dblp.uni-trier.dewww.uni-trier.de

Jun-Cheol Jeon

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
30EEJun-Cheol Jeon, Kee-Young Yoo: Montgomery exponent architecture based on programmable cellular automata. Mathematics and Computers in Simulation 79(4): 1189-1196 (2008)
29EEJun-Cheol Jeon, Kee-Young Yoo: Elliptic curve based hardware architecture using cellular automata. Mathematics and Computers in Simulation 79(4): 1197-1203 (2008)
2007
28 Se-Min Kim, Jun-Cheol Jeon, Byung-Heon Kang, Sang-Ho Shin, Kee-Young Yoo: Non-linear and Non-group Cellular Automata for Cryptographic Applications. Security and Management 2007: 432-438
27EEJun-Cheol Jeon, Kee-Young Yoo: Programmable cellular automata based Montgomery hardware architecture. Applied Mathematics and Computation 186(1): 915-922 (2007)
26EEJun-Cheol Jeon, Kee-Young Yoo: Role delegation on multiple-attractor cellular automata based on pseudo-exhaustive bit patterns. Applied Mathematics and Computation 186(2): 1423-1428 (2007)
25EEKee-Won Kim, Jun-Cheol Jeon, Kee-Young Yoo: Efficient and secure password authentication schemes for low-power devices. IJSNet 2(1/2): 77-81 (2007)
2006
24EEByung-Heon Kang, Jun-Cheol Jeon, Kee-Young Yoo: Decision Algorithms for Cellular Automata States Based on Periodic Boundary Condition. ACRI 2006: 104-111
23EEJun-Cheol Jeon, Kee-Young Yoo: Cellular Automata Based Role-Delegation in RBAC. ACRI 2006: 588-594
22EEJun-Cheol Jeon, Kee-Young Yoo: Authentication Based on Singular Cellular Automata. ACRI 2006: 605-610
21EEJun-Cheol Jeon, Kee-Young Yoo: Conflict Detection in Role-Based Access Control Using Multiple-Attractor Cellular Automata. ICIC (1) 2006: 533-541
20EEByung-Heon Kang, Jun-Cheol Jeon, Kee-Young Yoo: Evolutionary Algorithms for Group/Non-group Decision in Periodic Boundary CA. ICNC (1) 2006: 629-632
19EEJai-Boo Oh, Jun-Cheol Jeon, Kee-Young Yoo: Further Improvement of Manik et al.'s Remote User Authentication Scheme Using Smart Cards. ISPA Workshops 2006: 57-64
18EEJun-Cheol Jeon, Kee-Won Kim, Byung-Heon Kang, Kee-Young Yoo: Cellular Automata Architecture for Elliptic Curve Cryptographic Hardware. International Conference on Computational Science (3) 2006: 329-336
17EEJun-Cheol Jeon, Kee-Won Kim, Jai-Boo Oh, Kee-Young Yoo: Modular Divider for Elliptic Curve Cryptographic Hardware Based on Programmable CA. International Conference on Computational Science (4) 2006: 661-668
16EEJun-Cheol Jeon, Byung-Heon Kang, Se-Min Kim, Wan-Soo Lee, Kee-Young Yoo: An Improvement of Remote User Authentication Scheme Using Smart Cards. MSN 2006: 416-423
15EEJun-Cheol Jeon, Eun-Yeung Choi, Kee-Young Yoo: Agent-Based Real Time Intrusion Detection System Against Malformed Packet Attacks. PRIMA 2006: 807-812
2005
14 Hee-Jung Yoon, Jun-Cheol Jeon, Kee-Won Kim, Kee-Young Yoo: A Secure One-Time Password Authentication Using Cellular Automata. CAINE 2005: 376-381
13 Hye-Jin Yang, Jun-Cheol Jeon, Kee-Won Kim, Kee-Young Yoo: New Authentication Scheme with No Verification Table. CAINE 2005: 387-389
12EEJun-Cheol Jeon, Kee-Won Kim, Kee-Young Yoo: Evolutionary Hardware Architecture for Division in Elliptic Curve Cryptosystems over GF(2n). ICNC (3) 2005: 348-355
11EEJun-Cheol Jeon, Kee-Won Kim, Kee-Young Yoo: Non-group Cellular Automata Based One Time Password Authentication Scheme in Wireless Networks. MADNES 2005: 110-116
10EEJun-Cheol Jeon, Kee-Won Kim, Kee-Young Yoo: Low-Complexity Authentication Scheme Based on Cellular Automata in Wireless Network. MSN 2005: 413-421
9EEKee-Won Kim, Jun-Cheol Jeon, Kee-Young Yoo: Efficient and Secure Password Authentication Schemes for Low-Power Devices. MSN 2005: 73-82
8EEKee-Won Kim, Jun-Cheol Jeon, Kee-Young Yoo: An improvement on Yang et al.'s password authentication schemes. Applied Mathematics and Computation 170(1): 207-215 (2005)
2004
7EEJun-Cheol Jeon, Kee-Young Yoo: An Evolutionary Approach to the Design of Cellular Automata Architecture for Multiplication in Elliptic Curve Cryptography over Finite Fields. PRICAI 2004: 241-250
6 Yong-Seok Kim, Jun-Cheol Jeon, Jin-woo Jeon, Kee-Young Yoo: An Efficient Access Control Model Based on User-Classification and Role-Division. Security and Management 2004: 300-304
5EEJung-Seuk Lee, Jun-Cheol Jeon, Kee-Young Yoo: A security scheme for protecting security policies in firewall. Operating Systems Review 38(2): 69-72 (2004)
2003
4 H. Y. Park, Jun-Cheol Jeon, Jai-Boo Oh, Kee-Yon Yoo: An Efficient Multiplication Architecture using Montgomery Algorithm based on Programmable Cellular Automata. CAINE 2003: 87-90
3EEJun-Cheol Jeon, Kee-Young Yoo: Computational Algorithm and Architecture for AB2 Multiplication in Finite Fields. ICCSA (1) 2003: 947-956
2 Jun-Cheol Jeon, Kee-Young Yoo: Design of Bit-parallel Multiplier Based on Programmable Cellular Automata. ISCA PDCS 2003: 94-98
2002
1EEJun-Cheol Jeon, Hyun-Sung Kim, Hyoung-Mok Lee, Kee-Young Yoo: Bit-serial AB2 Multiplier Using Modified Inner Product. J. Inf. Sci. Eng. 18(4): 507-518 (2002)

Coauthor Index

1Eun-Yeung Choi [15]
2Jin-woo Jeon [6]
3Byung-Heon Kang [16] [18] [20] [24] [28]
4Hyun-Sung Kim [1]
5Kee-Won Kim [8] [9] [10] [11] [12] [13] [14] [17] [18] [25]
6Se-Min Kim [16] [28]
7Yong-Seok Kim [6]
8Hyoung-Mok Lee [1]
9Jung-Seuk Lee [5]
10Wan-Soo Lee [16]
11Jai-Boo Oh [4] [17] [19]
12H. Y. Park [4]
13Sang-Ho Shin [28]
14Hye-Jin Yang [13]
15Kee-Yon Yoo [4]
16Kee-Young Yoo [1] [2] [3] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] [20] [21] [22] [23] [24] [25] [26] [27] [28] [29] [30]
17Hee-Jung Yoon [14]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)