Efficient and Secure User Identification Scheme based on ID-based Cryptosystem 1 KW Kim, JC Jeon, KY Yoo International e-Conference on Computer Science (IeCCS 2005), 79-82, 2019 | | 2019 |
Proactive Secret Sharing for Mobile Ad-hoc Networks R Koikara, A Paul, EJ Yoon, KY Yoo 대한전자공학회 학술대회, 1317-1319, 2018 | | 2018 |
Design of a secure mutually authenticated key-agreement protocol for multi-server architecture AG Reddy, EJ Yoon, YJ Kim, KY Yoo Journal of Computers 13 (2), 194-204, 2018 | | 2018 |
A real-time secret image sharing with fairness GJ Lee, EJ Yoon, C Kim, KY Yoo Journal of Real-Time Image Processing 14, 5-12, 2018 | 4 | 2018 |
Reversible data hiding scheme with edge-direction predictor and modulo operation DS Kim, EJ Yoon, C Kim, KY Yoo Journal of Real-Time Image Processing 14, 137-145, 2018 | 9 | 2018 |
Dual Image based Reversible Data Hiding Scheme using Pixel-value Differencing for High Embedding Capacity PH Kim, KY Yoo, KH Jung Le travail humain, 2017 | | 2017 |
Application of Biometric Key in Practical Secret Sharing for DNSsec AS Hidayat, R Koikara, PH Kim, KY Yoo Information 20, 6451-6459, 2017 | 4 | 2017 |
Improved Reversible Data Hiding Scheme using Weighted Matrix with Overlapping KY Jung, DS Kim, YJ Kim, KY Yoo Information: an international Interdisciplinary journal 20 (9), 6565-6573, 2017 | | 2017 |
Comment on ‘Efficient and secure dynamic ID‐based remote user authentication scheme for distributed systems using smart cards’ A Goutham Reddy, EJ Yoon, KY Yoo IET Information Security 11 (4), 220-221, 2017 | 2 | 2017 |
Towards Security in Multi-clouds Using Secret Sharing R Koikara, DS Kim, EJ Yoon, A Paul, KY Yoo 한국통신학회 학술대회논문집, 1557-1558, 2017 | 2 | 2017 |
Secure signature-based authenticated key establishment scheme for future IoT applications S Challa, M Wazid, AK Das, N Kumar, AG Reddy, EJ Yoon, KY Yoo Ieee Access 5, 3028-3043, 2017 | 451 | 2017 |
Design of mutually authenticated key agreement protocol resistant to impersonation attacks for multi-server environment AG Reddy, EJ Yoon, AK Das, V Odelu, KY Yoo IEEE access 5, 3622-3639, 2017 | 103 | 2017 |
A Reversible Data Hiding Scheme Using 7× 7 Sudoku Based on Secret Sharing YJ Kim, PH Kim, KY Yoo Journal of Korea Multimedia Society 20 (2), 261-270, 2017 | 2 | 2017 |
Information Hiding Method based on Interpolation using Max Difference of RGB Pixel for Color Images JH Lee, PH Kim, KH Jung, KY Yoo Journal of Korea Multimedia Society 20 (4), 629-639, 2017 | 3 | 2017 |
Threshold Secret Sharing based on 3D-Cellular Automata R Koikara, PH Kim, A Paul, KY Yoo Proceedings of the International Conference on Security and Management (SAM …, 2017 | 2 | 2017 |
Improved reversible data hiding using mean values in an encrypted image KY Seo, DS Kim, EJ Yoon, KY Yoo Proceedings of the International Conference on Security and Management (SAM …, 2017 | 1 | 2017 |
Lightweight authentication with key-agreement protocol for mobile network environment using smart cards (vol 10, pg 272, 2016) AG Reddy, EJ Yoon, AK Das, KY Yoo IET INFORMATION SECURITY 10 (5), 283-285, 2016 | | 2016 |
Lightweight authentication with key‐agreement protocol for mobile network environment using smart cards A Goutham Reddy, EJ Yoon, AK Das, KY Yoo IET Information Security 10 (5), 272-282, 2016 | 32 | 2016 |
A (2, 2) and (n, n)-Threshold Random Grid-Based Visual Secret Sharing Using Chaos Theory R Koikara, AS Hidayat, A Paul, KY Yoo Advanced Science Letters 22 (9), 2527-2531, 2016 | | 2016 |
Lightweight authentication with key-agreement protocol for mobile network environment using smart cards AG Reddy, EJ Yoon, AK Das, KY Yoo IET Information Security 10 (5), 272-282, 2016 | | 2016 |