Sitemap
A list of all the posts and pages found on the site. For you robots out there is an XML version available for digesting as well.
Pages
Posts
Future Blog Post
Published:
This post will show up by default. To disable scheduling of future posts, edit config.yml
and set future: false
.
Blog Post number 4
Published:
This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.
Blog Post number 3
Published:
This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.
Blog Post number 2
Published:
This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.
Blog Post number 1
Published:
This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.
portfolio
Portfolio item number 1
Short description of portfolio item number 1
Portfolio item number 2
Short description of portfolio item number 2
publications
Cryptanalysis and Improvement of an ECC-based Authentication Protocol for Wireless Sensor Networks
Published in Information Science and Applications, 2018
Recommended citation: Taeui Song, Dongwoo Kang, Jihyeon Ryu, Hyoungshick Kim, and Dongho Won. (2018). "Cryptanalysis and Improvement of an ECC-based Authentication Protocol for Wireless Sensor Networks." ICCSA 2018. 50 - 61.
Cryptanalysis of Improved and Provably Secure Three-Factor User Authentication Scheme for Wireless Sensor Networks
Published in ICCST, 2018
Recommended citation: Jihyeon Ryu, Taeui Song, Jongho Moon, Hyoungshick Kim, and Dongho Won. (2018). " Cryptanalysis of Improved and Provably Secure Three-Factor User Authentication Scheme for Wireless Sensor Networks." ICCST 2018. 49 - 58.
Secure and efficient three-factor protocol for wireless sensor networks
Published in Sensors, 2018
Recommended citation: Jihyeon Ryu, Hakjun Lee, Hyoungshick Kim, Dongho Won. (2018). "Secure and efficient three-factor protocol for wireless sensor networks." Sensors. 18(12).
Cryptanalysis and Improvement of a Two-Factor User Authentication Scheme for Wireless Sensor Networks
Published in ICCST, 2019
Recommended citation: Jihyeon Ryu, Youngsook Lee, Dongho Won. (2019). "Cryptoanalysis of Lightweight and anonymous three-factor authentication and access control protocol for real-time applications in wireless sensor networks." ICCST 2019. 341 - 349.
Cryptanalysis of Kumar et al.’s Authentication Protocol for Wireless Sensor Networks
Published in Information Science and Applications, 2019
Recommended citation: Sewan Ha, Jihyeon Ryu, Hyoungshick Kim, Dongho Won, Youngsook Lee. (2019). "Cryptanalysis of Kumar et al.’s Authentication Protocol for Wireless Sensor Networks." Information Science and Applications. 329 - 340.
Analysis of Key Management Protocols for Secure Group Communication in Wireless Networks
Published in IMCOM, 2020
Recommended citation: Jihyeon Ryu, Hyoungshick Kim, Youngsook Lee, Dongho Won. (2020). "Cryptanalysis of Protocol for Heterogeneous Wireless Sensor Networks for the Internet of Things Environment." IMCOM 2020. 1 - 4.
A three-factor anonymous user authentication scheme for Internet of Things environments
Published in IEEE Access, 2020
Recommended citation: Hakjun Lee, Dongwoo Kang, Jihyeon Ryu, Dongho Won, Hyoungshick Kim, Youngsook Lee. (2020). "A three-factor anonymous user authentication scheme for Internet of Things environments." Journal of Information Security and Applications. 52(6).
MES-FPMIPv6: MIH-Enabled and enhanced secure Fast Proxy Mobile IPv6 handover protocol for 5G networks
Published in PLOS ONE, 2020
Recommended citation: Fikadu Degefa, Jihyeon Ryu, Hyoungshick Kim, Dongho Won. (2022). "MES-FPMIPv6: MIH-Enabled and enhanced secure Fast Proxy Mobile IPv6 handover protocol for 5G networks." PLOS ONE.
A Secure and Lightweight Three-Factor-Based Authentication Scheme for Smart Healthcare Systems
Published in Sensors, 2020
Recommended citation: Jihyeon Ryu, Dongwoo Kang, Hakjun Lee, Hyoungshick Kim, Dongho Won. (2020). "A Secure and Lightweight Three-Factor-Based Authentication Scheme for Smart Healthcare Systems." Sensors. 20(24).
Security Analysis of Blockchain-based User Authentication for Smart Grid Edge Computing Infrastructure
Published in IMCOM, 2021
Recommended citation: Hakjun Lee, Jihyeon Ryu, Youngsook Lee, Dongho Won. (2021). "Security Analysis of Blockchain-based User Authentication for Smart Grid Edge Computing Infrastructure." IMCOM. 1-4.
A Study of Split Learning Model to Protect Privacy
Published in CSJ, 2021
Recommended citation: Jihyeon Ryu, Dongho Won, Youngsook Lee (2021). "A Study of Split Learning Model to Protect Privacy." *Convergence Security Journal*. 21(3), 49-56.
A Survey of Signature System using Bilinear Pairing
Published in Korea Information Processing Society, 2021
Recommended citation: Jihyeon Ryu, Dongho Won. (2021). "A Survey of Signature System using Bilinear Pairing." Korea Information Processing Society.
A Study of Split Learning Model
Published in IMCOM, 2022
Recommended citation: Jihyeon Ryu, Dongho Won, Youngsook Lee. (2022). "A Study of Split Learning Model." IMCOM. 1-4.
Improved Secure and Efficient Chebyshev Chaotic Map-Based User Authentication Scheme
Published in IEEE Access, 2022
Recommended citation: Jihyeon Ryu, Hyoungshick Kim, Dongho Won. (2022). "Improved Secure and Efficient Chebyshev Chaotic Map-Based User Authentication Scheme." IEEE Access. 10, 15891 - 15910.
SMASG: Secure Mobile Authentication Scheme for Global Mobility Network
Published in IEEE Access, 2022
Recommended citation: Jihyeon Ryu, Hyoungshick Kim, Dongho Won. (2022). "A New Lightweight and Anonymous Authentication Scheme for IoT." IEEE Access. 10, 26907 - 26919.
Can differential privacy practically protect collaborative deep learning inference for IoT?
Published in Wireless Networks, 2022
Recommended citation: Jihyeon Ryu, Yifeng Zheng, Yansong Gao, Alsharif Abuadbba, Junyaup Kim, Dongho Won, Surya Nepal, Hyoungshick Kim, Cong Wang. (2022). "Can differential privacy practically protect collaborative deep learning inference for IoT?"; Wireless Networks. 1 - 21.
A Study on Partially Homomorphic Encryption
Published in IMCOM, 2023
Recommended citation: Jihyeon Ryu, Keunok Kim, Dongho Won.(2023). “A Study on Partially Homomorphic Encryption.” IMCOM. 1-4.
An Improved Lightweight User Authentication Scheme for the Internet of Medical Things
Published in Sensors, 2023
Recommended citation: Keunok Kim, Jihyeon Ryu, Youngsook Lee, Dongho Won. (2023). "An Improved Lightweight User Authentication Scheme for the Internet of Medical Things"; Sensors. 23(3), 1122.
Distributed and Federated Authentication Schemes Based on Updatable Smart Contracts
Published in Electronic, 2023
Recommended citation: Keunok Kim, Jihyeon Ryu, Hakjun Lee, Youngsook Lee, Dongho Won. (2023). "Distributed and Federated Authentication Schemes Based on Updatable Smart Contracts"; Electronics. 12(5), 1217.
Secure and Anonymous Authentication Scheme for Mobile Edge Computing Environments
Published in IEEE Internet of Things Journal, 2023
Recommended citation: Hakjun Lee, Jihyeon Ryu, Dongho Won. (2023). "Secure and Anonymous Authentication Scheme for Mobile Edge Computing Environments." IEEE Internet of Things Journal.
A Study of the Audio Data Split Learning Model to Protect User Privacy
Published in Korea Information Processing Society, 2023
Recommended citation: Hyungbeom Jang, Jihyeon Ryu. (2023). "A Study of the Audio Data Split Learning Model to Protect User Privacy." Korea Information Processing Society.
A Study on Deep Neural Network for User Privacy Based on Split Learning and Homomorphic Encryption
Published in Korea Institute of Information Security and Cryptology, 2023
Recommended citation: Hyungbeom Jang, Jihyeon Ryu. (2023). "A Study on Deep Neural Network for User Privacy Based on Split Learning and Homomorphic Encryption." Korea Institute of Information Security and Cryptology.
Enhanced Lightweight Medical Sensor Networks Authentication Scheme Based on Blockchain
Published in IEEE ACCESS, 2024
Recommended citation: Taewoong Kang, Naryun Woo, Jihyeon Ryu. (2024). "Enhanced Lightweight Medical Sensor Networks Authentication Scheme Based on Blockchain." IEEE ACCESS. 12, 35612 - 35629.
Lightweight Hash-Based Authentication Protocol for Smart Grids
Published in Sensors, 2024
Recommended citation: Sangjin Kook, Keunok Kim, Jihyeon Ryu, Youngsook Lee, Dongho Won. (2024). "Lightweight Hash-Based Authentication Protocol for Smart Grids." Sensors. 24(10), 3085.
A Study on Deep Neural Network for User Privacy Based on Split Learning and Homomorphic Encryption
Published in Korea Institute of Information Security and Cryptology, 2024
Recommended citation: Hyungbeom Jang, Jihyeon Ryu. (2023). "A Study on Deep Neural Network for User Privacy Based on Split Learning and Homomorphic Encryption." CISC-W 2023, Korea Institute of Information Security and Cryptology.
Trends in Homomorphic Encryption Research
Published in Korea Institute of Information Security and Cryptology, 2024
Recommended citation: Naryun Woo, Jihyeon Ryu. (2024). "Trends in Homomorphic Encryption Research." CISC-S 2024, Korea Institute of Information Security and Cryptology.
A Study on Anti-Analysis Technique Detection Using Graph Neural Network
Published in Korea Institute of Information Security and Cryptology, 2024
Recommended citation: Somi Lim, HyeonJun Yoo, Seoyeon Choi, Jihyeon Ryu. (2024). "A Study on Anti-Analysis Technique Detection Using Graph Neural Network." CISC-S 2024, Korea Institute of Information Security and Cryptology.
Study on the Application of Differential Privacy Based on Data Characteristics
Published in Korea Institute of Information Security and Cryptology, 2024
Recommended citation: Taewoong Kang, Jihyeon Ryu. (2024). "Study on the Application of Differential Privacy Based on Data Characteristics." CISC-S 2024, Korea Institute of Information Security and Cryptology.
talks
Talk 1 on Relevant Topic in Your Field
Published:
This is a description of your talk, which is a markdown files that can be all markdown-ified like any other post. Yay markdown!
Conference Proceeding talk 3 on Relevant Topic in Your Field
Published:
This is a description of your conference proceedings talk, note the different field in type. You can put anything in this field.
teaching
System Program (SWE2001)
Undergraduate course, Department of Software, Sungkyunkwan University, 2018
Lectured by Honguk Woo
Basis and Practice in Programming (GEDB029)
Undergraduate course, Department of Software, Sungkyunkwan University, 2018
Lectured by Arthur Tang
System Program (SWE2001)
Undergraduate course, Department of Software, Sungkyunkwan University, 2018
Lectured by Honguk Woo
Computer Programming for Engineers (GEDB030)
Undergraduate course, Department of Software, Sungkyunkwan University, 2018
Lectured by Woojong Yu
Computer Programming for Engineers (GEDB030)
Undergraduate course, Department of Software, Sungkyunkwan University, 2018
Lectured by Navrati Saxena
Basis and Practice in Programming (GEDB029)
Undergraduate course, Department of Software, Sungkyunkwan University, 2019
Lectured by Arthur Tang
Seminar in Computer Engineering (CSE3036)
Undergraduate course, Department of Software, Sungkyunkwan University, 2019
Lectured by Sungkil Lee
Computer Programming for Engineers (GEDB030)
Undergraduate course, Department of Software, Sungkyunkwan University, 2019
Lectured by Arthur Tang
Computer Programming for Engineers (GEDB030)
Undergraduate course, Department of Software, Sungkyunkwan University, 2020
Lectured by Arthur Tang
Computer Algorithm (IP01021)
Undergraduate course, Department of Security, Seoul Women University, 2022