2008 |
30 | EE | Jun-Cheol Jeon,
Kee-Young Yoo:
Montgomery exponent architecture based on programmable cellular automata.
Mathematics and Computers in Simulation 79(4): 1189-1196 (2008) |
29 | EE | Jun-Cheol Jeon,
Kee-Young Yoo:
Elliptic curve based hardware architecture using cellular automata.
Mathematics and Computers in Simulation 79(4): 1197-1203 (2008) |
2007 |
28 | | Se-Min Kim,
Jun-Cheol Jeon,
Byung-Heon Kang,
Sang-Ho Shin,
Kee-Young Yoo:
Non-linear and Non-group Cellular Automata for Cryptographic Applications.
Security and Management 2007: 432-438 |
27 | EE | Jun-Cheol Jeon,
Kee-Young Yoo:
Programmable cellular automata based Montgomery hardware architecture.
Applied Mathematics and Computation 186(1): 915-922 (2007) |
26 | EE | Jun-Cheol Jeon,
Kee-Young Yoo:
Role delegation on multiple-attractor cellular automata based on pseudo-exhaustive bit patterns.
Applied Mathematics and Computation 186(2): 1423-1428 (2007) |
25 | EE | Kee-Won Kim,
Jun-Cheol Jeon,
Kee-Young Yoo:
Efficient and secure password authentication schemes for low-power devices.
IJSNet 2(1/2): 77-81 (2007) |
2006 |
24 | EE | Byung-Heon Kang,
Jun-Cheol Jeon,
Kee-Young Yoo:
Decision Algorithms for Cellular Automata States Based on Periodic Boundary Condition.
ACRI 2006: 104-111 |
23 | EE | Jun-Cheol Jeon,
Kee-Young Yoo:
Cellular Automata Based Role-Delegation in RBAC.
ACRI 2006: 588-594 |
22 | EE | Jun-Cheol Jeon,
Kee-Young Yoo:
Authentication Based on Singular Cellular Automata.
ACRI 2006: 605-610 |
21 | EE | Jun-Cheol Jeon,
Kee-Young Yoo:
Conflict Detection in Role-Based Access Control Using Multiple-Attractor Cellular Automata.
ICIC (1) 2006: 533-541 |
20 | EE | Byung-Heon Kang,
Jun-Cheol Jeon,
Kee-Young Yoo:
Evolutionary Algorithms for Group/Non-group Decision in Periodic Boundary CA.
ICNC (1) 2006: 629-632 |
19 | EE | Jai-Boo Oh,
Jun-Cheol Jeon,
Kee-Young Yoo:
Further Improvement of Manik et al.'s Remote User Authentication Scheme Using Smart Cards.
ISPA Workshops 2006: 57-64 |
18 | EE | Jun-Cheol Jeon,
Kee-Won Kim,
Byung-Heon Kang,
Kee-Young Yoo:
Cellular Automata Architecture for Elliptic Curve Cryptographic Hardware.
International Conference on Computational Science (3) 2006: 329-336 |
17 | EE | Jun-Cheol Jeon,
Kee-Won Kim,
Jai-Boo Oh,
Kee-Young Yoo:
Modular Divider for Elliptic Curve Cryptographic Hardware Based on Programmable CA.
International Conference on Computational Science (4) 2006: 661-668 |
16 | EE | Jun-Cheol Jeon,
Byung-Heon Kang,
Se-Min Kim,
Wan-Soo Lee,
Kee-Young Yoo:
An Improvement of Remote User Authentication Scheme Using Smart Cards.
MSN 2006: 416-423 |
15 | EE | Jun-Cheol Jeon,
Eun-Yeung Choi,
Kee-Young Yoo:
Agent-Based Real Time Intrusion Detection System Against Malformed Packet Attacks.
PRIMA 2006: 807-812 |
2005 |
14 | | Hee-Jung Yoon,
Jun-Cheol Jeon,
Kee-Won Kim,
Kee-Young Yoo:
A Secure One-Time Password Authentication Using Cellular Automata.
CAINE 2005: 376-381 |
13 | | Hye-Jin Yang,
Jun-Cheol Jeon,
Kee-Won Kim,
Kee-Young Yoo:
New Authentication Scheme with No Verification Table.
CAINE 2005: 387-389 |
12 | EE | Jun-Cheol Jeon,
Kee-Won Kim,
Kee-Young Yoo:
Evolutionary Hardware Architecture for Division in Elliptic Curve Cryptosystems over GF(2n).
ICNC (3) 2005: 348-355 |
11 | EE | Jun-Cheol Jeon,
Kee-Won Kim,
Kee-Young Yoo:
Non-group Cellular Automata Based One Time Password Authentication Scheme in Wireless Networks.
MADNES 2005: 110-116 |
10 | EE | Jun-Cheol Jeon,
Kee-Won Kim,
Kee-Young Yoo:
Low-Complexity Authentication Scheme Based on Cellular Automata in Wireless Network.
MSN 2005: 413-421 |
9 | EE | Kee-Won Kim,
Jun-Cheol Jeon,
Kee-Young Yoo:
Efficient and Secure Password Authentication Schemes for Low-Power Devices.
MSN 2005: 73-82 |
8 | EE | Kee-Won Kim,
Jun-Cheol Jeon,
Kee-Young Yoo:
An improvement on Yang et al.'s password authentication schemes.
Applied Mathematics and Computation 170(1): 207-215 (2005) |
2004 |
7 | EE | Jun-Cheol Jeon,
Kee-Young Yoo:
An Evolutionary Approach to the Design of Cellular Automata Architecture for Multiplication in Elliptic Curve Cryptography over Finite Fields.
PRICAI 2004: 241-250 |
6 | | Yong-Seok Kim,
Jun-Cheol Jeon,
Jin-woo Jeon,
Kee-Young Yoo:
An Efficient Access Control Model Based on User-Classification and Role-Division.
Security and Management 2004: 300-304 |
5 | EE | Jung-Seuk Lee,
Jun-Cheol Jeon,
Kee-Young Yoo:
A security scheme for protecting security policies in firewall.
Operating Systems Review 38(2): 69-72 (2004) |
2003 |
4 | | H. Y. Park,
Jun-Cheol Jeon,
Jai-Boo Oh,
Kee-Yon Yoo:
An Efficient Multiplication Architecture using Montgomery Algorithm based on Programmable Cellular Automata.
CAINE 2003: 87-90 |
3 | EE | Jun-Cheol Jeon,
Kee-Young Yoo:
Computational Algorithm and Architecture for AB2 Multiplication in Finite Fields.
ICCSA (1) 2003: 947-956 |
2 | | Jun-Cheol Jeon,
Kee-Young Yoo:
Design of Bit-parallel Multiplier Based on Programmable Cellular Automata.
ISCA PDCS 2003: 94-98 |
2002 |
1 | EE | Jun-Cheol Jeon,
Hyun-Sung Kim,
Hyoung-Mok Lee,
Kee-Young Yoo:
Bit-serial AB2 Multiplier Using Modified Inner Product.
J. Inf. Sci. Eng. 18(4): 507-518 (2002) |