A three-factor anonymous user authentication scheme for Internet of Things environments H Lee, D Kang, J Ryu, D Won, H Kim, Y Lee
Journal of Information Security and Applications 52, 102494, 2020
59 2020 Secure and efficient three-factor protocol for wireless sensor networks J Ryu, H Lee, H Kim, D Won
Sensors 18 (12), 4481, 2018
28 2018 A secure and lightweight three-factor-based authentication scheme for smart healthcare systems J Ryu, D Kang, H Lee, H Kim, D Won
Sensors 20 (24), 7136, 2020
17 2020 An improved lightweight user authentication scheme for the internet of medical things K Kim, J Ryu, Y Lee, D Won
Sensors 23 (3), 1122, 2023
12 2023 Improved secure and efficient Chebyshev chaotic map-based user authentication scheme J Ryu, D Kang, D Won
IEEE Access 10, 15891-15910, 2022
12 2022 Can differential privacy practically protect collaborative deep learning inference for IoT? J Ryu, Y Zheng, Y Gao, A Abuadbba, J Kim, D Won, S Nepal, H Kim, ...
Wireless Networks, 1-21, 2022
9 2022 SMASG: secure mobile authentication scheme for global mobility network J Ryu, H Lee, Y Lee, D Won
IEEE Access 10, 26907-26919, 2022
8 2022 Can differential privacy practically protect collaborative deep learning inference for the internet of things? J Ryu, Y Zheng, Y Gao, S Abuadbba, J Kim, D Won, S Nepal, H Kim, ...
arXiv preprint arXiv:2104.03813, 2021
7 2021 A Study of Split Learning Model. J Ryu, D Won, Y Lee
IMCOM, 1-4, 2022
6 2022 Security analysis of blockchain-based user authentication for smart grid edge computing infrastructure H Lee, J Ryu, Y Lee, D Won
2021 15th International Conference on Ubiquitous Information Management and …, 2021
5 2021 Cryptanalysis and improvement of an ecc-based authentication protocol for wireless sensor networks T Song, D Kang, J Ryu, H Kim, D Won
Computational Science and Its Applications–ICCSA 2018: 18th International …, 2018
5 2018 A Study on Partially Homomorphic Encryption J Ryu, K Kim, D Won
2023 17th International Conference on Ubiquitous Information Management and …, 2023
4 2023 Cryptanalysis of protocol for heterogeneous wireless sensor networks for the Internet of Things environment J Ryu, H Kim, Y Lee, D Won
2020 14th International Conference on Ubiquitous Information Management and …, 2020
4 2020 Cryptanalysis of improved and provably secure three-factor user authentication scheme for wireless sensor networks J Ryu, T Song, J Moon, H Kim, D Won
Computational Science and Technology: 5th ICCST 2018, Kota Kinabalu …, 2019
4 2019 MES-FPMIPv6: MIH-Enabled and enhanced secure Fast Proxy Mobile IPv6 handover protocol for 5G networks F Degefa, J Ryu, H Kim, D Won
Plos one 17 (5), e0262696, 2022
3 2022 A study of split learning model to protect privacy J Ryu, D Won, Y Lee
Convergence Security Journal 21 (3), 49-56, 2021
3 2021 Cryptoanalysis of Lightweight and anonymous three-factor authentication and access control protocol for real-time applications in wireless sensor networks J Ryu, Y Lee, D Won
Computational Science and Technology: 6th ICCST 2019, Kota Kinabalu …, 2020
3 2020 Secure and Anonymous Authentication Scheme for Mobile Edge Computing Environments H Lee, J Ryu, D Won
IEEE Internet of Things Journal, 2023
2 2023 Distributed and Federated Authentication Schemes Based on Updatable Smart Contracts K Kim, J Ryu, H Lee, Y Lee, D Won
Electronics 12 (5), 1217, 2023
2 2023 Improvement of Wu et al.'s Three-Factor User Authentication Scheme for Wireless Sensor Networks J Ryu, H Lee, H Kim, D Won
Preprints, 2018
1 2018