Kyusuk Han

Orcid: 0000-0002-8734-3107

According to our database1, Kyusuk Han authored at least 32 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Privacy enhanced data aggregation based on federated learning in Internet of Vehicles (IoV).
Comput. Commun., 2024

2023
Enhancing security and robustness of Cyphal on Controller Area Network in unmanned aerial vehicle environments.
Comput. Secur., December, 2023

2022
Improving Drone Mission Continuity in Rescue Operations with Secure and Efficient Task Migration.
Proceedings of the 8th IEEE World Forum on Internet of Things, 2022

A New Scalable Mutual Authentication in Fog-Edge Drone Swarm Environment.
Proceedings of the Information Security Practice and Experience, 2022

A Study on Employing UPTANE for Secure Software Update OTA in Drone Environments.
Proceedings of the IEEE International Conference on Omni-layer Intelligent Systems, 2022

2020
Ensuring Safety and Security in CAN-Based Automotive Embedded Systems: A Combination of Design Optimization and Secure Communication.
IEEE Trans. Veh. Technol., 2020

2016
Editorial: A special section on "Emerging Platform Technologies".
J. Supercomput., 2016

Prevention of information mis-translation by a malicious gateway in connected vehicles.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

2015
Authentication of mobile applications through various local distributors.
Multim. Tools Appl., 2015

2014
Toward Advanced Mobile Cloud Computing for the Internet of Things: Current Issues and Future Direction.
Mob. Networks Appl., 2014

2013
Design and implementation of a wireless sensor network architecture using smart mobile devices.
Telecommun. Syst., 2013

A novel secure key paring protocol for RF4CE ubiquitous smart home systems.
Pers. Ubiquitous Comput., 2013

On authentication in a connected vehicle: secure integration of mobile devices with vehicular networks.
Proceedings of the ACM/IEEE 4th International Conference on Cyber-Physical Systems (with CPS Week 2013), 2013

2012
Secure and efficient public key management in next generation mobile networks.
Pers. Ubiquitous Comput., 2012

Enhanced secure anonymous authentication scheme for roaming service in global mobility networks.
Math. Comput. Model., 2012

Efficient Authenticated Key Agreement Protocols for Dynamic Wireless Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2012

2011
Providing security vertical handoff in SARAH for heterogeneous networks.
J. Netw. Comput. Appl., 2011

A scalable and efficient key escrow model for lawful interception of IDBC-based secure communication.
Int. J. Commun. Syst., 2011

Efficient sensor node authentication in third generation-wireless sensor networks integrated networks.
IET Commun., 2011

Design and Implementation of One-Way Key Agreement Model for Enhancing VoIP Internet Phone Security.
IEICE Trans. Commun., 2011

Enhancing Credibility of Location Based Service Using Multiple Sensing Technologies.
IEICE Trans. Inf. Syst., 2011

A Secure and Robust Connectivity Architecture for Smart Devices and Applications.
EURASIP J. Wirel. Commun. Netw., 2011

A Novel Approach to Detect Network Attacks Using G-HMM-Based Temporal Relations between Internet Protocol Packets.
EURASIP J. Wirel. Commun. Netw., 2011

2010
Efficient mobile sensor authentication in smart home and WPAN.
IEEE Trans. Consumer Electron., 2010

Untraceable Mobile Node Authentication in WSN.
Sensors, 2010

Enhancement of anonymous authentication scheme in wireless sensor network.
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010

Design of secure key agreement protocol for pairing in RF4CE.
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010

Efficient sensor node authentication via 3GPP mobile communication networks.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
3G-WLAN interworking: security analysis and new authentication and key agreement based on EAP-AKA.
Proceedings of the 2009 Wireless Telecommunications Symposium, 2009

2008
Secure authenticated group key agreement protocol in the MANET environment.
Inf. Secur. Tech. Rep., 2008

2004
An enhanced lightweight authentication protocol for access control in wireless LANs.
Proceedings of the 12th IEEE International Conference on Networks, 2004

Threshold Password-Based Authentication Using Bilinear Pairings.
Proceedings of the Public Key Infrastructure, 2004


  Loading...