Chul Sur

According to our database1, Chul Sur authored at least 29 papers between 2003 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
Self-Controllable Secure Location Sharing for Trajectory-Based Message Delivery on Cloud-Assisted VANETs.
Sensors, 2018

A Secure Incentive Scheme for Vehicular Delay Tolerant Networks Using Cryptocurrency.
Secur. Commun. Networks, 2018

2017
Secure vehicle location-sharing for trajectory-based message delivery on VANETs.
Proceedings of the 26th IEEE International Symposium on Industrial Electronics, 2017

2016
Pseudonymous authentication for secure V2I services in cloud-based vehicular networks.
J. Ambient Intell. Humaniz. Comput., 2016

An efficient and secure navigation protocol based on vehicular cloud.
Int. J. Comput. Math., 2016

2013
A Privacy Preserving Message Delivery Protocol Using Identity-Hidden Index in VDTNs.
J. Univers. Comput. Sci., 2013

An Improved Privacy-Preserving Navigation Protocol in {VANET}s.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2013

Certificate-Based Proxy Re-encryption for Public Cloud Storage.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

A Simplified Privacy Preserving Message Delivery Protocol in VDTNs.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

2011
A Privacy-Preserving Location Assurance Protocol for Location-Aware Services in VANETs.
Wirel. Pers. Commun., 2011

A Secure and Location Assurance Protocol for Location-Aware Services in VANETs.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

Securing Location-Aware Services Based on Online/Offline Signatures in VANETs.
Proceedings of the Availability, Reliability and Security for Business, Enterprise and Health Information Systems, 2011

2010
An Efficient Anonymous Authentication Protocol for Secure Vehicular Communications.
J. Inf. Sci. Eng., 2010

Discriminative Image Hashing Based on Region of Interest.
Proceedings of the Advances in Multimedia Modeling, 2010

Chosen-Ciphertext Secure Certificateless Proxy Re-Encryption.
Proceedings of the Communications and Multimedia Security, 2010

2009
A robust and efficient anonymous authentication protocol in VANETs.
J. Commun. Networks, 2009

A Robust Conditional Privacy-Preserving Authentication Protocol in VANET.
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2009

Efficient Anonymous Authentication Protocol Using Key-Insulated Signature Scheme for Secure VANET.
Proceedings of the Mobile Lightweight Wireless Systems, 2009

A Fast and Fully Format Compliant Protection of JPEG2000 Code-Streams.
Proceedings of the Advances in Multimedia Modeling, 2009

2008
An Improved Flexible Access Control Scheme for JPEG2000 Codestreams.
Proceedings of the 2008 International Conference on Multimedia and Ubiquitous Engineering (MUE 2008), 2008

2007
Region-Based Selective Encryption for Medical Imaging.
Proceedings of the Frontiers in Algorithmics, First Annual International Workshop, 2007

Multi-receiver Certificate-Based Encryption and Application to Public Key Broadcast Encryption.
Proceedings of the 2007 ECSIS Symposium on Bio-inspired, 2007

A New DRM System Based on Graded Contents Sharing and Time-Block Distribution for Home Networks.
Proceedings of the 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007

2006
A New Efficient Protocol for Authentication and Certificate Status Management in Personal Area Networks.
Proceedings of the Computer and Information Sciences, 2006

An Efficient Authentication and Simplified Certificate Status Management for Personal Area Networks.
Proceedings of the Management of Convergence Networks and Services, 2006

2005
A Fair and Reliable P2P E-Commerce Model Based on Collaboration with Distributed Peers.
Proceedings of the Distributed Computing, 2005

2004
Practical Modification of an Efficient Public-Key Framework.
Proceedings of the 2004 IEEE International Conference on e-Technology, 2004

2003
Distributed Certified E-mail System for Mobile Users.
Proceedings of the Distributed Computing, 2003

ROCEM: Robust Certified E-mail System Based on Server-Supported Signature.
Proceedings of the Information and Communications Security, 5th International Conference, 2003


  Loading...