Search Results - "Mun, Hyeran"

  • Showing 1 - 13 results of 13
Refine Results
  1. 1

    Ensuring Safety and Security in CAN-Based Automotive Embedded Systems: A Combination of Design Optimization and Secure Communication by Mun, Hyeran, Han, Kyusuk, Lee, Dong Hoon

    Published in IEEE transactions on vehicular technology (01-07-2020)
    “…As automotive embedded systems comprised of electronic control units (ECUs) connected via a controller area network (CAN) have continued to develop, the volume…”
    Get full text
    Journal Article
  2. 2

    Secure Privacy-Preserving V2V Communication in 5G-V2X Supporting Network Slicing by Mun, Hyeran, Seo, Minhye, Lee, Dong Hoon

    “…As autonomous driving technology continues to develop, communication for vehicles is becoming more important to provide an efficient and secure driving…”
    Get full text
    Journal Article
  3. 3

    Enhancing security and robustness of Cyphal on Controller Area Network in unmanned aerial vehicle environments by Han, Kyusuk, Mun, Hyeran, Balakrishnan, Malavika, Yeun, Chan Yeob

    Published in Computers & security (01-12-2023)
    “…A controller area network (CAN) has been widely deployed in automotive environments due to the decentralized environment which enables the easy control of many…”
    Get full text
    Journal Article
  4. 4

    Emerging Blockchain and Reputation Management in Federated Learning: Enhanced Security and Reliability for Internet of Vehicles (IoV) by Mun, Hyeran, Han, Kyusuk, Yeun, Hyun Ku, Damiani, Ernesto, Puthal, Deepak, Kim, Tae-Yeon, Yeun, Chan Yeob

    Published in IEEE transactions on vehicular technology (15-09-2024)
    “…Artificial intelligence (AI) technologies have been applied to the Internet of Vehicles (IoV) to provide convenience services such as traffic flow prediction…”
    Get full text
    Journal Article
  5. 5

    Enhanced secure anonymous authentication scheme for roaming service in global mobility networks by Mun, Hyeran, Han, Kyusuk, Lee, Yan Sun, Yeun, Chan Yeob, Choi, Hyo Hyun

    “…User authentication scheme is an important issue for providing secure roaming service to users of mobile devices. In 2008, Wu, Lee and Tsaur proposed an…”
    Get full text
    Journal Article
  6. 6

    Privacy enhanced data aggregation based on federated learning in Internet of Vehicles (IoV) by Mun, Hyeran, Han, Kyusuk, Damiani, Ernesto, Kim, Tae-Yeon, Yeun, Hyun Ku, Puthal, Deepak, Yeun, Chan Yeob

    Published in Computer communications (01-07-2024)
    “…As the Internet of Vehicles (IoV) environment continues to evolve, artificial intelligence (AI) technologies have been utilized to provide several applications…”
    Get full text
    Journal Article
  7. 7

    33‐1: All‐Inkjet‐printed AMOLED Display with Improved Efficiency and Lifetime by Kim, Sehun, Kang, Taeheon, Kim, Heunggyu, Mun, Hyeran, Koo, Youngmo, Ha, Jaekook, Lee, Changhee

    “…Inkjet‐printing of organic light‐emitting diodes(OLEDs) is a revolutionary technology aimed at large‐size panel production, high OLED material consumption…”
    Get full text
    Journal Article
  8. 8

    Design of secure key agreement protocol for pairing in RF4CE by Kyusuk Han, Hyeran Mun, Taeshik Shon

    “…Advance of Wireless Sensor Network (WSN) technologies brought deployment to various areas such as consumer electronics. Radio Frequency for Consumer…”
    Get full text
    Conference Proceeding
  9. 9

    Enhancement of anonymous authentication scheme in wireless sensor network by Hyeran Mun, Chan Yeob Yeun, Kyusuk Han, Byung Ho Chung

    “…User authentication scheme with anonymity is one of important issues for wireless sensor network. In this paper, we improve Wu et al.'s scheme providing…”
    Get full text
    Conference Proceeding
  10. 10

    A Privacy-Enhanced Contents Sharing Mechanism with Secure Removable Media(SRM) by Hyeran Mun, Sinhyo Kim, Jung Yeon Hwang, Byung Ho Chung

    “…In this paper, we propose a privacy-enhanced contents sharing mechanism with SRM. For user anonymity, our approach makes use of anonymously authenticated key…”
    Get full text
    Conference Proceeding
  11. 11

    3G-WLAN interworking: security analysis and new authentication and key agreement based on EAP-AKA by Mun, H., Han, K., Kim, K.

    Published in 2009 Wireless Telecommunications Symposium (01-05-2009)
    “…The 3rd Generation Partnership Project(3GPP) standard is developing System Architecture Evolution(SAE)/Long Term Evolution(LTE) architecture for the next…”
    Get full text
    Conference Proceeding
  12. 12
  13. 13

    Secure and efficient public key management in next generation mobile networks by Han, Kyusuk, Mun, Hyeran, Shon, Taeshik, Yeun, Chan Yeob, Park, James J. (Jong Hyuk)

    Published in Personal and ubiquitous computing (01-08-2012)
    “…Employing public key-based security architecture is inevitable for the advanced security applications in the mobile networks. However, key storage management…”
    Get full text
    Journal Article