Search Results - "Yu, Sungjin"
-
1
Robust and Efficient Authentication and Group-Proof Scheme Using Physical Unclonable Functions for Wearable Computing
Published in Sensors (Basel, Switzerland) (20-06-2023)“…Wearable computing has garnered a lot of attention due to its various advantages, including automatic recognition and categorization of human actions from…”
Get full text
Journal Article -
2
Design of Secure Protocol for Cloud-Assisted Electronic Health Record System Using Blockchain
Published in Sensors (Basel, Switzerland) (21-05-2020)“…In the traditional electronic health record (EHR) management system, each medical service center manages their own health records, respectively, which are…”
Get full text
Journal Article -
3
SLUA-WSN: Secure and Lightweight Three-Factor-Based User Authentication Protocol for Wireless Sensor Networks
Published in Sensors (Basel, Switzerland) (25-07-2020)“…Wireless sensor networks (WSN) are composed of multiple sensor nodes with limited storage, computation, power, and communication capabilities and are widely…”
Get full text
Journal Article -
4
A Secure Lightweight Three-Factor Authentication Scheme for IoT in Cloud Computing Environment
Published in Sensors (Basel, Switzerland) (19-08-2019)“…With the development of cloud computing and communication technology, users can access the internet of things (IoT) services provided in various environments,…”
Get full text
Journal Article -
5
Secure Three-Factor Authentication Protocol for Multi-Gateway IoT Environments
Published in Sensors (Basel, Switzerland) (22-05-2019)“…Internet of Things (IoT) environments such as smart homes, smart factories, and smart buildings have become a part of our lives. The services of IoT…”
Get full text
Journal Article -
6
A Secure and Lightweight Authentication Protocol for IoT-Based Smart Homes
Published in Sensors (Basel, Switzerland) (21-02-2021)“…With the information and communication technologies (ICT) and Internet of Things (IoT) gradually advancing, smart homes have been able to provide home services…”
Get full text
Journal Article -
7
Secure Authentication Protocol for Wireless Sensor Networks in Vehicular Communications
Published in Sensors (Basel, Switzerland) (21-09-2018)“…With wireless sensor networks (WSNs), a driver can access various useful information for convenient driving, such as traffic congestion, emergence, vehicle…”
Get full text
Journal Article -
8
Lightweight Three-Factor-Based Privacy- Preserving Authentication Scheme for IoT-Enabled Smart Homes
Published in IEEE access (2021)“…Smart homes are an emerging paradigm of Internet of Things (IoT) in which users can remotely control various home devices via the internet anytime and…”
Get full text
Journal Article -
9
SALS-TMIS: Secure, Anonymous, and Lightweight Privacy-Preserving Scheme for IoMT-Enabled TMIS Environments
Published in IEEE access (2022)“…With the Telecare Medical Information System (TMIS), patients and doctors can access various healthcare services through wireless communication technology…”
Get full text
Journal Article -
10
A Secure Charging System for Electric Vehicles Based on Blockchain
Published in Sensors (Basel, Switzerland) (09-07-2019)“…Smart grids incorporating internet-of-things are emerging solutions to provide a reliable, sustainable and efficient electricity supply, and electric vehicle…”
Get full text
Journal Article -
11
Design of Secure Authentication Protocol for Cloud-Assisted Telecare Medical Information System Using Blockchain
Published in IEEE access (2020)“…Telecare medical information system (TMIS) implemented in wireless body area network (WBAN) is convenient and time-saving for patients and doctors. TMIS is…”
Get full text
Journal Article -
12
IoV-SMAP: Secure and Efficient Message Authentication Protocol for IoV in Smart City Environment
Published in IEEE access (2020)“…With the emergence of the concept of smart city and the increasing demands for a range of vehicles, Internet of Vehicles (IoV) has achieved a lot of attention…”
Get full text
Journal Article -
13
PUFTAP-IoT: PUF-Based Three-Factor Authentication Protocol in IoT Environment Focused on Sensing Devices
Published in Sensors (Basel, Switzerland) (19-09-2022)“…In IoT-based environments, smart services can be provided to users under various environments, such as smart homes, smart factories, smart cities, smart…”
Get full text
Journal Article -
14
On the Design of a Privacy-Preserving Communication Scheme for Cloud-Based Digital Twin Environments Using Blockchain
Published in IEEE access (2022)“…Digital twin technology is recently in the spotlight because of its potential applicability in business and industry. In digital twin environments, data…”
Get full text
Journal Article -
15
Comments on "ITSSAKA-MS: An Improved Three-Factor Symmetric-Key Based Secure AKA Scheme for Multi-Server Environments"
Published in IEEE access (2020)“…Multi-server technology is widely utilized due to its enormous applicability in fields such as telecare medicine information system (TMIS), online shopping,…”
Get full text
Journal Article -
16
On the Design of Secure and Efficient Three-Factor Authentication Protocol Using Honey List for Wireless Sensor Networks
Published in IEEE access (2020)“…The Internet of Thing (IoT) is useful for connecting and collecting variable data of objects through the Internet, which makes to generate useful data for…”
Get full text
Journal Article -
17
Comments on "ALAM: Anonymous Lightweight Authentication Mechanism for SDN Enabled Smart Homes"
Published in IEEE access (2021)“…Smart home is intended to be able to enhance home automation systems and achieves goals such as reducing operational costs and increasing comfort while…”
Get full text
Journal Article -
18
A Dynamic Privacy-Preserving Key Management Protocol for V2G in Social Internet of Things
Published in IEEE access (2019)“…With the smart grid (SG) and the social Internet of Things (SIoT), an electric vehicle operator can use reliable, flexible, and efficient charging service with…”
Get full text
Journal Article -
19
A Secure Three-Factor Authentication Protocol for E-Governance System Based on Multiserver Environments
Published in IEEE access (2022)“…In electronic governance (e-governance) system, citizens can access government services such as transportation, licensing and immigration remotely over the…”
Get full text
Journal Article -
20
Privacy-Preserving Lightweight Authentication Protocol for Demand Response Management in Smart Grid Environment
Published in Applied sciences (01-03-2020)“…With the development in wireless communication and low-power device, users can receive various useful services such as electric vehicle (EV) charging, smart…”
Get full text
Journal Article