Rethinking vehicular communications: Merging VANET with cloud computing R Hussain, J Son, H Eun, S Kim, H Oh 4th IEEE International Conference on Cloud Computing Technology and Science …, 2012 | 358 | 2012 |
Investigation of thermal and electrochemical degradation of fuel cell catalysts M Cai, MS Ruthkosky, B Merzougui, S Swathirajan, MP Balogh, SH Oh Journal of Power Sources 160 (2), 977-986, 2006 | 240 | 2006 |
On security and privacy issues of fog computing supported Internet of Things environment K Lee, D Kim, D Ha, U Rajput, H Oh 2015 6th International Conference on the Network of the Future (NOF), 1-3, 2015 | 204 | 2015 |
Conditional privacy preserving security protocol for NFC applications H Eun, H Lee, H Oh IEEE Transactions on Consumer Electronics 59 (1), 153-160, 2013 | 141 | 2013 |
Pocketbook of palm oil uses. TP Pantzaris | 119 | 1987 |
A hierarchical privacy preserving pseudonymous authentication protocol for VANET U Rajput, F Abbas, H Oh Ieee Access 4, 7770-7784, 2016 | 99 | 2016 |
A hybrid approach for efficient privacy-preserving authentication in VANET U Rajput, F Abbas, H Eun, H Oh IEEE Access 5, 12014-12030, 2017 | 93 | 2017 |
A paradigm shift from vehicular ad hoc networks to VANET-based clouds R Hussain, Z Rezaeifar, H Oh Wireless Personal Communications 83, 1131-1158, 2015 | 80 | 2015 |
Cooperation-aware VANET clouds: providing secure cloud services to vehicular ad hoc networks R Hussain, H Oh Journal of information processing systems 10 (1), 103-118, 2014 | 75 | 2014 |
Secure and privacy-aware incentives-based witness service in social internet of vehicles clouds R Hussain, D Kim, J Son, J Lee, CA Kerrache, A Benslimane, H Oh IEEE Internet of Things Journal 5 (4), 2441-2448, 2018 | 54 | 2018 |
Vehicle witnesses as a service: Leveraging vehicles as witnesses on the road in vanet clouds R Hussain, F Abbas, J Son, D Kim, S Kim, H Oh 2013 IEEE 5th International Conference on Cloud Computing Technology and …, 2013 | 51 | 2013 |
Secure and privacy-aware traffic information as a service in VANET-based clouds R Hussain, Z Rezaeifar, YH Lee, H Oh Pervasive and Mobile Computing 24, 194-209, 2015 | 49 | 2015 |
TIaaS: Secure cloud-assisted traffic information dissemination in vehicular ad hoc networks R Hussain, F Abbas, J Son, H Oh 2013 13th IEEE/ACM International Symposium on Cluster, Cloud, and Grid …, 2013 | 49 | 2013 |
On secure and privacy-aware sybil attack detection in vehicular communications R Hussain, H Oh Wireless personal communications 77, 2649-2673, 2014 | 47 | 2014 |
Effects of global warming on mosquitoes & mosquito‐borne diseases and the new strategies for mosquito control H Yi, BR Devkota, J Yu, K Oh, J Kim, HJ Kim Entomological Research 44 (6), 215-235, 2014 | 46 | 2014 |
Towards privacy aware pseudonymless strategy for avoiding profile generation in vanet R Hussain, S Kim, H Oh International Workshop on Information Security Applications, 268-280, 2009 | 46 | 2009 |
A new hash-based RFID mutual authentication protocol providing enhanced user privacy protection J Lim, H Oh, SJ Kim Information Security Practice and Experience: 4th International Conference …, 2008 | 41 | 2008 |
Identity-based key agreement protocols in a multiple PKG environment H Lee, D Kim, S Kim, H Oh Computational Science and Its Applications–ICCSA 2005: International …, 2005 | 35 | 2005 |
A reliable adaptive forwarding approach in named data networking Z Rezaeifar, J Wang, H Oh, SB Lee, J Hur Future Generation Computer Systems 96, 538-551, 2019 | 34 | 2019 |
Conditional proxy re-encryption for secure big data group sharing in cloud environment J Son, D Kim, R Hussain, H Oh 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS …, 2014 | 34 | 2014 |