A three-factor anonymous user authentication scheme for Internet of Things environments H Lee, D Kang, J Ryu, D Won, H Kim, Y Lee Journal of Information Security and Applications 52, 102494, 2020 | 62 | 2020 |
Secure and efficient three-factor protocol for wireless sensor networks J Ryu, H Lee, H Kim, D Won Sensors 18 (12), 4481, 2018 | 31 | 2018 |
An improved anonymous authentication scheme for roaming in ubiquitous networks H Lee, D Lee, J Moon, J Jung, D Kang, H Kim, D Won PloS one 13 (3), e0193366, 2018 | 25 | 2018 |
A Secure and Lightweight Three-Factor-Based Authentication Scheme for Smart Healthcare Systems J Ryu, D Kang, H Lee, H Kim, D Won Sensors 20 (24), 7136, 2020 | 19 | 2020 |
Secure three-factor anonymous user authentication scheme for cloud computing environment H Lee, D Kang, Y Lee, D Won Wireless Communications and Mobile Computing 2021, 1-20, 2021 | 18 | 2021 |
Lightweight user authentication scheme for roaming service in GLOMONET with privacy preserving D Kang, H Lee, Y Lee, D Won Plos one 16 (2), e0247441, 2021 | 15 | 2021 |
SMASG: Secure Mobile Authentication Scheme for Global Mobility Network J Ryu, H Lee, Y Lee, D Won IEEE Access, 2022 | 10 | 2022 |
Secure and Anonymous Authentication Scheme for Mobile Edge Computing Environments H Lee, J Ryu, D Won IEEE Internet of Things Journal, 2023 | 5 | 2023 |
Security Analysis of Blockchain-based User Authentication for Smart Grid Edge Computing Infrastructure H Lee, J Ryu, Y Lee, D Won 2021 15th International Conference on Ubiquitous Information Management and …, 2021 | 5 | 2021 |
Security Enhanced Anonymous User Authenticated Key Agreement Scheme using Smart Card J Jung, D Lee, H Lee, D Won Journal of Electronic Science and Technology, 1-6, 0 | 5 | |
Quantum-resistant Lattice-based Authentication for V2X Communication in C-ITS S Ha, H Lee, D Won, Y Lee 2020 14th International Conference on Ubiquitous Information Management and …, 2020 | 4 | 2020 |
Cryptanalysis of a chaotic chebyshev polynomials based remote user authentication scheme C Quan, J Jung, H Lee, D Kang, D Won 2018 International Conference on Information Networking (ICOIN), 438-441, 2018 | 4 | 2018 |
Distributed and Federated Authentication Schemes Based on Updatable Smart Contracts K Kim, J Ryu, H Lee, Y Lee, D Won Electronics 12 (5), 1217, 2023 | 3 | 2023 |
Cryptanalysis and Improvement of an Advanced Anonymous and Biometrics-Based Multi-server Authentication Scheme Using Smart Cards C Quan, H Lee, D Kang, J Kim, S Cho, D Won International Conference on Applied Human Factors and Ergonomics, 62-71, 2017 | 2 | 2017 |
블록체인에서 대용량 컴퓨팅 공격 보호 기술★ 이학준, 원동호, 이영숙 융합보안논문지 제 19 (2), 6, 2019 | 1 | 2019 |
Improvement of Wu et al.'s Three-Factor User Authentication Scheme for Wireless Sensor Networks J Ryu, H Lee, H Kim, D Won Preprints, 2018 | 1 | 2018 |
A Security Enhanced Lightweight Mobile Payment Scheme Based on Two Gateways H Lee, J Kim, J Moon, D Kang, D Won biometrics 3, 9, 2017 | 1 | 2017 |
An enhanced unlinkable anonymous payment scheme based on near field communication H Lee, J Kim, J Jung, Y Lee, D Won Proceedings of the 11th International Conference on Ubiquitous Information …, 2017 | 1 | 2017 |
XAI 를 이용한 CNN 기반 리눅스 악성코드 탐지 박혜빈, 최윤성, 이학준 멀티미디어학회논문지 27 (4), 514-523, 2024 | | 2024 |
UAV 대상 AI 보안 공격 현황 및 대응 방안 연구 진미리, 최윤성, 이학준 한국산업보안연구 14 (1), 7-29, 2024 | | 2024 |