scispace - formally typeset
C

Chan Yeob Yeun

Researcher at Khalifa University

Publications -  165
Citations -  2315

Chan Yeob Yeun is an academic researcher from Khalifa University. The author has contributed to research in topics: Authentication & Computer science. The author has an hindex of 19, co-authored 135 publications receiving 1523 citations. Previous affiliations of Chan Yeob Yeun include Toshiba & University of London.

Papers
More filters
Journal ArticleDOI

Enhanced secure anonymous authentication scheme for roaming service in global mobility networks

TL;DR: This paper proposes a new enhanced scheme that uses Elliptic Curve Diffie–Hellman (ECDH) to overcome weaknesses of Wu–Lee–Tsaur’s schemes and provides mutual authentication and resistance to a man-in-the-middle attack.
Patent

Data transmission links

TL;DR: In this paper, a secure communications link between a terminal and a server using asymmetric cryptographic techniques was proposed, where the public and private keys for both the terminal and the server are provided by a public key and a private key, respectively.

Cloud computing security management

TL;DR: This paper will not only address security challenges for cloud computing including Identity and Access Management (IAM) but also present the current state authentication, authorization and auditing of users accessing the cloud along with emerging IAM protocols and standards.
Patent

Methods and apparatus for secure data communication links

TL;DR: In this paper, a method of initialising a secure communications link between a first data processing system and a second data processing systems using a first token comprising a first key and associated first request data is described.
Proceedings ArticleDOI

Recent Advances in VANET Security: A Survey

TL;DR: A structured and comprehensive overview of the recent research advances on VANETS security services is provided, surveying the state-of-the-art on security threats, vulnerabilities and security services, while focusing on important aspects that are not well-surveyed in the literature such as VANET security assessment tools.