Enhanced secure anonymous authentication scheme for roaming service in global mobility networks H Mun, K Han, YS Lee, CY Yeun, HH Choi Mathematical and Computer Modelling 55 (1-2), 214-222, 2012 | 160 | 2012 |
Real-time frame authentication using ID Anonymization in automotive networks KS Han, SD Potluri, KG Shin US Patent 9,288,048, 2016 | 132 | 2016 |
3G-WLAN interworking: security analysis and new authentication and key agreement based on EAP-AKA H Mun, K Han, K Kim 2009 Wireless Telecommunications Symposium, 1-8, 2009 | 103 | 2009 |
On authentication in a connected vehicle: Secure integration of mobile devices with vehicular networks K Han, SD Potluri, KG Shin Proceedings of the ACM/IEEE 4th International Conference on Cyber-Physical …, 2013 | 69 | 2013 |
Automotive cybersecurity for in-vehicle communication K Han, A Weimerskirch, KG Shin IQT QUARTERLY 6 (1), 22-25, 2014 | 60 | 2014 |
A scalable and efficient key escrow model for lawful interception of IDBC‐based secure communication K Han, CY Yeun, T Shon, J Park, K Kim International Journal of Communication Systems 24 (4), 461-472, 2011 | 52 | 2011 |
Ensuring safety and security in CAN-based automotive embedded systems: A combination of design optimization and secure communication H Mun, K Han, DH Lee IEEE Transactions on Vehicular Technology 69 (7), 7078-7091, 2020 | 50 | 2020 |
Untraceable mobile node authentication in WSN K Han, K Kim, T Shon Sensors 10 (5), 4410-4429, 2010 | 50 | 2010 |
Efficient mobile sensor authentication in smart home and WPAN K Han, T Shon, K Kim IEEE Transactions on Consumer Electronics 56 (2), 591-596, 2010 | 47 | 2010 |
A novel secure key paring protocol for RF4CE ubiquitous smart home systems K Han, J Kim, T Shon, D Ko Personal and ubiquitous computing 17, 945-949, 2013 | 39 | 2013 |
Secure authenticated group key agreement protocol in the MANET environment CY Yeun, K Han, DL Vo, K Kim information security technical report 13 (3), 158-164, 2008 | 39 | 2008 |
A practical solution to achieve real-time performance in the automotive network by randomizing frame identifier K Han, A Weimerskirch, KG Shin Proc. Eur. Embedded Secur. Cars (ESCAR), 13-29, 2015 | 26 | 2015 |
Method and apparatus for authenticating a sensor node in a sensor network TS Shon, YS Park, SS Han, KJ Kim, KS Han, KIM Jang-Seong US Patent 8,516,252, 2013 | 23 | 2013 |
Design and implementation of a wireless sensor network architecture using smart mobile devices B Koo, K Han, JJ Park, T Shon Telecommunication Systems 52, 2311-2320, 2013 | 22 | 2013 |
An enhanced lightweight authentication protocol for access control in wireless LANs K Ren, H Lee, K Han, J Park, K Kim Proceedings. 2004 12th IEEE International Conference on Networks (ICON 2004 …, 2004 | 19 | 2004 |
Yet another intrusion detection system against insider attacks K Kim, H Mun, K Han, CY Yeun Symposium on Cryptography and Information Security, 2008 | 17 | 2008 |
Sensor authentication in dynamic wireless sensor network environments K Han, T Shon International Journal of RFID Security and Cryptography 1 (1/2), 2012 | 13 | 2012 |
Efficient sensor node authentication in third generation-wireless sensor networks integrated networks K Han, K Kim, J Park, T Shon IET communications 5 (12), 1744-1754, 2011 | 13 | 2011 |
Enhancing privacy and authentication for location based service using trusted authority K Han, K Kim 2nd Joint Workshop on Information Security, 1-13, 2007 | 13 | 2007 |
Secure and efficient public key management in next generation mobile networks K Han, H Mun, T Shon, CY Yeun, JJ Park Personal and Ubiquitous Computing 16, 677-685, 2012 | 12 | 2012 |