Login / Signup
Hyeran Mun
ORCID
Publication Activity (10 Years)
Years Active: 2009-2024
Publications (10 Years): 4
2025
2016
Top Topics
2025
2016
Embedded Systems
2025
2016
Secure Communication
2025
2016
Data Aggregation
2025
2016
Homomorphic Encryption
Top Venues
Comput. Secur.
IEEE Trans. Veh. Technol.
IEEE Trans. Intell. Transp. Syst.
Comput. Commun.
</>
Publications
</>
Hyeran Mun
,
Kyusuk Han
,
Ernesto Damiani
,
Tae-Yeon Kim
,
Hyun Ku Yeun
,
Deepak Puthal
,
Chan Yeob Yeun
Privacy enhanced data aggregation based on federated learning in Internet of Vehicles (IoV).
Comput. Commun.
223 (2024)
Kyusuk Han
,
Hyeran Mun
,
Malavika Balakrishnan
,
Chan Yeob Yeun
Enhancing security and robustness of Cyphal on Controller Area Network in unmanned aerial vehicle environments.
Comput. Secur.
135 (2023)
Hyeran Mun
,
Minhye Seo
,
Dong Hoon Lee
Secure Privacy-Preserving V2V Communication in 5G-V2X Supporting Network Slicing.
IEEE Trans. Intell. Transp. Syst.
23 (9) (2022)
Hyeran Mun
,
Kyusuk Han
,
Dong Hoon Lee
Ensuring Safety and Security in CAN-Based Automotive Embedded Systems: A Combination of Design Optimization and Secure Communication.
IEEE Trans. Veh. Technol.
69 (7) (2020)
Kyusuk Han
,
Hyeran Mun
,
Taeshik Shon
,
Chan Yeob Yeun
,
Jong Hyuk Park
Secure and efficient public key management in next generation mobile networks.
Pers. Ubiquitous Comput.
16 (6) (2012)
Hyeran Mun
,
Kyusuk Han
,
Yang Sun Lee
,
Chan Yeob Yeun
,
Hyo Hyun Choi
Enhanced secure anonymous authentication scheme for roaming service in global mobility networks.
Math. Comput. Model.
55 (1-2) (2012)
Kyusuk Han
,
Hyeran Mun
,
Taeshik Shon
Design of secure key agreement protocol for pairing in RF4CE.
ICITST
(2010)
Hyeran Mun
,
Chan Yeob Yeun
,
Kyusuk Han
,
Byung-Ho Chung
Enhancement of anonymous authentication scheme in wireless sensor network.
ICITST
(2010)
Hyeran Mun
,
Sinhyo Kim
,
Jung Yeon Hwang
,
Byung-Ho Chung
A Privacy-Enhanced Contents Sharing Mechanism with Secure Removable Media(SRM).
MUE
(2010)
Hyeran Mun
,
Kyusuk Han
,
Kwangjo Kim
3G-WLAN interworking: security analysis and new authentication and key agreement based on EAP-AKA.
WTS
(2009)