (11 papers), Cryptographic Implementations and Security (8 papers) and Chaos-based Image/Signal Encryption (7 papers). Nam-Su Jho collaborates with scholars based in South Korea, China and United Kingdom. Nam-Su Jho's co-authors include Sungjin Yu, Youngho Park, Dowon Hong, Taek-Young Youn, Deokkyu Kwon, Joonyoung Lee, Changho Seo, Seunghwan Son, Cheol-Hee Park and Sang Uk Shin and has published in prestigious journals such as IEEE Transactions on Information Theory, IEEE Access and Sensors.

In The Last Decade

Nam-Su Jho

22 papers receiving 285 citations

Author Peers

Peers are selected by citation overlap in the author's most active subfields. citations · hero ref

Author Last Decade Papers Cites
Nam-Su Jho 156 138 126 58 48 26 301
Xuezeng Pan 130 0.8× 100 0.7× 176 1.4× 124 2.1× 41 0.9× 50 377
Nouha Oualha 164 1.1× 167 1.2× 259 2.1× 48 0.8× 50 1.0× 28 408
Shahzaib Tahir 219 1.4× 238 1.7× 186 1.5× 67 1.2× 30 0.6× 49 410
Jianzhen Luo 72 0.5× 97 0.7× 209 1.7× 37 0.6× 62 1.3× 21 300
Şuayb S. Arslan 114 0.7× 90 0.7× 191 1.5× 45 0.8× 112 2.3× 65 341
Xiangyu Zou 125 0.8× 153 1.1× 177 1.4× 57 1.0× 48 1.0× 48 366
Chuanyi Liu 265 1.7× 159 1.2× 257 2.0× 43 0.7× 31 0.6× 62 449
Kim Thuat Nguyen 201 1.3× 246 1.8× 254 2.0× 63 1.1× 49 1.0× 5 449
Dan Gohman 121 0.8× 176 1.3× 131 1.0× 43 0.7× 46 1.0× 5 377

Countries citing papers authored by Nam-Su Jho

Since Specialization
Citations

This map shows the geographic impact of Nam-Su Jho's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Nam-Su Jho with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Nam-Su Jho more than expected).

Fields of papers citing papers by Nam-Su Jho

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Nam-Su Jho. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Nam-Su Jho. The network helps show where Nam-Su Jho may publish in the future.

Co-authorship network of co-authors of Nam-Su Jho

This figure shows the co-authorship network connecting the top 25 collaborators of Nam-Su Jho. A scholar is included among the top collaborators of Nam-Su Jho based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Nam-Su Jho. Nam-Su Jho is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Hong, Dowon, et al.. (2023). Improvement of the Efficiency of Neural Cryptography-Based Secret Key Exchange Algorithm. IEEE Access. 11. 45323–45333. 1 indexed citations
2.
Son, Seunghwan, Deokkyu Kwon, Joonyoung Lee, et al.. (2022). On the Design of a Privacy-Preserving Communication Scheme for Cloud-Based Digital Twin Environments Using Blockchain. IEEE Access. 10. 75365–75375. 56 indexed citations
3.
Lee, Sang Cheol, et al.. (2022). Provably Secure PUF-Based Lightweight Mutual Authentication Scheme for Wireless Body Area Networks. Electronics. 11(23). 3868–3868. 7 indexed citations
4.
Lee, Joonyoung, Jihyeon Oh, Deokkyu Kwon, et al.. (2022). PUFTAP-IoT: PUF-Based Three-Factor Authentication Protocol in IoT Environment Focused on Sensing Devices. Sensors. 22(18). 7075–7075. 21 indexed citations
5.
Jho, Nam-Su, et al.. (2022). A Multi-Tree Approach to Mutable Order-Preserving Encoding. IEICE Transactions on Information and Systems. E105.D(11). 1930–1933.
6.
Yu, Sungjin, Nam-Su Jho, & Youngho Park. (2021). Lightweight Three-Factor-Based Privacy- Preserving Authentication Scheme for IoT-Enabled Smart Homes. IEEE Access. 9. 126186–126197. 51 indexed citations
7.
Park, Cheol-Hee, et al.. (2021). Neural Cryptography Based on Generalized Tree Parity Machine for Real-Life Systems. Security and Communication Networks. 2021. 1–12. 40 indexed citations
8.
Kim, Jiyoon, et al.. (2021). A lightweight D2D security protocol with request-forecasting for next-generation mobile networks. Connection Science. 34(1). 362–386. 9 indexed citations
9.
Youn, Taek-Young, et al.. (2020). Blockchain-Based Data Sharing and Trading Model for the Connected Car. Sensors. 20(11). 3141–3141. 22 indexed citations
10.
Jho, Nam-Su & Taek-Young Youn. (2020). Dynamic Membership Management in Anonymous and Deniable Distance Bounding. Sustainability. 12(24). 10330–10330.
11.
Jho, Nam-Su, et al.. (2020). On the Linear Transformation in White-Box Cryptography. IEEE Access. 8. 51684–51691. 4 indexed citations
12.
Kim, Ju‐Young, et al.. (2020). Trends in Data Privacy Protection Technologies with Enhanced Utilization. 35(6). 88–96. 1 indexed citations
13.
Youn, Taek-Young & Nam-Su Jho. (2020). Trapdoor Digital Shredder: A New Technique for Improved Data Security without Cryptographic Encryption. KSII Transactions on Internet and Information Systems. 14(3). 1 indexed citations
14.
Youn, Taek-Young, Nam-Su Jho, Kyung-Hyune Rhee, & Sang Uk Shin. (2019). Authorized Client-Side Deduplication Using CP-ABE in Cloud Storage. Wireless Communications and Mobile Computing. 2019. 1–11. 4 indexed citations
15.
Youn, Taek-Young, et al.. (2016). Client-Side Deduplication to Enhance Security and Reduce Communication Costs. ETRI Journal. 39(1). 116–123. 11 indexed citations
16.
Youn, Taek-Young, et al.. (2016). Design of additive homomorphic encryption with multiple message spaces for secure and practical storage services over encrypted data. The Journal of Supercomputing. 74(8). 3620–3638. 6 indexed citations
17.
Jho, Nam-Su, et al.. (2015). Efficient Construction of Order-Preserving Encryption Using Pseudo Random Function. IEICE Transactions on Communications. E98.B(7). 1276–1283. 1 indexed citations
18.
Kim, Taewan, et al.. (2015). Quantum messages with signatures forgeable in arbitrated quantum signature schemes. Physica Scripta. 90(2). 25101–25101. 9 indexed citations
19.
Jho, Nam-Su & Dowon Hong. (2013). Symmetric Searchable Encryption with Efficient Conjunctive Keyword Search. KSII Transactions on Internet and Information Systems. 7(5). 1328–1342. 7 indexed citations
20.
Cheon, Jung Hee, et al.. (2008). Skipping, Cascade, and Combined Chain Schemes for Broadcast Encryption. IEEE Transactions on Information Theory. 54(11). 5155–5171. 16 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026