2008 | ||
---|---|---|
176 | EE | Eun-Jun Yoon, Kee-Young Yoo: Enhanced Three-Round Smart Card-Based Key Exchange Protocol. ATC 2008: 507-515 |
175 | EE | Sang-Eon Lee, Sang-Ho Shin, Geum-Dal Park, Kee-Young Yoo: Wireless Sensor Network Protocols for Secure and Energy-Efficient Data Transmission. CISIM 2008: 157-162 |
174 | EE | Sang-Eon Lee, Sang-Ho Shin, Geum-Dal Park, Kee-Young Yoo: Wireless Sensor Network Protocols for Secure and Energy-Efficient Data Transmission. CISIM 2008: 157-162 |
173 | EE | Ki-Jong Kim, Ki-Hyun Jung, Kee-Young Yoo: A High Capacity Data Hiding Method Using PVD and LSB. CSSE (3) 2008: 876-879 |
172 | EE | Jin-Yong Byun, Ki-Hyun Jung, Kee-Young Yoo: Improved Data Hiding Method by Block Parity for Binary Images. CSSE (3) 2008: 931-934 |
171 | EE | Sang-Ho Shin, Geum-Dal Park, Kee-Young Yoo: A Virtual Three-Dimension Cellular Automata Pseudorandom Number Generator Based on the Moore Neighborhood Method. ICIC (2) 2008: 174-181 |
170 | EE | Eun-Jun Yoon, Kee-Young Yoo: Replay Attacks on Han et al.'s Chaotic Map Based Key Agreement Protocol Using Nonce. ICIC (3) 2008: 533-540 |
169 | EE | Jae-Gil Yu, Eun-Joon Yoon, Sang-Ho Shin, Kee-Young Yoo: A New Image Steganography Based on 2k Correction and Edge-Detection. ITNG 2008: 563-568 |
168 | EE | Se-Min Kim, Gil-Je Lee, Kee-Young Yoo: Palette and Index Change Technique for Steganoraphy Based on an Indexcolor. ITNG 2008: 569-574 |
167 | EE | Eun-Jun Yoon, Eun-Jung Lee, Kee-Young Yoo: Cryptanalysis of Wang et al.'s Remote User Authentication Scheme Using Smart Cards. ITNG 2008: 575-580 |
166 | EE | Eun-Jun Yoon, Kee-Young Yoo: A New Key Agreement Protocol Based on Chaotic Maps. KES-AMSTA 2008: 897-906 |
165 | EE | Eun-Jun Yoon, Kee-Young Yoo: An Improvement of Password-Only Authenticated Key Establishment Protocol without Public Key Cryptography. MUE 2008: 87-91 |
164 | EE | Eun-Jun Yoon, Kee-Young Yoo: An Efficient Authentication and Key Agreement Protocol in RFID System. NPC 2008: 320-326 |
163 | EE | Eun-Jun Yoon, Kee-Young Yoo: Improving the Host Authentication Mechanism for POD Copy Protection System. New Directions in Intelligent Interactive Multimedia 2008: 373-383 |
162 | EE | Eun-Jun Yoon, Kee-Young Yoo: Robust User Password Change Scheme based on the Elliptic Curve Cryptosystem. Fundam. Inform. 87(3-4): 483-492 (2008) |
161 | EE | Jun-Cheol Jeon, Kee-Young Yoo: Montgomery exponent architecture based on programmable cellular automata. Mathematics and Computers in Simulation 79(4): 1189-1196 (2008) |
160 | EE | Jun-Cheol Jeon, Kee-Young Yoo: Elliptic curve based hardware architecture using cellular automata. Mathematics and Computers in Simulation 79(4): 1197-1203 (2008) |
2007 | ||
159 | EE | Eun-Jun Yoon, Kee-Young Yoo: A Secure Chaotic Hash-Based Biometric Remote User Authentication Scheme Using Mobile Devices. APWeb/WAIM Workshops 2007: 612-623 |
158 | EE | Eun-Jun Yoon, Kee-Young Yoo: A Secret-Key Exponential Key Agreement Protocol with Smart Cards. ATC 2007: 430-440 |
157 | EE | Eun-Jun Yoon, Kee-Young Yoo: Token-Based Authenticated Key Establishment Protocols for Three-Party Communication. EUC Workshops 2007: 758-769 |
156 | EE | Eun-Jun Yoon, Kee-Young Yoo: Vulnerability of User Identification and Key Agreement Protocol with User Anonymity. FGCN (1) 2007: 516-521 |
155 | EE | Eun-Jun Yoon, Kee-Young Yoo: Two Security Problems of Efficient Remote Mutual Authentication and Key Agreement. FGCN (2) 2007: 66-70 |
154 | EE | Eun-Jun Yoon, Wan-Soo Lee, Kee-Young Yoo: Improving the Single-Assumption Authenticated Diffie-Hellman Key Agreement Protocols. ICCSA (1) 2007: 926-936 |
153 | EE | Eun-Jun Yoon, Kee-Young Yoo: Improving the Sun-Cao's Public Key Authentication Scheme for Non-repudiation. ICIC (3) 2007: 1103-1109 |
152 | EE | Eun-Jun Yoon, Wan-Soo Lee, Kee-Young Yoo: Secure PAP-Based RADIUS Protocol in Wireless Networks. ICIC (3) 2007: 689-694 |
151 | EE | Jai-Boo Oh, Eun-Jun Yoon, Kee-Young Yoo: An Efficient ID-Based Authenticated Key Agreement Protocol with Pairings. ISPA 2007: 446-456 |
150 | EE | Ki-Hyun Jung, Jae-Gil Yu, Se-Min Kim, Ki-Jong Kim, Jin-Yong Byun, Kee-Young Yoo: The Hiding of Secret Data Using the Run Length Matching Method. KES-AMSTA 2007: 1027-1034 |
149 | EE | Zhen-Ai Jin, Hyun-Ju Cho, Kee-Young Yoo: An Efficient Authentication Protocol for Low-Cost RFID Systems. KES-AMSTA 2007: 999-1006 |
148 | Hyun-Jin Park, Eun-Jun Yoon, Kee-Young Yoo: A New Steganography Scheme using a Frame. Security and Management 2007: 118-122 | |
147 | Se-Min Kim, Jun-Cheol Jeon, Byung-Heon Kang, Sang-Ho Shin, Kee-Young Yoo: Non-linear and Non-group Cellular Automata for Cryptographic Applications. Security and Management 2007: 432-438 | |
146 | Nu-El Choi, Eun-Jun Yoon, Hyun-Jin Park, Kee-Young Yoo: Visual Multi-Secret Sharing Scheme with Cheater Identification. Security and Management 2007: 90-96 | |
145 | EE | Eun-Jun Yoon, Wan-Soo Lee, Kee-Young Yoo: Secure Remote User Authentication Scheme Using Bilinear Pairings. WISTP 2007: 102-114 |
144 | EE | Jun-Cheol Jeon, Kee-Young Yoo: Programmable cellular automata based Montgomery hardware architecture. Applied Mathematics and Computation 186(1): 915-922 (2007) |
143 | EE | Jun-Cheol Jeon, Kee-Young Yoo: Role delegation on multiple-attractor cellular automata based on pseudo-exhaustive bit patterns. Applied Mathematics and Computation 186(2): 1423-1428 (2007) |
142 | EE | Eun-Jun Yoon, Kee-Young Yoo: Comments on Modified User Friendly Remote Authentication Scheme with Smart Cards. IEICE Transactions 90-B(2): 331-333 (2007) |
141 | EE | Kee-Won Kim, Jun-Cheol Jeon, Kee-Young Yoo: Efficient and secure password authentication schemes for low-power devices. IJSNet 2(1/2): 77-81 (2007) |
2006 | ||
140 | EE | Byung-Heon Kang, Jun-Cheol Jeon, Kee-Young Yoo: Decision Algorithms for Cellular Automata States Based on Periodic Boundary Condition. ACRI 2006: 104-111 |
139 | EE | Jun-Cheol Jeon, Kee-Young Yoo: Cellular Automata Based Role-Delegation in RBAC. ACRI 2006: 588-594 |
138 | EE | Jun-Cheol Jeon, Kee-Young Yoo: Authentication Based on Singular Cellular Automata. ACRI 2006: 605-610 |
137 | EE | Eun-Jun Yoon, Kee-Young Yoo: Improving the ID-Based Key Exchange Protocol in Wireless Mobile Ad Hoc Networks. ADHOC-NOW 2006: 349-354 |
136 | EE | Eun-Jun Yoon, Kee-Young Yoo: A Secure Password-Authenticated Key Exchange Between Clients with Different Passwords. APWeb Workshops 2006: 659-663 |
135 | EE | Eun-Jun Yoon, Kee-Young Yoo: Enhanced Forward-Secure User Authentication Scheme with Smart Cards. EuroPKI 2006: 197-206 |
134 | EE | Eun-Jun Yoon, Kee-Young Yoo: An Improved Lu-Cao's Remote User Authentication Scheme Using Smart Card. EuroPKI 2006: 45-53 |
133 | EE | Eun-Jun Yoon, Kee-Young Yoo: Various Types of Attacks and Solutions Regarding Secure Remote User Access over Insecure Networks. ICCSA (1) 2006: 1156-1165 |
132 | EE | Eun-Jun Yoon, Kee-Young Yoo: An Improved Popescu's Authenticated Key Agreement Protocol. ICCSA (5) 2006: 276-283 |
131 | EE | Eun-Jun Yoon, Kee-Young Yoo: One-Time Password Authentication Scheme Using Smart Cards Providing User Anonymity. ICCSA (5) 2006: 303-311 |
130 | EE | Jun-Cheol Jeon, Kee-Young Yoo: Conflict Detection in Role-Based Access Control Using Multiple-Attractor Cellular Automata. ICIC (1) 2006: 533-541 |
129 | EE | Byung-Heon Kang, Jun-Cheol Jeon, Kee-Young Yoo: Evolutionary Algorithms for Group/Non-group Decision in Periodic Boundary CA. ICNC (1) 2006: 629-632 |
128 | EE | Jai-Boo Oh, Jun-Cheol Jeon, Kee-Young Yoo: Further Improvement of Manik et al.'s Remote User Authentication Scheme Using Smart Cards. ISPA Workshops 2006: 57-64 |
127 | EE | Eun-Jun Yoon, Kee-Young Yoo: An Optimized Two Factor Authenticated Key Exchange Protocol in PWLANs. International Conference on Computational Science (2) 2006: 1000-1007 |
126 | EE | Jun-Cheol Jeon, Kee-Won Kim, Byung-Heon Kang, Kee-Young Yoo: Cellular Automata Architecture for Elliptic Curve Cryptographic Hardware. International Conference on Computational Science (3) 2006: 329-336 |
125 | EE | Jun-Cheol Jeon, Kee-Won Kim, Jai-Boo Oh, Kee-Young Yoo: Modular Divider for Elliptic Curve Cryptographic Hardware Based on Programmable CA. International Conference on Computational Science (4) 2006: 661-668 |
124 | EE | Jun-Cheol Jeon, Byung-Heon Kang, Se-Min Kim, Wan-Soo Lee, Kee-Young Yoo: An Improvement of Remote User Authentication Scheme Using Smart Cards. MSN 2006: 416-423 |
123 | EE | Eun-Jun Yoon, Kee-Young Yoo: Biometrics Authenticated Key Agreement Scheme. NGITS 2006: 345-349 |
122 | EE | Eun-Jun Yoon, Kee-Young Yoo: Improving the Dynamic ID-Based Remote Mutual Authentication Scheme. OTM Workshops (1) 2006: 499-507 |
121 | EE | Jun-Cheol Jeon, Eun-Yeung Choi, Kee-Young Yoo: Agent-Based Real Time Intrusion Detection System Against Malformed Packet Attacks. PRIMA 2006: 807-812 |
120 | EE | Eun-Jun Yoon, Kee-Young Yoo: Efficient Mutual Authentication Scheme with Smart Card. PRIMA 2006: 813-818 |
119 | EE | Eun-Jun Yoon, Kee-Young Yoo: An Improved Digital Signature with Message Recovery Using Self-certified Public Keys Without Trustworthy System Authority. SOFSEM 2006: 548-555 |
118 | EE | Eun-Jun Yoon, Kee-Young Yoo: An Optimizing Authenticated Key Exchange Protocol for Self-organizing Sensor Networks. UCS 2006: 537-546 |
117 | EE | Eun-Jun Yoon, Kee-Young Yoo: A New Secure Key Exchange Protocol Between STB and Smart Card in DTV Broadcasting. WISI 2006: 165-166 |
2005 | ||
116 | Hee-Jung Yoon, Jun-Cheol Jeon, Kee-Won Kim, Kee-Young Yoo: A Secure One-Time Password Authentication Using Cellular Automata. CAINE 2005: 376-381 | |
115 | Hye-Jin Yang, Jun-Cheol Jeon, Kee-Won Kim, Kee-Young Yoo: New Authentication Scheme with No Verification Table. CAINE 2005: 387-389 | |
114 | EE | Eun-Jun Yoon, Kee-Young Yoo: New Authentication Scheme Based on a One-Way Hash Function and Diffie-Hellman Key Exchange. CANS 2005: 147-160 |
113 | EE | Eun-Jun Yoon, Kee-Young Yoo: New Efficient Simple Authenticated Key Agreement Protocol. COCOON 2005: 945-954 |
112 | EE | Eun-Jun Yoon, Kee-Young Yoo: Improvement of an Efficient User Identification Scheme Based on ID-Based Cryptosystem. EUC Workshops 2005: 586-591 |
111 | EE | Eun-Jun Yoon, Kee-Young Yoo: A New Simple Authenticated Key Agreement and Protected Password Change Protocol. EUC Workshops 2005: 955-964 |
110 | EE | Eun-Jun Yoon, Kee-Young Yoo: An Efficient Password Authentication Schemes Without Using the Server Public Key for Grid Computing. GCC 2005: 149-154 |
109 | EE | Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo: Optimized Initiation Phases for Anonymous Auction Protocols. Human.Society@Internet 2005: 19-27 |
108 | EE | Eun-Jun Yoon, Kee-Young Yoo: Cryptanalysis of Two User Identification Schemes with Key Distribution Preserving Anonymity. ICICS 2005: 315-322 |
107 | EE | Eun-Jun Yoon, Kee-Young Yoo: New Multi-server Password Authentication Scheme Using Neural Networks. ICNC (2) 2005: 512-519 |
106 | EE | Jun-Cheol Jeon, Kee-Won Kim, Kee-Young Yoo: Evolutionary Hardware Architecture for Division in Elliptic Curve Cryptosystems over GF(2n). ICNC (3) 2005: 348-355 |
105 | EE | Eun-Jun Yoon, Kee-Young Yoo: More Efficient and Secure Remote User Authentication Scheme using Smart Cards. ICPADS (2) 2005: 73-77 |
104 | EE | Eun-Jun Yoon, Woo-Hun Kim, Kee-Young Yoo: Robust and Simple Authentication Protocol for Secure Communication on the Web. ICWE 2005: 352-362 |
103 | EE | Woo-Hun Kim, Kee-Young Yoo: Group-Oriented Channel Protection for Mobile Devices in Digital Multimedia Broadcasting. ISCIS 2005: 103-112 |
102 | EE | Woo-Hun Kim, Kee-Young Yoo: New Anonymous User Identification and Key Establishment Protocol in Distributed Networks. IWDC 2005: 410-415 |
101 | EE | Eun-Jun Yoon, Kee-Young Yoo: A New Efficient Fingerprint-Based Remote User Authentication Scheme for Multimedia Systems. KES (3) 2005: 332-338 |
100 | EE | Eun-Jun Yoon, Kee-Young Yoo: Robust Authenticated Encryption Scheme with Message Linkages. KES (4) 2005: 281-288 |
99 | EE | Jun-Cheol Jeon, Kee-Won Kim, Kee-Young Yoo: Non-group Cellular Automata Based One Time Password Authentication Scheme in Wireless Networks. MADNES 2005: 110-116 |
98 | EE | Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo: Secure Protected Password Change Scheme. MMM-ACNS 2005: 472-477 |
97 | EE | Jun-Cheol Jeon, Kee-Won Kim, Kee-Young Yoo: Low-Complexity Authentication Scheme Based on Cellular Automata in Wireless Network. MSN 2005: 413-421 |
96 | EE | Kee-Won Kim, Jun-Cheol Jeon, Kee-Young Yoo: Efficient and Secure Password Authentication Schemes for Low-Power Devices. MSN 2005: 73-82 |
95 | EE | Eun-Jun Yoon, Kee-Young Yoo: Robust Secret Key Based Authentication Scheme Using Smart Cards. PCM (2) 2005: 723-734 |
94 | Eun-Jun Yoon, Jae-Hyung Jung, Woo-Hun Kim, Kee-Young Yoo: A Secret Key Based Authentication Scheme Using Smart Cards. Security and Management 2005: 65-71 | |
93 | Eun-Jun Yoon, Eun-Kyung Ryu, Woo-Hun Kim, Kee-Young Yoo: Cryptanalysis of A Key Authentication Scheme Based on Discrete Logarithms. Security and Management 2005: 72-78 | |
92 | EE | Eun-Jun Yoon, Woo-Hun Kim, Kee-Young Yoo: Security Enhancement for Password Authentication Schemes with Smart Cards. TrustBus 2005: 311-320 |
91 | EE | Eun-Jun Yoon, Kee-Young Yoo: Secure Fingerprint-Based Remote User Authentication Scheme Using Smartcards. WINE 2005: 405-413 |
90 | EE | Woo-Hun Kim, Eun-Jun Yoon, Kee-Young Yoo: New Authentication Protocol Providing User Anonymity in Open Network. WINE 2005: 414-423 |
89 | EE | Sung-Woon Lee, Hyun-Sung Kim, Kee-Young Yoo: Improvement of Lee and Lee's authenticated key agreement scheme. Applied Mathematics and Computation 162(3): 1049-1053 (2005) |
88 | EE | Sung-Woon Lee, Hyun-Sung Kim, Kee-Young Yoo: Improvement of HWWM-authenticated key agreement protocol. Applied Mathematics and Computation 162(3): 1315-1320 (2005) |
87 | EE | Kee-Won Kim, Eun-Kyung Ryu, Kee-Young Yoo: Cryptanalysis of Lee-Lee authenticated key agreement scheme. Applied Mathematics and Computation 163(1): 193-198 (2005) |
86 | EE | Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo: Fixing problems in Lin et al.'s OSPA protocol. Applied Mathematics and Computation 166(1): 46-57 (2005) |
85 | EE | Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo: Improvement of Fan et al.'s deniable authentication protocol based on Diffie-Hellman algorithm. Applied Mathematics and Computation 167(1): 274-280 (2005) |
84 | EE | Sung-Woon Lee, Hyun-Sung Kim, Kee-Young Yoo: Efficient nonce-based remote user authentication scheme using smart cards. Applied Mathematics and Computation 167(1): 355-361 (2005) |
83 | EE | Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo: Improvement of Chien-Jan's authenticated multiple-key agreement protocol without using conventional one-way function. Applied Mathematics and Computation 167(1): 711-715 (2005) |
82 | EE | Eun-Kyung Ryu, Jae-Yuel Im, Kee-Young Yoo: Security of Tseng-Jan's conference key distribution system. Applied Mathematics and Computation 167(2): 833-839 (2005) |
81 | EE | Sung-Woon Lee, Hyun-Sung Kim, Kee-Young Yoo: Efficient verifier-based key agreement protocol for three parties without server's public key. Applied Mathematics and Computation 167(2): 996-1003 (2005) |
80 | EE | Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo: Cryptanalysis and further improvement of Peinado's improved LHL-key authentication scheme. Applied Mathematics and Computation 168(2): 788-794 (2005) |
79 | EE | Eun-Jun Yoon, Kee-Young Yoo: On the security of Wu-Lin's robust key authentication scheme. Applied Mathematics and Computation 169(1): 1-7 (2005) |
78 | EE | Eun-Jun Yoon, Kee-Young Yoo: Weakness and solution of Yang et al.'s protected password changing scheme. Applied Mathematics and Computation 169(1): 295-304 (2005) |
77 | EE | Kee-Won Kim, Jun-Cheol Jeon, Kee-Young Yoo: An improvement on Yang et al.'s password authentication schemes. Applied Mathematics and Computation 170(1): 207-215 (2005) |
76 | EE | Eun-Jun Yoon, Kee-Young Yoo: Cryptanalysis of Zhang-Xiao's multisignature scheme for specified group of verifiers. Applied Mathematics and Computation 170(1): 226-229 (2005) |
75 | EE | Eun-Kyung Ryu, Kee-Young Yoo: On the security of efficient user identification scheme. Applied Mathematics and Computation 171(2): 1201-1205 (2005) |
74 | EE | Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo: An improvement of Hwang-Lee-Tang's simple remote user authentication scheme. Computers & Security 24(1): 50-56 (2005) |
73 | EE | Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo: Attacks on the Shen et al.'s Timestamp-Based Password Authentication Scheme Using Smart Cards. IEICE Transactions 88-A(1): 319-321 (2005) |
72 | EE | Eun-Jun Yoon, Kee-Young Yoo: Cryptanalysis of Password Authenticated Key Exchange Based on RSA for Imbalanced Wireless Networks. IEICE Transactions 88-B(6): 2627-2628 (2005) |
71 | EE | Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo: Attacks and Solutions of Yang et al.'s Protected Password Changing Scheme. Informatica, Lith. Acad. Sci. 16(2): 285-294 (2005) |
2004 | ||
70 | EE | Jeung-Seop Kim, Hyo-Chul Kim, Kyeoung Ju Ha, Kee-Young Yoo: One Round Identity-Based Authenticated Conference Key Agreement Protocol. ECUMN 2004: 407-416 |
69 | EE | Won-Ho Lee, Keon-Jik Lee, Kee-Young Yoo: New Digit-Serial Systolic Arrays for Power-Sum and Division Operation in GF(2m). ICCSA (3) 2004: 638-647 |
68 | EE | Kyo-Min Ku, Kyeoung Ju Ha, Wi Hyun Yoo, Kee-Young Yoo: Parallel Montgomery Multiplication and Squaring over GF(2m) Based on Cellular Automata. ICCSA (4) 2004: 196-205 |
67 | EE | Eun-Kyung Ryu, Kee-Won Kim, Kee-Young Yoo: An Authenticated Key Agreement Protocol Resistant to a Dictionary Attack. ICCSA (4) 2004: 603-610 |
66 | EE | Sung-Woon Lee, Woo-Hun Kim, Hyun-Sung Kim, Kee-Young Yoo: Efficient Password-Based Authenticated Key Agreement Protocol. ICCSA (4) 2004: 617-626 |
65 | EE | Kee-Young Yoo, Eun-Kyung Ryu, Jae-Yuel Im: Multiparty Key Agreement Protocol with Cheater Identification Based on Shamir Secret Sharing. ICCSA (4) 2004: 655-664 |
64 | EE | Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo: Security of Shen et al.'s Timestamp-Based Password Authentication Scheme. ICCSA (4) 2004: 665-671 |
63 | EE | Kee-Won Kim, Eun-Kyung Ryu, Kee-Young Yoo: ID-Based Authenticated Multiple-Key Agreement Protocol from Pairings. ICCSA (4) 2004: 672-680 |
62 | EE | Nam-Yeun Kim, Kee-Young Yoo: Digit-Serial AB2 Systolic Array for Division in GF(2m). ICCSA (4) 2004: 87-96 |
61 | EE | Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo: Robust Remote User Authentication Scheme. ICOIN 2004: 935-942 |
60 | EE | Eun-Kyung Ryu, Eun-Jun Yoon, Kee-Young Yoo: An Efficient ID-Based Authenticated Key Agreement Protocol from Pairings. NETWORKING 2004: 1458-1463 |
59 | EE | Jun-Cheol Jeon, Kee-Young Yoo: An Evolutionary Approach to the Design of Cellular Automata Architecture for Multiplication in Elliptic Curve Cryptography over Finite Fields. PRICAI 2004: 241-250 |
58 | Yong-Seok Kim, Jun-Cheol Jeon, Jin-woo Jeon, Kee-Young Yoo: An Efficient Access Control Model Based on User-Classification and Role-Division. Security and Management 2004: 300-304 | |
57 | EE | Hyun-Sung Kim, Kee-Young Yoo: AOP arithmetic architectures over GF(2m). Applied Mathematics and Computation 158(1): 7-18 (2004) |
56 | EE | Sung-Woon Lee, Hyun-Sung Kim, Kee-Young Yoo: Cryptanalysis of a user authentication scheme using hash functions. Operating Systems Review 38(1): 24-28 (2004) |
55 | EE | Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo: A secure user authentication scheme using hash functions. Operating Systems Review 38(2): 62-68 (2004) |
54 | EE | Jung-Seuk Lee, Jun-Cheol Jeon, Kee-Young Yoo: A security scheme for protecting security policies in firewall. Operating Systems Review 38(2): 69-72 (2004) |
2003 | ||
53 | Kee-Won Kim, Eun-Kyung Ryu, Hyung-Mok Lee, Kee-Young Yoo: A New Authenticated Key Agreement Protocol. CAINE 2003: 91-94 | |
52 | Kyo-Min Ku, Kyeoung Ju Ha, Hyun-Sung Kim, Kee-Young Yoo: New AB2 Multiplier over GF(2m) using Cellular Automata. Computers and Their Applications 2003: 283-286 | |
51 | Woo-Hun Kim, Hyun-Sung Kim, Sung-Woon Lee, Kee-Young Yoo: Secure Authenticated Key Exchange Protocol. Computers and Their Applications 2003: 5-8 | |
50 | Hyoung-Mok Lee, Eun-Kyung Ryu, Kee-Won Kim, Jae-Min Lee, Kee-Young Yoo: A Robust Authenticated Key Agreement Protocol. Computers and Their Applications 2003: 76-79 | |
49 | Nam-Yeun Kim, Kee-Young Yoo: Look-Up Table-based Montgomery Algorithm in GF(2k) for Public-Key Cryptosystem. Computers and Their Applications 2003: 9-12 | |
48 | EE | Nam-Yeun Kim, Kee-Young Yoo: Montgomery Multiplication and Squaring Algorithms in GF(2k). ICCSA (1) 2003: 865-874 |
47 | EE | Kyo-Min Ku, Kyeoung Ju Ha, Kee-Young Yoo: Time-Space Efficient Exponentiation over GF(2m). ICCSA (1) 2003: 875-882 |
46 | EE | Won-Ho Lee, Young-Jun Heo, Kee-Young Yoo: Efficient Architecture for Exponentiation and Division in GF(2m) Using Irreducible AOP. ICCSA (1) 2003: 883-892 |
45 | EE | Jun-Cheol Jeon, Kee-Young Yoo: Computational Algorithm and Architecture for AB2 Multiplication in Finite Fields. ICCSA (1) 2003: 947-956 |
44 | EE | Eun-Kyung Ryu, Kee-Won Kim, Kee-Young Yoo: A Promising Key Agreement Protocol. ISAAC 2003: 655-662 |
43 | Hun-Joong Bae, Hyun-Sung Kim, Kee-Young Yoo: ID-based Key Exchange Protocol using Smart Cards with Fingerprint. ISCA PDCS 2003: 448-452 | |
42 | Jun-Cheol Jeon, Kee-Young Yoo: Design of Bit-parallel Multiplier Based on Programmable Cellular Automata. ISCA PDCS 2003: 94-98 | |
41 | EE | Kyo-Min Ku, Kyeoung Ju Ha, Kee-Young Yoo: Fast Exponentiaion over GF(2) Based on Cellular Automata. International Conference on Computational Science 2003: 841-850 |
40 | EE | Sung-Woon Lee, Kee-Young Yoo: Parallelizable Password-Authenticated Key Exchange Protocol. PPAM 2003: 1014-1019 |
39 | EE | Hyun-Sung Kim, Kee-Young Yoo: Cellular Automata Based Multiplier for Public-Key Cryptosystem. SPC 2003: 227-236 |
38 | Keon-Jik Lee, Kee-Won Kim, Won-Ho Lee, Young-Jun Heo, Kee-Young Yoo: Design of a Linear Systolic Modular Multiplier/Squarer for the Fast Modular Exponentiation. I. J. Comput. Appl. 10(1): 34-42 (2003) | |
37 | EE | Nam-Yeun Kim, Kee-Young Yoo: Systolic architectures for inversion/division using AB2 circuits in GF(2m). Integration 35(1): 11-24 (2003) |
36 | EE | Sung-Woon Lee, Woo-Hun Kim, Hyun-Sung Kim, Kee-Young Yoo: Parallizable simple authenticated key agreement protocol . Operating Systems Review 37(2): 13-18 (2003) |
35 | EE | Sung-Woon Lee, Woo-Hun Kim, Hyun-Sung Kim, Kee-Young Yoo: Parallizable simple authenticated key agreement protocol. Operating Systems Review 37(3): 17-22 (2003) |
34 | EE | Hyun-Sung Kim, Sung-Woon Lee, Kee-Young Yoo: ID-based password authentication scheme using smart cards and fingerprints. Operating Systems Review 37(4): 32-41 (2003) |
2002 | ||
33 | EE | Nam-Yeun Kim, Won-Ho Lee, Kee-Young Yoo: Efficient Power-Sum Systolic Architectures for Public-Key Cryptosystems in GF(2m). COCOON 2002: 153-161 |
32 | Nam-Yeun Kim, Hyun-Sung Kim, Won-Ho Lee, Kee-Won Kim, Kee-Young Yoo: New AB2 Systolic Architectures in GF(2m). Computers and Their Applications 2002: 394-397 | |
31 | Hyun-Sung Kim, Kee-Young Yoo: Basic Architecture for Modular Exponentiation over GF(2m). Computers and Their Applications 2002: 438-441 | |
30 | Kyo-Min Ku, Kyeoung Ju Ha, Hyun-Sung Kim, Kee-Young Yoo: Design of New Multiplier/Squarer using Montgomery Algorithm over GF(2m) Based on Cellular Automata. Computers and Their Applications 2002: 442-445 | |
29 | Won-Ho Lee, Kee-Won Kim, Nam-Yeun Kim, Kee-Young Yoo, Chang Hoon Kim, Chun Pyo Hong: Architecture for AB2 Operation over GF(2m) using Irreducible AOP and Its Applications. Computers and Their Applications 2002: 446-449 | |
28 | Keum-Sook Ha, Eun-Kyung Ryu, Kee-Young Yoo: A Promising Labeling Scheme for On-the-fly Data Race Detection. Computers and Their Applications 2002: 475-478 | |
27 | EE | Hyun-Sung Kim, Kee-Young Yoo: Parallel Algorithm and Architecture for Public-Key Cryptosystem. EurAsia-ICT 2002: 145-153 |
26 | EE | Nam-Yeun Kim, Hyun-Sung Kim, Won-Ho Lee, Kee-Young Yoo: A Power-Sum Systolic Architecture in GF(2m). ICOIN (2) 2002: 409-417 |
25 | EE | Nam-Yeun Kim, Dae-Ghon Kho, Kee-Young Yoo: Inversion/Division Systolic Architecture for Public-Key Cryptosystems in GF(2m). ISC 2002: 289-299 |
24 | EE | Hyun-Sung Kim, Kee-Young Yoo: Bit-Serial AOP Arithmetic Architectures over GF (2m). InfraSec 2002: 303-313 |
23 | EE | Keum-Sook Ha, Eun-Kyung Ryu, Kee-Young Yoo: Space-Efficient First Race Detection in Shared Memory Programs with Nested Parallelism. PARA 2002: 253-263 |
22 | EE | Eun-Kyung Ryu, Keum-Sook Ha, Kee-Young Yoo: A Practical Method for On-the-Fly Data Race Detection. PARA 2002: 264-273 |
21 | EE | Kyo-Min Ku, Kyeoung Ju Ha, Hyun-Sung Kim, Kee-Young Yoo: New Parallel Architecture for Modular Multiplication and Squaring Based on Cellular Automata. PARA 2002: 359-369 |
20 | EE | Keon-Jik Lee, Kee-Won Kim, Kee-Young Yoo: Digit-serial-in-serial-out systolic multiplier for Montgomery algorithm. Inf. Process. Lett. 82(2): 65-71 (2002) |
19 | EE | Keon-Jik Lee, Kee-Young Yoo: Systolic multiplier for Montgomery's algorithm. Integration 32(1-2): 99-109 (2002) |
18 | EE | Jun-Cheol Jeon, Hyun-Sung Kim, Hyoung-Mok Lee, Kee-Young Yoo: Bit-serial AB2 Multiplier Using Modified Inner Product. J. Inf. Sci. Eng. 18(4): 507-518 (2002) |
2001 | ||
17 | Kee-Won Kim, Keon-Jik Lee, Kee-Young Yoo: Efficient Digital-Serial Systolic Multiplier for Finite Fields GF(2m). CAINE 2001: 205-208 | |
16 | Hyo-Cheol Kim, Hyun-Chul Kim, Kee-Young Yoo: A Study on the Precise Extraction of Watermark. CAINE 2001: 37-40 | |
15 | Jong-Kook Lee, Shi-Ryong Ryu, Hyun-Chul Kim, Kee-Young Yoo: A Smart Card-based Authentication System for Undeniable Digital Signature. CAINE 2001: 62-65 | |
14 | Keon-Jik Lee, Kee-Won Kim, Kee-Young Yoo: Bit-Serial Systolic Multiplier/Squarer for Montgomery's Algorithm. CAINE 2001: 70-73 | |
13 | EE | Hyun-Sung Kim, Kee-Young Yoo: Area Efficient Exponentiation Using Modular Multiplier/Squarer in GF(2m. COCOON 2001: 262-267 |
12 | Hyun-Chul Kim, Hyo-Cheol Kim, Kee-Young Yoo: Exploitation of functional parallelism in hierarchical task graph using thread. Computers and Their Applications 2001: 179-182 | |
11 | Hyo-Cheol Kim, Jeung-Seop Kim, Hyun-Chul Kim, Kee-Young Yoo: Cross-correlation property for the public watermarking. Computers and Their Applications 2001: 196-199 | |
10 | Won-Ho Lee, Hyun-Sung Kim, Kee-Young Yoo: Area Efficient Architecture for Multiplication and Squaring in GF(2^m) using Irreducible AOP. ISCA PDCS 2001: 496-499 | |
9 | Keon-Jik Lee, Kee-Won Kim, Kee-Young Yoo: Digit Serial-In-Serial-Out Systolic Multiplier for Montogomery's Algorithm. ISCA PDCS 2001: 500-504 | |
2000 | ||
8 | EE | Sung-Woo Lee, Kee-Young Yoo: Using the Resizable Working-set Notion for Software Distributed Shared Memory. CLUSTER 2000: 373-374 |
7 | EE | Sung-Woo Lee, Kee-Young Yoo: The Working-Set Based Adaptive Protocol for Software Distributed Shared Memory. HiPC 2000: 73-82 |
6 | EE | Byoung-Ho Cho, Jeung-Seop Kim, Jae-Hyung Bae, In-Gu Bae, Kee-Young Yoo: Core-Based Fingerprint Image Classification. ICPR 2000: 2859-2862 |
5 | EE | Keon-Jik Lee, Kee-Young Yoo: Linear systolic multiplier/squarer for fast exponentiation. Inf. Process. Lett. 76(3): 105-111 (2000) |
4 | EE | Hyun-Sung Kim, Sung-Woo Lee, Kee-Young Yoo: Partitioned systolic architecture for modular multiplication in GF(2m). Inf. Process. Lett. 76(3): 135-139 (2000) |
1999 | ||
3 | EE | Sung-Woo Lee, Hyun-Sung Kim, Jung-Joon Kim, Tae-Geun Kim, Kee-Young Yoo: Efficient Fixed-Size Systolic Arrays for the Modular Multiplication. COCOON 1999: 442-451 |
2 | EE | Hyun-Sung Kim, Keon-Jik Lee, Jung-Joon Kim, Kee-Young Yoo: Partitioned Systolic Multiplier for GF(2m). ICPP Workshops 1999: 192-197 |
1 | Hyun-Sung Kim, Kee-Young Yoo, Jung-Joon Kim, Tae-Geun Kim: Pipelined Systolic Multiplier for Finite Fields GF (2m). PDPTA 1999: 1224-1229 |