DongYeop Hwang

According to our database1, DongYeop Hwang authored at least 17 papers between 2015 and 2021.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Vulnerability Analysis of DID Document's Updating Process in the Decentralized Identifier Systems.
Proceedings of the International Conference on Information Networking, 2021

A Subject-Centric Credential Management Method based on the Verifiable Credentials.
Proceedings of the International Conference on Information Networking, 2021

Attribute-Based Access Control(ABAC) with Decentralized Identifier in the Blockchain-Based Energy Transaction Platform.
Proceedings of the International Conference on Information Networking, 2021

Analysis on the Privacy of DID Service Properties in the DID Document.
Proceedings of the International Conference on Information Networking, 2021

2020
Proof-of-Lottery: Design for Block Producing Algorithm Based on PoS for Scalability.
Proceedings of the 2020 International Conference on Information Networking, 2020

2019
Blockchain-Based Management of Video Surveillance Systems.
Proceedings of the 33rd International Conference on Information Networking, 2019

Improving TDoA Based Positioning Accuracy Using Machine Learning in a LoRaWan Environment.
Proceedings of the 33rd International Conference on Information Networking, 2019

2018
Escalator: An Autonomous Scheduling Scheme for Convergecast in TSCH.
Sensors, 2018

A hybrid mode to enhance the downward route performance in routing protocol for low power and lossy networks.
Int. J. Distributed Sens. Networks, 2018

A TOTP-Based Two Factor Authentication Scheme for Hyperledger Fabric Blockchain.
Proceedings of the Tenth International Conference on Ubiquitous and Future Networks, 2018

Dynamic Access Control Scheme for IoT Devices using Blockchain.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2018

2017
Scenario and countermeasure for replay attack using join request messages in LoRaWAN.
Proceedings of the 2017 International Conference on Information Networking, 2017

Risk analysis and countermeasure for bit-flipping attack in LoRaWAN.
Proceedings of the 2017 International Conference on Information Networking, 2017

Reducing positioning errors in the important access point selection method for fingerprint localization by spatial partitioning.
Proceedings of the 2017 International Conference on Information Networking, 2017

2015
An ECDH-based light-weight mutual authentication scheme on local SIP.
Proceedings of the Seventh International Conference on Ubiquitous and Future Networks, 2015

Multi-antenna channel capacity enhancement in wireless communication.
Proceedings of the Seventh International Conference on Ubiquitous and Future Networks, 2015

An OAuth based authentication mechanism for IoT networks.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2015


  Loading...