The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Kee-Young Yoo: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Hun-Joong Bae, Hyun-Sung Kim, Kee-Young Yoo
    ID-based Key Exchange Protocol using Smart Cards with Fingerprint. [Citation Graph (0, 0)][DBLP]
    ISCA PDCS, 2003, pp:448-452 [Conf]
  2. Jun-Cheol Jeon, Kee-Young Yoo
    Design of Bit-parallel Multiplier Based on Programmable Cellular Automata. [Citation Graph (0, 0)][DBLP]
    ISCA PDCS, 2003, pp:94-98 [Conf]
  3. Jun-Cheol Jeon, Kee-Young Yoo
    Cellular Automata Based Role-Delegation in RBAC. [Citation Graph (0, 0)][DBLP]
    ACRI, 2006, pp:588-594 [Conf]
  4. Jun-Cheol Jeon, Kee-Young Yoo
    Authentication Based on Singular Cellular Automata. [Citation Graph (0, 0)][DBLP]
    ACRI, 2006, pp:605-610 [Conf]
  5. Byung-Heon Kang, Jun-Cheol Jeon, Kee-Young Yoo
    Decision Algorithms for Cellular Automata States Based on Periodic Boundary Condition. [Citation Graph (0, 0)][DBLP]
    ACRI, 2006, pp:104-111 [Conf]
  6. Eun-Jun Yoon, Kee-Young Yoo
    Improving the ID-Based Key Exchange Protocol in Wireless Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ADHOC-NOW, 2006, pp:349-354 [Conf]
  7. Eun-Jun Yoon, Kee-Young Yoo
    A Secure Password-Authenticated Key Exchange Between Clients with Different Passwords. [Citation Graph (0, 0)][DBLP]
    APWeb Workshops, 2006, pp:659-663 [Conf]
  8. Kee-Won Kim, Eun-Kyung Ryu, Hyung-Mok Lee, Kee-Young Yoo
    A New Authenticated Key Agreement Protocol. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:91-94 [Conf]
  9. Hye-Jin Yang, Jun-Cheol Jeon, Kee-Won Kim, Kee-Young Yoo
    New Authentication Scheme with No Verification Table. [Citation Graph (0, 0)][DBLP]
    CAINE, 2005, pp:387-389 [Conf]
  10. Hee-Jung Yoon, Jun-Cheol Jeon, Kee-Won Kim, Kee-Young Yoo
    A Secure One-Time Password Authentication Using Cellular Automata. [Citation Graph (0, 0)][DBLP]
    CAINE, 2005, pp:376-381 [Conf]
  11. Hyo-Cheol Kim, Hyun-Chul Kim, Kee-Young Yoo
    A Study on the Precise Extraction of Watermark. [Citation Graph (0, 0)][DBLP]
    CAINE, 2001, pp:37-40 [Conf]
  12. Kee-Won Kim, Keon-Jik Lee, Kee-Young Yoo
    Efficient Digital-Serial Systolic Multiplier for Finite Fields GF(2m). [Citation Graph (0, 0)][DBLP]
    CAINE, 2001, pp:205-208 [Conf]
  13. Keon-Jik Lee, Kee-Won Kim, Kee-Young Yoo
    Bit-Serial Systolic Multiplier/Squarer for Montgomery's Algorithm. [Citation Graph (0, 0)][DBLP]
    CAINE, 2001, pp:70-73 [Conf]
  14. Jong-Kook Lee, Shi-Ryong Ryu, Hyun-Chul Kim, Kee-Young Yoo
    A Smart Card-based Authentication System for Undeniable Digital Signature. [Citation Graph (0, 0)][DBLP]
    CAINE, 2001, pp:62-65 [Conf]
  15. Eun-Jun Yoon, Kee-Young Yoo
    New Authentication Scheme Based on a One-Way Hash Function and Diffie-Hellman Key Exchange. [Citation Graph (0, 0)][DBLP]
    CANS, 2005, pp:147-160 [Conf]
  16. Woo-Hun Kim, Hyun-Sung Kim, Sung-Woon Lee, Kee-Young Yoo
    Secure Authenticated Key Exchange Protocol. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2003, pp:5-8 [Conf]
  17. Nam-Yeun Kim, Kee-Young Yoo
    Look-Up Table-based Montgomery Algorithm in GF(2k) for Public-Key Cryptosystem. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2003, pp:9-12 [Conf]
  18. Kyo-Min Ku, Kyeoung Ju Ha, Hyun-Sung Kim, Kee-Young Yoo
    New AB2 Multiplier over GF(2m) using Cellular Automata. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2003, pp:283-286 [Conf]
  19. Hyoung-Mok Lee, Eun-Kyung Ryu, Kee-Won Kim, Jae-Min Lee, Kee-Young Yoo
    A Robust Authenticated Key Agreement Protocol. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2003, pp:76-79 [Conf]
  20. Hyun-Sung Kim, Kee-Young Yoo
    Basic Architecture for Modular Exponentiation over GF(2m). [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2002, pp:438-441 [Conf]
  21. Nam-Yeun Kim, Hyun-Sung Kim, Won-Ho Lee, Kee-Won Kim, Kee-Young Yoo
    New AB2 Systolic Architectures in GF(2m). [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2002, pp:394-397 [Conf]
  22. Won-Ho Lee, Kee-Won Kim, Nam-Yeun Kim, Kee-Young Yoo, Chang-Hoon Kim, Chun-Pyo Hong
    Architecture for AB2 Operation over GF(2m) using Irreducible AOP and Its Applications. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2002, pp:446-449 [Conf]
  23. Keum-Sook Ha, Eun-Kyung Ryu, Kee-Young Yoo
    A Promising Labeling Scheme for On-the-fly Data Race Detection. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2002, pp:475-478 [Conf]
  24. Kyo-Min Ku, Kyeoung Ju Ha, Hyun-Sung Kim, Kee-Young Yoo
    Design of New Multiplier/Squarer using Montgomery Algorithm over GF(2m) Based on Cellular Automata. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2002, pp:442-445 [Conf]
  25. Hyun-Chul Kim, Hyo-Cheol Kim, Kee-Young Yoo
    Exploitation of functional parallelism in hierarchical task graph using thread. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:179-182 [Conf]
  26. Hyo-Cheol Kim, Jeung-Seop Kim, Hyun-Chul Kim, Kee-Young Yoo
    Cross-correlation property for the public watermarking. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:196-199 [Conf]
  27. Sung-Woo Lee, Hyun-Sung Kim, Jung-Joon Kim, Tae-Geun Kim, Kee-Young Yoo
    Efficient Fixed-Size Systolic Arrays for the Modular Multiplication. [Citation Graph (0, 0)][DBLP]
    COCOON, 1999, pp:442-451 [Conf]
  28. Hyun-Sung Kim, Kee-Young Yoo
    Area Efficient Exponentiation Using Modular Multiplier/Squarer in GF(2m. [Citation Graph (0, 0)][DBLP]
    COCOON, 2001, pp:262-267 [Conf]
  29. Nam-Yeun Kim, Won-Ho Lee, Kee-Young Yoo
    Efficient Power-Sum Systolic Architectures for Public-Key Cryptosystems in GF(2m). [Citation Graph (0, 0)][DBLP]
    COCOON, 2002, pp:153-161 [Conf]
  30. Eun-Jun Yoon, Kee-Young Yoo
    New Efficient Simple Authenticated Key Agreement Protocol. [Citation Graph (0, 0)][DBLP]
    COCOON, 2005, pp:945-954 [Conf]
  31. Yong-Seok Kim, Jun-Cheol Jeon, Jin-woo Jeon, Kee-Young Yoo
    An Efficient Access Control Model Based on User-Classification and Role-Division. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2004, pp:300-304 [Conf]
  32. Eun-Jun Yoon, Jae-Hyung Jung, Woo-Hun Kim, Kee-Young Yoo
    A Secret Key Based Authentication Scheme Using Smart Cards. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:65-71 [Conf]
  33. Eun-Jun Yoon, Eun-Kyung Ryu, Woo-Hun Kim, Kee-Young Yoo
    Cryptanalysis of A Key Authentication Scheme Based on Discrete Logarithms. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:72-78 [Conf]
  34. Jeung-Seop Kim, Hyo-Chul Kim, Kyeoung Ju Ha, Kee-Young Yoo
    One Round Identity-Based Authenticated Conference Key Agreement Protocol. [Citation Graph (0, 0)][DBLP]
    ECUMN, 2004, pp:407-416 [Conf]
  35. Eun-Jun Yoon, Kee-Young Yoo
    Improvement of an Efficient User Identification Scheme Based on ID-Based Cryptosystem. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:586-591 [Conf]
  36. Eun-Jun Yoon, Kee-Young Yoo
    A New Simple Authenticated Key Agreement and Protected Password Change Protocol. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:955-964 [Conf]
  37. Hyun-Sung Kim, Kee-Young Yoo
    Parallel Algorithm and Architecture for Public-Key Cryptosystem. [Citation Graph (0, 0)][DBLP]
    EurAsia-ICT, 2002, pp:145-153 [Conf]
  38. Eun-Jun Yoon, Kee-Young Yoo
    An Improved Lu-Cao's Remote User Authentication Scheme Using Smart Card. [Citation Graph (0, 0)][DBLP]
    EuroPKI, 2006, pp:45-53 [Conf]
  39. Eun-Jun Yoon, Kee-Young Yoo
    Enhanced Forward-Secure User Authentication Scheme with Smart Cards. [Citation Graph (0, 0)][DBLP]
    EuroPKI, 2006, pp:197-206 [Conf]
  40. Eun-Jun Yoon, Kee-Young Yoo
    An Efficient Password Authentication Schemes Without Using the Server Public Key for Grid Computing. [Citation Graph (0, 0)][DBLP]
    GCC, 2005, pp:149-154 [Conf]
  41. Sung-Woo Lee, Kee-Young Yoo
    The Working-Set Based Adaptive Protocol for Software Distributed Shared Memory. [Citation Graph (0, 0)][DBLP]
    HiPC, 2000, pp:73-82 [Conf]
  42. Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo
    Optimized Initiation Phases for Anonymous Auction Protocols. [Citation Graph (0, 0)][DBLP]
    Human.Society@Internet, 2005, pp:19-27 [Conf]
  43. Jun-Cheol Jeon, Kee-Won Kim, Byung-Heon Kang, Kee-Young Yoo
    Cellular Automata Architecture for Elliptic Curve Cryptographic Hardware. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (3), 2006, pp:329-336 [Conf]
  44. Jun-Cheol Jeon, Kee-Won Kim, Jai-Boo Oh, Kee-Young Yoo
    Modular Divider for Elliptic Curve Cryptographic Hardware Based on Programmable CA. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (4), 2006, pp:661-668 [Conf]
  45. Kyo-Min Ku, Kyeoung Ju Ha, Kee-Young Yoo
    Fast Exponentiaion over GF(2) Based on Cellular Automata. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science, 2003, pp:841-850 [Conf]
  46. Eun-Jun Yoon, Kee-Young Yoo
    An Optimized Two Factor Authenticated Key Exchange Protocol in PWLANs. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (2), 2006, pp:1000-1007 [Conf]
  47. Jun-Cheol Jeon, Kee-Young Yoo
    Computational Algorithm and Architecture for AB2 Multiplication in Finite Fields. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2003, pp:947-956 [Conf]
  48. Kee-Won Kim, Eun-Kyung Ryu, Kee-Young Yoo
    ID-Based Authenticated Multiple-Key Agreement Protocol from Pairings. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:672-680 [Conf]
  49. Nam-Yeun Kim, Kee-Young Yoo
    Montgomery Multiplication and Squaring Algorithms in GF(2k). [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2003, pp:865-874 [Conf]
  50. Nam-Yeun Kim, Kee-Young Yoo
    Digit-Serial AB2 Systolic Array for Division in GF(2m). [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:87-96 [Conf]
  51. Kyo-Min Ku, Kyeoung Ju Ha, Kee-Young Yoo
    Time-Space Efficient Exponentiation over GF(2m). [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2003, pp:875-882 [Conf]
  52. Kyo-Min Ku, Kyeoung Ju Ha, Wi Hyun Yoo, Kee-Young Yoo
    Parallel Montgomery Multiplication and Squaring over GF(2m) Based on Cellular Automata. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:196-205 [Conf]
  53. Sung-Woon Lee, Woo-Hun Kim, Hyun-Sung Kim, Kee-Young Yoo
    Efficient Password-Based Authenticated Key Agreement Protocol. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:617-626 [Conf]
  54. Won-Ho Lee, Young-Jun Heo, Kee-Young Yoo
    Efficient Architecture for Exponentiation and Division in GF(2m) Using Irreducible AOP. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2003, pp:883-892 [Conf]
  55. Won-Ho Lee, Keon-Jik Lee, Kee-Young Yoo
    New Digit-Serial Systolic Arrays for Power-Sum and Division Operation in GF(2m). [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2004, pp:638-647 [Conf]
  56. Eun-Kyung Ryu, Kee-Won Kim, Kee-Young Yoo
    An Authenticated Key Agreement Protocol Resistant to a Dictionary Attack. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:603-610 [Conf]
  57. Kee-Young Yoo, Eun-Kyung Ryu, Jae-Yuel Im
    Multiparty Key Agreement Protocol with Cheater Identification Based on Shamir Secret Sharing. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:655-664 [Conf]
  58. Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo
    Security of Shen et al.'s Timestamp-Based Password Authentication Scheme. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:665-671 [Conf]
  59. Eun-Jun Yoon, Kee-Young Yoo
    Various Types of Attacks and Solutions Regarding Secure Remote User Access over Insecure Networks. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2006, pp:1156-1165 [Conf]
  60. Eun-Jun Yoon, Kee-Young Yoo
    An Improved Popescu's Authenticated Key Agreement Protocol. [Citation Graph (0, 0)][DBLP]
    ICCSA (5), 2006, pp:276-283 [Conf]
  61. Eun-Jun Yoon, Kee-Young Yoo
    One-Time Password Authentication Scheme Using Smart Cards Providing User Anonymity. [Citation Graph (0, 0)][DBLP]
    ICCSA (5), 2006, pp:303-311 [Conf]
  62. Jun-Cheol Jeon, Kee-Young Yoo
    Conflict Detection in Role-Based Access Control Using Multiple-Attractor Cellular Automata. [Citation Graph (0, 0)][DBLP]
    ICIC (1), 2006, pp:533-541 [Conf]
  63. Eun-Jun Yoon, Kee-Young Yoo
    Cryptanalysis of Two User Identification Schemes with Key Distribution Preserving Anonymity. [Citation Graph (0, 0)][DBLP]
    ICICS, 2005, pp:315-322 [Conf]
  64. Jun-Cheol Jeon, Kee-Won Kim, Kee-Young Yoo
    Evolutionary Hardware Architecture for Division in Elliptic Curve Cryptosystems over GF(2n). [Citation Graph (0, 0)][DBLP]
    ICNC (3), 2005, pp:348-355 [Conf]
  65. Byung-Heon Kang, Jun-Cheol Jeon, Kee-Young Yoo
    Evolutionary Algorithms for Group/Non-group Decision in Periodic Boundary CA. [Citation Graph (0, 0)][DBLP]
    ICNC (1), 2006, pp:629-632 [Conf]
  66. Eun-Jun Yoon, Kee-Young Yoo
    New Multi-server Password Authentication Scheme Using Neural Networks. [Citation Graph (0, 0)][DBLP]
    ICNC (2), 2005, pp:512-519 [Conf]
  67. Nam-Yeun Kim, Hyun-Sung Kim, Won-Ho Lee, Kee-Young Yoo
    A Power-Sum Systolic Architecture in GF(2m). [Citation Graph (0, 0)][DBLP]
    ICOIN (2), 2002, pp:409-417 [Conf]
  68. Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo
    Robust Remote User Authentication Scheme. [Citation Graph (0, 0)][DBLP]
    ICOIN, 2004, pp:935-942 [Conf]
  69. Eun-Jun Yoon, Kee-Young Yoo
    More Efficient and Secure Remote User Authentication Scheme using Smart Cards. [Citation Graph (0, 0)][DBLP]
    ICPADS (2), 2005, pp:73-77 [Conf]
  70. Hyun-Sung Kim, Keon-Jik Lee, Jung-Joon Kim, Kee-Young Yoo
    Partitioned Systolic Multiplier for GF(2m). [Citation Graph (0, 0)][DBLP]
    ICPP Workshops, 1999, pp:192-197 [Conf]
  71. Byoung-Ho Cho, Jeung-Seop Kim, Jae-Hyung Bae, In-Gu Bae, Kee-Young Yoo
    Core-Based Fingerprint Image Classification. [Citation Graph (0, 0)][DBLP]
    ICPR, 2000, pp:2859-2862 [Conf]
  72. Eun-Jun Yoon, Woo-Hun Kim, Kee-Young Yoo
    Robust and Simple Authentication Protocol for Secure Communication on the Web. [Citation Graph (0, 0)][DBLP]
    ICWE, 2005, pp:352-362 [Conf]
  73. Hyun-Sung Kim, Kee-Young Yoo
    Bit-Serial AOP Arithmetic Architectures over GF (2m). [Citation Graph (0, 0)][DBLP]
    InfraSec, 2002, pp:303-313 [Conf]
  74. Eun-Kyung Ryu, Kee-Won Kim, Kee-Young Yoo
    A Promising Key Agreement Protocol. [Citation Graph (0, 0)][DBLP]
    ISAAC, 2003, pp:655-662 [Conf]
  75. Woo-Hun Kim, Kee-Young Yoo
    Group-Oriented Channel Protection for Mobile Devices in Digital Multimedia Broadcasting. [Citation Graph (0, 0)][DBLP]
    ISCIS, 2005, pp:103-112 [Conf]
  76. Jai-Boo Oh, Jun-Cheol Jeon, Kee-Young Yoo
    Further Improvement of Manik et al.'s Remote User Authentication Scheme Using Smart Cards. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2006, pp:57-64 [Conf]
  77. Nam-Yeun Kim, Dae-Ghon Kho, Kee-Young Yoo
    Inversion/Division Systolic Architecture for Public-Key Cryptosystems in GF(2m). [Citation Graph (0, 0)][DBLP]
    ISC, 2002, pp:289-299 [Conf]
  78. Woo-Hun Kim, Kee-Young Yoo
    New Anonymous User Identification and Key Establishment Protocol in Distributed Networks. [Citation Graph (0, 0)][DBLP]
    IWDC, 2005, pp:410-415 [Conf]
  79. Eun-Jun Yoon, Kee-Young Yoo
    Robust Authenticated Encryption Scheme with Message Linkages. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:281-288 [Conf]
  80. Eun-Jun Yoon, Kee-Young Yoo
    A New Efficient Fingerprint-Based Remote User Authentication Scheme for Multimedia Systems. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:332-338 [Conf]
  81. Jun-Cheol Jeon, Kee-Won Kim, Kee-Young Yoo
    Non-group Cellular Automata Based One Time Password Authentication Scheme in Wireless Networks. [Citation Graph (0, 0)][DBLP]
    MADNES, 2005, pp:110-116 [Conf]
  82. Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo
    Secure Protected Password Change Scheme. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2005, pp:472-477 [Conf]
  83. Jun-Cheol Jeon, Byung-Heon Kang, Se-Min Kim, Wan-Soo Lee, Kee-Young Yoo
    An Improvement of Remote User Authentication Scheme Using Smart Cards. [Citation Graph (0, 0)][DBLP]
    MSN, 2006, pp:416-423 [Conf]
  84. Jun-Cheol Jeon, Kee-Won Kim, Kee-Young Yoo
    Low-Complexity Authentication Scheme Based on Cellular Automata in Wireless Network. [Citation Graph (0, 0)][DBLP]
    MSN, 2005, pp:413-421 [Conf]
  85. Kee-Won Kim, Jun-Cheol Jeon, Kee-Young Yoo
    Efficient and Secure Password Authentication Schemes for Low-Power Devices. [Citation Graph (0, 0)][DBLP]
    MSN, 2005, pp:73-82 [Conf]
  86. Eun-Kyung Ryu, Eun-Jun Yoon, Kee-Young Yoo
    An Efficient ID-Based Authenticated Key Agreement Protocol from Pairings. [Citation Graph (0, 0)][DBLP]
    NETWORKING, 2004, pp:1458-1463 [Conf]
  87. Eun-Jun Yoon, Kee-Young Yoo
    Biometrics Authenticated Key Agreement Scheme. [Citation Graph (0, 0)][DBLP]
    NGITS, 2006, pp:345-349 [Conf]
  88. Eun-Jun Yoon, Kee-Young Yoo
    Improving the Dynamic ID-Based Remote Mutual Authentication Scheme. [Citation Graph (0, 0)][DBLP]
    OTM Workshops (1), 2006, pp:499-507 [Conf]
  89. Keum-Sook Ha, Eun-Kyung Ryu, Kee-Young Yoo
    Space-Efficient First Race Detection in Shared Memory Programs with Nested Parallelism. [Citation Graph (0, 0)][DBLP]
    PARA, 2002, pp:253-263 [Conf]
  90. Kyo-Min Ku, Kyeoung Ju Ha, Hyun-Sung Kim, Kee-Young Yoo
    New Parallel Architecture for Modular Multiplication and Squaring Based on Cellular Automata. [Citation Graph (0, 0)][DBLP]
    PARA, 2002, pp:359-369 [Conf]
  91. Eun-Kyung Ryu, Keum-Sook Ha, Kee-Young Yoo
    A Practical Method for On-the-Fly Data Race Detection. [Citation Graph (0, 0)][DBLP]
    PARA, 2002, pp:264-273 [Conf]
  92. Eun-Jun Yoon, Kee-Young Yoo
    Robust Secret Key Based Authentication Scheme Using Smart Cards. [Citation Graph (0, 0)][DBLP]
    PCM (2), 2005, pp:723-734 [Conf]
  93. Hyun-Sung Kim, Kee-Young Yoo, Jung-Joon Kim, Tae-Geun Kim
    Pipelined Systolic Multiplier for Finite Fields GF (2m). [Citation Graph (0, 0)][DBLP]
    PDPTA, 1999, pp:1224-1229 [Conf]
  94. Sung-Woon Lee, Kee-Young Yoo
    Parallelizable Password-Authenticated Key Exchange Protocol. [Citation Graph (0, 0)][DBLP]
    PPAM, 2003, pp:1014-1019 [Conf]
  95. Jun-Cheol Jeon, Kee-Young Yoo
    An Evolutionary Approach to the Design of Cellular Automata Architecture for Multiplication in Elliptic Curve Cryptography over Finite Fields. [Citation Graph (0, 0)][DBLP]
    PRICAI, 2004, pp:241-250 [Conf]
  96. Jun-Cheol Jeon, Eun-Yeung Choi, Kee-Young Yoo
    Agent-Based Real Time Intrusion Detection System Against Malformed Packet Attacks. [Citation Graph (0, 0)][DBLP]
    PRIMA, 2006, pp:807-812 [Conf]
  97. Eun-Jun Yoon, Kee-Young Yoo
    Efficient Mutual Authentication Scheme with Smart Card. [Citation Graph (0, 0)][DBLP]
    PRIMA, 2006, pp:813-818 [Conf]
  98. Eun-Jun Yoon, Kee-Young Yoo
    An Improved Digital Signature with Message Recovery Using Self-certified Public Keys Without Trustworthy System Authority. [Citation Graph (0, 0)][DBLP]
    SOFSEM, 2006, pp:548-555 [Conf]
  99. Hyun-Sung Kim, Kee-Young Yoo
    Cellular Automata Based Multiplier for Public-Key Cryptosystem. [Citation Graph (0, 0)][DBLP]
    SPC, 2003, pp:227-236 [Conf]
  100. Eun-Jun Yoon, Woo-Hun Kim, Kee-Young Yoo
    Security Enhancement for Password Authentication Schemes with Smart Cards. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2005, pp:311-320 [Conf]
  101. Eun-Jun Yoon, Kee-Young Yoo
    An Optimizing Authenticated Key Exchange Protocol for Self-organizing Sensor Networks. [Citation Graph (0, 0)][DBLP]
    UCS, 2006, pp:537-546 [Conf]
  102. Eun-Jun Yoon, Kee-Young Yoo
    Secure Fingerprint-Based Remote User Authentication Scheme Using Smartcards. [Citation Graph (0, 0)][DBLP]
    WINE, 2005, pp:405-413 [Conf]
  103. Woo-Hun Kim, Eun-Jun Yoon, Kee-Young Yoo
    New Authentication Protocol Providing User Anonymity in Open Network. [Citation Graph (0, 0)][DBLP]
    WINE, 2005, pp:414-423 [Conf]
  104. Eun-Jun Yoon, Kee-Young Yoo
    A New Secure Key Exchange Protocol Between STB and Smart Card in DTV Broadcasting. [Citation Graph (0, 0)][DBLP]
    WISI, 2006, pp:165-166 [Conf]
  105. Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo
    An improvement of Hwang-Lee-Tang's simple remote user authentication scheme. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:1, pp:50-56 [Journal]
  106. Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo
    Attacks on the Shen et al.'s Timestamp-Based Password Authentication Scheme Using Smart Cards. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:319-321 [Journal]
  107. Nam-Yeun Kim, Kee-Young Yoo
    Systolic architectures for inversion/division using AB2 circuits in GF(2m). [Citation Graph (0, 0)][DBLP]
    Integration, 2003, v:35, n:1, pp:11-24 [Journal]
  108. Keon-Jik Lee, Kee-Young Yoo
    Systolic multiplier for Montgomery's algorithm. [Citation Graph (0, 0)][DBLP]
    Integration, 2002, v:32, n:1-2, pp:99-109 [Journal]
  109. Hyun-Sung Kim, Sung-Woo Lee, Kee-Young Yoo
    Partitioned systolic architecture for modular multiplication in GF(2m). [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2000, v:76, n:3, pp:135-139 [Journal]
  110. Keon-Jik Lee, Kee-Won Kim, Kee-Young Yoo
    Digit-serial-in-serial-out systolic multiplier for Montgomery algorithm. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2002, v:82, n:2, pp:65-71 [Journal]
  111. Keon-Jik Lee, Kee-Young Yoo
    Linear systolic multiplier/squarer for fast exponentiation. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2000, v:76, n:3, pp:105-111 [Journal]
  112. Keon-Jik Lee, Kee-Won Kim, Won-Ho Lee, Young-Jun Heo, Kee-Young Yoo
    Design of a Linear Systolic Modular Multiplier/Squarer for the Fast Modular Exponentiation. [Citation Graph (0, 0)][DBLP]
    I. J. Comput. Appl., 2003, v:10, n:1, pp:34-42 [Journal]
  113. Jun-Cheol Jeon, Hyun-Sung Kim, Hyoung-Mok Lee, Kee-Young Yoo
    Bit-serial AB2 Multiplier Using Modified Inner Product. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 2002, v:18, n:4, pp:507-518 [Journal]
  114. Hyun-Sung Kim, Sung-Woon Lee, Kee-Young Yoo
    ID-based password authentication scheme using smart cards and fingerprints. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 2003, v:37, n:4, pp:32-41 [Journal]
  115. Jung-Seuk Lee, Jun-Cheol Jeon, Kee-Young Yoo
    A security scheme for protecting security policies in firewall. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 2004, v:38, n:2, pp:69-72 [Journal]
  116. Sung-Woon Lee, Woo-Hun Kim, Hyun-Sung Kim, Kee-Young Yoo
    Parallizable simple authenticated key agreement protocol . [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 2003, v:37, n:2, pp:13-18 [Journal]
  117. Sung-Woon Lee, Woo-Hun Kim, Hyun-Sung Kim, Kee-Young Yoo
    Parallizable simple authenticated key agreement protocol. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 2003, v:37, n:3, pp:17-22 [Journal]
  118. Sung-Woon Lee, Hyun-Sung Kim, Kee-Young Yoo
    Cryptanalysis of a user authentication scheme using hash functions. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 2004, v:38, n:1, pp:24-28 [Journal]
  119. Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo
    A secure user authentication scheme using hash functions. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 2004, v:38, n:2, pp:62-68 [Journal]
  120. Eun-Kyung Ryu, Kee-Young Yoo
    On the security of efficient user identification scheme. [Citation Graph (0, 0)][DBLP]
    Applied Mathematics and Computation, 2005, v:171, n:2, pp:1201-1205 [Journal]
  121. Keon-Jik Lee, Kee-Won Kim, Kee-Young Yoo
    Digit Serial-In-Serial-Out Systolic Multiplier for Montogomery's Algorithm. [Citation Graph (0, 0)][DBLP]
    ISCA PDCS, 2001, pp:500-504 [Conf]
  122. Won-Ho Lee, Hyun-Sung Kim, Kee-Young Yoo
    Area Efficient Architecture for Multiplication and Squaring in GF(2^m) using Irreducible AOP. [Citation Graph (0, 0)][DBLP]
    ISCA PDCS, 2001, pp:496-499 [Conf]
  123. Eun-Jun Yoon, Kee-Young Yoo
    A Secure Chaotic Hash-Based Biometric Remote User Authentication Scheme Using Mobile Devices. [Citation Graph (0, 0)][DBLP]
    APWeb/WAIM Workshops, 2007, pp:612-623 [Conf]
  124. Eun-Jun Yoon, Kee-Young Yoo
    A Secret-Key Exponential Key Agreement Protocol with Smart Cards. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:430-440 [Conf]
  125. Eun-Jun Yoon, Wan-Soo Lee, Kee-Young Yoo
    Improving the Single-Assumption Authenticated Diffie-Hellman Key Agreement Protocols. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2007, pp:926-936 [Conf]
  126. Jai-Boo Oh, Eun-Jun Yoon, Kee-Young Yoo
    An Efficient ID-Based Authenticated Key Agreement Protocol with Pairings. [Citation Graph (0, 0)][DBLP]
    ISPA, 2007, pp:446-456 [Conf]
  127. Ki-Hyun Jung, Jae-Gil Yu, Se-Min Kim, Ki-Jong Kim, Jin-Yong Byun, Kee-Young Yoo
    The Hiding of Secret Data Using the Run Length Matching Method. [Citation Graph (0, 0)][DBLP]
    KES-AMSTA, 2007, pp:1027-1034 [Conf]
  128. Zhen-Ai Jin, Hyun-Ju Cho, Kee-Young Yoo
    An Efficient Authentication Protocol for Low-Cost RFID Systems. [Citation Graph (0, 0)][DBLP]
    KES-AMSTA, 2007, pp:999-1006 [Conf]
  129. Eun-Jun Yoon, Wan-Soo Lee, Kee-Young Yoo
    Secure Remote User Authentication Scheme Using Bilinear Pairings. [Citation Graph (0, 0)][DBLP]
    WISTP, 2007, pp:102-114 [Conf]
  130. Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo
    Attacks and Solutions of Yang et al.'s Protected Password Changing Scheme. [Citation Graph (0, 0)][DBLP]
    Informatica, Lith. Acad. Sci., 2005, v:16, n:2, pp:285-294 [Journal]

  131. Efficient Authentication and Authorization Infrastructure for Mobile Users. [Citation Graph (, )][DBLP]


  132. Enhanced Three-Round Smart Card-Based Key Exchange Protocol. [Citation Graph (, )][DBLP]


  133. Using the Resizable Working-set Notion for Software Distributed Shared Memory. [Citation Graph (, )][DBLP]


  134. A New Steganography Scheme using a Frame. [Citation Graph (, )][DBLP]


  135. Non-linear and Non-group Cellular Automata for Cryptographic Applications. [Citation Graph (, )][DBLP]


  136. Visual Multi-Secret Sharing Scheme with Cheater Identification. [Citation Graph (, )][DBLP]


  137. Token-Based Authenticated Key Establishment Protocols for Three-Party Communication. [Citation Graph (, )][DBLP]


  138. Robust Broadcasting Cryptosystem in Computer Networks. [Citation Graph (, )][DBLP]


  139. Improving the Generalized Password-Based Authenticated Key Agreement Protocol. [Citation Graph (, )][DBLP]


  140. Replay Attacks on Han et al.'s Chaotic Map Based Key Agreement Protocol Using Nonce. [Citation Graph (, )][DBLP]


  141. A Virtual Three-Dimension Cellular Automata Pseudorandom Number Generator Based on the Moore Neighborhood Method. [Citation Graph (, )][DBLP]


  142. Improving the Sun-Cao's Public Key Authentication Scheme for Non-repudiation. [Citation Graph (, )][DBLP]


  143. Secure PAP-Based RADIUS Protocol in Wireless Networks. [Citation Graph (, )][DBLP]


  144. A Reversible Data Hiding Scheme Using Even-Odd Embedding Method. [Citation Graph (, )][DBLP]


  145. A New Image Steganography Based on 2k Correction and Edge-Detection. [Citation Graph (, )][DBLP]


  146. Cryptanalysis of Wang et al.'s Remote User Authentication Scheme Using Smart Cards. [Citation Graph (, )][DBLP]


  147. Palette and Index Change Technique for Steganoraphy Based on an Indexcolor. [Citation Graph (, )][DBLP]


  148. A New Steganography Scheme Based on an Index-Color Image. [Citation Graph (, )][DBLP]


  149. A Reinforced Authentication Protocol for Anti-Counterfeiting and Privacy Protection. [Citation Graph (, )][DBLP]


  150. An Efficient PRNG Based on the Hybrid between One- and Two-Dimensional Cellular Automata. [Citation Graph (, )][DBLP]


  151. Robust Multi-Server Authentication Scheme. [Citation Graph (, )][DBLP]


  152. An Efficient Authentication and Key Agreement Protocol in RFID System. [Citation Graph (, )][DBLP]


  153. Two Security Problems of RFID Security Method with Ownership Transfer. [Citation Graph (, )][DBLP]


  154. An Improvement of Password-Only Authenticated Key Establishment Protocol without Public Key Cryptography. [Citation Graph (, )][DBLP]


  155. Wireless Sensor Network Protocols for Secure and Energy-Efficient Data Transmission. [Citation Graph (, )][DBLP]


  156. Wireless Sensor Network Protocols for Secure and Energy-Efficient Data Transmission. [Citation Graph (, )][DBLP]


  157. A New Key Agreement Protocol Based on Chaotic Maps. [Citation Graph (, )][DBLP]


  158. Vulnerability of User Identification and Key Agreement Protocol with User Anonymity. [Citation Graph (, )][DBLP]


  159. Two Security Problems of Efficient Remote Mutual Authentication and Key Agreement. [Citation Graph (, )][DBLP]


  160. Spacing Based Authentication Protocol for Low-Cost RFID. [Citation Graph (, )][DBLP]


  161. Analysis of 2-State, 3-Neighborhood Cellular Automata Rules for Cryptographic Pseudorandom Number Generation. [Citation Graph (, )][DBLP]


  162. Robust ID-Based Remote Mutual Authentication with Key Agreement Scheme for Mobile Devices on ECC. [Citation Graph (, )][DBLP]


  163. A New Authentication Scheme for Session Initiation Protocol. [Citation Graph (, )][DBLP]


  164. Improved Data Hiding Method by Block Parity for Binary Images. [Citation Graph (, )][DBLP]


  165. A High Capacity Data Hiding Method Using PVD and LSB. [Citation Graph (, )][DBLP]


  166. An Improved Secure Authenticated Group Key Agreement Protocol for WMNs. [Citation Graph (, )][DBLP]


  167. Design of Montgomery Multiplication Architecture Based on Programmable Cellular Automata. [Citation Graph (, )][DBLP]


  168. A secure and efficient SIP authentication scheme for converged VoIP networks. [Citation Graph (, )][DBLP]


Search in 0.011secs, Finished in 0.017secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002