Search

Your search keyword '"Won, Dongho"' showing total 103 results

Search Constraints

Start Over You searched for: Author "Won, Dongho" Remove constraint Author: "Won, Dongho" Publication Type Academic Journals Remove constraint Publication Type: Academic Journals Publication Type Periodicals Remove constraint Publication Type: Periodicals
103 results on '"Won, Dongho"'

Search Results

2. Lightweight Hash-Based Authentication Protocol for Smart Grids.

7. Distributed and Federated Authentication Schemes Based on Updatable Smart Contracts.

8. An Improved Lightweight User Authentication Scheme for the Internet of Medical Things.

15. Efficient secure group communications for SCADA

16. Enhancement of two-factor authenticated key exchange protocols in public wireless LANs

17. Advanced key-management architecture for secure SCADA communications

18. MES-FPMIPv6: MIH-Enabled and enhanced secure Fast Proxy Mobile IPv6 handover protocol for 5G networks*^.

21. DDH-based group key agreement in a mobile environment

22. Secure Three-Factor Anonymous User Authentication Scheme for Cloud Computing Environment.

23. Lightweight user authentication scheme for roaming service in GLOMONET with privacy preserving.

24. Efficient and Secure Biometric-Based User Authenticated Key Agreement Scheme with Anonymity.

25. An improved anonymous authentication scheme for roaming in ubiquitous networks.

26. Security analysis and enhanced user authentication in proxy mobile IPv6 networks.

27. Security enhanced multi-factor biometric authentication scheme using bio-hash function.

28. An Improved and Secure Anonymous Biometric-Based User Authentication with Key Agreement Scheme for the Integrated EPR Information System.

30. Efficient and robust user authentication scheme that achieve user anonymity with a Markov chain.

31. Security Analysis and Improvements of Session Key Establishment for Clustered Sensor Networks.

32. Security Improvement on Biometric Based Authentication Scheme for Wireless Sensor Networks Using Fuzzy Extraction.

33. An Improvement of Robust Biometrics-Based Authentication and Key Agreement Scheme for Multi-Server Environments Using Smart Cards.

34. Anonymous Authentication Scheme for Intercommunication in the Internet of Things Environments.

36. Efficient and Anonymous Two-Factor User Authentication in Wireless Sensor Networks: Achieving User Anonymity with Lightweight Sensor Computation.

37. A Secure and Lightweight Three-Factor-Based Authentication Scheme for Smart Healthcare Systems †.

38. Revisit of Password-Authenticated Key Exchange Protocol for Healthcare Support Wireless Communication.

39. Secure and Efficient Three-Factor Protocol for Wireless Sensor Networks.

41. Password-only authenticated three-party key exchange with provable security in the standard model.

42. Password-only authenticated three-party key exchange proven secure against insider dictionary attacks.

43. Time-dependent density functional theory-assisted absolute configuration determination of cis-dihydrodiol metabolite produced from isoflavone by biphenyl dioxygenase

44. Improving Biometric-Based Authentication Schemes with Smart Card Revocation/Reissue for Wireless Sensor Networks.

45. Efficient and Security Enhanced Anonymous Authentication with Key Agreement Scheme in Wireless Sensor Networks.

46. An Enhanced Lightweight Anonymous Authentication Scheme for a Scalable Localization Roaming Service in Wireless Sensor Networks.

47. An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks.

48. A provably-secure ECC-based authentication scheme for wireless sensor networks.

49. Association rule extraction from XML stream data for wireless sensor networks.

50. Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography.

Catalog

Books, media, physical & digital resources