Kyusuk Han
Orcid: 0000-0002-8734-3107
According to our database1,
Kyusuk Han
authored at least 32 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Privacy enhanced data aggregation based on federated learning in Internet of Vehicles (IoV).
Comput. Commun., 2024
2023
Enhancing security and robustness of Cyphal on Controller Area Network in unmanned aerial vehicle environments.
Comput. Secur., December, 2023
2022
Improving Drone Mission Continuity in Rescue Operations with Secure and Efficient Task Migration.
Proceedings of the 8th IEEE World Forum on Internet of Things, 2022
Proceedings of the Information Security Practice and Experience, 2022
Proceedings of the IEEE International Conference on Omni-layer Intelligent Systems, 2022
2020
Ensuring Safety and Security in CAN-Based Automotive Embedded Systems: A Combination of Design Optimization and Secure Communication.
IEEE Trans. Veh. Technol., 2020
2016
J. Supercomput., 2016
Prevention of information mis-translation by a malicious gateway in connected vehicles.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016
2015
Multim. Tools Appl., 2015
2014
Toward Advanced Mobile Cloud Computing for the Internet of Things: Current Issues and Future Direction.
Mob. Networks Appl., 2014
2013
Design and implementation of a wireless sensor network architecture using smart mobile devices.
Telecommun. Syst., 2013
Pers. Ubiquitous Comput., 2013
On authentication in a connected vehicle: secure integration of mobile devices with vehicular networks.
Proceedings of the ACM/IEEE 4th International Conference on Cyber-Physical Systems (with CPS Week 2013), 2013
2012
Pers. Ubiquitous Comput., 2012
Enhanced secure anonymous authentication scheme for roaming service in global mobility networks.
Math. Comput. Model., 2012
Efficient Authenticated Key Agreement Protocols for Dynamic Wireless Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2012
2011
J. Netw. Comput. Appl., 2011
A scalable and efficient key escrow model for lawful interception of IDBC-based secure communication.
Int. J. Commun. Syst., 2011
Efficient sensor node authentication in third generation-wireless sensor networks integrated networks.
IET Commun., 2011
Design and Implementation of One-Way Key Agreement Model for Enhancing VoIP Internet Phone Security.
IEICE Trans. Commun., 2011
IEICE Trans. Inf. Syst., 2011
EURASIP J. Wirel. Commun. Netw., 2011
A Novel Approach to Detect Network Attacks Using G-HMM-Based Temporal Relations between Internet Protocol Packets.
EURASIP J. Wirel. Commun. Netw., 2011
2010
IEEE Trans. Consumer Electron., 2010
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
2009
3G-WLAN interworking: security analysis and new authentication and key agreement based on EAP-AKA.
Proceedings of the 2009 Wireless Telecommunications Symposium, 2009
2008
Inf. Secur. Tech. Rep., 2008
2004
Proceedings of the 12th IEEE International Conference on Networks, 2004
Proceedings of the Public Key Infrastructure, 2004