Youngho Park

According to our database1, Youngho Park authored at least 59 papers between 2005 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 


Online presence:



SLUA-WSN: Secure and Lightweight Three-Factor-Based User Authentication Protocol for Wireless Sensor Networks.
Sensors, 2020

Designing Efficient Sinkhole Attack Detection Mechanism in Edge-Based IoT Deployment.
Sensors, 2020

Design of Secure Protocol for Cloud-Assisted Electronic Health Record System Using Blockchain.
Sensors, 2020

An Efficient, Anonymous and Robust Authentication Scheme for Smart Home Environments.
Sensors, 2020

A lightweight three-factor authentication protocol for digital rights management system.
Peer Peer Netw. Appl., 2020

Multi-Authority CP-ABE-Based user access control scheme with constant-size key and ciphertext for IoT deployment.
J. Inf. Secur. Appl., 2020

Certificateless-Signcryption-Based Three-Factor User Access Control Scheme for IoT Environment.
IEEE Internet Things J., 2020

Comments on "ITSSAKA-MS: An Improved Three-Factor Symmetric-Key Based Secure AKA Scheme for Multi-Server Environments".
IEEE Access, 2020

IoV-SMAP: Secure and Efficient Message Authentication Protocol for IoV in Smart City Environment.
IEEE Access, 2020

Design of Secure Authentication Protocol for Cloud-Assisted Telecare Medical Information System Using Blockchain.
IEEE Access, 2020

Intrusion Detection Protocols in Wireless Sensor Networks Integrated to Internet of Things Deployment: Survey and Future Challenges.
IEEE Access, 2020

LAKS-NVT: Provably Secure and Lightweight Authentication and Key Agreement Scheme Without Verification Table in Medical Internet of Things.
IEEE Access, 2020

On the Design of Secure and Efficient Three-Factor Authentication Protocol Using Honey List for Wireless Sensor Networks.
IEEE Access, 2020

BAKMP-IoMT: Design of Blockchain Enabled Authenticated Key Management Protocol for Internet of Medical Things Deployment.
IEEE Access, 2020

Authentication Protocols in Internet of Vehicles: Taxonomy, Analysis, and Challenges.
IEEE Access, 2020

A Secure Biometric Based User Authentication Protocol in Wireless Sensor Networks.
Proceedings of the 10th Annual Computing and Communication Workshop and Conference, 2020

A Secure Lightweight Three-Factor Authentication Scheme for IoT in Cloud Computing Environment.
Sensors, 2019

LDAKM-EIoT: Lightweight Device Authentication and Key Management Mechanism for Edge-Based IoT Deployment.
Sensors, 2019

Secure Three-Factor Authentication Protocol for Multi-Gateway IoT Environments.
Sensors, 2019

A Secure Charging System for Electric Vehicles Based on Blockchain.
Sensors, 2019

AKM-IoV: Authenticated Key Management Protocol in Fog Computing-Based Internet of Vehicles Deployment.
IEEE Internet Things J., 2019

Secure user authentication scheme with novel server mutual verification for multiserver environments.
Int. J. Commun. Syst., 2019

IoMT Malware Detection Approaches: Analysis and Research Challenges.
IEEE Access, 2019

A Dynamic Privacy-Preserving Key Management Protocol for V2G in Social Internet of Things.
IEEE Access, 2019

Provably Secure ECC-Based Device Access Control and Key Agreement Protocol for IoT Environment.
IEEE Access, 2019

Physically Secure Lightweight Anonymous User Authentication Protocol for Internet of Things Using Physically Unclonable Functions.
IEEE Access, 2019

A Secure Multi-Factor Remote User Authentication Scheme for Cloud-IoT Applications.
Proceedings of the 28th International Conference on Computer Communication and Networks, 2019

A Secure Authentication and Key Establishment Scheme for Wearable Devices.
Proceedings of the 28th International Conference on Computer Communication and Networks, 2019

Design of Secure and Lightweight Authentication Protocol for Wearable Devices Environment.
IEEE J. Biomed. Health Informatics, 2018

Secure Authentication Protocol for Wireless Sensor Networks in Vehicular Communications.
Sensors, 2018

2PAKEP: Provably Secure and Efficient Two-Party Authenticated Key Exchange Protocol for Mobile Environment.
IEEE Access, 2018

HEAP: An Efficient and Fault-Tolerant Authentication and Key Exchange Protocol for Hadoop-Assisted Big Data Platform.
IEEE Access, 2018

Provably Secure Multi-Server Authentication Protocol Using Fuzzy Commitment.
IEEE Access, 2018

Design of an Anonymity-Preserving Group Formation Based Authentication Protocol in Global Mobility Networks.
IEEE Access, 2018

Mobile Cloud-Based Interactive 3D Rendering and Streaming System Over Heterogeneous Wireless Networks.
IEEE Trans. Circuits Syst. Video Technol., 2017

A Selective Group Authentication Scheme for IoT-Based Medical Information System.
J. Medical Syst., 2017

Security analysis and enhancements of an improved multi-factor biometric authentication scheme.
Int. J. Distributed Sens. Networks, 2017

Design of Lightweight Authentication and Key Agreement Protocol for Vehicular Ad Hoc Networks.
IEEE Access, 2017

Provably Secure and Efficient Authentication Protocol for Roaming Service in Global Mobility Networks.
IEEE Access, 2017

Efficient and Secure Time-Key Based Single Sign-On Authentication for Mobile Devices.
IEEE Access, 2017

On the Design of Fine Grained Access Control With User Authentication Scheme for Telecare Medicine Information Systems.
IEEE Access, 2017

Three-Factor User Authentication and Key Agreement Using Elliptic Curve Cryptosystem in Wireless Sensor Networks.
Sensors, 2016

Secure biometric-based authentication scheme with smart card revocation/reissue for wireless sensor networks.
Int. J. Distributed Sens. Networks, 2016

Entire network load-aware cooperative routing algorithm for video streaming over mobile ad hoc networks.
Wirel. Commun. Mob. Comput., 2013

Anonymous Cluster-Based MANETs with Threshold Signature.
Int. J. Distributed Sens. Networks, 2013

Privacy-preserving ID-based key agreement protocols for cluster-based MANETs.
Int. J. Ad Hoc Ubiquitous Comput., 2013

Data security in unattended wireless sensor networks with mobile sinks.
Wirel. Commun. Mob. Comput., 2012

Secrecy Transfer.
Int. J. Distributed Sens. Networks, 2012

Authentications and Key Management in 3G-WLAN Interworking.
Mob. Networks Appl., 2011

A USIM-Based Uniform Access Authentication Framework in Mobile Communication.
EURASIP J. Wirel. Commun. Netw., 2011

Key Infection, Secrecy Transfer, and Key Evolution for Sensor Networks.
IEEE Trans. Wirel. Commun., 2010

ID-Based Private Key Update Protocol with Anonymity in Mobile Ad-Hoc Networks.
Proceedings of the Prodeedings of the 2010 International Conference on Computational Science and Its Applications, 2010

Secure Route Discovery Protocol for Ad Hoc Networks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007

Secure Deniable Authenticated Key Establishment for Internet Protocols.
IACR Cryptol. ePrint Arch., 2007

An Enhanced One-round Pairing-based Tripartite Authenticated Key Agreement Protocol.
IACR Cryptol. ePrint Arch., 2007

An Enhanced ID-based Deniable Authentication Protocol on Pairings.
IACR Cryptol. ePrint Arch., 2007

Cryptanalysis on the Robust and Simple Authentication Protocol for Secure Communication on the Web.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006

An Online Face Recognition System Using Multiple Compressed Images over the Internet.
Proceedings of the Web Information Systems Engineering, 2005

Provably Secure Tripartite Password Protected Key Exchange Protocol Based on Elliptic Curves.
Proceedings of the Selected Areas in Cryptography, 12th International Workshop, 2005