1 |
IEEE Access |
Random Number Generator Using Sensors for Drone |
2020 |
SCIE |
2 |
IEEE Transactions on Mobile Computing |
A Secure Shuffling Mechanism for White-box Attack-resistant Unmanned Vehicles |
2019 |
SCI |
3 |
IEEE Internet of Things Journal |
Two-Factor Fuzzy Commitment for Unmanned IoT Devices Security |
2019 |
SCIE |
4 |
IEEE Access |
A Lightweight Encryption Method for Privacy Protection in Survaillance Videos |
2018 |
SCIE |
5 |
Sensors |
Secure utilization of beacons and UAVs in emergency response systems for building fire hazard |
2017 |
SCIE |
6 |
IEEE Access |
Certificateless cryptographic protocols for efficient drone-based smart city applications |
2017 |
SCIE |
7 |
International Journal of Distributed Sensor Networks |
Preserving patient's anonymity for mobile healthcare system in IoT environment |
2016 |
SCIE |
8 |
Information Systems |
Scalable end-to-end security for advanced metering infrastructures |
2015 |
SCI |
9 |
IEEE Transactions on Information Forensics and Security |
Effective Key Management in Dynamic Wireless Sensor Networks |
2015 |
SCI |
10 |
ACM / ASIA-CCS |
Secure Communication Protocol for Drones and Smart Objects |
2015 |
BK+우수 학회 |
11 |
Journal of Internet Technology |
A Remote Control System for Cloud-based Smart Homes Supporting Dynamic User Management |
2014 |
SCIE |
12 |
Journal of Network and Computer Applications |
Detecting mobile malware threats to homeland security through static analysis |
2014 |
SCIE |
13 |
IEEE Transactions on Knowledge and Data Engineering |
An Efficient Certificateless Encryption for Secure Data sharing in Public Clouds |
2014 |
SCI |
14 |
Information Sciences |
Efficient certificateless proxy signature scheme with provable security |
2012 |
SCI |
15 |
Computer Standard & Intefaces |
Identity-based universal designated multi-verifiers signature schemes |
2008 |
SCIE |