Prof. Hyunsung Kim
School of Computer Science
Kyungil University, Korea
Email:
kim@kiu.ac.kr
Qualifications
2002 Ph.D., Kyungpook National University, Korea, Computer Engineering
1998 M.S., Kyungpook National University, Korea, Computer Engineering
1996 B.S., Kyungil University, Korea, Computer Engineering
Publications (Selected)
-
Location Verification Technique for Cluster Based Geographical Routing in MANET, Informatica, Vol. 31, No. 1, pp. 113-130, 2020.
-
Modeling Home Area Network for Resource Constraints Environment over IoT, International Journal of Advance Computational Engineering and Networking, Vol. 8, No. 1, pp. 1-4, 2020.
-
Modeling Secure Home Area Network based on IoT for Resource Constraints Environment, Journal of Computer and Communications, Vol. 8, pp. 45-70, 2020.
-
Secure Authenticated Key Agreement for Telecare Health Services using Ubiquitous IoT, International Journal of Advances in Electronics and Computer Science, Vol. 6, No. 9, pp. 28-32, 2019.
-
An Autonomous Fire Alarm System on Resource Constraints IoT Environment, International Journal of Advances in Electronics and Computer Science, Vol. 6, No. 9, pp. 23-27, 2019.
-
Performance Remarks on Security Scheme for BANs Compatible with Smart Vehicles, International Journal of Advances in Electronics and Computer Science, Vol. 6, No. 9, pp. 19-22, 2019.
-
mNPKI for Mobile Government in Developing Countries, Journal of Digital Convergence, Vol. 17, No. 9, pp. 161-171, 2019.
-
Linear (t, n) Secret Sharing Scheme with Reduced Number of Polynomials, Security and Communication Networks, Vol. 2019, Article ID 5134534, 2019.
-
Enhanced Mutual Authentication and Key Agreement Protocol for Anonymous Roaming Service in Global Mobility Networks, International Journal of Advanced Computer Science and Applications, Vol. 10, No. 7, pp. 261-267, 2019.
-
Hash chain based authenticated secure communication for healthcare system, International Journal of Advances in Science Engineering and Technology, Vol. 7, No. 2, pp. 41-46, 2019.
-
Unlinkable User Authenticated Key Agreement for Multi-Gateway Wireless Sensor Networks, Current Analysis on Communication Engineering, Vol. 2, pp. 1-11, 2019.
-
Privacy Preserving User Authentication Scheme based on Smart Card, International Journal on Cryptography and Information Security, Vol. 8, No. 3, pp. 15-25, 2018.
-
Enhanced User Authentication with Privacy for IoT-Based Medical Care System, International Journal of Computer Theory and Engineering, Vol. 10, No. 4, pp. 125-129, 2018.
-
Security and Privacy Measures on Data Mining for Internet of Things, International Journal of Applied Engineering Research, Vol. 13, No. 14, pp. 11648-11652, 2018.
-
Linear (t, n) Secret Sharing Scheme based on Single Polynomial, International Journal of Applied Engineering Research, Vol. 13, No. 14, pp. 11600-11605, 2018.
-
CCTV surveillance system, attacks and design goals, International Journal of Electrical and Computer Engineering, Vol. 8, No. 4, pp. 2072-2082, 2018.
-
Data Centric Security and Privacy Research Issues for Intelligent Internet of Things, ICSES Interdisiplinary Transactions on Cloud Computing, IoT, and Big Data, pp. 1-2, 2017.
-
SHRP-Secure Hybrid Routing Protocol over Hierarchical Wireless Sensor Networks, International Journal of Computers Communications & Control, Vol. 12, No. 6, pp. 854-870, 2017.
-
Delegation Based User Authentication Framework over Cognitive Radio Networks, Journal of Sensor and Actuator Networks, Vol. 6, No. 4, doi:10.3390/jsan6040029, 2017.
-
Cyber Security Insurance Status in Malawi, International Journal of Applied Engineering Research, Vol. 12, No. 17, pp. 287-293, 2017.