Search Results - "Park, YoungHo"

Refine Results
  1. 1

    Automated machine learning with R: AutoML tools for beginners in clinical research by Park, Youngho

    Published in Journal of minimally invasive surgery (15-09-2024)
    “…Recently, interest in machine learning (ML) has increased as the application fields have expanded significantly. Although ML methods excel in many fields,…”
    Get full text
    Journal Article
  2. 2

    Robust and Efficient Authentication and Group-Proof Scheme Using Physical Unclonable Functions for Wearable Computing by Yu, Sungjin, Park, Youngho

    Published in Sensors (Basel, Switzerland) (20-06-2023)
    “…Wearable computing has garnered a lot of attention due to its various advantages, including automatic recognition and categorization of human actions from…”
    Get full text
    Journal Article
  3. 3

    Design of Secure Protocol for Cloud-Assisted Electronic Health Record System Using Blockchain by Kim, MyeongHyun, Yu, SungJin, Lee, JoonYoung, Park, YoHan, Park, YoungHo

    Published in Sensors (Basel, Switzerland) (21-05-2020)
    “…In the traditional electronic health record (EHR) management system, each medical service center manages their own health records, respectively, which are…”
    Get full text
    Journal Article
  4. 4

    iAKA-CIoT: An Improved Authentication and Key Agreement Scheme for Cloud Enabled Internet of Things Using Physical Unclonable Function by Park, Kisung, Park, Youngho

    Published in Sensors (Basel, Switzerland) (01-08-2022)
    “…The Internet of Things (IoT) with cloud services are important functionalities in the latest IoT systems for providing various convenient services. These…”
    Get full text
    Journal Article
  5. 5

    Three-Factor User Authentication and Key Agreement Using Elliptic Curve Cryptosystem in Wireless Sensor Networks by Park, YoHan, Park, YoungHo

    Published in Sensors (Basel, Switzerland) (14-12-2016)
    “…Secure communication is a significant issue in wireless sensor networks. User authentication and key agreement are essential for providing a secure system,…”
    Get full text
    Journal Article
  6. 6

    Provably Secure Three-Factor-Based Mutual Authentication Scheme with PUF for Wireless Medical Sensor Networks by Kwon, DeokKyu, Park, YoHan, Park, YoungHo

    Published in Sensors (Basel, Switzerland) (09-09-2021)
    “…Wireless medical sensor networks (WMSNs) are used in remote medical service environments to provide patients with convenient healthcare services. In a WMSN…”
    Get full text
    Journal Article
  7. 7

    SLUA-WSN: Secure and Lightweight Three-Factor-Based User Authentication Protocol for Wireless Sensor Networks by Yu, SungJin, Park, YoungHo

    Published in Sensors (Basel, Switzerland) (25-07-2020)
    “…Wireless sensor networks (WSN) are composed of multiple sensor nodes with limited storage, computation, power, and communication capabilities and are widely…”
    Get full text
    Journal Article
  8. 8

    A Secure Lightweight Three-Factor Authentication Scheme for IoT in Cloud Computing Environment by Yu, SungJin, Park, KiSung, Park, YoungHo

    Published in Sensors (Basel, Switzerland) (19-08-2019)
    “…With the development of cloud computing and communication technology, users can access the internet of things (IoT) services provided in various environments,…”
    Get full text
    Journal Article
  9. 9

    Provably Secure Mutual Authentication and Key Agreement Scheme Using PUF in Internet of Drones Deployments by Park, Yohan, Ryu, Daeun, Kwon, Deokkyu, Park, Youngho

    Published in Sensors (Basel, Switzerland) (10-02-2023)
    “…Internet of Drones (IoD), designed to coordinate the access of unmanned aerial vehicles (UAVs), is a specific application of the Internet of Things (IoT)…”
    Get full text
    Journal Article
  10. 10

    Secure Three-Factor Authentication Protocol for Multi-Gateway IoT Environments by Lee, JoonYoung, Yu, SungJin, Park, KiSung, Park, YoHan, Park, YoungHo

    Published in Sensors (Basel, Switzerland) (22-05-2019)
    “…Internet of Things (IoT) environments such as smart homes, smart factories, and smart buildings have become a part of our lives. The services of IoT…”
    Get full text
    Journal Article
  11. 11

    A Secure and Lightweight Authentication Protocol for IoT-Based Smart Homes by Oh, JiHyeon, Yu, SungJin, Lee, JoonYoung, Son, SeungHwan, Kim, MyeongHyun, Park, YoungHo

    Published in Sensors (Basel, Switzerland) (21-02-2021)
    “…With the information and communication technologies (ICT) and Internet of Things (IoT) gradually advancing, smart homes have been able to provide home services…”
    Get full text
    Journal Article
  12. 12

    Secure Authentication Protocol for Wireless Sensor Networks in Vehicular Communications by Yu, SungJin, Lee, JoonYoung, Lee, KyungKeun, Park, KiSung, Park, YoungHo

    Published in Sensors (Basel, Switzerland) (21-09-2018)
    “…With wireless sensor networks (WSNs), a driver can access various useful information for convenient driving, such as traffic congestion, emergence, vehicle…”
    Get full text
    Journal Article
  13. 13

    Design of Secure Mutual Authentication Scheme for Metaverse Environments Using Blockchain by Ryu, Jongseok, Son, Seunghwan, Lee, Joonyoung, Park, Yohan, Park, Youngho

    Published in IEEE access (2022)
    “…During the COVID-19 pandemic, engagement in various remote activities such as online education and meetings has increased. However, since the conventional…”
    Get full text
    Journal Article
  14. 14

    AKM-IoV: Authenticated Key Management Protocol in Fog Computing-Based Internet of Vehicles Deployment by Wazid, Mohammad, Bagga, Palak, Das, Ashok Kumar, Shetty, Sachin, Rodrigues, Joel J. P. C., Park, Youngho

    Published in IEEE internet of things journal (01-10-2019)
    “…Internet of Vehicles (IoV) is an intelligent application of Internet of Things (IoT) in smart transportation that takes intelligent commitments to the…”
    Get full text
    Journal Article
  15. 15

    Design of Secure and Lightweight Authentication Protocol for Wearable Devices Environment by Das, Ashok Kumar, Wazid, Mohammad, Kumar, Neeraj, Khan, Muhammad Khurram, Choo, Kim-Kwang Raymond, Park, YoungHo

    “…Wearable devices are used in various applications to collect information including step information, sleeping cycles, workout statistics, and health-related…”
    Get full text
    Journal Article
  16. 16

    An Efficient, Anonymous and Robust Authentication Scheme for Smart Home Environments by Banerjee, Soumya, Odelu, Vanga, Das, Ashok Kumar, Chattopadhyay, Samiran, Park, Youngho

    Published in Sensors (Basel, Switzerland) (22-02-2020)
    “…In recent years, the Internet of Things (IoT) has exploded in popularity. The smart home, as an important facet of IoT, has gained its focus for smart…”
    Get full text
    Journal Article
  17. 17

    Lightweight Three-Factor-Based Privacy- Preserving Authentication Scheme for IoT-Enabled Smart Homes by Yu, Sungjin, Jho, Namsu, Park, Youngho

    Published in IEEE access (2021)
    “…Smart homes are an emerging paradigm of Internet of Things (IoT) in which users can remotely control various home devices via the internet anytime and…”
    Get full text
    Journal Article
  18. 18

    Secure ECC-Based Three-Factor Mutual Authentication Protocol for Telecare Medical Information System by Ryu, Jongseok, Oh, Jihyeon, Kwon, Deokkyu, Son, Seunghwan, Lee, Joonyoung, Park, Yohan, Park, Youngho

    Published in IEEE access (2022)
    “…In the recent COVID-19 situation, Telecare Medical Information System (TMIS) is attracting attention. TMIS is one of the technologies used in Wireless Body…”
    Get full text
    Journal Article
  19. 19

    IoMT Malware Detection Approaches: Analysis and Research Challenges by Wazid, Mohammad, Das, Ashok Kumar, Rodrigues, Joel J. P. C., Shetty, Sachin, Park, Youngho

    Published in IEEE access (2019)
    “…The advancement in Information and Communications Technology (ICT) has changed the entire paradigm of computing. Because of such advancement, we have new types…”
    Get full text
    Journal Article
  20. 20

    Provably Secure ECC-Based Device Access Control and Key Agreement Protocol for IoT Environment by Das, Ashok Kumar, Wazid, Mohammad, Yannam, Animi Reddy, Rodrigues, Joel J. P. C., Park, Youngho

    Published in IEEE access (2019)
    “…For secure communication between any two neighboring sensing devices on the Internet of Things (IoT) environment, it is essential to design a secure device…”
    Get full text
    Journal Article