关注
Kee-Young Yoo
Kee-Young Yoo
在 knu.ac.kr 的电子邮件经过验证 - 首页
标题
引用次数
年份
Efficient and Secure User Identification Scheme based on ID-based Cryptosystem 1
KW Kim, JC Jeon, KY Yoo
International e-Conference on Computer Science (IeCCS 2005), 79-82, 2019
2019
Proactive Secret Sharing for Mobile Ad-hoc Networks
R Koikara, A Paul, EJ Yoon, KY Yoo
대한전자공학회 학술대회, 1317-1319, 2018
2018
Design of a secure mutually authenticated key-agreement protocol for multi-server architecture
AG Reddy, EJ Yoon, YJ Kim, KY Yoo
Journal of Computers 13 (2), 194-204, 2018
2018
A real-time secret image sharing with fairness
GJ Lee, EJ Yoon, C Kim, KY Yoo
Journal of Real-Time Image Processing 14, 5-12, 2018
42018
Reversible data hiding scheme with edge-direction predictor and modulo operation
DS Kim, EJ Yoon, C Kim, KY Yoo
Journal of Real-Time Image Processing 14, 137-145, 2018
92018
Dual Image based Reversible Data Hiding Scheme using Pixel-value Differencing for High Embedding Capacity
PH Kim, KY Yoo, KH Jung
Le travail humain, 2017
2017
Application of Biometric Key in Practical Secret Sharing for DNSsec
AS Hidayat, R Koikara, PH Kim, KY Yoo
Information 20, 6451-6459, 2017
42017
Improved Reversible Data Hiding Scheme using Weighted Matrix with Overlapping
KY Jung, DS Kim, YJ Kim, KY Yoo
Information: an international Interdisciplinary journal 20 (9), 6565-6573, 2017
2017
Comment on ‘Efficient and secure dynamic ID‐based remote user authentication scheme for distributed systems using smart cards’
A Goutham Reddy, EJ Yoon, KY Yoo
IET Information Security 11 (4), 220-221, 2017
22017
Towards Security in Multi-clouds Using Secret Sharing
R Koikara, DS Kim, EJ Yoon, A Paul, KY Yoo
한국통신학회 학술대회논문집, 1557-1558, 2017
22017
Secure signature-based authenticated key establishment scheme for future IoT applications
S Challa, M Wazid, AK Das, N Kumar, AG Reddy, EJ Yoon, KY Yoo
Ieee Access 5, 3028-3043, 2017
4512017
Design of mutually authenticated key agreement protocol resistant to impersonation attacks for multi-server environment
AG Reddy, EJ Yoon, AK Das, V Odelu, KY Yoo
IEEE access 5, 3622-3639, 2017
1032017
A Reversible Data Hiding Scheme Using 7× 7 Sudoku Based on Secret Sharing
YJ Kim, PH Kim, KY Yoo
Journal of Korea Multimedia Society 20 (2), 261-270, 2017
22017
Information Hiding Method based on Interpolation using Max Difference of RGB Pixel for Color Images
JH Lee, PH Kim, KH Jung, KY Yoo
Journal of Korea Multimedia Society 20 (4), 629-639, 2017
32017
Threshold Secret Sharing based on 3D-Cellular Automata
R Koikara, PH Kim, A Paul, KY Yoo
Proceedings of the International Conference on Security and Management (SAM …, 2017
22017
Improved reversible data hiding using mean values in an encrypted image
KY Seo, DS Kim, EJ Yoon, KY Yoo
Proceedings of the International Conference on Security and Management (SAM …, 2017
12017
Lightweight authentication with key-agreement protocol for mobile network environment using smart cards (vol 10, pg 272, 2016)
AG Reddy, EJ Yoon, AK Das, KY Yoo
IET INFORMATION SECURITY 10 (5), 283-285, 2016
2016
Lightweight authentication with key‐agreement protocol for mobile network environment using smart cards
A Goutham Reddy, EJ Yoon, AK Das, KY Yoo
IET Information Security 10 (5), 272-282, 2016
322016
A (2, 2) and (n, n)-Threshold Random Grid-Based Visual Secret Sharing Using Chaos Theory
R Koikara, AS Hidayat, A Paul, KY Yoo
Advanced Science Letters 22 (9), 2527-2531, 2016
2016
Lightweight authentication with key-agreement protocol for mobile network environment using smart cards
AG Reddy, EJ Yoon, AK Das, KY Yoo
IET Information Security 10 (5), 272-282, 2016
2016
系统目前无法执行此操作,请稍后再试。
文章 1–20