Youngho Park

Affiliations:
  • Pukyong National University, Busan, Department of IT Convergence and Application Engineering, South Korea


According to our database1, Youngho Park authored at least 27 papers between 2004 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2018
Secure vehicle traffic data dissemination and analysis protocol in vehicular cloud computing.
J. Supercomput., 2018

Self-Controllable Secure Location Sharing for Trajectory-Based Message Delivery on Cloud-Assisted VANETs.
Sensors, 2018

A Secure Incentive Scheme for Vehicular Delay Tolerant Networks Using Cryptocurrency.
Secur. Commun. Networks, 2018

A Blockchain-Based Access Control with Micropayment Channels.
Proceedings of the Advanced Multimedia and Ubiquitous Engineering, 2018

2017
Secure vehicle location-sharing for trajectory-based message delivery on VANETs.
Proceedings of the 26th IEEE International Symposium on Industrial Electronics, 2017

A Framework for Blockchain Based Secure Smart Green House Farming.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2017

2016
Pseudonymous authentication for secure V2I services in cloud-based vehicular networks.
J. Ambient Intell. Humaniz. Comput., 2016

An efficient and secure navigation protocol based on vehicular cloud.
Int. J. Comput. Math., 2016

A secure billing protocol over attribute-based encryption in vehicular cloud computing.
EURASIP J. Wirel. Commun. Netw., 2016

2015
A Fine-Grained Privacy Preserving Protocol over Attribute Based Access Control for VANETs.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2015

2013
A Privacy Preserving Message Delivery Protocol Using Identity-Hidden Index in VDTNs.
J. Univers. Comput. Sci., 2013

An Improved Privacy-Preserving Navigation Protocol in {VANET}s.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2013

Certificate-Based Proxy Re-encryption for Public Cloud Storage.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

A Simplified Privacy Preserving Message Delivery Protocol in VDTNs.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

2011
A Privacy-Preserving Location Assurance Protocol for Location-Aware Services in VANETs.
Wirel. Pers. Commun., 2011

A Secure and Location Assurance Protocol for Location-Aware Services in VANETs.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

Securing Location-Aware Services Based on Online/Offline Signatures in VANETs.
Proceedings of the Availability, Reliability and Security for Business, Enterprise and Health Information Systems, 2011

2010
An Efficient Anonymous Authentication Protocol for Secure Vehicular Communications.
J. Inf. Sci. Eng., 2010

Chosen-Ciphertext Secure Certificateless Proxy Re-Encryption.
Proceedings of the Communications and Multimedia Security, 2010

2009
A robust and efficient anonymous authentication protocol in VANETs.
J. Commun. Networks, 2009

An Authenticated On-Demand Routing Protocol with Key Exchange for Secure MANET.
IEICE Trans. Inf. Syst., 2009

A Robust Conditional Privacy-Preserving Authentication Protocol in VANET.
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2009

Efficient Anonymous Authentication Protocol Using Key-Insulated Signature Scheme for Secure VANET.
Proceedings of the Mobile Lightweight Wireless Systems, 2009

2007
Authenticated On-Demand Ad Hoc Routing Protocol without Pre-shared Key Distribution.
Proceedings of the 2007 ECSIS Symposium on Bio-inspired, 2007

2005
A Group Key Management Architecture for Mobile Ad-hoc Wireless Networks.
J. Inf. Sci. Eng., 2005

Design of a Secure Digital Contents Delivery System in P2P Networks.
Proceedings of the Digital Rights Management: Technologies, 2005

2004
An architecture for key management in hierarchical mobile ad-hoc networks.
J. Commun. Networks, 2004


  Loading...