Search the dblp DataBase
Kee-Young Yoo :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Hun-Joong Bae , Hyun-Sung Kim , Kee-Young Yoo ID-based Key Exchange Protocol using Smart Cards with Fingerprint. [Citation Graph (0, 0)][DBLP ] ISCA PDCS, 2003, pp:448-452 [Conf ] Jun-Cheol Jeon , Kee-Young Yoo Design of Bit-parallel Multiplier Based on Programmable Cellular Automata. [Citation Graph (0, 0)][DBLP ] ISCA PDCS, 2003, pp:94-98 [Conf ] Jun-Cheol Jeon , Kee-Young Yoo Cellular Automata Based Role-Delegation in RBAC. [Citation Graph (0, 0)][DBLP ] ACRI, 2006, pp:588-594 [Conf ] Jun-Cheol Jeon , Kee-Young Yoo Authentication Based on Singular Cellular Automata. [Citation Graph (0, 0)][DBLP ] ACRI, 2006, pp:605-610 [Conf ] Byung-Heon Kang , Jun-Cheol Jeon , Kee-Young Yoo Decision Algorithms for Cellular Automata States Based on Periodic Boundary Condition. [Citation Graph (0, 0)][DBLP ] ACRI, 2006, pp:104-111 [Conf ] Eun-Jun Yoon , Kee-Young Yoo Improving the ID-Based Key Exchange Protocol in Wireless Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] ADHOC-NOW, 2006, pp:349-354 [Conf ] Eun-Jun Yoon , Kee-Young Yoo A Secure Password-Authenticated Key Exchange Between Clients with Different Passwords. [Citation Graph (0, 0)][DBLP ] APWeb Workshops, 2006, pp:659-663 [Conf ] Kee-Won Kim , Eun-Kyung Ryu , Hyung-Mok Lee , Kee-Young Yoo A New Authenticated Key Agreement Protocol. [Citation Graph (0, 0)][DBLP ] CAINE, 2003, pp:91-94 [Conf ] Hye-Jin Yang , Jun-Cheol Jeon , Kee-Won Kim , Kee-Young Yoo New Authentication Scheme with No Verification Table. [Citation Graph (0, 0)][DBLP ] CAINE, 2005, pp:387-389 [Conf ] Hee-Jung Yoon , Jun-Cheol Jeon , Kee-Won Kim , Kee-Young Yoo A Secure One-Time Password Authentication Using Cellular Automata. [Citation Graph (0, 0)][DBLP ] CAINE, 2005, pp:376-381 [Conf ] Hyo-Cheol Kim , Hyun-Chul Kim , Kee-Young Yoo A Study on the Precise Extraction of Watermark. [Citation Graph (0, 0)][DBLP ] CAINE, 2001, pp:37-40 [Conf ] Kee-Won Kim , Keon-Jik Lee , Kee-Young Yoo Efficient Digital-Serial Systolic Multiplier for Finite Fields GF(2m). [Citation Graph (0, 0)][DBLP ] CAINE, 2001, pp:205-208 [Conf ] Keon-Jik Lee , Kee-Won Kim , Kee-Young Yoo Bit-Serial Systolic Multiplier/Squarer for Montgomery's Algorithm. [Citation Graph (0, 0)][DBLP ] CAINE, 2001, pp:70-73 [Conf ] Jong-Kook Lee , Shi-Ryong Ryu , Hyun-Chul Kim , Kee-Young Yoo A Smart Card-based Authentication System for Undeniable Digital Signature. [Citation Graph (0, 0)][DBLP ] CAINE, 2001, pp:62-65 [Conf ] Eun-Jun Yoon , Kee-Young Yoo New Authentication Scheme Based on a One-Way Hash Function and Diffie-Hellman Key Exchange. [Citation Graph (0, 0)][DBLP ] CANS, 2005, pp:147-160 [Conf ] Woo-Hun Kim , Hyun-Sung Kim , Sung-Woon Lee , Kee-Young Yoo Secure Authenticated Key Exchange Protocol. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2003, pp:5-8 [Conf ] Nam-Yeun Kim , Kee-Young Yoo Look-Up Table-based Montgomery Algorithm in GF(2k ) for Public-Key Cryptosystem. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2003, pp:9-12 [Conf ] Kyo-Min Ku , Kyeoung Ju Ha , Hyun-Sung Kim , Kee-Young Yoo New AB2 Multiplier over GF(2m ) using Cellular Automata. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2003, pp:283-286 [Conf ] Hyoung-Mok Lee , Eun-Kyung Ryu , Kee-Won Kim , Jae-Min Lee , Kee-Young Yoo A Robust Authenticated Key Agreement Protocol. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2003, pp:76-79 [Conf ] Hyun-Sung Kim , Kee-Young Yoo Basic Architecture for Modular Exponentiation over GF(2m ). [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2002, pp:438-441 [Conf ] Nam-Yeun Kim , Hyun-Sung Kim , Won-Ho Lee , Kee-Won Kim , Kee-Young Yoo New AB2 Systolic Architectures in GF(2m ). [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2002, pp:394-397 [Conf ] Won-Ho Lee , Kee-Won Kim , Nam-Yeun Kim , Kee-Young Yoo , Chang-Hoon Kim , Chun-Pyo Hong Architecture for AB2 Operation over GF(2m ) using Irreducible AOP and Its Applications. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2002, pp:446-449 [Conf ] Keum-Sook Ha , Eun-Kyung Ryu , Kee-Young Yoo A Promising Labeling Scheme for On-the-fly Data Race Detection. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2002, pp:475-478 [Conf ] Kyo-Min Ku , Kyeoung Ju Ha , Hyun-Sung Kim , Kee-Young Yoo Design of New Multiplier/Squarer using Montgomery Algorithm over GF(2m ) Based on Cellular Automata. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2002, pp:442-445 [Conf ] Hyun-Chul Kim , Hyo-Cheol Kim , Kee-Young Yoo Exploitation of functional parallelism in hierarchical task graph using thread. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:179-182 [Conf ] Hyo-Cheol Kim , Jeung-Seop Kim , Hyun-Chul Kim , Kee-Young Yoo Cross-correlation property for the public watermarking. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:196-199 [Conf ] Sung-Woo Lee , Hyun-Sung Kim , Jung-Joon Kim , Tae-Geun Kim , Kee-Young Yoo Efficient Fixed-Size Systolic Arrays for the Modular Multiplication. [Citation Graph (0, 0)][DBLP ] COCOON, 1999, pp:442-451 [Conf ] Hyun-Sung Kim , Kee-Young Yoo Area Efficient Exponentiation Using Modular Multiplier/Squarer in GF(2m . [Citation Graph (0, 0)][DBLP ] COCOON, 2001, pp:262-267 [Conf ] Nam-Yeun Kim , Won-Ho Lee , Kee-Young Yoo Efficient Power-Sum Systolic Architectures for Public-Key Cryptosystems in GF(2m ). [Citation Graph (0, 0)][DBLP ] COCOON, 2002, pp:153-161 [Conf ] Eun-Jun Yoon , Kee-Young Yoo New Efficient Simple Authenticated Key Agreement Protocol. [Citation Graph (0, 0)][DBLP ] COCOON, 2005, pp:945-954 [Conf ] Yong-Seok Kim , Jun-Cheol Jeon , Jin-woo Jeon , Kee-Young Yoo An Efficient Access Control Model Based on User-Classification and Role-Division. [Citation Graph (0, 0)][DBLP ] Security and Management, 2004, pp:300-304 [Conf ] Eun-Jun Yoon , Jae-Hyung Jung , Woo-Hun Kim , Kee-Young Yoo A Secret Key Based Authentication Scheme Using Smart Cards. [Citation Graph (0, 0)][DBLP ] Security and Management, 2005, pp:65-71 [Conf ] Eun-Jun Yoon , Eun-Kyung Ryu , Woo-Hun Kim , Kee-Young Yoo Cryptanalysis of A Key Authentication Scheme Based on Discrete Logarithms. [Citation Graph (0, 0)][DBLP ] Security and Management, 2005, pp:72-78 [Conf ] Jeung-Seop Kim , Hyo-Chul Kim , Kyeoung Ju Ha , Kee-Young Yoo One Round Identity-Based Authenticated Conference Key Agreement Protocol. [Citation Graph (0, 0)][DBLP ] ECUMN, 2004, pp:407-416 [Conf ] Eun-Jun Yoon , Kee-Young Yoo Improvement of an Efficient User Identification Scheme Based on ID-Based Cryptosystem. [Citation Graph (0, 0)][DBLP ] EUC Workshops, 2005, pp:586-591 [Conf ] Eun-Jun Yoon , Kee-Young Yoo A New Simple Authenticated Key Agreement and Protected Password Change Protocol. [Citation Graph (0, 0)][DBLP ] EUC Workshops, 2005, pp:955-964 [Conf ] Hyun-Sung Kim , Kee-Young Yoo Parallel Algorithm and Architecture for Public-Key Cryptosystem. [Citation Graph (0, 0)][DBLP ] EurAsia-ICT, 2002, pp:145-153 [Conf ] Eun-Jun Yoon , Kee-Young Yoo An Improved Lu-Cao's Remote User Authentication Scheme Using Smart Card. [Citation Graph (0, 0)][DBLP ] EuroPKI, 2006, pp:45-53 [Conf ] Eun-Jun Yoon , Kee-Young Yoo Enhanced Forward-Secure User Authentication Scheme with Smart Cards. [Citation Graph (0, 0)][DBLP ] EuroPKI, 2006, pp:197-206 [Conf ] Eun-Jun Yoon , Kee-Young Yoo An Efficient Password Authentication Schemes Without Using the Server Public Key for Grid Computing. [Citation Graph (0, 0)][DBLP ] GCC, 2005, pp:149-154 [Conf ] Sung-Woo Lee , Kee-Young Yoo The Working-Set Based Adaptive Protocol for Software Distributed Shared Memory. [Citation Graph (0, 0)][DBLP ] HiPC, 2000, pp:73-82 [Conf ] Eun-Jun Yoon , Eun-Kyung Ryu , Kee-Young Yoo Optimized Initiation Phases for Anonymous Auction Protocols. [Citation Graph (0, 0)][DBLP ] Human.Society@Internet, 2005, pp:19-27 [Conf ] Jun-Cheol Jeon , Kee-Won Kim , Byung-Heon Kang , Kee-Young Yoo Cellular Automata Architecture for Elliptic Curve Cryptographic Hardware. [Citation Graph (0, 0)][DBLP ] International Conference on Computational Science (3), 2006, pp:329-336 [Conf ] Jun-Cheol Jeon , Kee-Won Kim , Jai-Boo Oh , Kee-Young Yoo Modular Divider for Elliptic Curve Cryptographic Hardware Based on Programmable CA. [Citation Graph (0, 0)][DBLP ] International Conference on Computational Science (4), 2006, pp:661-668 [Conf ] Kyo-Min Ku , Kyeoung Ju Ha , Kee-Young Yoo Fast Exponentiaion over GF(2) Based on Cellular Automata. [Citation Graph (0, 0)][DBLP ] International Conference on Computational Science, 2003, pp:841-850 [Conf ] Eun-Jun Yoon , Kee-Young Yoo An Optimized Two Factor Authenticated Key Exchange Protocol in PWLANs. [Citation Graph (0, 0)][DBLP ] International Conference on Computational Science (2), 2006, pp:1000-1007 [Conf ] Jun-Cheol Jeon , Kee-Young Yoo Computational Algorithm and Architecture for AB2 Multiplication in Finite Fields. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2003, pp:947-956 [Conf ] Kee-Won Kim , Eun-Kyung Ryu , Kee-Young Yoo ID-Based Authenticated Multiple-Key Agreement Protocol from Pairings. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2004, pp:672-680 [Conf ] Nam-Yeun Kim , Kee-Young Yoo Montgomery Multiplication and Squaring Algorithms in GF(2k ). [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2003, pp:865-874 [Conf ] Nam-Yeun Kim , Kee-Young Yoo Digit-Serial AB2 Systolic Array for Division in GF(2m ). [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2004, pp:87-96 [Conf ] Kyo-Min Ku , Kyeoung Ju Ha , Kee-Young Yoo Time-Space Efficient Exponentiation over GF(2m ). [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2003, pp:875-882 [Conf ] Kyo-Min Ku , Kyeoung Ju Ha , Wi Hyun Yoo , Kee-Young Yoo Parallel Montgomery Multiplication and Squaring over GF(2m ) Based on Cellular Automata. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2004, pp:196-205 [Conf ] Sung-Woon Lee , Woo-Hun Kim , Hyun-Sung Kim , Kee-Young Yoo Efficient Password-Based Authenticated Key Agreement Protocol. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2004, pp:617-626 [Conf ] Won-Ho Lee , Young-Jun Heo , Kee-Young Yoo Efficient Architecture for Exponentiation and Division in GF(2m ) Using Irreducible AOP. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2003, pp:883-892 [Conf ] Won-Ho Lee , Keon-Jik Lee , Kee-Young Yoo New Digit-Serial Systolic Arrays for Power-Sum and Division Operation in GF(2m ). [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2004, pp:638-647 [Conf ] Eun-Kyung Ryu , Kee-Won Kim , Kee-Young Yoo An Authenticated Key Agreement Protocol Resistant to a Dictionary Attack. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2004, pp:603-610 [Conf ] Kee-Young Yoo , Eun-Kyung Ryu , Jae-Yuel Im Multiparty Key Agreement Protocol with Cheater Identification Based on Shamir Secret Sharing. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2004, pp:655-664 [Conf ] Eun-Jun Yoon , Eun-Kyung Ryu , Kee-Young Yoo Security of Shen et al.'s Timestamp-Based Password Authentication Scheme. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2004, pp:665-671 [Conf ] Eun-Jun Yoon , Kee-Young Yoo Various Types of Attacks and Solutions Regarding Secure Remote User Access over Insecure Networks. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2006, pp:1156-1165 [Conf ] Eun-Jun Yoon , Kee-Young Yoo An Improved Popescu's Authenticated Key Agreement Protocol. [Citation Graph (0, 0)][DBLP ] ICCSA (5), 2006, pp:276-283 [Conf ] Eun-Jun Yoon , Kee-Young Yoo One-Time Password Authentication Scheme Using Smart Cards Providing User Anonymity. [Citation Graph (0, 0)][DBLP ] ICCSA (5), 2006, pp:303-311 [Conf ] Jun-Cheol Jeon , Kee-Young Yoo Conflict Detection in Role-Based Access Control Using Multiple-Attractor Cellular Automata. [Citation Graph (0, 0)][DBLP ] ICIC (1), 2006, pp:533-541 [Conf ] Eun-Jun Yoon , Kee-Young Yoo Cryptanalysis of Two User Identification Schemes with Key Distribution Preserving Anonymity. [Citation Graph (0, 0)][DBLP ] ICICS, 2005, pp:315-322 [Conf ] Jun-Cheol Jeon , Kee-Won Kim , Kee-Young Yoo Evolutionary Hardware Architecture for Division in Elliptic Curve Cryptosystems over GF(2n ). [Citation Graph (0, 0)][DBLP ] ICNC (3), 2005, pp:348-355 [Conf ] Byung-Heon Kang , Jun-Cheol Jeon , Kee-Young Yoo Evolutionary Algorithms for Group/Non-group Decision in Periodic Boundary CA. [Citation Graph (0, 0)][DBLP ] ICNC (1), 2006, pp:629-632 [Conf ] Eun-Jun Yoon , Kee-Young Yoo New Multi-server Password Authentication Scheme Using Neural Networks. [Citation Graph (0, 0)][DBLP ] ICNC (2), 2005, pp:512-519 [Conf ] Nam-Yeun Kim , Hyun-Sung Kim , Won-Ho Lee , Kee-Young Yoo A Power-Sum Systolic Architecture in GF(2m ). [Citation Graph (0, 0)][DBLP ] ICOIN (2), 2002, pp:409-417 [Conf ] Eun-Jun Yoon , Eun-Kyung Ryu , Kee-Young Yoo Robust Remote User Authentication Scheme. [Citation Graph (0, 0)][DBLP ] ICOIN, 2004, pp:935-942 [Conf ] Eun-Jun Yoon , Kee-Young Yoo More Efficient and Secure Remote User Authentication Scheme using Smart Cards. [Citation Graph (0, 0)][DBLP ] ICPADS (2), 2005, pp:73-77 [Conf ] Hyun-Sung Kim , Keon-Jik Lee , Jung-Joon Kim , Kee-Young Yoo Partitioned Systolic Multiplier for GF(2m ). [Citation Graph (0, 0)][DBLP ] ICPP Workshops, 1999, pp:192-197 [Conf ] Byoung-Ho Cho , Jeung-Seop Kim , Jae-Hyung Bae , In-Gu Bae , Kee-Young Yoo Core-Based Fingerprint Image Classification. [Citation Graph (0, 0)][DBLP ] ICPR, 2000, pp:2859-2862 [Conf ] Eun-Jun Yoon , Woo-Hun Kim , Kee-Young Yoo Robust and Simple Authentication Protocol for Secure Communication on the Web. [Citation Graph (0, 0)][DBLP ] ICWE, 2005, pp:352-362 [Conf ] Hyun-Sung Kim , Kee-Young Yoo Bit-Serial AOP Arithmetic Architectures over GF (2m ). [Citation Graph (0, 0)][DBLP ] InfraSec, 2002, pp:303-313 [Conf ] Eun-Kyung Ryu , Kee-Won Kim , Kee-Young Yoo A Promising Key Agreement Protocol. [Citation Graph (0, 0)][DBLP ] ISAAC, 2003, pp:655-662 [Conf ] Woo-Hun Kim , Kee-Young Yoo Group-Oriented Channel Protection for Mobile Devices in Digital Multimedia Broadcasting. [Citation Graph (0, 0)][DBLP ] ISCIS, 2005, pp:103-112 [Conf ] Jai-Boo Oh , Jun-Cheol Jeon , Kee-Young Yoo Further Improvement of Manik et al.'s Remote User Authentication Scheme Using Smart Cards. [Citation Graph (0, 0)][DBLP ] ISPA Workshops, 2006, pp:57-64 [Conf ] Nam-Yeun Kim , Dae-Ghon Kho , Kee-Young Yoo Inversion/Division Systolic Architecture for Public-Key Cryptosystems in GF(2m ). [Citation Graph (0, 0)][DBLP ] ISC, 2002, pp:289-299 [Conf ] Woo-Hun Kim , Kee-Young Yoo New Anonymous User Identification and Key Establishment Protocol in Distributed Networks. [Citation Graph (0, 0)][DBLP ] IWDC, 2005, pp:410-415 [Conf ] Eun-Jun Yoon , Kee-Young Yoo Robust Authenticated Encryption Scheme with Message Linkages. [Citation Graph (0, 0)][DBLP ] KES (4), 2005, pp:281-288 [Conf ] Eun-Jun Yoon , Kee-Young Yoo A New Efficient Fingerprint-Based Remote User Authentication Scheme for Multimedia Systems. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:332-338 [Conf ] Jun-Cheol Jeon , Kee-Won Kim , Kee-Young Yoo Non-group Cellular Automata Based One Time Password Authentication Scheme in Wireless Networks. [Citation Graph (0, 0)][DBLP ] MADNES, 2005, pp:110-116 [Conf ] Eun-Jun Yoon , Eun-Kyung Ryu , Kee-Young Yoo Secure Protected Password Change Scheme. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2005, pp:472-477 [Conf ] Jun-Cheol Jeon , Byung-Heon Kang , Se-Min Kim , Wan-Soo Lee , Kee-Young Yoo An Improvement of Remote User Authentication Scheme Using Smart Cards. [Citation Graph (0, 0)][DBLP ] MSN, 2006, pp:416-423 [Conf ] Jun-Cheol Jeon , Kee-Won Kim , Kee-Young Yoo Low-Complexity Authentication Scheme Based on Cellular Automata in Wireless Network. [Citation Graph (0, 0)][DBLP ] MSN, 2005, pp:413-421 [Conf ] Kee-Won Kim , Jun-Cheol Jeon , Kee-Young Yoo Efficient and Secure Password Authentication Schemes for Low-Power Devices. [Citation Graph (0, 0)][DBLP ] MSN, 2005, pp:73-82 [Conf ] Eun-Kyung Ryu , Eun-Jun Yoon , Kee-Young Yoo An Efficient ID-Based Authenticated Key Agreement Protocol from Pairings. [Citation Graph (0, 0)][DBLP ] NETWORKING, 2004, pp:1458-1463 [Conf ] Eun-Jun Yoon , Kee-Young Yoo Biometrics Authenticated Key Agreement Scheme. [Citation Graph (0, 0)][DBLP ] NGITS, 2006, pp:345-349 [Conf ] Eun-Jun Yoon , Kee-Young Yoo Improving the Dynamic ID-Based Remote Mutual Authentication Scheme. [Citation Graph (0, 0)][DBLP ] OTM Workshops (1), 2006, pp:499-507 [Conf ] Keum-Sook Ha , Eun-Kyung Ryu , Kee-Young Yoo Space-Efficient First Race Detection in Shared Memory Programs with Nested Parallelism. [Citation Graph (0, 0)][DBLP ] PARA, 2002, pp:253-263 [Conf ] Kyo-Min Ku , Kyeoung Ju Ha , Hyun-Sung Kim , Kee-Young Yoo New Parallel Architecture for Modular Multiplication and Squaring Based on Cellular Automata. [Citation Graph (0, 0)][DBLP ] PARA, 2002, pp:359-369 [Conf ] Eun-Kyung Ryu , Keum-Sook Ha , Kee-Young Yoo A Practical Method for On-the-Fly Data Race Detection. [Citation Graph (0, 0)][DBLP ] PARA, 2002, pp:264-273 [Conf ] Eun-Jun Yoon , Kee-Young Yoo Robust Secret Key Based Authentication Scheme Using Smart Cards. [Citation Graph (0, 0)][DBLP ] PCM (2), 2005, pp:723-734 [Conf ] Hyun-Sung Kim , Kee-Young Yoo , Jung-Joon Kim , Tae-Geun Kim Pipelined Systolic Multiplier for Finite Fields GF (2m ). [Citation Graph (0, 0)][DBLP ] PDPTA, 1999, pp:1224-1229 [Conf ] Sung-Woon Lee , Kee-Young Yoo Parallelizable Password-Authenticated Key Exchange Protocol. [Citation Graph (0, 0)][DBLP ] PPAM, 2003, pp:1014-1019 [Conf ] Jun-Cheol Jeon , Kee-Young Yoo An Evolutionary Approach to the Design of Cellular Automata Architecture for Multiplication in Elliptic Curve Cryptography over Finite Fields. [Citation Graph (0, 0)][DBLP ] PRICAI, 2004, pp:241-250 [Conf ] Jun-Cheol Jeon , Eun-Yeung Choi , Kee-Young Yoo Agent-Based Real Time Intrusion Detection System Against Malformed Packet Attacks. [Citation Graph (0, 0)][DBLP ] PRIMA, 2006, pp:807-812 [Conf ] Eun-Jun Yoon , Kee-Young Yoo Efficient Mutual Authentication Scheme with Smart Card. [Citation Graph (0, 0)][DBLP ] PRIMA, 2006, pp:813-818 [Conf ] Eun-Jun Yoon , Kee-Young Yoo An Improved Digital Signature with Message Recovery Using Self-certified Public Keys Without Trustworthy System Authority. [Citation Graph (0, 0)][DBLP ] SOFSEM, 2006, pp:548-555 [Conf ] Hyun-Sung Kim , Kee-Young Yoo Cellular Automata Based Multiplier for Public-Key Cryptosystem. [Citation Graph (0, 0)][DBLP ] SPC, 2003, pp:227-236 [Conf ] Eun-Jun Yoon , Woo-Hun Kim , Kee-Young Yoo Security Enhancement for Password Authentication Schemes with Smart Cards. [Citation Graph (0, 0)][DBLP ] TrustBus, 2005, pp:311-320 [Conf ] Eun-Jun Yoon , Kee-Young Yoo An Optimizing Authenticated Key Exchange Protocol for Self-organizing Sensor Networks. [Citation Graph (0, 0)][DBLP ] UCS, 2006, pp:537-546 [Conf ] Eun-Jun Yoon , Kee-Young Yoo Secure Fingerprint-Based Remote User Authentication Scheme Using Smartcards. [Citation Graph (0, 0)][DBLP ] WINE, 2005, pp:405-413 [Conf ] Woo-Hun Kim , Eun-Jun Yoon , Kee-Young Yoo New Authentication Protocol Providing User Anonymity in Open Network. [Citation Graph (0, 0)][DBLP ] WINE, 2005, pp:414-423 [Conf ] Eun-Jun Yoon , Kee-Young Yoo A New Secure Key Exchange Protocol Between STB and Smart Card in DTV Broadcasting. [Citation Graph (0, 0)][DBLP ] WISI, 2006, pp:165-166 [Conf ] Eun-Jun Yoon , Eun-Kyung Ryu , Kee-Young Yoo An improvement of Hwang-Lee-Tang's simple remote user authentication scheme. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2005, v:24, n:1, pp:50-56 [Journal ] Eun-Jun Yoon , Eun-Kyung Ryu , Kee-Young Yoo Attacks on the Shen et al.'s Timestamp-Based Password Authentication Scheme Using Smart Cards. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:319-321 [Journal ] Nam-Yeun Kim , Kee-Young Yoo Systolic architectures for inversion/division using AB2 circuits in GF(2m). [Citation Graph (0, 0)][DBLP ] Integration, 2003, v:35, n:1, pp:11-24 [Journal ] Keon-Jik Lee , Kee-Young Yoo Systolic multiplier for Montgomery's algorithm. [Citation Graph (0, 0)][DBLP ] Integration, 2002, v:32, n:1-2, pp:99-109 [Journal ] Hyun-Sung Kim , Sung-Woo Lee , Kee-Young Yoo Partitioned systolic architecture for modular multiplication in GF(2m ). [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 2000, v:76, n:3, pp:135-139 [Journal ] Keon-Jik Lee , Kee-Won Kim , Kee-Young Yoo Digit-serial-in-serial-out systolic multiplier for Montgomery algorithm. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 2002, v:82, n:2, pp:65-71 [Journal ] Keon-Jik Lee , Kee-Young Yoo Linear systolic multiplier/squarer for fast exponentiation. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 2000, v:76, n:3, pp:105-111 [Journal ] Keon-Jik Lee , Kee-Won Kim , Won-Ho Lee , Young-Jun Heo , Kee-Young Yoo Design of a Linear Systolic Modular Multiplier/Squarer for the Fast Modular Exponentiation. [Citation Graph (0, 0)][DBLP ] I. J. Comput. Appl., 2003, v:10, n:1, pp:34-42 [Journal ] Jun-Cheol Jeon , Hyun-Sung Kim , Hyoung-Mok Lee , Kee-Young Yoo Bit-serial AB2 Multiplier Using Modified Inner Product. [Citation Graph (0, 0)][DBLP ] J. Inf. Sci. Eng., 2002, v:18, n:4, pp:507-518 [Journal ] Hyun-Sung Kim , Sung-Woon Lee , Kee-Young Yoo ID-based password authentication scheme using smart cards and fingerprints. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 2003, v:37, n:4, pp:32-41 [Journal ] Jung-Seuk Lee , Jun-Cheol Jeon , Kee-Young Yoo A security scheme for protecting security policies in firewall. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 2004, v:38, n:2, pp:69-72 [Journal ] Sung-Woon Lee , Woo-Hun Kim , Hyun-Sung Kim , Kee-Young Yoo Parallizable simple authenticated key agreement protocol . [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 2003, v:37, n:2, pp:13-18 [Journal ] Sung-Woon Lee , Woo-Hun Kim , Hyun-Sung Kim , Kee-Young Yoo Parallizable simple authenticated key agreement protocol. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 2003, v:37, n:3, pp:17-22 [Journal ] Sung-Woon Lee , Hyun-Sung Kim , Kee-Young Yoo Cryptanalysis of a user authentication scheme using hash functions. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 2004, v:38, n:1, pp:24-28 [Journal ] Eun-Jun Yoon , Eun-Kyung Ryu , Kee-Young Yoo A secure user authentication scheme using hash functions. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 2004, v:38, n:2, pp:62-68 [Journal ] Eun-Kyung Ryu , Kee-Young Yoo On the security of efficient user identification scheme. [Citation Graph (0, 0)][DBLP ] Applied Mathematics and Computation, 2005, v:171, n:2, pp:1201-1205 [Journal ] Keon-Jik Lee , Kee-Won Kim , Kee-Young Yoo Digit Serial-In-Serial-Out Systolic Multiplier for Montogomery's Algorithm. [Citation Graph (0, 0)][DBLP ] ISCA PDCS, 2001, pp:500-504 [Conf ] Won-Ho Lee , Hyun-Sung Kim , Kee-Young Yoo Area Efficient Architecture for Multiplication and Squaring in GF(2^m) using Irreducible AOP. [Citation Graph (0, 0)][DBLP ] ISCA PDCS, 2001, pp:496-499 [Conf ] Eun-Jun Yoon , Kee-Young Yoo A Secure Chaotic Hash-Based Biometric Remote User Authentication Scheme Using Mobile Devices. [Citation Graph (0, 0)][DBLP ] APWeb/WAIM Workshops, 2007, pp:612-623 [Conf ] Eun-Jun Yoon , Kee-Young Yoo A Secret-Key Exponential Key Agreement Protocol with Smart Cards. [Citation Graph (0, 0)][DBLP ] ATC, 2007, pp:430-440 [Conf ] Eun-Jun Yoon , Wan-Soo Lee , Kee-Young Yoo Improving the Single-Assumption Authenticated Diffie-Hellman Key Agreement Protocols. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2007, pp:926-936 [Conf ] Jai-Boo Oh , Eun-Jun Yoon , Kee-Young Yoo An Efficient ID-Based Authenticated Key Agreement Protocol with Pairings. [Citation Graph (0, 0)][DBLP ] ISPA, 2007, pp:446-456 [Conf ] Ki-Hyun Jung , Jae-Gil Yu , Se-Min Kim , Ki-Jong Kim , Jin-Yong Byun , Kee-Young Yoo The Hiding of Secret Data Using the Run Length Matching Method. [Citation Graph (0, 0)][DBLP ] KES-AMSTA, 2007, pp:1027-1034 [Conf ] Zhen-Ai Jin , Hyun-Ju Cho , Kee-Young Yoo An Efficient Authentication Protocol for Low-Cost RFID Systems. [Citation Graph (0, 0)][DBLP ] KES-AMSTA, 2007, pp:999-1006 [Conf ] Eun-Jun Yoon , Wan-Soo Lee , Kee-Young Yoo Secure Remote User Authentication Scheme Using Bilinear Pairings. [Citation Graph (0, 0)][DBLP ] WISTP, 2007, pp:102-114 [Conf ] Eun-Jun Yoon , Eun-Kyung Ryu , Kee-Young Yoo Attacks and Solutions of Yang et al.'s Protected Password Changing Scheme. [Citation Graph (0, 0)][DBLP ] Informatica, Lith. Acad. Sci., 2005, v:16, n:2, pp:285-294 [Journal ] Efficient Authentication and Authorization Infrastructure for Mobile Users. [Citation Graph (, )][DBLP ] Enhanced Three-Round Smart Card-Based Key Exchange Protocol. [Citation Graph (, )][DBLP ] Using the Resizable Working-set Notion for Software Distributed Shared Memory. [Citation Graph (, )][DBLP ] A New Steganography Scheme using a Frame. [Citation Graph (, )][DBLP ] Non-linear and Non-group Cellular Automata for Cryptographic Applications. [Citation Graph (, )][DBLP ] Visual Multi-Secret Sharing Scheme with Cheater Identification. [Citation Graph (, )][DBLP ] Token-Based Authenticated Key Establishment Protocols for Three-Party Communication. [Citation Graph (, )][DBLP ] Robust Broadcasting Cryptosystem in Computer Networks. [Citation Graph (, )][DBLP ] Improving the Generalized Password-Based Authenticated Key Agreement Protocol. [Citation Graph (, )][DBLP ] Replay Attacks on Han et al.'s Chaotic Map Based Key Agreement Protocol Using Nonce. [Citation Graph (, )][DBLP ] A Virtual Three-Dimension Cellular Automata Pseudorandom Number Generator Based on the Moore Neighborhood Method. [Citation Graph (, )][DBLP ] Improving the Sun-Cao's Public Key Authentication Scheme for Non-repudiation. [Citation Graph (, )][DBLP ] Secure PAP-Based RADIUS Protocol in Wireless Networks. [Citation Graph (, )][DBLP ] A Reversible Data Hiding Scheme Using Even-Odd Embedding Method. [Citation Graph (, )][DBLP ] A New Image Steganography Based on 2k Correction and Edge-Detection. [Citation Graph (, )][DBLP ] Cryptanalysis of Wang et al.'s Remote User Authentication Scheme Using Smart Cards. [Citation Graph (, )][DBLP ] Palette and Index Change Technique for Steganoraphy Based on an Indexcolor. [Citation Graph (, )][DBLP ] A New Steganography Scheme Based on an Index-Color Image. [Citation Graph (, )][DBLP ] A Reinforced Authentication Protocol for Anti-Counterfeiting and Privacy Protection. [Citation Graph (, )][DBLP ] An Efficient PRNG Based on the Hybrid between One- and Two-Dimensional Cellular Automata. [Citation Graph (, )][DBLP ] Robust Multi-Server Authentication Scheme. [Citation Graph (, )][DBLP ] An Efficient Authentication and Key Agreement Protocol in RFID System. [Citation Graph (, )][DBLP ] Two Security Problems of RFID Security Method with Ownership Transfer. [Citation Graph (, )][DBLP ] An Improvement of Password-Only Authenticated Key Establishment Protocol without Public Key Cryptography. [Citation Graph (, )][DBLP ] Wireless Sensor Network Protocols for Secure and Energy-Efficient Data Transmission. [Citation Graph (, )][DBLP ] Wireless Sensor Network Protocols for Secure and Energy-Efficient Data Transmission. [Citation Graph (, )][DBLP ] A New Key Agreement Protocol Based on Chaotic Maps. [Citation Graph (, )][DBLP ] Vulnerability of User Identification and Key Agreement Protocol with User Anonymity. [Citation Graph (, )][DBLP ] Two Security Problems of Efficient Remote Mutual Authentication and Key Agreement. [Citation Graph (, )][DBLP ] Spacing Based Authentication Protocol for Low-Cost RFID. [Citation Graph (, )][DBLP ] Analysis of 2-State, 3-Neighborhood Cellular Automata Rules for Cryptographic Pseudorandom Number Generation. [Citation Graph (, )][DBLP ] Robust ID-Based Remote Mutual Authentication with Key Agreement Scheme for Mobile Devices on ECC. [Citation Graph (, )][DBLP ] A New Authentication Scheme for Session Initiation Protocol. [Citation Graph (, )][DBLP ] Improved Data Hiding Method by Block Parity for Binary Images. [Citation Graph (, )][DBLP ] A High Capacity Data Hiding Method Using PVD and LSB. [Citation Graph (, )][DBLP ] An Improved Secure Authenticated Group Key Agreement Protocol for WMNs. [Citation Graph (, )][DBLP ] Design of Montgomery Multiplication Architecture Based on Programmable Cellular Automata. [Citation Graph (, )][DBLP ] A secure and efficient SIP authentication scheme for converged VoIP networks. [Citation Graph (, )][DBLP ] Search in 0.011secs, Finished in 0.017secs