| 2009 |
| 70 | EE | Eun-Jun Yoon:
Robust Key Exchange Protocol between Set-Top Box and Smart Card in DTV Broadcasting.
Informatica, Lith. Acad. Sci. 20(1): 139-150 (2009) |
| 2008 |
| 69 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
Enhanced Three-Round Smart Card-Based Key Exchange Protocol.
ATC 2008: 507-515 |
| 68 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
Replay Attacks on Han et al.'s Chaotic Map Based Key Agreement Protocol Using Nonce.
ICIC (3) 2008: 533-540 |
| 67 | EE | Eun-Jun Yoon,
Eun-Jung Lee,
Kee-Young Yoo:
Cryptanalysis of Wang et al.'s Remote User Authentication Scheme Using Smart Cards.
ITNG 2008: 575-580 |
| 66 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
A New Key Agreement Protocol Based on Chaotic Maps.
KES-AMSTA 2008: 897-906 |
| 65 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
An Improvement of Password-Only Authenticated Key Establishment Protocol without Public Key Cryptography.
MUE 2008: 87-91 |
| 64 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
An Efficient Authentication and Key Agreement Protocol in RFID System.
NPC 2008: 320-326 |
| 63 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
Improving the Host Authentication Mechanism for POD Copy Protection System.
New Directions in Intelligent Interactive Multimedia 2008: 373-383 |
| 62 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
Robust User Password Change Scheme based on the Elliptic Curve Cryptosystem.
Fundam. Inform. 87(3-4): 483-492 (2008) |
| 2007 |
| 61 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
A Secure Chaotic Hash-Based Biometric Remote User Authentication Scheme Using Mobile Devices.
APWeb/WAIM Workshops 2007: 612-623 |
| 60 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
A Secret-Key Exponential Key Agreement Protocol with Smart Cards.
ATC 2007: 430-440 |
| 59 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
Token-Based Authenticated Key Establishment Protocols for Three-Party Communication.
EUC Workshops 2007: 758-769 |
| 58 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
Vulnerability of User Identification and Key Agreement Protocol with User Anonymity.
FGCN (1) 2007: 516-521 |
| 57 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
Two Security Problems of Efficient Remote Mutual Authentication and Key Agreement.
FGCN (2) 2007: 66-70 |
| 56 | EE | Eun-Jun Yoon,
Wan-Soo Lee,
Kee-Young Yoo:
Improving the Single-Assumption Authenticated Diffie-Hellman Key Agreement Protocols.
ICCSA (1) 2007: 926-936 |
| 55 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
Improving the Sun-Cao's Public Key Authentication Scheme for Non-repudiation.
ICIC (3) 2007: 1103-1109 |
| 54 | EE | Eun-Jun Yoon,
Wan-Soo Lee,
Kee-Young Yoo:
Secure PAP-Based RADIUS Protocol in Wireless Networks.
ICIC (3) 2007: 689-694 |
| 53 | EE | Jai-Boo Oh,
Eun-Jun Yoon,
Kee-Young Yoo:
An Efficient ID-Based Authenticated Key Agreement Protocol with Pairings.
ISPA 2007: 446-456 |
| 52 | | Hyun-Jin Park,
Eun-Jun Yoon,
Kee-Young Yoo:
A New Steganography Scheme using a Frame.
Security and Management 2007: 118-122 |
| 51 | | Nu-El Choi,
Eun-Jun Yoon,
Hyun-Jin Park,
Kee-Young Yoo:
Visual Multi-Secret Sharing Scheme with Cheater Identification.
Security and Management 2007: 90-96 |
| 50 | EE | Eun-Jun Yoon,
Wan-Soo Lee,
Kee-Young Yoo:
Secure Remote User Authentication Scheme Using Bilinear Pairings.
WISTP 2007: 102-114 |
| 49 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
Comments on Modified User Friendly Remote Authentication Scheme with Smart Cards.
IEICE Transactions 90-B(2): 331-333 (2007) |
| 2006 |
| 48 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
Improving the ID-Based Key Exchange Protocol in Wireless Mobile Ad Hoc Networks.
ADHOC-NOW 2006: 349-354 |
| 47 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
A Secure Password-Authenticated Key Exchange Between Clients with Different Passwords.
APWeb Workshops 2006: 659-663 |
| 46 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
Enhanced Forward-Secure User Authentication Scheme with Smart Cards.
EuroPKI 2006: 197-206 |
| 45 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
An Improved Lu-Cao's Remote User Authentication Scheme Using Smart Card.
EuroPKI 2006: 45-53 |
| 44 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
Various Types of Attacks and Solutions Regarding Secure Remote User Access over Insecure Networks.
ICCSA (1) 2006: 1156-1165 |
| 43 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
An Improved Popescu's Authenticated Key Agreement Protocol.
ICCSA (5) 2006: 276-283 |
| 42 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
One-Time Password Authentication Scheme Using Smart Cards Providing User Anonymity.
ICCSA (5) 2006: 303-311 |
| 41 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
An Optimized Two Factor Authenticated Key Exchange Protocol in PWLANs.
International Conference on Computational Science (2) 2006: 1000-1007 |
| 40 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
Biometrics Authenticated Key Agreement Scheme.
NGITS 2006: 345-349 |
| 39 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
Improving the Dynamic ID-Based Remote Mutual Authentication Scheme.
OTM Workshops (1) 2006: 499-507 |
| 38 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
Efficient Mutual Authentication Scheme with Smart Card.
PRIMA 2006: 813-818 |
| 37 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
An Improved Digital Signature with Message Recovery Using Self-certified Public Keys Without Trustworthy System Authority.
SOFSEM 2006: 548-555 |
| 36 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
An Optimizing Authenticated Key Exchange Protocol for Self-organizing Sensor Networks.
UCS 2006: 537-546 |
| 35 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
A New Secure Key Exchange Protocol Between STB and Smart Card in DTV Broadcasting.
WISI 2006: 165-166 |
| 2005 |
| 34 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
New Authentication Scheme Based on a One-Way Hash Function and Diffie-Hellman Key Exchange.
CANS 2005: 147-160 |
| 33 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
New Efficient Simple Authenticated Key Agreement Protocol.
COCOON 2005: 945-954 |
| 32 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
Improvement of an Efficient User Identification Scheme Based on ID-Based Cryptosystem.
EUC Workshops 2005: 586-591 |
| 31 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
A New Simple Authenticated Key Agreement and Protected Password Change Protocol.
EUC Workshops 2005: 955-964 |
| 30 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
An Efficient Password Authentication Schemes Without Using the Server Public Key for Grid Computing.
GCC 2005: 149-154 |
| 29 | EE | Eun-Jun Yoon,
Eun-Kyung Ryu,
Kee-Young Yoo:
Optimized Initiation Phases for Anonymous Auction Protocols.
Human.Society@Internet 2005: 19-27 |
| 28 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
Cryptanalysis of Two User Identification Schemes with Key Distribution Preserving Anonymity.
ICICS 2005: 315-322 |
| 27 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
New Multi-server Password Authentication Scheme Using Neural Networks.
ICNC (2) 2005: 512-519 |
| 26 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
More Efficient and Secure Remote User Authentication Scheme using Smart Cards.
ICPADS (2) 2005: 73-77 |
| 25 | EE | Eun-Jun Yoon,
Woo-Hun Kim,
Kee-Young Yoo:
Robust and Simple Authentication Protocol for Secure Communication on the Web.
ICWE 2005: 352-362 |
| 24 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
A New Efficient Fingerprint-Based Remote User Authentication Scheme for Multimedia Systems.
KES (3) 2005: 332-338 |
| 23 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
Robust Authenticated Encryption Scheme with Message Linkages.
KES (4) 2005: 281-288 |
| 22 | EE | Eun-Jun Yoon,
Eun-Kyung Ryu,
Kee-Young Yoo:
Secure Protected Password Change Scheme.
MMM-ACNS 2005: 472-477 |
| 21 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
Robust Secret Key Based Authentication Scheme Using Smart Cards.
PCM (2) 2005: 723-734 |
| 20 | | Eun-Jun Yoon,
Jae-Hyung Jung,
Woo-Hun Kim,
Kee-Young Yoo:
A Secret Key Based Authentication Scheme Using Smart Cards.
Security and Management 2005: 65-71 |
| 19 | | Eun-Jun Yoon,
Eun-Kyung Ryu,
Woo-Hun Kim,
Kee-Young Yoo:
Cryptanalysis of A Key Authentication Scheme Based on Discrete Logarithms.
Security and Management 2005: 72-78 |
| 18 | EE | Eun-Jun Yoon,
Woo-Hun Kim,
Kee-Young Yoo:
Security Enhancement for Password Authentication Schemes with Smart Cards.
TrustBus 2005: 311-320 |
| 17 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
Secure Fingerprint-Based Remote User Authentication Scheme Using Smartcards.
WINE 2005: 405-413 |
| 16 | EE | Woo-Hun Kim,
Eun-Jun Yoon,
Kee-Young Yoo:
New Authentication Protocol Providing User Anonymity in Open Network.
WINE 2005: 414-423 |
| 15 | EE | Eun-Jun Yoon,
Eun-Kyung Ryu,
Kee-Young Yoo:
Fixing problems in Lin et al.'s OSPA protocol.
Applied Mathematics and Computation 166(1): 46-57 (2005) |
| 14 | EE | Eun-Jun Yoon,
Eun-Kyung Ryu,
Kee-Young Yoo:
Improvement of Fan et al.'s deniable authentication protocol based on Diffie-Hellman algorithm.
Applied Mathematics and Computation 167(1): 274-280 (2005) |
| 13 | EE | Eun-Jun Yoon,
Eun-Kyung Ryu,
Kee-Young Yoo:
Improvement of Chien-Jan's authenticated multiple-key agreement protocol without using conventional one-way function.
Applied Mathematics and Computation 167(1): 711-715 (2005) |
| 12 | EE | Eun-Jun Yoon,
Eun-Kyung Ryu,
Kee-Young Yoo:
Cryptanalysis and further improvement of Peinado's improved LHL-key authentication scheme.
Applied Mathematics and Computation 168(2): 788-794 (2005) |
| 11 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
On the security of Wu-Lin's robust key authentication scheme.
Applied Mathematics and Computation 169(1): 1-7 (2005) |
| 10 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
Weakness and solution of Yang et al.'s protected password changing scheme.
Applied Mathematics and Computation 169(1): 295-304 (2005) |
| 9 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
Cryptanalysis of Zhang-Xiao's multisignature scheme for specified group of verifiers.
Applied Mathematics and Computation 170(1): 226-229 (2005) |
| 8 | EE | Eun-Jun Yoon,
Eun-Kyung Ryu,
Kee-Young Yoo:
An improvement of Hwang-Lee-Tang's simple remote user authentication scheme.
Computers & Security 24(1): 50-56 (2005) |
| 7 | EE | Eun-Jun Yoon,
Eun-Kyung Ryu,
Kee-Young Yoo:
Attacks on the Shen et al.'s Timestamp-Based Password Authentication Scheme Using Smart Cards.
IEICE Transactions 88-A(1): 319-321 (2005) |
| 6 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
Cryptanalysis of Password Authenticated Key Exchange Based on RSA for Imbalanced Wireless Networks.
IEICE Transactions 88-B(6): 2627-2628 (2005) |
| 5 | EE | Eun-Jun Yoon,
Eun-Kyung Ryu,
Kee-Young Yoo:
Attacks and Solutions of Yang et al.'s Protected Password Changing Scheme.
Informatica, Lith. Acad. Sci. 16(2): 285-294 (2005) |
| 2004 |
| 4 | EE | Eun-Jun Yoon,
Eun-Kyung Ryu,
Kee-Young Yoo:
Security of Shen et al.'s Timestamp-Based Password Authentication Scheme.
ICCSA (4) 2004: 665-671 |
| 3 | EE | Eun-Jun Yoon,
Eun-Kyung Ryu,
Kee-Young Yoo:
Robust Remote User Authentication Scheme.
ICOIN 2004: 935-942 |
| 2 | EE | Eun-Kyung Ryu,
Eun-Jun Yoon,
Kee-Young Yoo:
An Efficient ID-Based Authenticated Key Agreement Protocol from Pairings.
NETWORKING 2004: 1458-1463 |
| 1 | EE | Eun-Jun Yoon,
Eun-Kyung Ryu,
Kee-Young Yoo:
A secure user authentication scheme using hash functions.
Operating Systems Review 38(2): 62-68 (2004) |