Search

Your search keyword '"YoungHo Park"' showing total 261 results

Search Constraints

Start Over You searched for: Author "YoungHo Park" Remove constraint Author: "YoungHo Park"
261 results on '"YoungHo Park"'

Search Results

1. TL-ABKS: Traceable and lightweight attribute-based keyword search in edge–cloud assisted IoT environment

2. Effect of lipid emulsion on vasoconstriction induced by epinephrine or norepinephrine in isolated rat aorta

3. A Zero-Trust Authentication Scheme With Access Control for 6G-Enabled IoT Environments

4. ECC-PDGPP: ECC-Based Parallel Dependency RFID-Grouping-Proof Protocol Using Zero-Knowledge Property in the Internet of Things Environment

5. Generic Quantum Blockchain-Envisioned Security Framework for IoT Environment: Architecture, Security Benefits and Future Research

6. ECC-EXONUM-eVOTING: A Novel Signature-Based e-Voting Scheme Using Blockchain and Zero Knowledge Property

7. A Secure Authentication Scheme with Local Differential Privacy in Edge Intelligence-Enabled VANET

8. Design of Secure and Privacy-Preserving Data Sharing Scheme Based on Key Aggregation and Private Set Intersection in Medical Information System

9. A Reliable and Privacy-Preserving Vehicular Energy Trading Scheme Using Decentralized Identifiers

10. Private Blockchain Envisioned Access Control System for Securing Industrial IoT-Based Pervasive Edge Computing

11. A Secure Content Trading for Cross-Platform in the Metaverse With Blockchain and Searchable Encryption

12. Efficient Personal-Health-Records Sharing in Internet of Medical Things Using Searchable Symmetric Encryption, Blockchain, and IPFS

13. Design of Secure and Lightweight Authentication Scheme for UAV-Enabled Intelligent Transportation Systems Using Blockchain and PUF

14. Blockchain Integration for IoT-Enabled V2X Communications: A Comprehensive Survey, Security Issues and Challenges

15. An Effective Privacy-Preserving Blockchain-Assisted Security Protocol for Cloud-Based Digital Twin Environment

16. Uniting cyber security and machine learning: Advantages, challenges and future research

17. A Privacy-Preserving Authentication Scheme for a Blockchain-Based Energy Trading System

18. Healthcare 5.0 Security Framework: Applications, Issues and Future Research Directions

19. On the Design of a Privacy-Preserving Communication Scheme for Cloud-Based Digital Twin Environments Using Blockchain

20. A Secure Three-Factor Authentication Protocol for E-Governance System Based on Multiserver Environments

21. A Secure Batch Authentication Scheme for Multiaccess Edge Computing in 5G-Enabled Intelligent Transportation System

22. Design of Secure Handover Authentication Scheme for Urban Air Mobility Environments

23. Design of Secure Mutual Authentication Scheme for Metaverse Environments Using Blockchain

24. Secure ECC-Based Three-Factor Mutual Authentication Protocol for Telecare Medical Information System

25. A Secure and Anonymous User Authentication Scheme for IoT-Enabled Smart Home Environments Using PUF

26. MUC5B promoter variant rs35705950, rare but significant susceptibility locus in rheumatoid arthritis-interstitial lung disease with usual interstitial pneumonia in Asian populations

27. Robust and Efficient Authentication and Group–Proof Scheme Using Physical Unclonable Functions for Wearable Computing

28. Blockchain-Based Data Access Control and Key Agreement System in IoT Environment

29. On the Design of Lightweight and Secure Mutual Authentication System for Global Roaming in Resource-Limited Mobility Networks

30. Design of Secure Decentralized Car-Sharing System Using Blockchain

31. Comments on 'ALAM: Anonymous Lightweight Authentication Mechanism for SDN Enabled Smart Homes'

32. iGCACS-IoD: An Improved Certificate-Enabled Generic Access Control Scheme for Internet of Drones Deployment

33. Lightweight Three-Factor-Based Privacy- Preserving Authentication Scheme for IoT-Enabled Smart Homes

34. On the Security of a Secure and Lightweight Authentication Scheme for Next Generation IoT Infrastructure

35. Authentication Protocols in Internet of Vehicles: Taxonomy, Analysis, and Challenges

36. LAKS-NVT: Provably Secure and Lightweight Authentication and Key Agreement Scheme Without Verification Table in Medical Internet of Things

37. BAKMP-IoMT: Design of Blockchain Enabled Authenticated Key Management Protocol for Internet of Medical Things Deployment

38. On the Design of Secure and Efficient Three-Factor Authentication Protocol Using Honey List for Wireless Sensor Networks

39. Design of Secure Authentication Protocol for Cloud-Assisted Telecare Medical Information System Using Blockchain

40. IoV-SMAP: Secure and Efficient Message Authentication Protocol for IoV in Smart City Environment

41. Comments on 'ITSSAKA-MS: An Improved Three-Factor Symmetric-Key Based Secure AKA Scheme for Multi-Server Environments'

42. Intrusion Detection Protocols in Wireless Sensor Networks Integrated to Internet of Things Deployment: Survey and Future Challenges

43. Provably Secure Mutual Authentication and Key Agreement Scheme Using PUF in Internet of Drones Deployments

44. PUFTAP-IoT: PUF-Based Three-Factor Authentication Protocol in IoT Environment Focused on Sensing Devices

45. Deletion at 2q14.3 is associated with worse response to TNF-α blockers in patients with rheumatoid arthritis

46. Provably Secure ECC-Based Device Access Control and Key Agreement Protocol for IoT Environment

47. A Dynamic Privacy-Preserving Key Management Protocol for V2G in Social Internet of Things

48. Physically Secure Lightweight Anonymous User Authentication Protocol for Internet of Things Using Physically Unclonable Functions

49. IoMT Malware Detection Approaches: Analysis and Research Challenges

50. iAKA-CIoT: An Improved Authentication and Key Agreement Scheme for Cloud Enabled Internet of Things Using Physical Unclonable Function

Catalog

Books, media, physical & digital resources