Sunday, June 12, 2016

Invited Speaker: Cyber Security for infrastructure of Energy & Transport - 2nd edition June 20th and 21st, 2016 - Genoa (Italy)

Cyber Security for infrastructure of Energy & Transport - 2nd edition
June 20th and 21st, 2016 - Genoa (Italy)

Event promoted by:
Polytechnic School Engineering and Architecture - University of Genoa
Cyber Security, Resilience and Business Continuity for Electrical Grid National Commitee
Invited Speaker: Dr. Chan Yeob Yeun

Monday, December 01, 2014

Keynote Speaker: RFIDSec Asia 2014, Nov 27-28, Hualien Taiwan

Keynote Speaker
Formal method for securing mutual NFC authentication protocol over LTE network
Chan Yeob Yeun, Khalifa UniversityAbu Dhabi, The United Arab Emirates (UAE)

     NFC (Near Field Communication) has a good adaptable structure that it can be easily combined with any wireless network. Since NFC can be used to communicate without using a proper wire, all the transactions can be done remotely without any physical connections. In this paper, we propose a new authentication protocol based on LTE network to secure the NFC. Our protocol enhances the security level provided by the LTE. Our approach is new in a sense that it covers LTE in contrast to old networks like GSM & 3G substantially treated in the literature. Moreover, both GSM and 3G have several drawbacks when they are combined with the NFC technology, which has potential weakness in confidentiality, integrity, and authentication. Hence our new approach will resolve the security of the new LTE system. Also, we presented security analysis of our protocol based on the formal method, ProVerif. Finally, we expect that our protocol may result in new secure applications for the smart phone markets.


Tuesday, February 12, 2013

Recently, my biographical profile has been published in the 2013 30th Pearl Anniversary Edition of Who's Who in the World, Marquis Who's Who (Since 1899) that has remained the standard for reliable and comprehensive biographical data. Each year, we strive to continue the tradition established by our founder, Albert Nelson Marquis, over 110 years ago with the first publication of Who's Who in America:

Tuesday, January 29, 2013

ICITST-2012: December 10-12, 2012, London, UK 
 The 7th International Conference for Internet Technology and Secured Transactions (ICITST 2012) has been held in December 10-12, 2012 in London, UK and a prime international forum for both researchers and industry practitioners to exchange the latest fundamental advances in the state of the art and practice, Internet Technologies, Secured Transactions, Application of Agents, Human-Computer Interface and Interaction for Ubi-com, Cybernetics, Data Mining, E-Society, Web Services, Semantic Web and Ontology, Mobile, Ad Hoc and Sensor Network Security, Digital Information Management and identify emerging research topics:

I have served as a Co-Workshop Chair of ICITST 2012 and a Co-Program Chair of RISC 2012.

Tuesday, November 27, 2012

The 2012 FTRA World Convergence Conference (FTRA WCC 2012)

The 3rd FTRA World Convergence Conference (FTRA WCC 2012) will be held in Jeju, Korea, November 22-25, 2012. The Conference is aimed at addressing key themes on "Technologies and Services for Converged environments".
I am an Europe and Middle East Director of FTRA and a TPC member of FTRA WCC 2012.

I have attended and presented our paper entitled "A New Security Methodology for the Future Smart Grid and SCADA Security" on the 23rd of November  at the 2012 FTRA International Workshop on Human centric computing, P2P, Grid and Cloud computing (HCPC 2012) that is co-located with FTRA WCC 2012:


Tuesday, June 12, 2012

2012 International Summer School at Korea Aerospace University

Date: June 25 - July 20 2012
Time: Afternoon Session, 2pm-4:50pm
Venue: Korea Aerospace University 

Course: Internet Security with Emerging Applications
Course Description: Foundation of Information Security concepts and technologies. Symmetric and Asymmetric Cryptography Techniques. Identify the main network security threats and vulnerabilities. Firewall, Intrusion Detection, Intrusion Prevention. Some hacking techniques. Web application security and online privacy issues and applications for secure wired and wireless online environments such as RFID/USN Security, Airport Security and Cloud Computing Security.

Web link:

Sunday, May 13, 2012

Invitation for Lunch at Consul General of Republic of Korea, 9 May 2012 at 1:30pm

The Consul General of the Republic of Korea

Consul General Hong, Young-Jong 

Request the pleasure of the company of

 Khalifa University Director, Assistant Directors, Professors
 and Korea Club Member Students

for enjoying Korean Cuisine at Consul General's Residence 

On Monday, 9 May 2012, at 1:30pm