Search Results - "Park, YoungHo"
-
1
Automated machine learning with R: AutoML tools for beginners in clinical research
Published in Journal of minimally invasive surgery (15-09-2024)“…Recently, interest in machine learning (ML) has increased as the application fields have expanded significantly. Although ML methods excel in many fields,…”
Get full text
Journal Article -
2
Robust and Efficient Authentication and Group-Proof Scheme Using Physical Unclonable Functions for Wearable Computing
Published in Sensors (Basel, Switzerland) (20-06-2023)“…Wearable computing has garnered a lot of attention due to its various advantages, including automatic recognition and categorization of human actions from…”
Get full text
Journal Article -
3
Design of Secure Protocol for Cloud-Assisted Electronic Health Record System Using Blockchain
Published in Sensors (Basel, Switzerland) (21-05-2020)“…In the traditional electronic health record (EHR) management system, each medical service center manages their own health records, respectively, which are…”
Get full text
Journal Article -
4
iAKA-CIoT: An Improved Authentication and Key Agreement Scheme for Cloud Enabled Internet of Things Using Physical Unclonable Function
Published in Sensors (Basel, Switzerland) (01-08-2022)“…The Internet of Things (IoT) with cloud services are important functionalities in the latest IoT systems for providing various convenient services. These…”
Get full text
Journal Article -
5
Three-Factor User Authentication and Key Agreement Using Elliptic Curve Cryptosystem in Wireless Sensor Networks
Published in Sensors (Basel, Switzerland) (14-12-2016)“…Secure communication is a significant issue in wireless sensor networks. User authentication and key agreement are essential for providing a secure system,…”
Get full text
Journal Article -
6
Provably Secure Three-Factor-Based Mutual Authentication Scheme with PUF for Wireless Medical Sensor Networks
Published in Sensors (Basel, Switzerland) (09-09-2021)“…Wireless medical sensor networks (WMSNs) are used in remote medical service environments to provide patients with convenient healthcare services. In a WMSN…”
Get full text
Journal Article -
7
SLUA-WSN: Secure and Lightweight Three-Factor-Based User Authentication Protocol for Wireless Sensor Networks
Published in Sensors (Basel, Switzerland) (25-07-2020)“…Wireless sensor networks (WSN) are composed of multiple sensor nodes with limited storage, computation, power, and communication capabilities and are widely…”
Get full text
Journal Article -
8
A Secure Lightweight Three-Factor Authentication Scheme for IoT in Cloud Computing Environment
Published in Sensors (Basel, Switzerland) (19-08-2019)“…With the development of cloud computing and communication technology, users can access the internet of things (IoT) services provided in various environments,…”
Get full text
Journal Article -
9
Provably Secure Mutual Authentication and Key Agreement Scheme Using PUF in Internet of Drones Deployments
Published in Sensors (Basel, Switzerland) (10-02-2023)“…Internet of Drones (IoD), designed to coordinate the access of unmanned aerial vehicles (UAVs), is a specific application of the Internet of Things (IoT)…”
Get full text
Journal Article -
10
Secure Three-Factor Authentication Protocol for Multi-Gateway IoT Environments
Published in Sensors (Basel, Switzerland) (22-05-2019)“…Internet of Things (IoT) environments such as smart homes, smart factories, and smart buildings have become a part of our lives. The services of IoT…”
Get full text
Journal Article -
11
A Secure and Lightweight Authentication Protocol for IoT-Based Smart Homes
Published in Sensors (Basel, Switzerland) (21-02-2021)“…With the information and communication technologies (ICT) and Internet of Things (IoT) gradually advancing, smart homes have been able to provide home services…”
Get full text
Journal Article -
12
Secure Authentication Protocol for Wireless Sensor Networks in Vehicular Communications
Published in Sensors (Basel, Switzerland) (21-09-2018)“…With wireless sensor networks (WSNs), a driver can access various useful information for convenient driving, such as traffic congestion, emergence, vehicle…”
Get full text
Journal Article -
13
Design of Secure Mutual Authentication Scheme for Metaverse Environments Using Blockchain
Published in IEEE access (2022)“…During the COVID-19 pandemic, engagement in various remote activities such as online education and meetings has increased. However, since the conventional…”
Get full text
Journal Article -
14
AKM-IoV: Authenticated Key Management Protocol in Fog Computing-Based Internet of Vehicles Deployment
Published in IEEE internet of things journal (01-10-2019)“…Internet of Vehicles (IoV) is an intelligent application of Internet of Things (IoT) in smart transportation that takes intelligent commitments to the…”
Get full text
Journal Article -
15
Design of Secure and Lightweight Authentication Protocol for Wearable Devices Environment
Published in IEEE journal of biomedical and health informatics (01-07-2018)“…Wearable devices are used in various applications to collect information including step information, sleeping cycles, workout statistics, and health-related…”
Get full text
Journal Article -
16
An Efficient, Anonymous and Robust Authentication Scheme for Smart Home Environments
Published in Sensors (Basel, Switzerland) (22-02-2020)“…In recent years, the Internet of Things (IoT) has exploded in popularity. The smart home, as an important facet of IoT, has gained its focus for smart…”
Get full text
Journal Article -
17
Lightweight Three-Factor-Based Privacy- Preserving Authentication Scheme for IoT-Enabled Smart Homes
Published in IEEE access (2021)“…Smart homes are an emerging paradigm of Internet of Things (IoT) in which users can remotely control various home devices via the internet anytime and…”
Get full text
Journal Article -
18
Secure ECC-Based Three-Factor Mutual Authentication Protocol for Telecare Medical Information System
Published in IEEE access (2022)“…In the recent COVID-19 situation, Telecare Medical Information System (TMIS) is attracting attention. TMIS is one of the technologies used in Wireless Body…”
Get full text
Journal Article -
19
IoMT Malware Detection Approaches: Analysis and Research Challenges
Published in IEEE access (2019)“…The advancement in Information and Communications Technology (ICT) has changed the entire paradigm of computing. Because of such advancement, we have new types…”
Get full text
Journal Article -
20
Provably Secure ECC-Based Device Access Control and Key Agreement Protocol for IoT Environment
Published in IEEE access (2019)“…For secure communication between any two neighboring sensing devices on the Internet of Things (IoT) environment, it is essential to design a secure device…”
Get full text
Journal Article