Zobrazeno 1 - 10
of 83
pro vyhledávání: '"Jung-Yeon Hwang"'
Autor:
Jung Yeon Hwang
Publikováno v:
IEEE Access, Vol 11, Pp 142015-142029 (2023)
In the paper we present novel anonymous credential schemes that provide controllable opening and linking capability. In a normal situation, signers are allowed to prove their possession of attributes of credentials anonymously and in a user-controlla
Externí odkaz:
https://doaj.org/article/1724a629b34a4ebe82f38c7ebbcb26b1
Autor:
Eunah Joo, Jin Woo Hur, Joon Young Ko, Tae Gyun Kim, Jung Yeon Hwang, Kevin E. Smith, Hyunbok Lee, Sang Wan Cho
Publikováno v:
Molecules, Vol 28, Iss 9, p 3821 (2023)
Efficient energy-level alignment is crucial for achieving high performance in organic electronic devices. Because the electronic structure of an organic semiconductor is significantly influenced by its molecular orientation, comprehensively understan
Externí odkaz:
https://doaj.org/article/ca31a92bfb5c43ad90cb50db65ad8f7f
Publikováno v:
IEEE Access, Vol 9, Pp 62038-62042 (2021)
An identity-based revocation (IBR) scheme is a useful one-to-many cryptographic message transmission method in which a message can be encrypted using receivers’ identities such as e-mail addresses as public keys and a trusted message sender who hol
Externí odkaz:
https://doaj.org/article/8d806e5d81e04f69ab52d104427e2651
Publikováno v:
IEEE Access, Vol 8, Pp 83248-83264 (2020)
With the popularization of smart devices, companies are adopting bring-your-own-device or mobile office policies that utilize personal smart devices for work. However, as work data are stored on individual smart devices, critical security threats are
Externí odkaz:
https://doaj.org/article/ed77631501114f76bb3ec3a449a3fcea
Publikováno v:
IEEE Access, Vol 7, Pp 136481-136495 (2019)
A blockchain as a trustworthy and secure decentralized and distributed network has been emerged for many applications such as in banking, finance, insurance, healthcare and business. Recently, many communities in blockchain networks want to deploy ma
Externí odkaz:
https://doaj.org/article/d67327dc54ec4c378a32b57b275ee17e
Publikováno v:
IEEE Access, Vol 7, Pp 69892-69906 (2019)
Fuzzy authentication uses non-deterministic or noisy data, like biometrics, as an authentication factor. Although the data is extracted from the same individual or source, it can be different for each measurement. As a result, one of the main issues
Externí odkaz:
https://doaj.org/article/b86eb9b270594a9ebe7e2a1519c52aa0
Publikováno v:
Journal of the Korea Academia-Industrial cooperation Society. 23:538-547
Publikováno v:
ACM Transactions on Multimedia Computing, Communications, and Applications. 17:1-22
Biometric cryptosystems such as fuzzy vaults represent one of the most popular approaches for secret and biometric template protection. However, they are solely designed for biometric verification, where the user is required to input both identity cr
Publikováno v:
IEEE Wireless Communications Letters. 10:1061-1065
In this letter, we propose a novel joint mobile cache and power management scheme for energy-efficient mobile augmented reality (MAR) services in mobile edge computing (MEC). For this purpose, depending on whether the cache is hit or not, analytical
Publikováno v:
The Computer Journal. 64:1293-1302
Password-based authenticated key exchange (PAKE) allows two parties to compute a common secret key. PAKE offers the advantage of allowing two parties to pre-share only a password. However, when it is executed in a client–server environment, server