Biography

Prof. Hyunsung Kim

School of Computer Science

Kyungil University, Korea


Email: kim@kiu.ac.kr


Qualifications

2002 Ph.D., Kyungpook National University, Korea, Computer Engineering

1998 M.S., Kyungpook National University, Korea, Computer Engineering

1996 B.S., Kyungil University, Korea, Computer Engineering


Publications (Selected)


  1. Location Verification Technique for Cluster Based Geographical Routing in MANET, Informatica, Vol. 31, No. 1, pp. 113-130, 2020.
  2. Modeling Home Area Network for Resource Constraints Environment over IoT, International Journal of Advance Computational Engineering and Networking, Vol. 8, No. 1, pp. 1-4, 2020.
  3. Modeling Secure Home Area Network based on IoT for Resource Constraints Environment, Journal of Computer and Communications, Vol. 8, pp. 45-70, 2020.
  4. Secure Authenticated Key Agreement for Telecare Health Services using Ubiquitous IoT, International Journal of Advances in Electronics and Computer Science, Vol. 6, No. 9, pp. 28-32, 2019.
  5. An Autonomous Fire Alarm System on Resource Constraints IoT Environment, International Journal of Advances in Electronics and Computer Science, Vol. 6, No. 9, pp. 23-27, 2019.
  6. Performance Remarks on Security Scheme for BANs Compatible with Smart Vehicles, International Journal of Advances in Electronics and Computer Science, Vol. 6, No. 9, pp. 19-22, 2019.
  7. mNPKI for Mobile Government in Developing Countries, Journal of Digital Convergence, Vol. 17, No. 9, pp. 161-171, 2019.
  8. Linear (t, n) Secret Sharing Scheme with Reduced Number of Polynomials, Security and Communication Networks, Vol. 2019, Article ID 5134534, 2019.
  9. Enhanced Mutual Authentication and Key Agreement Protocol for Anonymous Roaming Service in Global Mobility Networks, International Journal of Advanced Computer Science and Applications, Vol. 10, No. 7, pp. 261-267, 2019.
  10. Hash chain based authenticated secure communication for healthcare system, International Journal of Advances in Science Engineering and Technology, Vol. 7, No. 2, pp. 41-46, 2019.
  11. Unlinkable User Authenticated Key Agreement for Multi-Gateway Wireless Sensor Networks, Current Analysis on Communication Engineering, Vol. 2, pp. 1-11, 2019.
  12. Privacy Preserving User Authentication Scheme based on Smart Card, International Journal on Cryptography and Information Security, Vol. 8, No. 3, pp. 15-25, 2018.
  13. Enhanced User Authentication with Privacy for IoT-Based Medical Care System, International Journal of Computer Theory and Engineering, Vol. 10, No. 4, pp. 125-129, 2018.
  14. Security and Privacy Measures on Data Mining for Internet of Things, International Journal of Applied Engineering Research, Vol. 13, No. 14, pp. 11648-11652, 2018.
  15. Linear (t, n) Secret Sharing Scheme based on Single Polynomial, International Journal of Applied Engineering Research, Vol. 13, No. 14, pp. 11600-11605, 2018.
  16. CCTV surveillance system, attacks and design goals, International Journal of Electrical and Computer Engineering, Vol. 8, No. 4, pp. 2072-2082, 2018.
  17. Data Centric Security and Privacy Research Issues for Intelligent Internet of Things, ICSES Interdisiplinary Transactions on Cloud Computing, IoT, and Big Data, pp. 1-2, 2017.
  18. SHRP-Secure Hybrid Routing Protocol over Hierarchical Wireless Sensor Networks, International Journal of Computers Communications & Control, Vol. 12, No. 6, pp. 854-870, 2017.
  19. Delegation Based User Authentication Framework over Cognitive Radio Networks, Journal of Sensor and Actuator Networks, Vol. 6, No. 4, doi:10.3390/jsan6040029, 2017.
  20. Cyber Security Insurance Status in Malawi, International Journal of Applied Engineering Research, Vol. 12, No. 17, pp. 287-293, 2017.


Free SCIRP Newsletters
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top