Calendar

Dr. Chan Yeob Yeun

Dr. Chan Yeob Yeun

dr. chan yeob Associate Professor of Computer Engineering

Address: P.O. Box: 1227788, Abu Dhabi, UAE

Telephone: +971-(0)2-5018572

Fax: +971-(0)2-4472442

Email: 

CV

Ph.D., Royal Holloway, University of London, UK, 2000 

  • Computer and Network Security
  • Wireless Networks and Mobile Security
  • Network and Information Security
  • Mathematics for Information Security
  • Information Security Management
  • Introduction to Cryptography
  • Computer Network Security
  • IoT and USN Security
  • Cloud and VM Security
  • Big Data Security
  • U-Healthcare Security
  • Wearable Security
  • SCADA and Grid Security
  • Cryptographic Techniques 

Google Scholar  Scopus

Selected Publications list

  • A.S. Gajparia, C.J. Mitchell and C.Y. Yeun, “Supporting User Privacy in Location Based Services”, in the Special issue on Mobile Multimedia Communications on IEICE Transactions on Communications, E88-B, 2837-2847, July 2005.
  • N.W. Lo, Kuo-Hui Yeh and C.Y. Yeun, “New Mutual Agreement Protocol to Secure Mobile RFID-Enabled Devices”, Information Security Technical Report, Elsevier, Vol. 13, No. 3, pp. 151-157, August 2008.
  • C.Y. Yeun, K. Han, D.L. Vo and K.J. Kim, “Secure authenticated Group Key Agreement Protocol in the MANET Environment”, Information Security Technical Report, Elsevier, Vol. 13, No. 3, pp. 158-164, August 2008.
  • C.Y. Yeun, M. Al-Qutayri and F. Al-Hawi “Efficient Security Implementation for Emerging VANETs”, Special issue of Applied Computing, Ubiquitous Computing and Communication Journal, Vol. 4, No.4, October 2009.
  • D.L. Vo, H. Lee, H. Lee, C.Y. Yeun and K.J. Kim, “Enhancements of Authenticated Multiple Key Exchange Protocol based on Bilinear Parings”, Computer and Electrical Engineering, Elsevier, Vol. 36, No. 1, pp. 155-159, January 2010.
  • M.B. Shemaili, C.Y. Yeun and M.J. Zemerly, "Lightweight mutual authentication protocol for securing RFID applications", International Journal of Internet Technology and Secured Transactions, Inderscience, Vol. 2. No. 3/4, pp. 205-221, August 2010.
  • M. Al-Qutayri, C.Y. Yeun and K. Belghuzooz, "Framework for secure wireless health monitoring and remote access system", International Journal of Internet Technology and Secured Transactions, Inderscience, Vol. 2. No. 3/4, pp. 380-398, August 2010.
  • D.M. Konidala, D. Kim, C.Y. Yeun and B. Lee, “Security Framework for RFID-based Applications in Smart Home Environment”, Journal of Information Processing Systems, KIPS, Vol. 7. No. 1, pp. 111-120, March 2011.
  • M. Alzaabi, C.Y. Yeun and T.A. Martin, “Ensuring Anonymity for LBSs in Smartphone Environment”, Journal of Information Processing Systems, KIPS, Vol. 7. No. 1, pp. 121-136, March 2011.
  • K. Han, C.Y. Yeun, T. Shon, J. Park and K. Kim, “A scalable and efficient key escrow model for lawful interception of IDBC-based secure communication”, International Journal of Communication Systems, Wiley, Vol. 24, No. 4, pp. 461-472, April 2011.
  • H. Mun, K. Han, Y.S. Lee, C.Y. Yeun and H.Y. Choi, “Enhanced secure anonymous authentication scheme for roaming service in global mobility networks”, Mathematical and Computer Modelling, Elsevier, Vol. 55, No. 1-2, pp. 214-222, January 2012.
  • M.A. Shemaili, C.Y. Yeun, K. Mubarak and M.J. Zemerly “Security Threats and Challenges for RFID and WSN Integration”, International Journal of RFID Security and Cryptography (IJRFIDSC), Infonomics Society, Vol. 1, No. 1-2, pp. 9-15, March/June 2012.
  • H. Al-Hamadi, C.Y. Yeun, M.J. Zemerly, M. Al-Qutayri and A. Gawanmeh “Verifying Mutual Authentication for the DLK Protocol using ProVerif tool”, International Journal for Information Security Research (IJIRS), Vol. 2, No. 1-2, pp. 256-265, March/June 2012.
  • M.A. Shemaili, C.Y. Yeun, M.J. Zemerly and K. Mubarak “Enhancing the Security of the Shrinking Generator Based Lightweight Mutual Authentication RFID Protocol”, International Journal of Advanced Logistics, Taylor & Francis, Vol. 1, No. 1, pp. 33-50, July 2012.
  • K. Han, H. Mun, T. Shon, C.Y. Yeun, J.J. Park, “Secure and efficient public key management in next generation mobile networks”, Personal and Ubiquitous Computing, Springer, Vol. 16, No. 6, pp. 677-685, August 2012.
  • F. Bazargan, C.Y. Yeun and M.J. Zemerly “State-of-Art of Virtualization, its Security Threats and Deployment Models”, International Journal for Information Security Research (IJIRS), Vol. 2, No. 3-4, pp. 335-343, September/December 2012.
  • H.M.N. Al Hamadi, C.Y. Yeun, J.M. Zemerly, “A Novel Security Scheme for the Smart Grid and SCADA Networks”, Wireless Personal Communications, Springer, Vol. 73, No. 4, pp. 1547-1559, December 2013.
  • A. AlMahmoud, M. Colombo, C.Y. Yeun and H. Al Muhairi, “An Authentication Protocol for Real-time Business Process Monitoring”, International Journal for Internet Technology and Secured Transactions (IJITST), ISSN 1748-569X (Print), ISSN: 1748-5703 (Online), Inderscience, Vol. 4, No. 3, pp. 223-239, October 2014. 
  • M. Ahmed, Q.H. Vu, R. Asal, C.Y. Yeun and H. Al Muhairi, “Lightweight Secure Storage Model with Fault-Tolerance in Cloud Environment” Electronic Commerce Research (ECR), Springer, ISSN: 1389-5753 (Print), ISSN: 1572-9362 (Online), Vol.14, No. 3, pp. 271-291, November 2014.
  • Y. AlSalami, T. Martin and C.Y. Yeun, “Linear and Differential Properties of Randomly Generated DES-Like Substitution Boxes”, Computer Science and Its Applications, Lecture Notes in Electrical Engineering Vol. 330, pp. 517-524, 2015. 

Patents

  • Data transmission links: Secure software download techniques (UK Patent Application No. 0201049.4) Filed on the 17th of January 2002 and also filed for International Patent (UK Patent has been granted on the 28th of April 2004).
  • Data Transmission Links: Secure software download techniques (UK Patent Application No. 0201048.6) Filed on the 17th January of 2002 and also filed for International Patent (UK Patent has been granted on the 28th of April 2004). 
  • Methods and apparatus for secure data communication links: Secure mobile delegation techniques (UK Patent Application No. 0220203.4) Filed on the 30th of August 2002 and to be filed for International Patent imminent.
  • Methods and systems for flexible delegation: Flexible security delegation techniques (UK Patent Application No. 0223853.3) Filed on the 14th of October 2002.   
  • Methods and apparatus for secure data communication links: Deniable authentication protocols (UK Patent Application No. 0324356.5) Filed on the 17th of October 2003.
  • Methods and apparatus for secure data communication links: Communication device networks (UK Patent Application No. 0401924.8) Filed on the 26th of January 2004.
  • Methods and apparatus for secure data communication links: A secure bind friendship establishment (UK Patent Application No. 0405037.3) Filed on the 5th of March 2004.
  • Methods and apparatus for secure data communication links: The location information preference authority supporting user privacy in location based services (UK Patent Application No. 0409585.7) Filed on the 29th April 2004.
  • Security for Emerging Ubiquitous Networks (Korean Patent Application No. 10-2005-0087462) Filed on the 20th September 2005 and also filed for International Patent.
  • Chaotic Cryptography for OFDM Based Communication Systems (US Patent Application No. 13/329935) Filed on the 19th of December 2011 and been granted on the 4th of February 2014.