Search Results - "NAM, Junghyun"

Refine Results
  1. 1

    Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography by Choi, Younsung, Lee, Donghoon, Kim, Jiye, Jung, Jaewook, Nam, Junghyun, Won, Dongho

    Published in Sensors (Basel, Switzerland) (10-06-2014)
    “…Wireless sensor networks (WSNs) consist of sensors, gateways and users. Sensors are widely distributed to monitor various conditions, such as temperature,…”
    Get full text
    Journal Article
  2. 2

    A provably-secure ECC-based authentication scheme for wireless sensor networks by Nam, Junghyun, Kim, Moonseong, Paik, Juryon, Lee, Youngsook, Won, Dongho

    Published in Sensors (Basel, Switzerland) (06-11-2014)
    “…A smart-card-based user authentication scheme for wireless sensor networks (in short, a SUA-WSN scheme) is designed to restrict access to the sensor data only…”
    Get full text
    Journal Article
  3. 3

    Efficient and anonymous two-factor user authentication in wireless sensor networks: achieving user anonymity with lightweight sensor computation by Nam, Junghyun, Choo, Kim-Kwang Raymond, Han, Sangchul, Kim, Moonseong, Paik, Juryon, Won, Dongho

    Published in PloS one (07-04-2015)
    “…A smart-card-based user authentication scheme for wireless sensor networks (hereafter referred to as a SCA-WSN scheme) is designed to ensure that only users…”
    Get full text
    Journal Article
  4. 4

    An off-line dictionary attack on a simple three-party key exchange protocol by Junghyun Nam, Junghyun Nam, Juryon Paik, Juryon Paik, Hyun-kyu Kang, Hyun-kyu Kang, Ung Kim, Ung Kim, Dongho Won, Dongho Won

    Published in IEEE communications letters (01-03-2009)
    “…Key exchange protocols allow two or more parties communicating over a public network to establish a common secret key called a session key. Due to their…”
    Get full text
    Journal Article
  5. 5

    Osteosarcoma and soft-tissue sarcomas with an immune infiltrate express PD-L1: relation to clinical outcome and Th1 pathway activation by Wunder, Jay S., Lee, Minji J., Nam, Junghyun, Lau, Beatrice Y., Dickson, Brendan C., Pinnaduwage, Dushanthi, Bull, Shelley B., Ferguson, Peter C., Seto, Andrew, Gokgoz, Nalan, Andrulis, Irene L.

    Published in Oncoimmunology (01-01-2020)
    “…Immune checkpoint proteins, such as PD-L1 and PD-1, are important in several cancers; however, their role in osteosarcoma (OSA) and soft tissue sarcoma (STS)…”
    Get full text
    Journal Article
  6. 6

    Security Enhanced Anonymous Multiserver Authenticated Key Agreement Scheme Using Smart Cards and Biometrics by Jung, Jaewook, Kim, Jiye, Lee, Donghoon, Nam, Junghyun, Choi, Younsung, Won, Dongho

    Published in TheScientificWorld (01-01-2014)
    “…An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key…”
    Get full text
    Journal Article
  7. 7

    Clinical implications of matrix metalloproteinase-1, -3, -7, -9, -12, and plasminogen activator inhibitor-1 gene polymorphisms in colorectal cancer by Woo, Mijung, Park, Kyungsook, Nam, Junghyun, Kim, Jin C

    Published in Journal of gastroenterology and hepatology (01-07-2007)
    “…Background and Aim:  Overexpression of matrix metalloproteinase (MMP)‐1, ‐3, ‐7, ‐9, and plasminogen activator inhibitor‐1 (PAI‐1) are implicated in the…”
    Get full text
    Journal Article
  8. 8

    Security enhancement to a password-authenticated group key exchange protocol for mobile Ad-hoc networks by Junghyun Nam, Paik, J., Ung Mo Kim, Dongho Won

    Published in IEEE communications letters (01-02-2008)
    “…Group key exchange protocols allow a group of parties communicating over a public network to come up with a common secret key called a session key . Due to…”
    Get full text
    Journal Article
  9. 9

    Association rule extraction from XML stream data for wireless sensor networks by Paik, Juryon, Nam, Junghyun, Kim, Ung Mo, Won, Dongho

    Published in Sensors (Basel, Switzerland) (18-07-2014)
    “…With the advances of wireless sensor networks, they yield massive volumes of disparate, dynamic and geographically-distributed and heterogeneous data. The data…”
    Get full text
    Journal Article
  10. 10

    Start codon polymorphisms in the vitamin D receptor and colorectal cancer risk by Park, KyungSook, Woo, Mijung, Nam, JungHyun, Kim, Jin Cheon

    Published in Cancer letters (18-06-2006)
    “…The expression of the nuclear vitamin D receptor (VDR), which is involved in regulating cell growth and proliferation, may contribute to the development of…”
    Get full text
    Journal Article
  11. 11

    Provably-Secure (Chinese Government) SM2 and Simplified SM2 Key Exchange Protocols by Choo, Kim-Kwang Raymond, Kim, Moonseong, Nam, Junghyun, Yang, Ang

    Published in TheScientificWorld (01-01-2014)
    “…We revisit the SM2 protocol, which is widely used in Chinesecommercial applications and by Chinese government agencies. Althoughit is by now standard practice…”
    Get full text
    Journal Article
  12. 12

    Password-Only Authenticated Three-Party Key Exchange Proven Secure against Insider Dictionary Attacks by Won, Dongho, Paik, Juryon, Choo, Kim-Kwang Raymond, Nam, Junghyun

    Published in TheScientificWorld (2014)
    “…While a number of protocols for password-only authenticated key exchange (PAKE) in the 3-party setting have been proposed, it still remains a challenging task…”
    Get full text
    Journal Article
  13. 13

    Password-Only Authenticated Three-Party Key Exchange with Provable Security in the Standard Model by Paik, Juryon, Kim, Jinsoo, Kang, Hyun-Kyu, Kim, Junghwan, Choo, Kim-Kwang Raymond, Nam, Junghyun, Won, Dongho

    Published in TheScientificWorld (01-01-2014)
    “…Protocols for password-only authenticated key exchange (PAKE) in the three-party setting allow two clients registered with the same authentication server to…”
    Get full text
    Journal Article
  14. 14

    On the Security of a Simple Three-Party Key Exchange Protocol without Server’s Public Keys by Paik, Juryon, Park, Minkyu, Choo, Kim-Kwang Raymond, Nam, Junghyun, Won, Dongho

    Published in TheScientificWorld (01-01-2014)
    “…Authenticated key exchange protocols are of fundamental importance in securing communications and are now extensively deployed for use in various real-world…”
    Get full text
    Journal Article
  15. 15

    Two-Round Password-Only Authenticated Key Exchange in the Three-Party Setting by Nam, Junghyun, Choo, Kim-Kwang Raymond, Han, Sangchul, Paik, Juryon, Won, Dongho

    Published in Symmetry (Basel) (2015)
    “…We present the first provably-secure three-party password-only authenticated key exchange (PAKE) protocol that can run in only two communication rounds. Our…”
    Get full text
    Journal Article
  16. 16

    A weakness in the Bresson-Chevassut-Essiari-Pointcheval's Group Key Agreement scheme for low-power mobile devices by NAM, Junghyun, KIM, Seungjoo, WON, Dongho

    Published in IEEE communications letters (01-05-2005)
    “…In this letter, we show that Bresson-Chevassut-Essiari-Pointcheval's Group Key Agreement scheme does not meet the main security properties: implicit key…”
    Get full text
    Journal Article
  17. 17

    Understanding the motivation to use web portals by Nam, Junghyun

    Published in Computers in human behavior (01-07-2014)
    “…•Social escapism motivation is the main determinant of web portal intention-to-use.•The influence of motivation on intention-to-use of web portal was…”
    Get full text
    Journal Article
  18. 18

    The preventative effects of statin on lung cancer development in patients with idiopathic pulmonary fibrosis using the National Health Insurance Service Database in Korea by Lee, Yoo Jung, Kang, Nayoon, Nam, Junghyun, Lee, Eung Gu, Ryoo, Jiwon, Kwon, Soon Seog, Kim, Yong Hyun, Kang, Hye Seon

    Published in PloS one (13-03-2024)
    “…Little is known about the effect of statin use in lung cancer development in idiopathic pulmonary fibrosis (IPF). We analyzed the database of the National…”
    Get full text
    Journal Article
  19. 19
  20. 20