Kyusuk Han
Kyusuk Han
Technology Innovation Institute
Verified email at - Homepage
Cited by
Cited by
Enhanced secure anonymous authentication scheme for roaming service in global mobility networks
H Mun, K Han, YS Lee, CY Yeun, HH Choi
Mathematical and Computer Modelling 55 (1-2), 214-222, 2012
Real-time frame authentication using ID Anonymization in automotive networks
KS Han, SD Potluri, KG Shin
US Patent 9,288,048, 2016
3G-WLAN interworking: security analysis and new authentication and key agreement based on EAP-AKA
H Mun, K Han, K Kim
2009 Wireless Telecommunications Symposium, 1-8, 2009
On authentication in a connected vehicle: Secure integration of mobile devices with vehicular networks
K Han, SD Potluri, KG Shin
Proceedings of the ACM/IEEE 4th International Conference on Cyber-Physical …, 2013
Automotive cybersecurity for in-vehicle communication
K Han, A Weimerskirch, KG Shin
IQT QUARTERLY 6 (1), 22-25, 2014
Ensuring safety and security in CAN-based automotive embedded systems: A combination of design optimization and secure communication
H Mun, K Han, DH Lee
IEEE Transactions on Vehicular Technology 69 (7), 7078-7091, 2020
A scalable and efficient key escrow model for lawful interception of IDBC‐based secure communication
K Han, CY Yeun, T Shon, J Park, K Kim
International Journal of Communication Systems 24 (4), 461-472, 2011
Untraceable mobile node authentication in WSN
K Han, K Kim, T Shon
Sensors 10 (5), 4410-4429, 2010
Efficient mobile sensor authentication in smart home and WPAN
K Han, T Shon, K Kim
IEEE Transactions on Consumer Electronics 56 (2), 591-596, 2010
A novel secure key paring protocol for RF4CE ubiquitous smart home systems
K Han, J Kim, T Shon, D Ko
Personal and ubiquitous computing 17, 945-949, 2013
Secure authenticated group key agreement protocol in the MANET environment
CY Yeun, K Han, DL Vo, K Kim
information security technical report 13 (3), 158-164, 2008
A practical solution to achieve real-time performance in the automotive network by randomizing frame identifier
K Han, A Weimerskirch, KG Shin
Proc. Eur. Embedded Secur. Cars (ESCAR), 13-29, 2015
Method and apparatus for authenticating a sensor node in a sensor network
TS Shon, YS Park, SS Han, KJ Kim, KS Han, KIM Jang-Seong
US Patent 8,516,252, 2013
Design and implementation of a wireless sensor network architecture using smart mobile devices
B Koo, K Han, JJ Park, T Shon
Telecommunication Systems 52, 2311-2320, 2013
An enhanced lightweight authentication protocol for access control in wireless LANs
K Ren, H Lee, K Han, J Park, K Kim
Proceedings. 2004 12th IEEE International Conference on Networks (ICON 2004 …, 2004
Yet another intrusion detection system against insider attacks
K Kim, H Mun, K Han, CY Yeun
Symposium on Cryptography and Information Security, 2008
Sensor authentication in dynamic wireless sensor network environments
K Han, T Shon
International Journal of RFID Security and Cryptography 1 (1/2), 2012
Efficient sensor node authentication in third generation-wireless sensor networks integrated networks
K Han, K Kim, J Park, T Shon
IET communications 5 (12), 1744-1754, 2011
Enhancing privacy and authentication for location based service using trusted authority
K Han, K Kim
2nd Joint Workshop on Information Security, 1-13, 2007
Secure and efficient public key management in next generation mobile networks
K Han, H Mun, T Shon, CY Yeun, JJ Park
Personal and Ubiquitous Computing 16, 677-685, 2012
The system can't perform the operation now. Try again later.
Articles 1–20