Jiyoon Kim
Orcid: 0000-0003-2710-0864Affiliations:
- Gyeongsang National University, Jinju, South Korea
- Soonchunhyang University, Asan, South Korea (former)
According to our database1,
Jiyoon Kim
authored at least 28 papers
between 2017 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2023
APSec1.0: Innovative Security Protocol Design with Formal Security Analysis for the Artificial Pancreas System.
Sensors, 2023
Comput. Syst. Sci. Eng., 2023
2022
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2022
MoTH: Mobile Terminal Handover Security Protocol for HUB Switching Based on 5G and Beyond (5GB) P2MP Backhaul Environment.
IEEE Internet Things J., 2022
Federated intelligence of anomaly detection agent in IoTMD-enabled Diabetes Management Control System.
Future Gener. Comput. Syst., 2022
A lightweight D2D security protocol with request-forecasting for next-generation mobile networks.
Connect. Sci., 2022
2021
TrMAps: Trust Management in Specification-Based Misbehavior Detection System for IMD-Enabled Artificial Pancreas System.
IEEE J. Biomed. Health Informatics, 2021
Drone Secure Communication Protocol for Future Sensitive Applications in Military Zone.
Sensors, 2021
Can Formal Security Verification Really Be Optional? Scrutinizing the Security of IMD Authentication Protocols.
Sensors, 2021
Scrutinizing the Vulnerability of Ephemeral Diffie-Hellman over COSE (EDHOC) for IoT Environment Using Formal Approaches.
Mob. Inf. Syst., 2021
A Formally Verified Security Scheme for Inter-gNB-DU Handover in 5G Vehicle-to-Everything.
IEEE Access, 2021
Behavior-Rule Specification-based IDS for Safety-Related Embedded Devices in Smart Home.
Proceedings of the 2021 World Automation Congress, 2021
2020
DMM-SEP: Secure and Efficient Protocol for Distributed Mobility Management Based on 5G Networks.
IEEE Access, 2020
SGF-MD: Behavior Rule Specification-Based Distributed Misbehavior Detection of Embedded IoT Devices in a Closed-Loop Smart Greenhouse Farming System.
IEEE Access, 2020
Comments on "Securing implantable cardiac medical devices": Use of radio frequency energy harvesting.
Proceedings of the ACM ICEA '20: 2020 ACM International Conference on Intelligent Computing and its Emerging Applications, GangWon Republic of Korea, December 12, 2020
A Formal Security Verification on He and Zeadally's Authentication Protocol for IMD-Enabled Ambient Assisted Living System.
Proceedings of the ACM ICEA '20: 2020 ACM International Conference on Intelligent Computing and its Emerging Applications, GangWon Republic of Korea, December 12, 2020
2019
MIH-SPFP: MIH-based secure cross-layer handover protocol for Fast Proxy Mobile IPv6-IoT networks.
J. Netw. Comput. Appl., 2019
EURASIP J. Wirel. Commun. Netw., 2019
An optimal security management framework for backhaul-aware 5G-Vehicle to Everything (V2X).
CoRR, 2019
IEEE Access, 2019
2018
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2018
CoRR, 2018
2017
Secur. Commun. Networks, 2017
Secure and Efficient Protocol for Route Optimization in PMIPv6-Based Smart Home IoT Networks.
IEEE Access, 2017
An Overview of 802.21a-2012 and Its Incorporation into IoT-Fog Networks Using Osmotic Framework.
Proceedings of the IoT as a Service - Third International Conference, 2017
Proceedings of the IoT as a Service - Third International Conference, 2017