Calculated based on number of publications stored in Pure and citations from Scopus
1996 …2024

Research activity per year

Filter
Conference contribution

Search results

  • 2008

    Data randomization for lightweight secure data aggregation in sensor network

    Mohaisen, A., Jeong, I. R., Hong, D., Jho, N. S. & Nyang, D., 2008, Ubiquitous Intelligence and Computing - 5th International Conference, UIC 2008, Proceedings. p. 338-351 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5061 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Privacy in location based services: Primitives toward the solution

    Mohaisen, A., Hong, D. & Nyang, D. H., 2008, Proceedings - 4th International Conference on Networked Computing and Advanced Information Management, NCM 2008. p. 572-579 8 p. 4624072. (Proceedings - 4th International Conference on Networked Computing and Advanced Information Management, NCM 2008; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    11 Scopus citations
  • Protection techniques of secret information in non-tamper proof devices of smart home network

    Mohaisen, A., Maeng, Y., Kang, J., Nyang, D., Lee, K., Hong, D. & Han, J., 2008, Ubiquitous Intelligence and Computing - 5th International Conference, UIC 2008, Proceedings. p. 548-562 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5061 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2007

    Certificate issuing using proxy and threshold signatures in self-initialized ad hoc network

    Kang, J., Nyang, D. H., Mohaisen, A., Choi, Y. G. & Kim, K. S., 2007, Computational Science and Its Applications - ICCSA 2007 - International Conference, Proceedings. PART 3 ed. Springer Verlag, p. 886-899 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4707 LNCS, no. PART 3).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • Fair reputation evaluating protocol for mobile ad hoc network

    Lei, Z., Nyang, D. H., Lee, K. H. & Lim, H., 2007, Computational Intelligence and Security - International Conference, CIS 2006, Revised Selected Papers. Springer Verlag, p. 683-693 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4456 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Fuzzy face vault: How to implement fuzzy vault with weighted features

    Nyang, D. H. & Lee, K. H., 2007, Universal Access in Human-Computer Interaction: Coping with Diversity - 4th International Conference on Universal Access in Human-Computer Interaction, UAHCI 2007. Held as Part of HCI Int. 2007 Proc.. PART 1 ed. Springer Verlag, p. 491-496 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4554 LNCS, no. PART 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    7 Scopus citations
  • On grid-based key pre-distribution: toward a better connectivity in wireless sensor network

    Mohaisen, A., Maeng, Y. J. & Nyang, D. H., 2007, Emerging Technologies in Knowledge Discovery and Data Mining - PAKDD 2007 International Workshops, Revised Selected Papers. Springer Verlag, p. 527-537 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4819 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    13 Scopus citations
  • Proactive code verification protocol in wireless sensor network

    Choi, Y. G., Kang, J. & Nyang, D. H., 2007, Computational Science and Its Applications - ICCSA 2007 - International Conference, Proceedings. PART 2 ed. Springer Verlag, p. 1085-1096 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4706 LNCS, no. PART 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    28 Scopus citations
  • Secret key revocation in sensor networks

    Maeng, Y. J., Mohaisen, A. & Nyang, D. H., 2007, Ubiquitous Intelligence and Computing - 4th International Conference, UIC 2007, Proceedings. Springer Verlag, p. 1222-1232 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4611 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • Structures for communication-efficient public key revocation in ubiquitous sensor network

    Mohaisen, A., Nyang, D. H., Maeng, Y. J. & Lee, K. H., 2007, Mobile Ad-hoc and Sensor Networks - Third International Conference, MSN 2007, Proceedings. Springer Verlag, p. 822-833 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4864 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • 2006

    Cooperative public key authentication protocol in wireless sensor network

    Nyang, D. H. & Mohaisen, A., 2006, Ubiquitous Intelligence and Computing - Third International Conference, UIC 2006, Proceedings. Springer Verlag, p. 864-873 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4159 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    13 Scopus citations
  • Fair reputation evaluating protocol for mobile ad hoc network

    Lei, Z., Nyang, D. H., Lee, K. H. & Lim, H., 2006, 2006 International Conference on Computational Intelligence and Security, ICCIAS 2006. IEEE Computer Society, p. 613-616 4 p. 4072161. (2006 International Conference on Computational Intelligence and Security, ICCIAS 2006; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    7 Scopus citations
  • Hierarchical grid-based pairwise key predistribution scheme for wireless sensor networks

    Mohaisen, A. & Nyang, D. H., 2006, Wireless Sensor Networks - Third European Workshop, EWSN 2006, Proceedings. p. 83-98 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3868 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    18 Scopus citations
  • Message and its origin authentication protocol for data aggregation in sensor networks

    Lee, H. K., Nyang, D. H. & Song, J. S., 2006, Emerging Directions in Embedded and Ubiquitous Computing - EUC 2006 Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Proceedings. Zhou, X., Sokolsky, O., Yan, L., Yan, L., Jung, E.-S., Shao, Z., Mu, Y., Lee, D.-C., Kim, D., Jeong, Y.-S. & Xu, C.-Z. (eds.). Springer Verlag, p. 281-290 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4097 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    3 Scopus citations
  • 2005

    RFID authentication protocol with strong resistance against traceability and denial of service attacks

    Kang, J. & Nyang, D. H., 2005, Security and Privacy in Ad-hoc and Sensor Networks - Second European Workshop, ESAS 2005, Revised Selected Papers. Springer Verlag, p. 164-175 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3813 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    12 Scopus citations
  • Selective collision based medium access control protocol for proactive protection of privacy for RFID

    Park, J. S., Kang, J. & Nyang, D. H., 2005, Embedded and Ubiquitous Computing - EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Proceedings. Enokido, T., Yan, L., Xiao, B., Kim, D., Dai, Y. & Yang, L. T. (eds.). Springer Verlag, p. 383-392 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3823 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Two factor face authentication scheme with cancelable feature

    Kang, J., Nyang, D. H. & Lee, K. H., 2005, Advances in Biometric Person Authentication - International Wokshop on Biometric Recognition Systems, IWBRS 2005, Proceedings. Springer Verlag, p. 67-76 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3781 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    6 Scopus citations
  • 2000

    Preventing double-spent coins from revealing user’s whole secret

    Nyang, D. H. & Song, J. S., 2000, Information Security and Cryptology - ICISC 1999 - 2nd International Conference, Proceedings. Song, J. (ed.). Springer Verlag, p. 30-37 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1787).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • 1998

    An interactive proof based identification and signature scheme using Euler's totient function

    Nyang, D. & Song, J., 1998, Proceedings - 1998 IEEE International Symposium on Information Theory, ISIT 1998. p. 82 1 p. 708667. (IEEE International Symposium on Information Theory - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Your message has successfully been sent.
Your message was not sent due to an error.