Portfolio item number 1
Short description of portfolio item number 1
Short description of portfolio item number 1
Short description of portfolio item number 2
Published in Information Science and Applications, 2018
Recommended citation: Taeui Song, Dongwoo Kang, Jihyeon Ryu, Hyoungshick Kim, and Dongho Won. (2018). "Cryptanalysis and Improvement of an ECC-based Authentication Protocol for Wireless Sensor Networks." ICCSA 2018. 50 - 61.
Published in ICCST, 2018
Recommended citation: Jihyeon Ryu, Taeui Song, Jongho Moon, Hyoungshick Kim, and Dongho Won. (2018). " Cryptanalysis of Improved and Provably Secure Three-Factor User Authentication Scheme for Wireless Sensor Networks." ICCST 2018. 49 - 58.
Published in Sensors, 2018
Recommended citation: Jihyeon Ryu, Hakjun Lee, Hyoungshick Kim, Dongho Won. (2018). "Secure and efficient three-factor protocol for wireless sensor networks." Sensors. 18(12).
Published in ICCST, 2019
Recommended citation: Jihyeon Ryu, Youngsook Lee, Dongho Won. (2019). "Cryptoanalysis of Lightweight and anonymous three-factor authentication and access control protocol for real-time applications in wireless sensor networks." ICCST 2019. 341 - 349.
Published in Information Science and Applications, 2019
Recommended citation: Sewan Ha, Jihyeon Ryu, Hyoungshick Kim, Dongho Won, Youngsook Lee. (2019). "Cryptanalysis of Kumar et al.’s Authentication Protocol for Wireless Sensor Networks." Information Science and Applications. 329 - 340.
Published in IMCOM, 2020
Recommended citation: Jihyeon Ryu, Hyoungshick Kim, Youngsook Lee, Dongho Won. (2020). "Cryptanalysis of Protocol for Heterogeneous Wireless Sensor Networks for the Internet of Things Environment." IMCOM 2020. 1 - 4.
Published in IEEE Access, 2020
Recommended citation: Hakjun Lee, Dongwoo Kang, Jihyeon Ryu, Dongho Won, Hyoungshick Kim, Youngsook Lee. (2020). "A three-factor anonymous user authentication scheme for Internet of Things environments." Journal of Information Security and Applications. 52(6).
Published in PLOS ONE, 2020
Recommended citation: Fikadu Degefa, Jihyeon Ryu, Hyoungshick Kim, Dongho Won. (2022). "MES-FPMIPv6: MIH-Enabled and enhanced secure Fast Proxy Mobile IPv6 handover protocol for 5G networks." PLOS ONE.
Published in Sensors, 2020
Recommended citation: Jihyeon Ryu, Dongwoo Kang, Hakjun Lee, Hyoungshick Kim, Dongho Won. (2020). "A Secure and Lightweight Three-Factor-Based Authentication Scheme for Smart Healthcare Systems." Sensors. 20(24).
Published in IMCOM, 2021
Recommended citation: Hakjun Lee, Jihyeon Ryu, Youngsook Lee, Dongho Won. (2021). "Security Analysis of Blockchain-based User Authentication for Smart Grid Edge Computing Infrastructure." IMCOM. 1-4.
Published in CSJ, 2021
Recommended citation: Jihyeon Ryu, Dongho Won, Youngsook Lee (2021). "A Study of Split Learning Model to Protect Privacy." *Convergence Security Journal*. 21(3), 49-56.
Published in Korea Information Processing Society, 2021
Recommended citation: Jihyeon Ryu, Dongho Won. (2021). "A Survey of Signature System using Bilinear Pairing." Korea Information Processing Society.
Published in IMCOM, 2022
Recommended citation: Jihyeon Ryu, Dongho Won, Youngsook Lee. (2022). "A Study of Split Learning Model." IMCOM. 1-4.
Published in IEEE Access, 2022
Recommended citation: Jihyeon Ryu, Hyoungshick Kim, Dongho Won. (2022). "Improved Secure and Efficient Chebyshev Chaotic Map-Based User Authentication Scheme." IEEE Access. 10, 15891 - 15910.
Published in IEEE Access, 2022
Recommended citation: Jihyeon Ryu, Hyoungshick Kim, Dongho Won. (2022). "A New Lightweight and Anonymous Authentication Scheme for IoT." IEEE Access. 10, 26907 - 26919.
Published in Wireless Networks, 2022
Recommended citation: Jihyeon Ryu, Yifeng Zheng, Yansong Gao, Alsharif Abuadbba, Junyaup Kim, Dongho Won, Surya Nepal, Hyoungshick Kim, Cong Wang. (2022). "Can differential privacy practically protect collaborative deep learning inference for IoT?"; Wireless Networks. 1 - 21.
Published in IMCOM, 2023
Recommended citation: Jihyeon Ryu, Keunok Kim, Dongho Won.(2023). “A Study on Partially Homomorphic Encryption.” IMCOM. 1-4.
Published in Sensors, 2023
Recommended citation: Keunok Kim, Jihyeon Ryu, Youngsook Lee, Dongho Won. (2023). "An Improved Lightweight User Authentication Scheme for the Internet of Medical Things"; Sensors. 23(3), 1122.
Published in Electronic, 2023
Recommended citation: Keunok Kim, Jihyeon Ryu, Hakjun Lee, Youngsook Lee, Dongho Won. (2023). "Distributed and Federated Authentication Schemes Based on Updatable Smart Contracts"; Electronics. 12(5), 1217.
Published in IEEE Internet of Things Journal, 2023
Recommended citation: Hakjun Lee, Jihyeon Ryu, Dongho Won. (2023). "Secure and Anonymous Authentication Scheme for Mobile Edge Computing Environments." IEEE Internet of Things Journal.
Published in Korea Information Processing Society, 2023
Recommended citation: Hyungbeom Jang, Jihyeon Ryu. (2023). "A Study of the Audio Data Split Learning Model to Protect User Privacy." Korea Information Processing Society.
Published in Korea Institute of Information Security and Cryptology, 2023
Recommended citation: Hyungbeom Jang, Jihyeon Ryu. (2023). "A Study on Deep Neural Network for User Privacy Based on Split Learning and Homomorphic Encryption." Korea Institute of Information Security and Cryptology.
Published in IEEE ACCESS, 2024
Recommended citation: Taewoong Kang, Naryun Woo, Jihyeon Ryu. (2024). "Enhanced Lightweight Medical Sensor Networks Authentication Scheme Based on Blockchain." IEEE ACCESS. 12, 35612 - 35629.
Published in Sensors, 2024
Recommended citation: Sangjin Kook, Keunok Kim, Jihyeon Ryu, Youngsook Lee, Dongho Won. (2024). "Lightweight Hash-Based Authentication Protocol for Smart Grids." Sensors. 24(10), 3085.
Published in Korea Institute of Information Security and Cryptology, 2024
Recommended citation: Hyungbeom Jang, Jihyeon Ryu. (2023). "A Study on Deep Neural Network for User Privacy Based on Split Learning and Homomorphic Encryption." CISC-W 2023, Korea Institute of Information Security and Cryptology.
Published in Korea Institute of Information Security and Cryptology, 2024
Recommended citation: Naryun Woo, Jihyeon Ryu. (2024). "Trends in Homomorphic Encryption Research." CISC-S 2024, Korea Institute of Information Security and Cryptology.
Published in Korea Institute of Information Security and Cryptology, 2024
Recommended citation: Somi Lim, HyeonJun Yoo, Seoyeon Choi, Jihyeon Ryu. (2024). "A Study on Anti-Analysis Technique Detection Using Graph Neural Network." CISC-S 2024, Korea Institute of Information Security and Cryptology.
Published in Korea Institute of Information Security and Cryptology, 2024
Recommended citation: Taewoong Kang, Jihyeon Ryu. (2024). "Study on the Application of Differential Privacy Based on Data Characteristics." CISC-S 2024, Korea Institute of Information Security and Cryptology.
Published:
This is a description of your talk, which is a markdown files that can be all markdown-ified like any other post. Yay markdown!
Published:
This is a description of your conference proceedings talk, note the different field in type. You can put anything in this field.
Undergraduate course, Department of Software, Sungkyunkwan University, 2018
Lectured by Honguk Woo
Undergraduate course, Department of Software, Sungkyunkwan University, 2018
Lectured by Arthur Tang
Undergraduate course, Department of Software, Sungkyunkwan University, 2018
Lectured by Honguk Woo
Undergraduate course, Department of Software, Sungkyunkwan University, 2018
Lectured by Woojong Yu
Undergraduate course, Department of Software, Sungkyunkwan University, 2018
Lectured by Navrati Saxena
Undergraduate course, Department of Software, Sungkyunkwan University, 2019
Lectured by Arthur Tang
Undergraduate course, Department of Software, Sungkyunkwan University, 2019
Lectured by Sungkil Lee
Undergraduate course, Department of Software, Sungkyunkwan University, 2019
Lectured by Arthur Tang
Undergraduate course, Department of Software, Sungkyunkwan University, 2020
Lectured by Arthur Tang
Undergraduate course, Department of Security, Seoul Women University, 2022