Zobrazeno 1 - 10
of 78
pro vyhledávání: '"Okyeon Yi"'
Autor:
N. Kannaiya Raja, E. Laxmi Lydia, Thumpala Archana Acharya, K. Radhika, Eunmok Yang, Okyeon Yi
Publikováno v:
IEEE Access, Vol 11, Pp 121646-121655 (2023)
In recent years, drones or Unmanned Aerial Vehicles (UAVs) got significant attention among researchers because of their extensive application in commercial applications, border surveillance, etc. As the conventional terrestrial communication system d
Externí odkaz:
https://doaj.org/article/00400129b5ae429fb6066be86b1df783
Autor:
Hyunki Kim, Okyeon Yi
Publikováno v:
Applied Sciences, Vol 13, Iss 15, p 8761 (2023)
A one-time password is a security system that uses a password that is only used once for authentication, and it is commonly used in multi-factor authentication systems. The process of generating an OTP is very similar to generating pseudorandom seque
Externí odkaz:
https://doaj.org/article/c005d2e896314841bcb525b581d84745
Publikováno v:
Mathematics, Vol 9, Iss 19, p 2360 (2021)
Due to contemporary communication trends, the amount of multimedia data created and transferred in 5G networks has reached record levels. Multimedia applications communicate an enormous quantity of images containing private data that tend to be attac
Externí odkaz:
https://doaj.org/article/ce1ca3b408a642c9b121e9c080a6133b
Autor:
Eunmok Yang, Velmurugan Subbiah Parvathy, P. Pandi Selvi, K. Shankar, Changho Seo, Gyanendra Prasad Joshi, Okyeon Yi
Publikováno v:
Mathematics, Vol 8, Iss 11, p 1871 (2020)
The expanding utilization of edge consumer electronic (ECE) components and other innovations allows medical devices to communicate with one another to distribute sensitive clinical information. This information is used by health care authorities, spe
Externí odkaz:
https://doaj.org/article/23a301ba8c744dd1b8590e907da0ab6b
Publikováno v:
Applied Sciences, Vol 10, Iss 8, p 2961 (2020)
A one-time password (OTP) is a password that is valid for only one login session or transaction, in IT systems or digital devices. This is one of the human-centered security services and is commonly used for multi-factor authentication. This is very
Externí odkaz:
https://doaj.org/article/256d6924775e40aa9e384f6938740db7
Publikováno v:
Wireless Communications and Mobile Computing. 2022:1-12
Currently, unmanned aircraft systems (UASs) or drones are in service in various industrial fields, and each UAS operator establishes and operates their own independent drone system. These individual drone systems interact only with their own componen
Publikováno v:
Wireless Communications and Mobile Computing. 2022:1-17
When 5G telecommunication becomes a standardized and widely used communication medium, it must be implemented in coherence with certain 5G network standards and requirements. One such requirement is a Subscription Concealed Identifier called SUCI. SU
Publikováno v:
Information Security Applications ISBN: 9783031256585
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::35f4588c0ffdc4bce9d605a4d9e75788
https://doi.org/10.1007/978-3-031-25659-2_20
https://doi.org/10.1007/978-3-031-25659-2_20
Publikováno v:
Wireless Communications and Mobile Computing.
When the logic of a pseudo-random number generator is followed by standards, the security of the generator depends on the entropy sources used in the seed construction, which are constructed through noise sources; thus, the noise sources are extremel
Publikováno v:
Forensic Science International: Digital Investigation. 41:301393