{FarmBeats}: An {IoT} Platform for {Data-Driven} Agriculture D Vasisht, Z Kapetanovic, J Won, X Jin, R Chandra, S Sinha, A Kapoor, ... 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2017 | 357 | 2017 |
Effective key management in dynamic wireless sensor networks SH Seo, J Won, S Sultana, E Bertino IEEE Transactions on Information Forensics and Security 10 (2), 371-383, 2014 | 178 | 2014 |
A secure communication protocol for drones and smart objects J Won, SH Seo, E Bertino Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015 | 84 | 2015 |
Blockchain-assisted public key infrastructure for internet of things applications JH Won, G Bollella US Patent 10,382,485, 2019 | 59 | 2019 |
Certificateless cryptographic protocols for efficient drone-based smart city applications J Won, SH Seo, E Bertino IEEE Access 5, 3721-3749, 2017 | 53 | 2017 |
Proactive fault-tolerant aggregation protocol for privacy-assured smart metering J Won, CYT Ma, DKY Yau, NSV Rao IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 2804-2812, 2014 | 39 | 2014 |
Decentralized public key infrastructure for internet-of-things J Won, A Singla, E Bertino, G Bollella MILCOM 2018-2018 IEEE Military Communications Conference (MILCOM), 907-913, 2018 | 30 | 2018 |
pCLSC-TKEM: a Pairing-free Certificateless Signcryption-tag Key Encapsulation Mechanism for a Privacy-Preserving IoT. SH Seo, J Won, E Bertino Trans. Data Priv. 9 (2), 101-130, 2016 | 30 | 2016 |
A security framework for a drone delivery service SH Seo, J Won, E Bertino, Y Kang, D Choi Proceedings of the 2Nd Workshop on Micro Aerial Vehicle Networks, Systems …, 2016 | 29 | 2016 |
Privacy-assured aggregation protocol for smart metering: A proactive fault-tolerant approach J Won, CYT Ma, DKY Yau, NSV Rao IEEE/ACM Transactions on Networking 24 (3), 1661-1674, 2015 | 25 | 2015 |
POSTER: A pairing-free certificateless hybrid sign-cryption scheme for advanced metering infrastructures SH Seo, J Won, E Bertino Proceedings of the 4th ACM conference on data and application security and …, 2014 | 13 | 2014 |
A secure shuffling mechanism for white-box attack-resistant unmanned vehicles J Won, SH Seo, E Bertino IEEE Transactions on Mobile Computing 19 (5), 1023-1039, 2019 | 11 | 2019 |
Exploiting or avoiding air drag for an aerial vehicle R Chandra, A Kapoor, J Won US Patent 10,012,999, 2018 | 10 | 2018 |
Experiences deploying an always-on farm network Z Kapetanovic, D Vasisht, J Won, R Chandra, M Kimball GetMobile: Mobile Computing and Communications 21 (2), 16-21, 2017 | 9 | 2017 |
Distance-based trustworthiness assessment for sensors in wireless sensor networks J Won, E Bertino International conference on network and system security, 18-31, 2015 | 9 | 2015 |
Robust sensor localization against known sensor position attacks J Won, E Bertino IEEE Transactions on Mobile Computing 18 (12), 2954-2967, 2018 | 7 | 2018 |
A downlink rate adaptation scheme in IEEE 802.11 WLANs using overhearing J Won, C Kim 2008 International Conference on Information Networking, 1-5, 2008 | 4 | 2008 |
Inside attack filtering for robust sensor localization J Won, E Bertino Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016 | 2 | 2016 |
Securing mobile data collectors by integrating software attestation and encrypted data repositories J Won, E Bertino 2018 IEEE 4th International Conference on Collaboration and Internet …, 2018 | 1 | 2018 |
CertificateLess Cryptography-Based Rule Management Protocol for Advanced Mission Delivery Networks J Won, A Singla, E Bertino 2017 IEEE 37th International Conference on Distributed Computing Systems …, 2017 | 1 | 2017 |