Sunghyuck Hong

Orcid: 0000-0002-5923-1191

According to our database1, Sunghyuck Hong authored at least 21 papers between 2006 and 2020.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
P2P networking based internet of things (IoT) sensor node authentication by Blockchain.
Peer-to-Peer Netw. Appl., 2020

2019
Authentication Techniques in the Internet of Things Environment: A Survey.
Int. J. Netw. Secur., 2019

2018
Erratum to: A novel secure and efficient hash function with extra padding against rainbow table attacks.
Clust. Comput., 2018

A novel secure and efficient hash function with extra padding against rainbow table attacks.
Clust. Comput., 2018

2017
Secure and light IoT protocol (SLIP) for anti-hacking.
J. Comput. Virol. Hacking Tech., 2017

2016
Two-channel user authentication by using USB on Cloud.
J. Comput. Virol. Hacking Tech., 2016

2015
Efficient and secure DNS cyber shelter on DDoS attacks.
J. Comput. Virol. Hacking Tech., 2015

2014
Cost-Efficient Routing Protocol (CERP) on Wireless Sensor Networks.
Wirel. Pers. Commun., 2014

Tree-based routing algorithms on wireless sensor networks: survey.
J. Syst. Inf. Technol., 2014

2013
Design and Performance Analysis of Queue-based Group Diffie-Hellman Protocol (QGDH).
KSII Trans. Internet Inf. Syst., 2013

2011
Unified Modeling Language based Analysis of Security Attacks in Wireless Sensor Networks: A Survey.
KSII Trans. Internet Inf. Syst., 2011

2010
Analysis of attack models via Unified Modeling Language in Wireless Sensor Networks: A survey study.
Proceedings of the IEEE International Conference on Wireless Communications, 2010

2009
Secure and Efficient Tree-based Group Diffie-Hellman Protocol.
KSII Trans. Internet Inf. Syst., 2009

Queue-based Group Key Agreement Protocol.
Int. J. Netw. Secur., 2009

A Secure Certificate for Secure Group Communication.
Proceedings of the 2009 International Conference on Security & Management, 2009

2008
An Analysis on Media Projections of Information Technology.
Proceedings of the NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008, 2008

Secure Authentication in Virtual Community by Using Media Access Control address (MAC).
Proceedings of the 2008 International Conference on Security & Management, 2008

2007
Secure and Efficient Group Key Agreement Protocols.
PhD thesis, 2007

Design and Performance Analysis of an Enhanced Group Key Generation Protocol.
Proceedings of the 2007 International Conference on Security & Management, 2007

2006
Enhanced Group Key Generation Algorithm.
Proceedings of the Management of Integrated End-to-End Communications and Services, 2006

Enhanced Group Key Generation Protocol.
Proceedings of the 2006 International Conference on Security & Management, 2006


  Loading...