The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Jun-Cheol Jeon: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Jun-Cheol Jeon, Kee-Young Yoo
    Design of Bit-parallel Multiplier Based on Programmable Cellular Automata. [Citation Graph (0, 0)][DBLP]
    ISCA PDCS, 2003, pp:94-98 [Conf]
  2. Jun-Cheol Jeon, Kee-Young Yoo
    Cellular Automata Based Role-Delegation in RBAC. [Citation Graph (0, 0)][DBLP]
    ACRI, 2006, pp:588-594 [Conf]
  3. Jun-Cheol Jeon, Kee-Young Yoo
    Authentication Based on Singular Cellular Automata. [Citation Graph (0, 0)][DBLP]
    ACRI, 2006, pp:605-610 [Conf]
  4. Byung-Heon Kang, Jun-Cheol Jeon, Kee-Young Yoo
    Decision Algorithms for Cellular Automata States Based on Periodic Boundary Condition. [Citation Graph (0, 0)][DBLP]
    ACRI, 2006, pp:104-111 [Conf]
  5. H. Y. Park, Jun-Cheol Jeon, Jai-Boo Oh, Kee-Yon Yoo
    An Efficient Multiplication Architecture using Montgomery Algorithm based on Programmable Cellular Automata. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:87-90 [Conf]
  6. Hye-Jin Yang, Jun-Cheol Jeon, Kee-Won Kim, Kee-Young Yoo
    New Authentication Scheme with No Verification Table. [Citation Graph (0, 0)][DBLP]
    CAINE, 2005, pp:387-389 [Conf]
  7. Hee-Jung Yoon, Jun-Cheol Jeon, Kee-Won Kim, Kee-Young Yoo
    A Secure One-Time Password Authentication Using Cellular Automata. [Citation Graph (0, 0)][DBLP]
    CAINE, 2005, pp:376-381 [Conf]
  8. Yong-Seok Kim, Jun-Cheol Jeon, Jin-woo Jeon, Kee-Young Yoo
    An Efficient Access Control Model Based on User-Classification and Role-Division. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2004, pp:300-304 [Conf]
  9. Jun-Cheol Jeon, Kee-Won Kim, Byung-Heon Kang, Kee-Young Yoo
    Cellular Automata Architecture for Elliptic Curve Cryptographic Hardware. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (3), 2006, pp:329-336 [Conf]
  10. Jun-Cheol Jeon, Kee-Won Kim, Jai-Boo Oh, Kee-Young Yoo
    Modular Divider for Elliptic Curve Cryptographic Hardware Based on Programmable CA. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (4), 2006, pp:661-668 [Conf]
  11. Jun-Cheol Jeon, Kee-Young Yoo
    Computational Algorithm and Architecture for AB2 Multiplication in Finite Fields. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2003, pp:947-956 [Conf]
  12. Jun-Cheol Jeon, Kee-Young Yoo
    Conflict Detection in Role-Based Access Control Using Multiple-Attractor Cellular Automata. [Citation Graph (0, 0)][DBLP]
    ICIC (1), 2006, pp:533-541 [Conf]
  13. Jun-Cheol Jeon, Kee-Won Kim, Kee-Young Yoo
    Evolutionary Hardware Architecture for Division in Elliptic Curve Cryptosystems over GF(2n). [Citation Graph (0, 0)][DBLP]
    ICNC (3), 2005, pp:348-355 [Conf]
  14. Byung-Heon Kang, Jun-Cheol Jeon, Kee-Young Yoo
    Evolutionary Algorithms for Group/Non-group Decision in Periodic Boundary CA. [Citation Graph (0, 0)][DBLP]
    ICNC (1), 2006, pp:629-632 [Conf]
  15. Jai-Boo Oh, Jun-Cheol Jeon, Kee-Young Yoo
    Further Improvement of Manik et al.'s Remote User Authentication Scheme Using Smart Cards. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2006, pp:57-64 [Conf]
  16. Jun-Cheol Jeon, Kee-Won Kim, Kee-Young Yoo
    Non-group Cellular Automata Based One Time Password Authentication Scheme in Wireless Networks. [Citation Graph (0, 0)][DBLP]
    MADNES, 2005, pp:110-116 [Conf]
  17. Jun-Cheol Jeon, Byung-Heon Kang, Se-Min Kim, Wan-Soo Lee, Kee-Young Yoo
    An Improvement of Remote User Authentication Scheme Using Smart Cards. [Citation Graph (0, 0)][DBLP]
    MSN, 2006, pp:416-423 [Conf]
  18. Jun-Cheol Jeon, Kee-Won Kim, Kee-Young Yoo
    Low-Complexity Authentication Scheme Based on Cellular Automata in Wireless Network. [Citation Graph (0, 0)][DBLP]
    MSN, 2005, pp:413-421 [Conf]
  19. Kee-Won Kim, Jun-Cheol Jeon, Kee-Young Yoo
    Efficient and Secure Password Authentication Schemes for Low-Power Devices. [Citation Graph (0, 0)][DBLP]
    MSN, 2005, pp:73-82 [Conf]
  20. Jun-Cheol Jeon, Kee-Young Yoo
    An Evolutionary Approach to the Design of Cellular Automata Architecture for Multiplication in Elliptic Curve Cryptography over Finite Fields. [Citation Graph (0, 0)][DBLP]
    PRICAI, 2004, pp:241-250 [Conf]
  21. Jun-Cheol Jeon, Eun-Yeung Choi, Kee-Young Yoo
    Agent-Based Real Time Intrusion Detection System Against Malformed Packet Attacks. [Citation Graph (0, 0)][DBLP]
    PRIMA, 2006, pp:807-812 [Conf]
  22. Jun-Cheol Jeon, Hyun-Sung Kim, Hyoung-Mok Lee, Kee-Young Yoo
    Bit-serial AB2 Multiplier Using Modified Inner Product. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 2002, v:18, n:4, pp:507-518 [Journal]
  23. Jung-Seuk Lee, Jun-Cheol Jeon, Kee-Young Yoo
    A security scheme for protecting security policies in firewall. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 2004, v:38, n:2, pp:69-72 [Journal]

  24. Non-linear and Non-group Cellular Automata for Cryptographic Applications. [Citation Graph (, )][DBLP]


  25. A Reinforced Authentication Protocol for Anti-Counterfeiting and Privacy Protection. [Citation Graph (, )][DBLP]


  26. Design of Montgomery Multiplication Architecture Based on Programmable Cellular Automata. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.301secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002