dblp.uni-trier.dewww.uni-trier.de

Eun-Jun Yoon

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
70EEEun-Jun Yoon: Robust Key Exchange Protocol between Set-Top Box and Smart Card in DTV Broadcasting. Informatica, Lith. Acad. Sci. 20(1): 139-150 (2009)
2008
69EEEun-Jun Yoon, Kee-Young Yoo: Enhanced Three-Round Smart Card-Based Key Exchange Protocol. ATC 2008: 507-515
68EEEun-Jun Yoon, Kee-Young Yoo: Replay Attacks on Han et al.'s Chaotic Map Based Key Agreement Protocol Using Nonce. ICIC (3) 2008: 533-540
67EEEun-Jun Yoon, Eun-Jung Lee, Kee-Young Yoo: Cryptanalysis of Wang et al.'s Remote User Authentication Scheme Using Smart Cards. ITNG 2008: 575-580
66EEEun-Jun Yoon, Kee-Young Yoo: A New Key Agreement Protocol Based on Chaotic Maps. KES-AMSTA 2008: 897-906
65EEEun-Jun Yoon, Kee-Young Yoo: An Improvement of Password-Only Authenticated Key Establishment Protocol without Public Key Cryptography. MUE 2008: 87-91
64EEEun-Jun Yoon, Kee-Young Yoo: An Efficient Authentication and Key Agreement Protocol in RFID System. NPC 2008: 320-326
63EEEun-Jun Yoon, Kee-Young Yoo: Improving the Host Authentication Mechanism for POD Copy Protection System. New Directions in Intelligent Interactive Multimedia 2008: 373-383
62EEEun-Jun Yoon, Kee-Young Yoo: Robust User Password Change Scheme based on the Elliptic Curve Cryptosystem. Fundam. Inform. 87(3-4): 483-492 (2008)
2007
61EEEun-Jun Yoon, Kee-Young Yoo: A Secure Chaotic Hash-Based Biometric Remote User Authentication Scheme Using Mobile Devices. APWeb/WAIM Workshops 2007: 612-623
60EEEun-Jun Yoon, Kee-Young Yoo: A Secret-Key Exponential Key Agreement Protocol with Smart Cards. ATC 2007: 430-440
59EEEun-Jun Yoon, Kee-Young Yoo: Token-Based Authenticated Key Establishment Protocols for Three-Party Communication. EUC Workshops 2007: 758-769
58EEEun-Jun Yoon, Kee-Young Yoo: Vulnerability of User Identification and Key Agreement Protocol with User Anonymity. FGCN (1) 2007: 516-521
57EEEun-Jun Yoon, Kee-Young Yoo: Two Security Problems of Efficient Remote Mutual Authentication and Key Agreement. FGCN (2) 2007: 66-70
56EEEun-Jun Yoon, Wan-Soo Lee, Kee-Young Yoo: Improving the Single-Assumption Authenticated Diffie-Hellman Key Agreement Protocols. ICCSA (1) 2007: 926-936
55EEEun-Jun Yoon, Kee-Young Yoo: Improving the Sun-Cao's Public Key Authentication Scheme for Non-repudiation. ICIC (3) 2007: 1103-1109
54EEEun-Jun Yoon, Wan-Soo Lee, Kee-Young Yoo: Secure PAP-Based RADIUS Protocol in Wireless Networks. ICIC (3) 2007: 689-694
53EEJai-Boo Oh, Eun-Jun Yoon, Kee-Young Yoo: An Efficient ID-Based Authenticated Key Agreement Protocol with Pairings. ISPA 2007: 446-456
52 Hyun-Jin Park, Eun-Jun Yoon, Kee-Young Yoo: A New Steganography Scheme using a Frame. Security and Management 2007: 118-122
51 Nu-El Choi, Eun-Jun Yoon, Hyun-Jin Park, Kee-Young Yoo: Visual Multi-Secret Sharing Scheme with Cheater Identification. Security and Management 2007: 90-96
50EEEun-Jun Yoon, Wan-Soo Lee, Kee-Young Yoo: Secure Remote User Authentication Scheme Using Bilinear Pairings. WISTP 2007: 102-114
49EEEun-Jun Yoon, Kee-Young Yoo: Comments on Modified User Friendly Remote Authentication Scheme with Smart Cards. IEICE Transactions 90-B(2): 331-333 (2007)
2006
48EEEun-Jun Yoon, Kee-Young Yoo: Improving the ID-Based Key Exchange Protocol in Wireless Mobile Ad Hoc Networks. ADHOC-NOW 2006: 349-354
47EEEun-Jun Yoon, Kee-Young Yoo: A Secure Password-Authenticated Key Exchange Between Clients with Different Passwords. APWeb Workshops 2006: 659-663
46EEEun-Jun Yoon, Kee-Young Yoo: Enhanced Forward-Secure User Authentication Scheme with Smart Cards. EuroPKI 2006: 197-206
45EEEun-Jun Yoon, Kee-Young Yoo: An Improved Lu-Cao's Remote User Authentication Scheme Using Smart Card. EuroPKI 2006: 45-53
44EEEun-Jun Yoon, Kee-Young Yoo: Various Types of Attacks and Solutions Regarding Secure Remote User Access over Insecure Networks. ICCSA (1) 2006: 1156-1165
43EEEun-Jun Yoon, Kee-Young Yoo: An Improved Popescu's Authenticated Key Agreement Protocol. ICCSA (5) 2006: 276-283
42EEEun-Jun Yoon, Kee-Young Yoo: One-Time Password Authentication Scheme Using Smart Cards Providing User Anonymity. ICCSA (5) 2006: 303-311
41EEEun-Jun Yoon, Kee-Young Yoo: An Optimized Two Factor Authenticated Key Exchange Protocol in PWLANs. International Conference on Computational Science (2) 2006: 1000-1007
40EEEun-Jun Yoon, Kee-Young Yoo: Biometrics Authenticated Key Agreement Scheme. NGITS 2006: 345-349
39EEEun-Jun Yoon, Kee-Young Yoo: Improving the Dynamic ID-Based Remote Mutual Authentication Scheme. OTM Workshops (1) 2006: 499-507
38EEEun-Jun Yoon, Kee-Young Yoo: Efficient Mutual Authentication Scheme with Smart Card. PRIMA 2006: 813-818
37EEEun-Jun Yoon, Kee-Young Yoo: An Improved Digital Signature with Message Recovery Using Self-certified Public Keys Without Trustworthy System Authority. SOFSEM 2006: 548-555
36EEEun-Jun Yoon, Kee-Young Yoo: An Optimizing Authenticated Key Exchange Protocol for Self-organizing Sensor Networks. UCS 2006: 537-546
35EEEun-Jun Yoon, Kee-Young Yoo: A New Secure Key Exchange Protocol Between STB and Smart Card in DTV Broadcasting. WISI 2006: 165-166
2005
34EEEun-Jun Yoon, Kee-Young Yoo: New Authentication Scheme Based on a One-Way Hash Function and Diffie-Hellman Key Exchange. CANS 2005: 147-160
33EEEun-Jun Yoon, Kee-Young Yoo: New Efficient Simple Authenticated Key Agreement Protocol. COCOON 2005: 945-954
32EEEun-Jun Yoon, Kee-Young Yoo: Improvement of an Efficient User Identification Scheme Based on ID-Based Cryptosystem. EUC Workshops 2005: 586-591
31EEEun-Jun Yoon, Kee-Young Yoo: A New Simple Authenticated Key Agreement and Protected Password Change Protocol. EUC Workshops 2005: 955-964
30EEEun-Jun Yoon, Kee-Young Yoo: An Efficient Password Authentication Schemes Without Using the Server Public Key for Grid Computing. GCC 2005: 149-154
29EEEun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo: Optimized Initiation Phases for Anonymous Auction Protocols. Human.Society@Internet 2005: 19-27
28EEEun-Jun Yoon, Kee-Young Yoo: Cryptanalysis of Two User Identification Schemes with Key Distribution Preserving Anonymity. ICICS 2005: 315-322
27EEEun-Jun Yoon, Kee-Young Yoo: New Multi-server Password Authentication Scheme Using Neural Networks. ICNC (2) 2005: 512-519
26EEEun-Jun Yoon, Kee-Young Yoo: More Efficient and Secure Remote User Authentication Scheme using Smart Cards. ICPADS (2) 2005: 73-77
25EEEun-Jun Yoon, Woo-Hun Kim, Kee-Young Yoo: Robust and Simple Authentication Protocol for Secure Communication on the Web. ICWE 2005: 352-362
24EEEun-Jun Yoon, Kee-Young Yoo: A New Efficient Fingerprint-Based Remote User Authentication Scheme for Multimedia Systems. KES (3) 2005: 332-338
23EEEun-Jun Yoon, Kee-Young Yoo: Robust Authenticated Encryption Scheme with Message Linkages. KES (4) 2005: 281-288
22EEEun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo: Secure Protected Password Change Scheme. MMM-ACNS 2005: 472-477
21EEEun-Jun Yoon, Kee-Young Yoo: Robust Secret Key Based Authentication Scheme Using Smart Cards. PCM (2) 2005: 723-734
20 Eun-Jun Yoon, Jae-Hyung Jung, Woo-Hun Kim, Kee-Young Yoo: A Secret Key Based Authentication Scheme Using Smart Cards. Security and Management 2005: 65-71
19 Eun-Jun Yoon, Eun-Kyung Ryu, Woo-Hun Kim, Kee-Young Yoo: Cryptanalysis of A Key Authentication Scheme Based on Discrete Logarithms. Security and Management 2005: 72-78
18EEEun-Jun Yoon, Woo-Hun Kim, Kee-Young Yoo: Security Enhancement for Password Authentication Schemes with Smart Cards. TrustBus 2005: 311-320
17EEEun-Jun Yoon, Kee-Young Yoo: Secure Fingerprint-Based Remote User Authentication Scheme Using Smartcards. WINE 2005: 405-413
16EEWoo-Hun Kim, Eun-Jun Yoon, Kee-Young Yoo: New Authentication Protocol Providing User Anonymity in Open Network. WINE 2005: 414-423
15EEEun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo: Fixing problems in Lin et al.'s OSPA protocol. Applied Mathematics and Computation 166(1): 46-57 (2005)
14EEEun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo: Improvement of Fan et al.'s deniable authentication protocol based on Diffie-Hellman algorithm. Applied Mathematics and Computation 167(1): 274-280 (2005)
13EEEun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo: Improvement of Chien-Jan's authenticated multiple-key agreement protocol without using conventional one-way function. Applied Mathematics and Computation 167(1): 711-715 (2005)
12EEEun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo: Cryptanalysis and further improvement of Peinado's improved LHL-key authentication scheme. Applied Mathematics and Computation 168(2): 788-794 (2005)
11EEEun-Jun Yoon, Kee-Young Yoo: On the security of Wu-Lin's robust key authentication scheme. Applied Mathematics and Computation 169(1): 1-7 (2005)
10EEEun-Jun Yoon, Kee-Young Yoo: Weakness and solution of Yang et al.'s protected password changing scheme. Applied Mathematics and Computation 169(1): 295-304 (2005)
9EEEun-Jun Yoon, Kee-Young Yoo: Cryptanalysis of Zhang-Xiao's multisignature scheme for specified group of verifiers. Applied Mathematics and Computation 170(1): 226-229 (2005)
8EEEun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo: An improvement of Hwang-Lee-Tang's simple remote user authentication scheme. Computers & Security 24(1): 50-56 (2005)
7EEEun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo: Attacks on the Shen et al.'s Timestamp-Based Password Authentication Scheme Using Smart Cards. IEICE Transactions 88-A(1): 319-321 (2005)
6EEEun-Jun Yoon, Kee-Young Yoo: Cryptanalysis of Password Authenticated Key Exchange Based on RSA for Imbalanced Wireless Networks. IEICE Transactions 88-B(6): 2627-2628 (2005)
5EEEun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo: Attacks and Solutions of Yang et al.'s Protected Password Changing Scheme. Informatica, Lith. Acad. Sci. 16(2): 285-294 (2005)
2004
4EEEun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo: Security of Shen et al.'s Timestamp-Based Password Authentication Scheme. ICCSA (4) 2004: 665-671
3EEEun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo: Robust Remote User Authentication Scheme. ICOIN 2004: 935-942
2EEEun-Kyung Ryu, Eun-Jun Yoon, Kee-Young Yoo: An Efficient ID-Based Authenticated Key Agreement Protocol from Pairings. NETWORKING 2004: 1458-1463
1EEEun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo: A secure user authentication scheme using hash functions. Operating Systems Review 38(2): 62-68 (2004)

Coauthor Index

1Nu-El Choi [51]
2Jae-Hyung Jung [20]
3Woo-Hun Kim [16] [18] [19] [20] [25]
4Eun-Jung Lee [67]
5Wan-Soo Lee [50] [54] [56]
6Jai-Boo Oh [53]
7Hyun-Jin Park [51] [52]
8Eun-Kyung Ryu [1] [2] [3] [4] [5] [7] [8] [12] [13] [14] [15] [19] [22] [29]
9Kee-Young Yoo [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] [20] [21] [22] [23] [24] [25] [26] [27] [28] [29] [30] [31] [32] [33] [34] [35] [36] [37] [38] [39] [40] [41] [42] [43] [44] [45] [46] [47] [48] [49] [50] [51] [52] [53] [54] [55] [56] [57] [58] [59] [60] [61] [62] [63] [64] [65] [66] [67] [68] [69]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)