2006 Workshop on Scientific Computing in Electronics Engineering-Modular Divider for Elliptic Curve Cryptographic Hardware Based on Programmable CA JC Jeon, KW Kim, JB Oh, KY Yoo Lecture Notes in Computer Science 3994, 661-668, 2006 | | 2006 |
3PSA: 3-party smart card-based authentication scheme EJ Yoon, KY Yoo 2009 Fourth International Conference on Innovative Computing, Information …, 2009 | 3 | 2009 |
A (2, 2) and (n, n)-Threshold Random Grid-Based Visual Secret Sharing Using Chaos Theory R Koikara, AS Hidayat, A Paul, KY Yoo Advanced Science Letters 22 (9), 2527-2531, 2016 | | 2016 |
A 2-dimensional cellular automata pseudorandom number generator with non-linear neighborhood relationship SH Shin, DS Kim, KY Yoo Networked Digital Technologies: 4th International Conference, NDT 2012 …, 2012 | 6 | 2012 |
A Biometric Authenticated Key Agreement Protocol for Secure Token EJ Yoon, KY Yoo IEICE TRANSACTIONS on Information and Systems 93 (8), 2311-2315, 2010 | | 2010 |
A biometric-based authenticated key agreement scheme using ECC for wireless sensor networks EJ Yoon, KY Yoo Proceedings of the 29th Annual ACM Symposium on Applied Computing, 699-705, 2014 | 8 | 2014 |
A case study: the evaluation for the stability of The Nanji landfill WY Lee, JY Lee, KY Yoo 廃棄物学会研究発表会講演論文集 12, 1181-1183, 2001 | | 2001 |
A cellular automata pseudorandom number generator based on concept of target & reference cells SH Shin, KY Yoo 24th IASTED international conference on modeling and simulation. http://dx …, 2013 | 1 | 2013 |
A certificateless authenticated group key agreement protocol providing forward secrecy EJ Lee, SE Lee, KY Yoo 2008 International Symposium on Ubiquitous Multimedia Computing, 124-129, 2008 | 23 | 2008 |
A Design of Efficient Modular Multiplication based on Montgomery Algorithm HY Park, KY Yoo Proceedings of the Korea Information Processing Society Conference, 1003-1006, 2004 | | 2004 |
A Design of RFID Mutual Authentication System based on Open Channel EJ Yoon, KY Yoo The Journal of Korean Institute of Communications and Information Sciences …, 2009 | 2 | 2009 |
A Forgery Attack on A Low Computation Cost User Authentication Scheme. EJ Yoon, KY Yoo Int. J. Netw. Secur. 3 (1), 51-53, 2006 | 4 | 2006 |
A Frequency Domain based Steganography using Image Frame and Collage EJ Yoon, HS Ahn, KD Bu, KY Yoo Journal of the Institute of Electronics Engineers of Korea CI 47 (6), 86-92, 2010 | 2 | 2010 |
A high capacity data hiding method using PVD and LSB KJ Kim, KH Jung, KY Yoo 2008 International Conference on Computer Science and Software Engineering 3 …, 2008 | 21 | 2008 |
A Key Exchange Protocol based on the Steganography with the QR code GJ Lee, EJ Yoon, KY Yoo Journal of the Institute of Electronics and Information Engineers 50 (6 …, 2013 | 2 | 2013 |
A lightweight multi-user authentication scheme based on cellular automata in cloud environment SH Shin, DH Kim, KY Yoo 2012 IEEE 1st International Conference on Cloud Networking (CLOUDNET), 176-178, 2012 | 27 | 2012 |
A New (n, n)-threshold Reversible Secret Image Sharing Using Histogram Shifting GJ Lee, DS Kim, KY Yoo International Journal of Security and Its Applications 9 (1), 259-270, 2015 | | 2015 |
A new authentication scheme for session initiation protocol EJ Yoon, KY Yoo 2009 International Conference on Complex, Intelligent and Software Intensive …, 2009 | 42 | 2009 |
A new biometric-based user authentication scheme without using password for wireless sensor networks EJ Yoon, KY Yoo 2011 IEEE 20th International Workshops on Enabling Technologies …, 2011 | 32 | 2011 |
A new copyright protection scheme with visual cryptography GD Park, EJ Yoon, KY Yoo 2008 Second International Conference on Future Generation Communication and …, 2008 | 32 | 2008 |