A three-factor anonymous user authentication scheme for Internet of Things environments H Lee, D Kang, J Ryu, D Won, H Kim, Y Lee Journal of Information Security and Applications 52, 102494, 2020 | 67 | 2020 |
An improved lightweight user authentication scheme for the internet of medical things K Kim, J Ryu, Y Lee, D Won Sensors 23 (3), 1122, 2023 | 32 | 2023 |
Secure and efficient three-factor protocol for wireless sensor networks J Ryu, H Lee, H Kim, D Won Sensors 18 (12), 4481, 2018 | 32 | 2018 |
A secure and lightweight three-factor-based authentication scheme for smart healthcare systems J Ryu, D Kang, H Lee, H Kim, D Won Sensors 20 (24), 7136, 2020 | 24 | 2020 |
Can differential privacy practically protect collaborative deep learning inference for IoT? J Ryu, Y Zheng, Y Gao, A Abuadbba, J Kim, D Won, S Nepal, H Kim, ... Wireless Networks 30 (6), 4713-4733, 2024 | 23 | 2024 |
Improved secure and efficient Chebyshev chaotic map-based user authentication scheme J Ryu, D Kang, D Won IEEE Access 10, 15891-15910, 2022 | 16 | 2022 |
SMASG: Secure mobile authentication scheme for global mobility network J Ryu, H Lee, Y Lee, D Won IEEE Access 10, 26907-26919, 2022 | 13 | 2022 |
Secure and anonymous authentication scheme for mobile edge computing environments H Lee, J Ryu, D Won IEEE Internet of Things Journal, 2023 | 11 | 2023 |
Enhanced Lightweight Medical Sensor Networks Authentication Scheme Based on Blockchain T Kang, N Woo, J Ryu IEEE Access, 2024 | 9 | 2024 |
Distributed and Federated Authentication Schemes Based on Updatable Smart Contracts K Kim, J Ryu, H Lee, Y Lee, D Won Electronics 12 (5), 1217, 2023 | 9 | 2023 |
A Study on Partially Homomorphic Encryption J Ryu, K Kim, D Won 2023 17th International Conference on Ubiquitous Information Management and …, 2023 | 9 | 2023 |
A Study of Split Learning Model. J Ryu, D Won, Y Lee IMCOM, 1-4, 2022 | 8 | 2022 |
Security analysis of blockchain-based user authentication for smart grid edge computing infrastructure H Lee, J Ryu, Y Lee, D Won 2021 15th International Conference on Ubiquitous Information Management and …, 2021 | 8 | 2021 |
Cryptanalysis and improvement of an ecc-based authentication protocol for wireless sensor networks T Song, D Kang, J Ryu, H Kim, D Won Computational Science and Its Applications–ICCSA 2018: 18th International …, 2018 | 7 | 2018 |
Cryptanalysis of protocol for heterogeneous wireless sensor networks for the Internet of Things environment J Ryu, H Kim, Y Lee, D Won 2020 14th International Conference on Ubiquitous Information Management and …, 2020 | 6 | 2020 |
MES-FPMIPv6: MIH-Enabled and enhanced secure Fast Proxy Mobile IPv6 handover protocol for 5G networks F Degefa, J Ryu, H Kim, D Won Plos one 17 (5), e0262696, 2022 | 5 | 2022 |
Cryptanalysis of improved and provably secure three-factor user authentication scheme for wireless sensor networks J Ryu, T Song, J Moon, H Kim, D Won Computational Science and Technology: 5th ICCST 2018, Kota Kinabalu …, 2019 | 5 | 2019 |
A study of split learning model to protect privacy J Ryu, D Won, Y Lee Convergence Security Journal 21 (3), 49-56, 2021 | 4 | 2021 |
Lightweight Hash-Based Authentication Protocol for Smart Grids S Kook, K Kim, J Ryu, Y Lee, D Won Sensors 24 (10), 3085, 2024 | 3 | 2024 |
Cryptoanalysis of Lightweight and anonymous three-factor authentication and access control protocol for real-time applications in wireless sensor networks J Ryu, Y Lee, D Won Computational Science and Technology: 6th ICCST 2019, Kota Kinabalu …, 2020 | 3 | 2020 |