Search Results - "Mun, Hyeran"
-
1
Ensuring Safety and Security in CAN-Based Automotive Embedded Systems: A Combination of Design Optimization and Secure Communication
Published in IEEE transactions on vehicular technology (01-07-2020)“…As automotive embedded systems comprised of electronic control units (ECUs) connected via a controller area network (CAN) have continued to develop, the volume…”
Get full text
Journal Article -
2
Secure Privacy-Preserving V2V Communication in 5G-V2X Supporting Network Slicing
Published in IEEE transactions on intelligent transportation systems (01-09-2022)“…As autonomous driving technology continues to develop, communication for vehicles is becoming more important to provide an efficient and secure driving…”
Get full text
Journal Article -
3
Enhancing security and robustness of Cyphal on Controller Area Network in unmanned aerial vehicle environments
Published in Computers & security (01-12-2023)“…A controller area network (CAN) has been widely deployed in automotive environments due to the decentralized environment which enables the easy control of many…”
Get full text
Journal Article -
4
Emerging Blockchain and Reputation Management in Federated Learning: Enhanced Security and Reliability for Internet of Vehicles (IoV)
Published in IEEE transactions on vehicular technology (15-09-2024)“…Artificial intelligence (AI) technologies have been applied to the Internet of Vehicles (IoV) to provide convenience services such as traffic flow prediction…”
Get full text
Journal Article -
5
Enhanced secure anonymous authentication scheme for roaming service in global mobility networks
Published in Mathematical and computer modelling (2012)“…User authentication scheme is an important issue for providing secure roaming service to users of mobile devices. In 2008, Wu, Lee and Tsaur proposed an…”
Get full text
Journal Article -
6
Privacy enhanced data aggregation based on federated learning in Internet of Vehicles (IoV)
Published in Computer communications (01-07-2024)“…As the Internet of Vehicles (IoV) environment continues to evolve, artificial intelligence (AI) technologies have been utilized to provide several applications…”
Get full text
Journal Article -
7
33‐1: All‐Inkjet‐printed AMOLED Display with Improved Efficiency and Lifetime
Published in SID International Symposium Digest of technical papers (01-06-2022)“…Inkjet‐printing of organic light‐emitting diodes(OLEDs) is a revolutionary technology aimed at large‐size panel production, high OLED material consumption…”
Get full text
Journal Article -
8
Design of secure key agreement protocol for pairing in RF4CE
Published in 2010 International Conference for Internet Technology and Secured Transactions (01-11-2010)“…Advance of Wireless Sensor Network (WSN) technologies brought deployment to various areas such as consumer electronics. Radio Frequency for Consumer…”
Get full text
Conference Proceeding -
9
Enhancement of anonymous authentication scheme in wireless sensor network
Published in 2010 International Conference for Internet Technology and Secured Transactions (01-11-2010)“…User authentication scheme with anonymity is one of important issues for wireless sensor network. In this paper, we improve Wu et al.'s scheme providing…”
Get full text
Conference Proceeding -
10
A Privacy-Enhanced Contents Sharing Mechanism with Secure Removable Media(SRM)
Published in 2010 4th International Conference on Multimedia and Ubiquitous Engineering (01-08-2010)“…In this paper, we propose a privacy-enhanced contents sharing mechanism with SRM. For user anonymity, our approach makes use of anonymously authenticated key…”
Get full text
Conference Proceeding -
11
3G-WLAN interworking: security analysis and new authentication and key agreement based on EAP-AKA
Published in 2009 Wireless Telecommunications Symposium (01-05-2009)“…The 3rd Generation Partnership Project(3GPP) standard is developing System Architecture Evolution(SAE)/Long Term Evolution(LTE) architecture for the next…”
Get full text
Conference Proceeding -
12
-
13
Secure and efficient public key management in next generation mobile networks
Published in Personal and ubiquitous computing (01-08-2012)“…Employing public key-based security architecture is inevitable for the advanced security applications in the mobile networks. However, key storage management…”
Get full text
Journal Article