The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Eun-Jun Yoon: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Eun-Jun Yoon, Kee-Young Yoo
    Improving the ID-Based Key Exchange Protocol in Wireless Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ADHOC-NOW, 2006, pp:349-354 [Conf]
  2. Eun-Jun Yoon, Kee-Young Yoo
    A Secure Password-Authenticated Key Exchange Between Clients with Different Passwords. [Citation Graph (0, 0)][DBLP]
    APWeb Workshops, 2006, pp:659-663 [Conf]
  3. Eun-Jun Yoon, Kee-Young Yoo
    New Authentication Scheme Based on a One-Way Hash Function and Diffie-Hellman Key Exchange. [Citation Graph (0, 0)][DBLP]
    CANS, 2005, pp:147-160 [Conf]
  4. Eun-Jun Yoon, Kee-Young Yoo
    New Efficient Simple Authenticated Key Agreement Protocol. [Citation Graph (0, 0)][DBLP]
    COCOON, 2005, pp:945-954 [Conf]
  5. Eun-Jun Yoon, Jae-Hyung Jung, Woo-Hun Kim, Kee-Young Yoo
    A Secret Key Based Authentication Scheme Using Smart Cards. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:65-71 [Conf]
  6. Eun-Jun Yoon, Eun-Kyung Ryu, Woo-Hun Kim, Kee-Young Yoo
    Cryptanalysis of A Key Authentication Scheme Based on Discrete Logarithms. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:72-78 [Conf]
  7. Eun-Jun Yoon, Kee-Young Yoo
    Improvement of an Efficient User Identification Scheme Based on ID-Based Cryptosystem. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:586-591 [Conf]
  8. Eun-Jun Yoon, Kee-Young Yoo
    A New Simple Authenticated Key Agreement and Protected Password Change Protocol. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:955-964 [Conf]
  9. Eun-Jun Yoon, Kee-Young Yoo
    An Improved Lu-Cao's Remote User Authentication Scheme Using Smart Card. [Citation Graph (0, 0)][DBLP]
    EuroPKI, 2006, pp:45-53 [Conf]
  10. Eun-Jun Yoon, Kee-Young Yoo
    Enhanced Forward-Secure User Authentication Scheme with Smart Cards. [Citation Graph (0, 0)][DBLP]
    EuroPKI, 2006, pp:197-206 [Conf]
  11. Eun-Jun Yoon, Kee-Young Yoo
    An Efficient Password Authentication Schemes Without Using the Server Public Key for Grid Computing. [Citation Graph (0, 0)][DBLP]
    GCC, 2005, pp:149-154 [Conf]
  12. Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo
    Optimized Initiation Phases for Anonymous Auction Protocols. [Citation Graph (0, 0)][DBLP]
    Human.Society@Internet, 2005, pp:19-27 [Conf]
  13. Eun-Jun Yoon, Kee-Young Yoo
    An Optimized Two Factor Authenticated Key Exchange Protocol in PWLANs. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (2), 2006, pp:1000-1007 [Conf]
  14. Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo
    Security of Shen et al.'s Timestamp-Based Password Authentication Scheme. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:665-671 [Conf]
  15. Eun-Jun Yoon, Kee-Young Yoo
    Various Types of Attacks and Solutions Regarding Secure Remote User Access over Insecure Networks. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2006, pp:1156-1165 [Conf]
  16. Eun-Jun Yoon, Kee-Young Yoo
    An Improved Popescu's Authenticated Key Agreement Protocol. [Citation Graph (0, 0)][DBLP]
    ICCSA (5), 2006, pp:276-283 [Conf]
  17. Eun-Jun Yoon, Kee-Young Yoo
    One-Time Password Authentication Scheme Using Smart Cards Providing User Anonymity. [Citation Graph (0, 0)][DBLP]
    ICCSA (5), 2006, pp:303-311 [Conf]
  18. Eun-Jun Yoon, Kee-Young Yoo
    Cryptanalysis of Two User Identification Schemes with Key Distribution Preserving Anonymity. [Citation Graph (0, 0)][DBLP]
    ICICS, 2005, pp:315-322 [Conf]
  19. Eun-Jun Yoon, Kee-Young Yoo
    New Multi-server Password Authentication Scheme Using Neural Networks. [Citation Graph (0, 0)][DBLP]
    ICNC (2), 2005, pp:512-519 [Conf]
  20. Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo
    Robust Remote User Authentication Scheme. [Citation Graph (0, 0)][DBLP]
    ICOIN, 2004, pp:935-942 [Conf]
  21. Eun-Jun Yoon, Kee-Young Yoo
    More Efficient and Secure Remote User Authentication Scheme using Smart Cards. [Citation Graph (0, 0)][DBLP]
    ICPADS (2), 2005, pp:73-77 [Conf]
  22. Eun-Jun Yoon, Woo-Hun Kim, Kee-Young Yoo
    Robust and Simple Authentication Protocol for Secure Communication on the Web. [Citation Graph (0, 0)][DBLP]
    ICWE, 2005, pp:352-362 [Conf]
  23. Eun-Jun Yoon, Kee-Young Yoo
    Robust Authenticated Encryption Scheme with Message Linkages. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:281-288 [Conf]
  24. Eun-Jun Yoon, Kee-Young Yoo
    A New Efficient Fingerprint-Based Remote User Authentication Scheme for Multimedia Systems. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:332-338 [Conf]
  25. Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo
    Secure Protected Password Change Scheme. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2005, pp:472-477 [Conf]
  26. Eun-Kyung Ryu, Eun-Jun Yoon, Kee-Young Yoo
    An Efficient ID-Based Authenticated Key Agreement Protocol from Pairings. [Citation Graph (0, 0)][DBLP]
    NETWORKING, 2004, pp:1458-1463 [Conf]
  27. Eun-Jun Yoon, Kee-Young Yoo
    Biometrics Authenticated Key Agreement Scheme. [Citation Graph (0, 0)][DBLP]
    NGITS, 2006, pp:345-349 [Conf]
  28. Eun-Jun Yoon, Kee-Young Yoo
    Improving the Dynamic ID-Based Remote Mutual Authentication Scheme. [Citation Graph (0, 0)][DBLP]
    OTM Workshops (1), 2006, pp:499-507 [Conf]
  29. Eun-Jun Yoon, Kee-Young Yoo
    Robust Secret Key Based Authentication Scheme Using Smart Cards. [Citation Graph (0, 0)][DBLP]
    PCM (2), 2005, pp:723-734 [Conf]
  30. Eun-Jun Yoon, Kee-Young Yoo
    Efficient Mutual Authentication Scheme with Smart Card. [Citation Graph (0, 0)][DBLP]
    PRIMA, 2006, pp:813-818 [Conf]
  31. Eun-Jun Yoon, Kee-Young Yoo
    An Improved Digital Signature with Message Recovery Using Self-certified Public Keys Without Trustworthy System Authority. [Citation Graph (0, 0)][DBLP]
    SOFSEM, 2006, pp:548-555 [Conf]
  32. Eun-Jun Yoon, Woo-Hun Kim, Kee-Young Yoo
    Security Enhancement for Password Authentication Schemes with Smart Cards. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2005, pp:311-320 [Conf]
  33. Eun-Jun Yoon, Kee-Young Yoo
    An Optimizing Authenticated Key Exchange Protocol for Self-organizing Sensor Networks. [Citation Graph (0, 0)][DBLP]
    UCS, 2006, pp:537-546 [Conf]
  34. Eun-Jun Yoon, Kee-Young Yoo
    Secure Fingerprint-Based Remote User Authentication Scheme Using Smartcards. [Citation Graph (0, 0)][DBLP]
    WINE, 2005, pp:405-413 [Conf]
  35. Woo-Hun Kim, Eun-Jun Yoon, Kee-Young Yoo
    New Authentication Protocol Providing User Anonymity in Open Network. [Citation Graph (0, 0)][DBLP]
    WINE, 2005, pp:414-423 [Conf]
  36. Eun-Jun Yoon, Kee-Young Yoo
    A New Secure Key Exchange Protocol Between STB and Smart Card in DTV Broadcasting. [Citation Graph (0, 0)][DBLP]
    WISI, 2006, pp:165-166 [Conf]
  37. Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo
    An improvement of Hwang-Lee-Tang's simple remote user authentication scheme. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:1, pp:50-56 [Journal]
  38. Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo
    Attacks on the Shen et al.'s Timestamp-Based Password Authentication Scheme Using Smart Cards. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:319-321 [Journal]
  39. Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo
    A secure user authentication scheme using hash functions. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 2004, v:38, n:2, pp:62-68 [Journal]
  40. Eun-Jun Yoon, Kee-Young Yoo
    A Secure Chaotic Hash-Based Biometric Remote User Authentication Scheme Using Mobile Devices. [Citation Graph (0, 0)][DBLP]
    APWeb/WAIM Workshops, 2007, pp:612-623 [Conf]
  41. Eun-Jun Yoon, Kee-Young Yoo
    A Secret-Key Exponential Key Agreement Protocol with Smart Cards. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:430-440 [Conf]
  42. Eun-Jun Yoon, Wan-Soo Lee, Kee-Young Yoo
    Improving the Single-Assumption Authenticated Diffie-Hellman Key Agreement Protocols. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2007, pp:926-936 [Conf]
  43. Jai-Boo Oh, Eun-Jun Yoon, Kee-Young Yoo
    An Efficient ID-Based Authenticated Key Agreement Protocol with Pairings. [Citation Graph (0, 0)][DBLP]
    ISPA, 2007, pp:446-456 [Conf]
  44. Eun-Jun Yoon, Wan-Soo Lee, Kee-Young Yoo
    Secure Remote User Authentication Scheme Using Bilinear Pairings. [Citation Graph (0, 0)][DBLP]
    WISTP, 2007, pp:102-114 [Conf]
  45. Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo
    Attacks and Solutions of Yang et al.'s Protected Password Changing Scheme. [Citation Graph (0, 0)][DBLP]
    Informatica, Lith. Acad. Sci., 2005, v:16, n:2, pp:285-294 [Journal]

  46. Enhanced Three-Round Smart Card-Based Key Exchange Protocol. [Citation Graph (, )][DBLP]


  47. A New Steganography Scheme using a Frame. [Citation Graph (, )][DBLP]


  48. Visual Multi-Secret Sharing Scheme with Cheater Identification. [Citation Graph (, )][DBLP]


  49. Token-Based Authenticated Key Establishment Protocols for Three-Party Communication. [Citation Graph (, )][DBLP]


  50. Robust Broadcasting Cryptosystem in Computer Networks. [Citation Graph (, )][DBLP]


  51. Improving the Generalized Password-Based Authenticated Key Agreement Protocol. [Citation Graph (, )][DBLP]


  52. Replay Attacks on Han et al.'s Chaotic Map Based Key Agreement Protocol Using Nonce. [Citation Graph (, )][DBLP]


  53. Improving the Sun-Cao's Public Key Authentication Scheme for Non-repudiation. [Citation Graph (, )][DBLP]


  54. Secure PAP-Based RADIUS Protocol in Wireless Networks. [Citation Graph (, )][DBLP]


  55. Cryptanalysis of Wang et al.'s Remote User Authentication Scheme Using Smart Cards. [Citation Graph (, )][DBLP]


  56. Robust Multi-Server Authentication Scheme. [Citation Graph (, )][DBLP]


  57. An Efficient Authentication and Key Agreement Protocol in RFID System. [Citation Graph (, )][DBLP]


  58. Two Security Problems of RFID Security Method with Ownership Transfer. [Citation Graph (, )][DBLP]


  59. An Improvement of Password-Only Authenticated Key Establishment Protocol without Public Key Cryptography. [Citation Graph (, )][DBLP]


  60. A New Key Agreement Protocol Based on Chaotic Maps. [Citation Graph (, )][DBLP]


  61. A study on intelligent cyber university. [Citation Graph (, )][DBLP]


  62. Vulnerability of User Identification and Key Agreement Protocol with User Anonymity. [Citation Graph (, )][DBLP]


  63. Two Security Problems of Efficient Remote Mutual Authentication and Key Agreement. [Citation Graph (, )][DBLP]


  64. Robust ID-Based Remote Mutual Authentication with Key Agreement Scheme for Mobile Devices on ECC. [Citation Graph (, )][DBLP]


  65. A New Authentication Scheme for Session Initiation Protocol. [Citation Graph (, )][DBLP]


  66. A secure and efficient SIP authentication scheme for converged VoIP networks. [Citation Graph (, )][DBLP]


Search in 0.006secs, Finished in 0.008secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002