关注
Kee-Young Yoo
Kee-Young Yoo
在 knu.ac.kr 的电子邮件经过验证 - 首页
标题
引用次数
年份
2006 Workshop on Scientific Computing in Electronics Engineering-Modular Divider for Elliptic Curve Cryptographic Hardware Based on Programmable CA
JC Jeon, KW Kim, JB Oh, KY Yoo
Lecture Notes in Computer Science 3994, 661-668, 2006
2006
3PSA: 3-party smart card-based authentication scheme
EJ Yoon, KY Yoo
2009 Fourth International Conference on Innovative Computing, Information …, 2009
32009
A (2, 2) and (n, n)-Threshold Random Grid-Based Visual Secret Sharing Using Chaos Theory
R Koikara, AS Hidayat, A Paul, KY Yoo
Advanced Science Letters 22 (9), 2527-2531, 2016
2016
A 2-dimensional cellular automata pseudorandom number generator with non-linear neighborhood relationship
SH Shin, DS Kim, KY Yoo
Networked Digital Technologies: 4th International Conference, NDT 2012 …, 2012
62012
A Biometric Authenticated Key Agreement Protocol for Secure Token
EJ Yoon, KY Yoo
IEICE TRANSACTIONS on Information and Systems 93 (8), 2311-2315, 2010
2010
A biometric-based authenticated key agreement scheme using ECC for wireless sensor networks
EJ Yoon, KY Yoo
Proceedings of the 29th Annual ACM Symposium on Applied Computing, 699-705, 2014
82014
A case study: the evaluation for the stability of The Nanji landfill
WY Lee, JY Lee, KY Yoo
廃棄物学会研究発表会講演論文集 12, 1181-1183, 2001
2001
A cellular automata pseudorandom number generator based on concept of target & reference cells
SH Shin, KY Yoo
24th IASTED international conference on modeling and simulation. http://dx …, 2013
12013
A certificateless authenticated group key agreement protocol providing forward secrecy
EJ Lee, SE Lee, KY Yoo
2008 International Symposium on Ubiquitous Multimedia Computing, 124-129, 2008
232008
A Design of Efficient Modular Multiplication based on Montgomery Algorithm
HY Park, KY Yoo
Proceedings of the Korea Information Processing Society Conference, 1003-1006, 2004
2004
A Design of RFID Mutual Authentication System based on Open Channel
EJ Yoon, KY Yoo
The Journal of Korean Institute of Communications and Information Sciences …, 2009
22009
A Forgery Attack on A Low Computation Cost User Authentication Scheme.
EJ Yoon, KY Yoo
Int. J. Netw. Secur. 3 (1), 51-53, 2006
42006
A Frequency Domain based Steganography using Image Frame and Collage
EJ Yoon, HS Ahn, KD Bu, KY Yoo
Journal of the Institute of Electronics Engineers of Korea CI 47 (6), 86-92, 2010
22010
A high capacity data hiding method using PVD and LSB
KJ Kim, KH Jung, KY Yoo
2008 International Conference on Computer Science and Software Engineering 3 …, 2008
212008
A Key Exchange Protocol based on the Steganography with the QR code
GJ Lee, EJ Yoon, KY Yoo
Journal of the Institute of Electronics and Information Engineers 50 (6 …, 2013
22013
A lightweight multi-user authentication scheme based on cellular automata in cloud environment
SH Shin, DH Kim, KY Yoo
2012 IEEE 1st International Conference on Cloud Networking (CLOUDNET), 176-178, 2012
272012
A New (n, n)-threshold Reversible Secret Image Sharing Using Histogram Shifting
GJ Lee, DS Kim, KY Yoo
International Journal of Security and Its Applications 9 (1), 259-270, 2015
2015
A new authentication scheme for session initiation protocol
EJ Yoon, KY Yoo
2009 International Conference on Complex, Intelligent and Software Intensive …, 2009
422009
A new biometric-based user authentication scheme without using password for wireless sensor networks
EJ Yoon, KY Yoo
2011 IEEE 20th International Workshops on Enabling Technologies …, 2011
322011
A new copyright protection scheme with visual cryptography
GD Park, EJ Yoon, KY Yoo
2008 Second International Conference on Future Generation Communication and …, 2008
322008
系统目前无法执行此操作,请稍后再试。
文章 1–20