2009 |
70 | EE | Eun-Jun Yoon:
Robust Key Exchange Protocol between Set-Top Box and Smart Card in DTV Broadcasting.
Informatica, Lith. Acad. Sci. 20(1): 139-150 (2009) |
2008 |
69 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
Enhanced Three-Round Smart Card-Based Key Exchange Protocol.
ATC 2008: 507-515 |
68 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
Replay Attacks on Han et al.'s Chaotic Map Based Key Agreement Protocol Using Nonce.
ICIC (3) 2008: 533-540 |
67 | EE | Eun-Jun Yoon,
Eun-Jung Lee,
Kee-Young Yoo:
Cryptanalysis of Wang et al.'s Remote User Authentication Scheme Using Smart Cards.
ITNG 2008: 575-580 |
66 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
A New Key Agreement Protocol Based on Chaotic Maps.
KES-AMSTA 2008: 897-906 |
65 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
An Improvement of Password-Only Authenticated Key Establishment Protocol without Public Key Cryptography.
MUE 2008: 87-91 |
64 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
An Efficient Authentication and Key Agreement Protocol in RFID System.
NPC 2008: 320-326 |
63 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
Improving the Host Authentication Mechanism for POD Copy Protection System.
New Directions in Intelligent Interactive Multimedia 2008: 373-383 |
62 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
Robust User Password Change Scheme based on the Elliptic Curve Cryptosystem.
Fundam. Inform. 87(3-4): 483-492 (2008) |
2007 |
61 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
A Secure Chaotic Hash-Based Biometric Remote User Authentication Scheme Using Mobile Devices.
APWeb/WAIM Workshops 2007: 612-623 |
60 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
A Secret-Key Exponential Key Agreement Protocol with Smart Cards.
ATC 2007: 430-440 |
59 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
Token-Based Authenticated Key Establishment Protocols for Three-Party Communication.
EUC Workshops 2007: 758-769 |
58 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
Vulnerability of User Identification and Key Agreement Protocol with User Anonymity.
FGCN (1) 2007: 516-521 |
57 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
Two Security Problems of Efficient Remote Mutual Authentication and Key Agreement.
FGCN (2) 2007: 66-70 |
56 | EE | Eun-Jun Yoon,
Wan-Soo Lee,
Kee-Young Yoo:
Improving the Single-Assumption Authenticated Diffie-Hellman Key Agreement Protocols.
ICCSA (1) 2007: 926-936 |
55 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
Improving the Sun-Cao's Public Key Authentication Scheme for Non-repudiation.
ICIC (3) 2007: 1103-1109 |
54 | EE | Eun-Jun Yoon,
Wan-Soo Lee,
Kee-Young Yoo:
Secure PAP-Based RADIUS Protocol in Wireless Networks.
ICIC (3) 2007: 689-694 |
53 | EE | Jai-Boo Oh,
Eun-Jun Yoon,
Kee-Young Yoo:
An Efficient ID-Based Authenticated Key Agreement Protocol with Pairings.
ISPA 2007: 446-456 |
52 | | Hyun-Jin Park,
Eun-Jun Yoon,
Kee-Young Yoo:
A New Steganography Scheme using a Frame.
Security and Management 2007: 118-122 |
51 | | Nu-El Choi,
Eun-Jun Yoon,
Hyun-Jin Park,
Kee-Young Yoo:
Visual Multi-Secret Sharing Scheme with Cheater Identification.
Security and Management 2007: 90-96 |
50 | EE | Eun-Jun Yoon,
Wan-Soo Lee,
Kee-Young Yoo:
Secure Remote User Authentication Scheme Using Bilinear Pairings.
WISTP 2007: 102-114 |
49 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
Comments on Modified User Friendly Remote Authentication Scheme with Smart Cards.
IEICE Transactions 90-B(2): 331-333 (2007) |
2006 |
48 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
Improving the ID-Based Key Exchange Protocol in Wireless Mobile Ad Hoc Networks.
ADHOC-NOW 2006: 349-354 |
47 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
A Secure Password-Authenticated Key Exchange Between Clients with Different Passwords.
APWeb Workshops 2006: 659-663 |
46 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
Enhanced Forward-Secure User Authentication Scheme with Smart Cards.
EuroPKI 2006: 197-206 |
45 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
An Improved Lu-Cao's Remote User Authentication Scheme Using Smart Card.
EuroPKI 2006: 45-53 |
44 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
Various Types of Attacks and Solutions Regarding Secure Remote User Access over Insecure Networks.
ICCSA (1) 2006: 1156-1165 |
43 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
An Improved Popescu's Authenticated Key Agreement Protocol.
ICCSA (5) 2006: 276-283 |
42 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
One-Time Password Authentication Scheme Using Smart Cards Providing User Anonymity.
ICCSA (5) 2006: 303-311 |
41 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
An Optimized Two Factor Authenticated Key Exchange Protocol in PWLANs.
International Conference on Computational Science (2) 2006: 1000-1007 |
40 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
Biometrics Authenticated Key Agreement Scheme.
NGITS 2006: 345-349 |
39 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
Improving the Dynamic ID-Based Remote Mutual Authentication Scheme.
OTM Workshops (1) 2006: 499-507 |
38 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
Efficient Mutual Authentication Scheme with Smart Card.
PRIMA 2006: 813-818 |
37 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
An Improved Digital Signature with Message Recovery Using Self-certified Public Keys Without Trustworthy System Authority.
SOFSEM 2006: 548-555 |
36 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
An Optimizing Authenticated Key Exchange Protocol for Self-organizing Sensor Networks.
UCS 2006: 537-546 |
35 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
A New Secure Key Exchange Protocol Between STB and Smart Card in DTV Broadcasting.
WISI 2006: 165-166 |
2005 |
34 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
New Authentication Scheme Based on a One-Way Hash Function and Diffie-Hellman Key Exchange.
CANS 2005: 147-160 |
33 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
New Efficient Simple Authenticated Key Agreement Protocol.
COCOON 2005: 945-954 |
32 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
Improvement of an Efficient User Identification Scheme Based on ID-Based Cryptosystem.
EUC Workshops 2005: 586-591 |
31 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
A New Simple Authenticated Key Agreement and Protected Password Change Protocol.
EUC Workshops 2005: 955-964 |
30 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
An Efficient Password Authentication Schemes Without Using the Server Public Key for Grid Computing.
GCC 2005: 149-154 |
29 | EE | Eun-Jun Yoon,
Eun-Kyung Ryu,
Kee-Young Yoo:
Optimized Initiation Phases for Anonymous Auction Protocols.
Human.Society@Internet 2005: 19-27 |
28 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
Cryptanalysis of Two User Identification Schemes with Key Distribution Preserving Anonymity.
ICICS 2005: 315-322 |
27 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
New Multi-server Password Authentication Scheme Using Neural Networks.
ICNC (2) 2005: 512-519 |
26 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
More Efficient and Secure Remote User Authentication Scheme using Smart Cards.
ICPADS (2) 2005: 73-77 |
25 | EE | Eun-Jun Yoon,
Woo-Hun Kim,
Kee-Young Yoo:
Robust and Simple Authentication Protocol for Secure Communication on the Web.
ICWE 2005: 352-362 |
24 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
A New Efficient Fingerprint-Based Remote User Authentication Scheme for Multimedia Systems.
KES (3) 2005: 332-338 |
23 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
Robust Authenticated Encryption Scheme with Message Linkages.
KES (4) 2005: 281-288 |
22 | EE | Eun-Jun Yoon,
Eun-Kyung Ryu,
Kee-Young Yoo:
Secure Protected Password Change Scheme.
MMM-ACNS 2005: 472-477 |
21 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
Robust Secret Key Based Authentication Scheme Using Smart Cards.
PCM (2) 2005: 723-734 |
20 | | Eun-Jun Yoon,
Jae-Hyung Jung,
Woo-Hun Kim,
Kee-Young Yoo:
A Secret Key Based Authentication Scheme Using Smart Cards.
Security and Management 2005: 65-71 |
19 | | Eun-Jun Yoon,
Eun-Kyung Ryu,
Woo-Hun Kim,
Kee-Young Yoo:
Cryptanalysis of A Key Authentication Scheme Based on Discrete Logarithms.
Security and Management 2005: 72-78 |
18 | EE | Eun-Jun Yoon,
Woo-Hun Kim,
Kee-Young Yoo:
Security Enhancement for Password Authentication Schemes with Smart Cards.
TrustBus 2005: 311-320 |
17 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
Secure Fingerprint-Based Remote User Authentication Scheme Using Smartcards.
WINE 2005: 405-413 |
16 | EE | Woo-Hun Kim,
Eun-Jun Yoon,
Kee-Young Yoo:
New Authentication Protocol Providing User Anonymity in Open Network.
WINE 2005: 414-423 |
15 | EE | Eun-Jun Yoon,
Eun-Kyung Ryu,
Kee-Young Yoo:
Fixing problems in Lin et al.'s OSPA protocol.
Applied Mathematics and Computation 166(1): 46-57 (2005) |
14 | EE | Eun-Jun Yoon,
Eun-Kyung Ryu,
Kee-Young Yoo:
Improvement of Fan et al.'s deniable authentication protocol based on Diffie-Hellman algorithm.
Applied Mathematics and Computation 167(1): 274-280 (2005) |
13 | EE | Eun-Jun Yoon,
Eun-Kyung Ryu,
Kee-Young Yoo:
Improvement of Chien-Jan's authenticated multiple-key agreement protocol without using conventional one-way function.
Applied Mathematics and Computation 167(1): 711-715 (2005) |
12 | EE | Eun-Jun Yoon,
Eun-Kyung Ryu,
Kee-Young Yoo:
Cryptanalysis and further improvement of Peinado's improved LHL-key authentication scheme.
Applied Mathematics and Computation 168(2): 788-794 (2005) |
11 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
On the security of Wu-Lin's robust key authentication scheme.
Applied Mathematics and Computation 169(1): 1-7 (2005) |
10 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
Weakness and solution of Yang et al.'s protected password changing scheme.
Applied Mathematics and Computation 169(1): 295-304 (2005) |
9 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
Cryptanalysis of Zhang-Xiao's multisignature scheme for specified group of verifiers.
Applied Mathematics and Computation 170(1): 226-229 (2005) |
8 | EE | Eun-Jun Yoon,
Eun-Kyung Ryu,
Kee-Young Yoo:
An improvement of Hwang-Lee-Tang's simple remote user authentication scheme.
Computers & Security 24(1): 50-56 (2005) |
7 | EE | Eun-Jun Yoon,
Eun-Kyung Ryu,
Kee-Young Yoo:
Attacks on the Shen et al.'s Timestamp-Based Password Authentication Scheme Using Smart Cards.
IEICE Transactions 88-A(1): 319-321 (2005) |
6 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
Cryptanalysis of Password Authenticated Key Exchange Based on RSA for Imbalanced Wireless Networks.
IEICE Transactions 88-B(6): 2627-2628 (2005) |
5 | EE | Eun-Jun Yoon,
Eun-Kyung Ryu,
Kee-Young Yoo:
Attacks and Solutions of Yang et al.'s Protected Password Changing Scheme.
Informatica, Lith. Acad. Sci. 16(2): 285-294 (2005) |
2004 |
4 | EE | Eun-Jun Yoon,
Eun-Kyung Ryu,
Kee-Young Yoo:
Security of Shen et al.'s Timestamp-Based Password Authentication Scheme.
ICCSA (4) 2004: 665-671 |
3 | EE | Eun-Jun Yoon,
Eun-Kyung Ryu,
Kee-Young Yoo:
Robust Remote User Authentication Scheme.
ICOIN 2004: 935-942 |
2 | EE | Eun-Kyung Ryu,
Eun-Jun Yoon,
Kee-Young Yoo:
An Efficient ID-Based Authenticated Key Agreement Protocol from Pairings.
NETWORKING 2004: 1458-1463 |
1 | EE | Eun-Jun Yoon,
Eun-Kyung Ryu,
Kee-Young Yoo:
A secure user authentication scheme using hash functions.
Operating Systems Review 38(2): 62-68 (2004) |