Search the dblp DataBase
Jun-Cheol Jeon :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Jun-Cheol Jeon , Kee-Young Yoo Design of Bit-parallel Multiplier Based on Programmable Cellular Automata. [Citation Graph (0, 0)][DBLP ] ISCA PDCS, 2003, pp:94-98 [Conf ] Jun-Cheol Jeon , Kee-Young Yoo Cellular Automata Based Role-Delegation in RBAC. [Citation Graph (0, 0)][DBLP ] ACRI, 2006, pp:588-594 [Conf ] Jun-Cheol Jeon , Kee-Young Yoo Authentication Based on Singular Cellular Automata. [Citation Graph (0, 0)][DBLP ] ACRI, 2006, pp:605-610 [Conf ] Byung-Heon Kang , Jun-Cheol Jeon , Kee-Young Yoo Decision Algorithms for Cellular Automata States Based on Periodic Boundary Condition. [Citation Graph (0, 0)][DBLP ] ACRI, 2006, pp:104-111 [Conf ] H. Y. Park , Jun-Cheol Jeon , Jai-Boo Oh , Kee-Yon Yoo An Efficient Multiplication Architecture using Montgomery Algorithm based on Programmable Cellular Automata. [Citation Graph (0, 0)][DBLP ] CAINE, 2003, pp:87-90 [Conf ] Hye-Jin Yang , Jun-Cheol Jeon , Kee-Won Kim , Kee-Young Yoo New Authentication Scheme with No Verification Table. [Citation Graph (0, 0)][DBLP ] CAINE, 2005, pp:387-389 [Conf ] Hee-Jung Yoon , Jun-Cheol Jeon , Kee-Won Kim , Kee-Young Yoo A Secure One-Time Password Authentication Using Cellular Automata. [Citation Graph (0, 0)][DBLP ] CAINE, 2005, pp:376-381 [Conf ] Yong-Seok Kim , Jun-Cheol Jeon , Jin-woo Jeon , Kee-Young Yoo An Efficient Access Control Model Based on User-Classification and Role-Division. [Citation Graph (0, 0)][DBLP ] Security and Management, 2004, pp:300-304 [Conf ] Jun-Cheol Jeon , Kee-Won Kim , Byung-Heon Kang , Kee-Young Yoo Cellular Automata Architecture for Elliptic Curve Cryptographic Hardware. [Citation Graph (0, 0)][DBLP ] International Conference on Computational Science (3), 2006, pp:329-336 [Conf ] Jun-Cheol Jeon , Kee-Won Kim , Jai-Boo Oh , Kee-Young Yoo Modular Divider for Elliptic Curve Cryptographic Hardware Based on Programmable CA. [Citation Graph (0, 0)][DBLP ] International Conference on Computational Science (4), 2006, pp:661-668 [Conf ] Jun-Cheol Jeon , Kee-Young Yoo Computational Algorithm and Architecture for AB2 Multiplication in Finite Fields. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2003, pp:947-956 [Conf ] Jun-Cheol Jeon , Kee-Young Yoo Conflict Detection in Role-Based Access Control Using Multiple-Attractor Cellular Automata. [Citation Graph (0, 0)][DBLP ] ICIC (1), 2006, pp:533-541 [Conf ] Jun-Cheol Jeon , Kee-Won Kim , Kee-Young Yoo Evolutionary Hardware Architecture for Division in Elliptic Curve Cryptosystems over GF(2n ). [Citation Graph (0, 0)][DBLP ] ICNC (3), 2005, pp:348-355 [Conf ] Byung-Heon Kang , Jun-Cheol Jeon , Kee-Young Yoo Evolutionary Algorithms for Group/Non-group Decision in Periodic Boundary CA. [Citation Graph (0, 0)][DBLP ] ICNC (1), 2006, pp:629-632 [Conf ] Jai-Boo Oh , Jun-Cheol Jeon , Kee-Young Yoo Further Improvement of Manik et al.'s Remote User Authentication Scheme Using Smart Cards. [Citation Graph (0, 0)][DBLP ] ISPA Workshops, 2006, pp:57-64 [Conf ] Jun-Cheol Jeon , Kee-Won Kim , Kee-Young Yoo Non-group Cellular Automata Based One Time Password Authentication Scheme in Wireless Networks. [Citation Graph (0, 0)][DBLP ] MADNES, 2005, pp:110-116 [Conf ] Jun-Cheol Jeon , Byung-Heon Kang , Se-Min Kim , Wan-Soo Lee , Kee-Young Yoo An Improvement of Remote User Authentication Scheme Using Smart Cards. [Citation Graph (0, 0)][DBLP ] MSN, 2006, pp:416-423 [Conf ] Jun-Cheol Jeon , Kee-Won Kim , Kee-Young Yoo Low-Complexity Authentication Scheme Based on Cellular Automata in Wireless Network. [Citation Graph (0, 0)][DBLP ] MSN, 2005, pp:413-421 [Conf ] Kee-Won Kim , Jun-Cheol Jeon , Kee-Young Yoo Efficient and Secure Password Authentication Schemes for Low-Power Devices. [Citation Graph (0, 0)][DBLP ] MSN, 2005, pp:73-82 [Conf ] Jun-Cheol Jeon , Kee-Young Yoo An Evolutionary Approach to the Design of Cellular Automata Architecture for Multiplication in Elliptic Curve Cryptography over Finite Fields. [Citation Graph (0, 0)][DBLP ] PRICAI, 2004, pp:241-250 [Conf ] Jun-Cheol Jeon , Eun-Yeung Choi , Kee-Young Yoo Agent-Based Real Time Intrusion Detection System Against Malformed Packet Attacks. [Citation Graph (0, 0)][DBLP ] PRIMA, 2006, pp:807-812 [Conf ] Jun-Cheol Jeon , Hyun-Sung Kim , Hyoung-Mok Lee , Kee-Young Yoo Bit-serial AB2 Multiplier Using Modified Inner Product. [Citation Graph (0, 0)][DBLP ] J. Inf. Sci. Eng., 2002, v:18, n:4, pp:507-518 [Journal ] Jung-Seuk Lee , Jun-Cheol Jeon , Kee-Young Yoo A security scheme for protecting security policies in firewall. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 2004, v:38, n:2, pp:69-72 [Journal ] Non-linear and Non-group Cellular Automata for Cryptographic Applications. [Citation Graph (, )][DBLP ] A Reinforced Authentication Protocol for Anti-Counterfeiting and Privacy Protection. [Citation Graph (, )][DBLP ] Design of Montgomery Multiplication Architecture Based on Programmable Cellular Automata. [Citation Graph (, )][DBLP ] Search in 0.002secs, Finished in 0.301secs