C
Chan Yeob Yeun
Researcher at Khalifa University
Publications - 165
Citations - 2315
Chan Yeob Yeun is an academic researcher from Khalifa University. The author has contributed to research in topics: Authentication & Computer science. The author has an hindex of 19, co-authored 135 publications receiving 1523 citations. Previous affiliations of Chan Yeob Yeun include Toshiba & University of London.
Papers
More filters
Journal ArticleDOI
Enhanced secure anonymous authentication scheme for roaming service in global mobility networks
TL;DR: This paper proposes a new enhanced scheme that uses Elliptic Curve Diffie–Hellman (ECDH) to overcome weaknesses of Wu–Lee–Tsaur’s schemes and provides mutual authentication and resistance to a man-in-the-middle attack.
Patent
Data transmission links
TL;DR: In this paper, a secure communications link between a terminal and a server using asymmetric cryptographic techniques was proposed, where the public and private keys for both the terminal and the server are provided by a public key and a private key, respectively.
Cloud computing security management
Sameera Almulla,Chan Yeob Yeun +1 more
TL;DR: This paper will not only address security challenges for cloud computing including Identity and Access Management (IAM) but also present the current state authentication, authorization and auditing of users accessing the cloud along with emerging IAM protocols and standards.
Patent
Methods and apparatus for secure data communication links
TL;DR: In this paper, a method of initialising a secure communications link between a first data processing system and a second data processing systems using a first token comprising a first key and associated first request data is described.
Proceedings ArticleDOI
Recent Advances in VANET Security: A Survey
TL;DR: A structured and comprehensive overview of the recent research advances on VANETS security services is provided, surveying the state-of-the-art on security threats, vulnerabilities and security services, while focusing on important aspects that are not well-surveyed in the literature such as VANET security assessment tools.