


Остановите войну!
for scientists:


default search action
Kee-Young Yoo
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2010 – 2019
- 2018
- [j96]Goutham Reddy Alavalapati, Eun-Jun Yoon, Young-Ju Kim, Kee-Young Yoo:
Design of a Secure Mutually Authenticated Key-Agreement Protocol for Multi-server Architecture. J. Comput. 13(2): 194-203 (2018) - [j95]Gil-Je Lee, Eun-Jun Yoon, Cheonshik Kim
, Kee-Young Yoo:
A real-time secret image sharing with fairness. J. Real Time Image Process. 14(1): 5-12 (2018) - [j94]Dae-Soo Kim, Eun-Jun Yoon, Cheonshik Kim
, Kee-Young Yoo:
Reversible data hiding scheme with edge-direction predictor and modulo operation. J. Real Time Image Process. 14(1): 137-145 (2018) - 2017
- [j93]Sravani Challa, Mohammad Wazid
, Ashok Kumar Das, Neeraj Kumar
, Goutham Reddy Alavalapati
, Eun-Jun Yoon, Kee-Young Yoo:
Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications. IEEE Access 5: 3028-3043 (2017) - [j92]Goutham Reddy Alavalapati
, Eun-Jun Yoon, Ashok Kumar Das, Vanga Odelu, Kee-Young Yoo:
Design of Mutually Authenticated Key Agreement Protocol Resistant to Impersonation Attacks for Multi-Server Environment. IEEE Access 5: 3622-3639 (2017) - [j91]Goutham Reddy Alavalapati
, Eun-Jun Yoon, Kee-Young Yoo:
Comment on 'Efficient and secure dynamic ID-based remote user authentication scheme for distributed systems using smart cards'. IET Inf. Secur. 11(4): 220-221 (2017) - 2016
- [j90]Goutham Reddy Alavalapati
, Ashok Kumar Das, Eun-Jun Yoon, Kee-Young Yoo:
A Secure Anonymous Authentication Protocol for Mobile Services on Elliptic Curve Cryptography. IEEE Access 4: 4394-4407 (2016) - [j89]Goutham Reddy Alavalapati
, Eun-Jun Yoon, Ashok Kumar Das, Kee-Young Yoo:
Lightweight authentication with key-agreement protocol for mobile network environment using smart cards. IET Inf. Secur. 10(5): 272-282 (2016) - [j88]Anneke Soraya Hidayat, Gil-Je Lee, Eun-Jun Yoon, Kee-Young Yoo:
An in-depth analysis of strong t-consistency on secret image sharing. Int. J. Pervasive Comput. Commun. 12(1): 107-126 (2016) - [j87]Goutham Reddy Alavalapati
, Ashok Kumar Das, Eun-Jun Yoon, Kee-Young Yoo:
An Anonymous Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Biometrics and Smartcards. KSII Trans. Internet Inf. Syst. 10(7): 3371-3396 (2016) - [c172]Goutham Reddy Alavalapati
, Eun-Jun Yoon, Ashok Kumar Das, Kee-Young Yoo:
An Enhanced Anonymous Two-factor Mutual Authentication with Key-agreement Scheme for Session Initiation Protocol. SIN 2016: 145-149 - 2015
- [j86]Ki-Hyun Jung, Kee-Young Yoo:
Steganographic method based on interpolation and LSB substitution of digital images. Multim. Tools Appl. 74(6): 2143-2155 (2015) - [j85]Ki-Hyun Jung, Kee-Young Yoo:
High-capacity index based data hiding method. Multim. Tools Appl. 74(6): 2179-2193 (2015) - [j84]Gil-Je Lee, Kee-Young Yoo:
An improved double image digital watermarking scheme using the position property. Multim. Tools Appl. 74(17): 7261-7283 (2015) - [c171]Eun-Kyung Ryu, Dae-Soo Kim, Kee-Young Yoo:
On Elliptic Curve Based Untraceable RFID Authentication Protocols. IH&MMSec 2015: 147-153 - [c170]Pyung-Han Kim, Dae-Soo Kim, Kee-Young Yoo:
Improved Histogram-Shifting-Imitated Reversible Data Hiding Scheme. ITNG 2015: 668-673 - [c169]Anneke Soraya Hidayat, Gil-Je Lee, Eun-Jun Yoon, Kee-Young Yoo:
Consistency Analysis for Secure Reconstruction in Secret Image Sharing. MoMM 2015: 357-364 - [c168]Reddy A. Goutham, Gil-Je Lee, Kee-Young Yoo:
An anonymous ID-based remote mutual authentication with key agreement protocol on ECC using smart cards. SAC 2015: 169-174 - 2014
- [j83]Ki-Hyun Jung, Kee-Young Yoo:
Three-Directional Data Hiding Method for Digital Images. Cryptologia 38(2): 178-191 (2014) - [j82]Ki-Hyun Jung, Kee-Young Yoo:
Data hiding method in binary images based on block masking for key authentication. Inf. Sci. 277: 188-196 (2014) - [j81]Ki-Hyun Jung, Kee-Young Yoo:
Data hiding using edge detector for scalable images. Multim. Tools Appl. 71(3): 1455-1468 (2014) - [c167]Geum-Dal Park, Dea-Su Kim, Kee-Young Yoo:
Lossless Codebook-Based Digital Watermarking Scheme with Authentication. ITNG 2014: 301-306 - [c166]Dae-Soo Kim, Gil-Je Lee, Kee-Young Yoo:
A reversible data hiding scheme based on histogram shifting using edge direction predictor. RACS 2014: 126-131 - [c165]Reddy A. Goutham, Dae-Soo Kim, Kee-Young Yoo:
Implicit graphical password mutual authentication using mirror-image encryption. RACS 2014: 218-223 - [c164]Eun-Jun Yoon, Kee-Young Yoo:
A biometric-based authenticated key agreement scheme using ECC for wireless sensor networks. SAC 2014: 699-705 - [c163]Sang-Ho Shin, Jun-Cheol Jeon, Gil-Je Lee, Kee-Young Yoo:
Design of a cellular automata cell with rule 30 on quantum-dot cellular automata. SAC 2014: 1749-1750 - 2013
- [j80]Eun-Kyung Ryu, Kee-Young Yoo:
Certificateless broadcast authentication for vehicular ad hoc networks. Secur. Commun. Networks 6(5): 602-611 (2013) - [j79]Eun-Jun Yoon, Kee-Young Yoo:
Robust biometrics-based multi-server authentication with key agreement scheme for smart cards on elliptic curve cryptosystem. J. Supercomput. 63(1): 235-255 (2013) - [c162]Eun-Kyung Ryu, Gil-Je Lee, Kee-Young Yoo:
Unlinkable authentication for roaming user in heterogeneous wireless networks. ICCVE 2013: 629-634 - [c161]Dae-Soo Kim, Gil-Je Lee, Kee-Young Yoo:
Reversible Image Hiding Scheme for High Quality Based on Histogram Shifting. ITNG 2013: 392-397 - [c160]Dae-Soo Kim, Geum-Dal Park, Kee-Young Yoo:
An Improved Reversible Data Hiding Scheme Based On Neighboring Pixel Differences. MoMM 2013: 282 - 2012
- [j78]Eun-Jun Yoon, Kee-Young Yoo:
On the Security of an Efficient and Secure Dynamic ID-Based Remote User Authentication Scheme. IEICE Trans. Inf. Syst. 95-D(6): 1684-1686 (2012) - [j77]Eun-Jun Yoon, Kee-Young Yoo:
Cryptanalysis of an Improved User Authentication Scheme with User Anonymity for Wireless Communications. IEICE Trans. Inf. Syst. 95-D(6): 1687-1689 (2012) - [j76]Eun-Jun Yoon, Kee-Young Yoo:
An Improvement of the User Identification and Key Agreement Protocol with User Anonymity. Informatica 23(1): 155-172 (2012) - [j75]Eun-Kyung Ryu, Hyunsung Kim, Kee-Young Yoo:
KCI-resilient anonymous wireless link-layer authentication protocols. Math. Comput. Model. 55(11-12): 2107-2116 (2012) - [c159]Sang-Ho Shin, Dong-Hyun Kim, Kee-Young Yoo:
A lightweight multi-user authentication scheme based on cellular automata in cloud environment. CloudNet 2012: 176-178 - [c158]Dong-Hyun Kim, Gil-Je Lee, Min-Ho Park, Kee-Young Yoo:
A Reversible Secret Sharing Scheme Based on GF(2^8). ITNG 2012: 425-430 - [c157]Sang-Ho Shin, Dae-Soo Kim, Kee-Young Yoo:
A 2-Dimensional Cellular Automata Pseudorandom Number Generator with Non-linear Neighborhood Relationship. NDT (1) 2012: 355-368 - 2011
- [j74]Eun-Jun Yoon, Kee-Young Yoo, Keum-Sook Ha:
A user friendly authentication scheme with anonymity for wireless communications. Comput. Electr. Eng. 37(3): 356-364 (2011) - [j73]Eun-Jun Yoon, Kee-Young Yoo, Jeong-Woo Hong, Sang-Yoon Yoon, Dong-In Park, Myung-Jin Choi:
An efficient and secure anonymous authentication scheme for mobile satellite communication systems. EURASIP J. Wirel. Commun. Netw. 2011: 86 (2011) - [j72]Eun-Jun Yoon, Kee-Young Yoo:
A secure broadcasting cryptosystem and its application to grid computing. Future Gener. Comput. Syst. 27(5): 620-626 (2011) - [j71]Eun-Jun Yoon, Il-Soo Jeon, Kee-Young Yoo:
Robust Authentication Scheme between User and Remote Autonomous Object in Telecommunications System. IEICE Trans. Inf. Syst. 94-D(5): 1113-1116 (2011) - [j70]Eun-Jun Yoon, Kee-Young Yoo:
Cryptanalysis of Group Key Agreement Protocol Based on Chaotic Hash Function. IEICE Trans. Inf. Syst. 94-D(11): 2167-2170 (2011) - [j69]Eun-Jun Yoon, Kee-Young Yoo:
Robust biometric-based three-party authenticated key establishment protocols. Int. J. Comput. Math. 88(6): 1144-1157 (2011) - [j68]Eun-Jun Yoon, Kee-Young Yoo:
Cryptanalysis of a simple three-party password-based key exchange protocol. Int. J. Commun. Syst. 24(4): 532-542 (2011) - [j67]Jeong-Woo Hong, Sang-Yoon Yoon, Dong-In Park, Myung-Jin Choi, Eun-Jun Yoon, Kee-Young Yoo:
A New Efficient Key Agreement Scheme for VSAT Satellite Communications Based on Elliptic Curve Cryptosystem. Inf. Technol. Control. 40(3): 252-259 (2011) - [c156]Eun-Jun Yoon, Kee-Young Yoo:
Cryptanalysis of robust mutual authentication protocol for wireless sensor networks. IEEE ICCI*CC 2011: 392-396 - [c155]Eun-Jun Yoon, Kee-Young Yoo:
A Practical Convertible Authenticated Encryption Scheme with Message Linkages and Forward Secrecy. CSE 2011: 339-342 - [c154]Eun-Jun Yoon, Kee-Young Yoo:
Simple Authenticated Multiple Key Exchange Protocol for Ubiquitous Computing. CSE 2011: 532-536 - [c153]Eun-Jun Yoon, Kee-Young Yoo:
A New Biometric-based User Authentication Scheme without Using Password for Wireless Sensor Networks. WETICE 2011: 279-284 - 2010
- [j66]Eun-Jun Yoon, Kee-Young Yoo, Cheonshik Kim
, YouSik Hong, Minho Jo
, Hsiao-Hwa Chen:
A secure and efficient SIP authentication scheme for converged VoIP networks. Comput. Commun. 33(14): 1674-1681 (2010) - [j65]Eun-Jun Yoon, Kee-Young Yoo:
A New Fingerprint Biometric Remote User Authentication Scheme Using Chaotic Hash Function On Mobile Devices. Intell. Autom. Soft Comput. 16(3): 471-487 (2010) - [j64]Eun-Jun Yoon, Kee-Young Yoo:
An Optimized Gateway-Oriented Password-Based Authenticated Key Exchange Protocol. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(4): 850-853 (2010) - [j63]Eun-Jun Yoon, Kee-Young Yoo:
Off-Line Keyword Guessing Attacks on Searchable Encryption with Keyword-Recoverability. IEICE Trans. Inf. Syst. 93-D(7): 1995-1996 (2010) - [j62]Eun-Jun Yoon, Kee-Young Yoo:
A Biometric Authenticated Key Agreement Protocol for Secure Token. IEICE Trans. Inf. Syst. 93-D(8): 2311-2315 (2010) - [j61]Eun-Jun Yoon, Kee-Young Yoo:
A Robust Security Mechanism for Mobile Commerce Transactions. IEICE Trans. Inf. Syst. 93-D(11): 2898-2906 (2010) - [j60]Eun-Jun Yoon, Muhammad Khurram Khan, Kee-Young Yoo:
Improvement of the Efficient Secret Broadcast Scheme. IEICE Trans. Inf. Syst. 93-D(12): 3396-3399 (2010) - [j59]Eun-Jun Yoon, Muhammad Khurram Khan, Kee-Young Yoo:
Cryptanalysis of a Handover Authentication Scheme Using Credentials Based on Chameleon Hashing. IEICE Trans. Inf. Syst. 93-D(12): 3400-3402 (2010) - [j58]Eun-Jun Yoon, Kee-Young Yoo:
An Entire Chaos-Based Biometric Remote User Authentication Scheme on Tokens Without Using Password. Informatica 21(4): 627-637 (2010) - [j57]Sang-Ho Shin, Kee-Young Yoo:
An Improved Virtual 3D CA PRNG Based on Moore Neighborhood Method. J. Circuits Syst. Comput. 19(1): 75-90 (2010) - [j56]Eun-Jun Yoon, Kee-Young Yoo, Sang-Soo Yeo
, Changhoon Lee:
Robust Deniable Authentication Protocol. Wirel. Pers. Commun. 55(1): 81-90 (2010) - [c152]Eun-Kyung Ryu, Eun-Jun Yoon, Kee-Young Yoo:
More Robust Anonymous Authentication with Link-Layer Privacy. APSCC 2010: 441-446 - [c151]Sang-Ho Shin, Kee-Young Yoo:
An 4-state 3-neighborhood Cellular Automata Pseudorandom Number Generator based on 2-state 3-neighborhood Evolution. CSC 2010: 81-86 - [c150]Lin Jia, Sang-Ho Shin, Kee-Young Yoo:
A Reversible Data Hiding Scheme Using Even-Odd Embedding Method. ICIC (2) 2010: 213-220 - [c149]Eun-Jun Yoon, Kee-Young Yoo:
A Three-Factor Authenticated Key Agreement Scheme for SIP on Elliptic Curves. NSS 2010: 334-339
2000 – 2009
- 2009
- [j55]Ki-Hyun Jung, Kee-Young Yoo:
Data hiding method using image interpolation. Comput. Stand. Interfaces 31(2): 465-470 (2009) - [j54]Ki-Hyun Jung, Kee-Young Yoo:
Data hiding using run length matching. Int. J. Intell. Inf. Database Syst. 3(3): 311-325 (2009) - [j53]Ki-Hyun Jung, Kee-Young Yoo:
Data Hiding Method with Quality Control for Binary Images. J. Softw. Eng. Appl. 2(1): 20-24 (2009) - [c148]Eun-Jun Yoon, Kee-Young Yoo:
A New Authentication Scheme for Session Initiation Protocol. CISIS 2009: 549-554 - [c147]Sang-Ho Shin, Kee-Young Yoo:
Analysis of 2-State, 3-Neighborhood Cellular Automata Rules for Cryptographic Pseudorandom Number Generation. CSE (1) 2009: 399-404 - [c146]Eun-Jun Yoon, Kee-Young Yoo:
Robust ID-Based Remote Mutual Authentication with Key Agreement Scheme for Mobile Devices on ECC. CSE (2) 2009: 633-640 - [c145]Eun-Jun Yoon, Kee-Young Yoo:
Robust Broadcasting Cryptosystem in Computer Networks. GPC Workshops 2009: 153-159 - [c144]Se-Min Kim, Zi-Qiang Cheng, Kee-Young Yoo:
A New Steganography Scheme Based on an Index-Color Image. ITNG 2009: 376-381 - [c143]Sang-Ho Shin, Kee-Young Yoo:
An Efficient PRNG Based on the Hybrid between One- and Two-Dimensional Cellular Automata. ITNG 2009: 498-503 - [c142]Kang-Joong Seo, Jun-Cheol Jeon, Kee-Young Yoo:
A Reinforced Authentication Protocol for Anti-Counterfeiting and Privacy Protection. ITNG 2009: 1610-1611 - [c141]Eun-Jun Yoon, Kee-Young Yoo:
Robust Multi-Server Authentication Scheme. NPC 2009: 197-203 - 2008
- [j52]Eun-Jun Yoon, Kee-Young Yoo:
Improving the novel three-party encrypted key exchange protocol. Comput. Stand. Interfaces 30(5): 309-314 (2008) - [j51]Eun-Jun Yoon, Kee-Young Yoo:
Robust User Password Change Scheme based on the Elliptic Curve Cryptosystem. Fundam. Informaticae 87(3-4): 483-492 (2008) - [j50]Jun-Cheol Jeon, Kee-Young Yoo:
Montgomery exponent architecture based on programmable cellular automata. Math. Comput. Simul. 79(4): 1189-1196 (2008) - [j49]Jun-Cheol Jeon, Kee-Young Yoo:
Elliptic curve based hardware architecture using cellular automata. Math. Comput. Simul. 79(4): 1197-1203 (2008) - [c140]Zhen-Ai Jin, Geum-Dal Park, Kee-Young Yoo:
An Improved Secure Authenticated Group Key Agreement Protocol for WMNs. ALPIT 2008: 412-417 - [c139]Zhen-Ai Jin, Sang-Eon Lee, Kee-Young Yoo:
Efficient Authentication and Authorization Infrastructure for Mobile Users. APWeb Workshops 2008: 155-164 - [c138]Eun-Jun Yoon, Kee-Young Yoo:
Enhanced Three-Round Smart Card-Based Key Exchange Protocol. ATC 2008: 507-515 - [c137]Sang-Eon Lee, Sang-Ho Shin, Geum-Dal Park, Kee-Young Yoo:
Wireless Sensor Network Protocols for Secure and Energy-Efficient Data Transmission. CISIM 2008: 157-162 - [c136]Ki-Jong Kim, Ki-Hyun Jung, Kee-Young Yoo:
A High Capacity Data Hiding Method Using PVD and LSB. CSSE (3) 2008: 876-879 - [c135]Jin-Yong Byun, Ki-Hyun Jung, Kee-Young Yoo:
Improved Data Hiding Method by Block Parity for Binary Images. CSSE (3) 2008: 931-934 - [c134]Zhen-Ai Jin, Zi-Qiang Cheng, Kee-Young Yoo:
Spacing Based Authentication Protocol for Low-Cost RFID. FGCN (1) 2008: 160-163 - [c133]Eun-Jun Yoon, Kee-Young Yoo:
Improving the Generalized Password-Based Authenticated Key Agreement Protocol. GPC Workshops 2008: 341-346 - [c132]Sang-Ho Shin, Geum-Dal Park, Kee-Young Yoo:
A Virtual Three-Dimension Cellular Automata Pseudorandom Number Generator Based on the Moore Neighborhood Method. ICIC (2) 2008: 174-181 - [c131]Eun-Jun Yoon, Kee-Young Yoo:
Replay Attacks on Han et al.'s Chaotic Map Based Key Agreement Protocol Using Nonce. ICIC (3) 2008: 533-540 - [c130]Jae-Gil Yu, Eun-Joon Yoon, Sang-Ho Shin, Kee-Young Yoo:
A New Image Steganography Based on 2k Correction and Edge-Detection. ITNG 2008: 563-568 - [c129]Se-Min Kim, Gil-Je Lee, Kee-Young Yoo:
Palette and Index Change Technique for Steganoraphy Based on an Indexcolor. ITNG 2008: 569-574 - [c128]Eun-Jun Yoon, Eun-Jung Lee, Kee-Young Yoo:
Cryptanalysis of Wang et al.'s Remote User Authentication Scheme Using Smart Cards. ITNG 2008: 575-580 - [c127]Eun-Jun Yoon, Kee-Young Yoo:
A New Key Agreement Protocol Based on Chaotic Maps. KES-AMSTA 2008: 897-906 - [c126]Eun-Jun Yoon, Kee-Young Yoo:
An Improvement of Password-Only Authenticated Key Establishment Protocol without Public Key Cryptography. MUE 2008: 87-91 - [c125]Eun-Jun Yoon, Kee-Young Yoo:
Two Security Problems of RFID Security Method with Ownership Transfer. NPC Workshops 2008: 68-73 - [c124]Eun-Jun Yoon, Kee-Young Yoo:
An Efficient Authentication and Key Agreement Protocol in RFID System. NPC 2008: 320-326 - [p1]Eun-Jun Yoon, Kee-Young Yoo:
Improving the Host Authentication Mechanism for POD Copy Protection System. New Directions in Intelligent Interactive Multimedia 2008: 373-383 - 2007
- [j48]Jun-Cheol Jeon, Kee-Young Yoo:
Programmable cellular automata based Montgomery hardware architecture. Appl. Math. Comput. 186(1): 915-922 (2007) - [j47]Jun-Cheol Jeon, Kee-Young Yoo:
Role delegation on multiple-attractor cellular automata based on pseudo-exhaustive bit patterns. Appl. Math. Comput. 186(2): 1423-1428 (2007) - [j46]Eun-Jun Yoon, Kee-Young Yoo:
Cryptanalysis of Robust E-Mail Protocols with Perfect Forward Secrecy. IEEE Commun. Lett. 11(5): 372-374 (2007) - [j45]Eun-Jun Yoon, Kee-Young Yoo:
Comments on Modified User Friendly Remote Authentication Scheme with Smart Cards. IEICE Trans. Commun. 90-B(2): 331-333 (2007) - [j44]Kee-Won Kim
, Jun-Cheol Jeon, Kee-Young Yoo:
Efficient and secure password authentication schemes for low-power devices. Int. J. Sens. Networks 2(1/2): 77-81 (2007) - [c123]Eun-Jun Yoon, Kee-Young Yoo:
A Secure Chaotic Hash-Based Biometric Remote User Authentication Scheme Using Mobile Devices. APWeb/WAIM Workshops 2007: 612-623 - [c122]Eun-Jun Yoon, Kee-Young Yoo:
A Secret-Key Exponential Key Agreement Protocol with Smart Cards. ATC 2007: 430-440 - [c121]Nu-El Choi, Eun-Jun Yoon, Hyun-Jin Park, Kee-Young Yoo:
Visual Multi-Secret Sharing Scheme with Cheater Identification. Security and Management 2007: 90-96 - [c120]Hyun-Jin Park, Eun-Jun Yoon, Kee-Young Yoo:
A New Steganography Scheme using a Frame. Security and Management 2007: 118-122 - [c119]Se-Min Kim, Jun-Cheol Jeon, Byung-Heon Kang, Sang-Ho Shin, Kee-Young Yoo:
Non-linear and Non-group Cellular Automata for Cryptographic Applications. Security and Management 2007: 432-438 - [c118]Eun-Jun Yoon, Kee-Young Yoo:
Token-Based Authenticated Key Establishment Protocols for Three-Party Communication. EUC Workshops 2007: 758-769 - [c117]Eun-Jun Yoon, Kee-Young Yoo:
Two Security Problems of Efficient Remote Mutual Authentication and Key Agreement. FGCN (2) 2007: 66-70 - [c116]Eun-Jun Yoon, Kee-Young Yoo:
Vulnerability of User Identification and Key Agreement Protocol with User Anonymity. FGCN (1) 2007: 516-521 - [c115]Eun-Jun Yoon, Wan-Soo Lee, Kee-Young Yoo:
Improving the Single-Assumption Authenticated Diffie-Hellman Key Agreement Protocols. ICCSA (1) 2007: 926-936 - [c114]Eun-Jun Yoon, Wan-Soo Lee, Kee-Young Yoo:
Secure PAP-Based RADIUS Protocol in Wireless Networks. ICIC (3) 2007: 689-694 - [c113]Eun-Jun Yoon, Kee-Young Yoo:
Improving the Sun-Cao's Public Key Authentication Scheme for Non-repudiation. ICIC (3) 2007: 1103-1109 - [c112]Jai-Boo Oh, Eun-Jun Yoon, Kee-Young Yoo:
An Efficient ID-Based Authenticated Key Agreement Protocol with Pairings. ISPA 2007: 446-456 - [c111]Zhen-Ai Jin, Hyun-Ju Cho, Kee-Young Yoo:
An Efficient Authentication Protocol for Low-Cost RFID Systems. KES-AMSTA 2007: 999-1006 - [c110]Ki-Hyun Jung, Jae-Gil Yu, Se-Min Kim, Ki-Jong Kim, Jin-Yong Byun, Kee-Young Yoo:
The Hiding of Secret Data Using the Run Length Matching Method. KES-AMSTA 2007: 1027-1034 - [c109]Eun-Jun Yoon, Wan-Soo Lee, Kee-Young Yoo:
Secure Remote User Authentication Scheme Using Bilinear Pairings. WISTP 2007: 102-114 - 2006
- [j43]