A three-factor anonymous user authentication scheme for Internet of Things environments H Lee, D Kang, J Ryu, D Won, H Kim, Y Lee
Journal of Information Security and Applications 52, 102494, 2020
67 2020 Secure and efficient three-factor protocol for wireless sensor networks J Ryu, H Lee, H Kim, D Won
Sensors 18 (12), 4481, 2018
32 2018 An improved lightweight user authentication scheme for the internet of medical things K Kim, J Ryu, Y Lee, D Won
Sensors 23 (3), 1122, 2023
30 2023 A secure and lightweight three-factor-based authentication scheme for smart healthcare systems J Ryu, D Kang, H Lee, H Kim, D Won
Sensors 20 (24), 7136, 2020
24 2020 Can differential privacy practically protect collaborative deep learning inference for IoT? J Ryu, Y Zheng, Y Gao, A Abuadbba, J Kim, D Won, S Nepal, H Kim, ...
Wireless Networks 30 (6), 4713-4733, 2024
23 2024 Improved secure and efficient Chebyshev chaotic map-based user authentication scheme J Ryu, D Kang, D Won
IEEE Access 10, 15891-15910, 2022
16 2022 SMASG: Secure mobile authentication scheme for global mobility network J Ryu, H Lee, Y Lee, D Won
IEEE Access 10, 26907-26919, 2022
13 2022 Secure and anonymous authentication scheme for mobile edge computing environments H Lee, J Ryu, D Won
IEEE Internet of Things Journal, 2023
11 2023 Enhanced Lightweight Medical Sensor Networks Authentication Scheme Based on Blockchain T Kang, N Woo, J Ryu
IEEE Access, 2024
9 2024 Distributed and Federated Authentication Schemes Based on Updatable Smart Contracts K Kim, J Ryu, H Lee, Y Lee, D Won
Electronics 12 (5), 1217, 2023
9 2023 A Study on Partially Homomorphic Encryption J Ryu, K Kim, D Won
2023 17th International Conference on Ubiquitous Information Management and …, 2023
9 2023 A Study of Split Learning Model. J Ryu, D Won, Y Lee
IMCOM, 1-4, 2022
8 2022 Security analysis of blockchain-based user authentication for smart grid edge computing infrastructure H Lee, J Ryu, Y Lee, D Won
2021 15th International Conference on Ubiquitous Information Management and …, 2021
8 2021 Cryptanalysis and improvement of an ecc-based authentication protocol for wireless sensor networks T Song, D Kang, J Ryu, H Kim, D Won
Computational Science and Its Applications–ICCSA 2018: 18th International …, 2018
7 2018 Cryptanalysis of protocol for heterogeneous wireless sensor networks for the Internet of Things environment J Ryu, H Kim, Y Lee, D Won
2020 14th International Conference on Ubiquitous Information Management and …, 2020
6 2020 MES-FPMIPv6: MIH-Enabled and enhanced secure Fast Proxy Mobile IPv6 handover protocol for 5G networks F Degefa, J Ryu, H Kim, D Won
Plos one 17 (5), e0262696, 2022
5 2022 Cryptanalysis of improved and provably secure three-factor user authentication scheme for wireless sensor networks J Ryu, T Song, J Moon, H Kim, D Won
Computational Science and Technology: 5th ICCST 2018, Kota Kinabalu …, 2019
5 2019 A study of split learning model to protect privacy J Ryu, D Won, Y Lee
Convergence Security Journal 21 (3), 49-56, 2021
4 2021 Lightweight Hash-Based Authentication Protocol for Smart Grids S Kook, K Kim, J Ryu, Y Lee, D Won
Sensors 24 (10), 3085, 2024
3 2024 Cryptoanalysis of Lightweight and anonymous three-factor authentication and access control protocol for real-time applications in wireless sensor networks J Ryu, Y Lee, D Won
Computational Science and Technology: 6th ICCST 2019, Kota Kinabalu …, 2020
3 2020