


Остановите войну!
for scientists:


default search action
Eun-Jun Yoon
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2021
- [j60]Rosemary Koikara, Eun-Jun Yoon, Anand Paul
:
Publicly verifiable threshold secret sharing based on three-dimensional-cellular automata. Concurr. Comput. Pract. Exp. 33(22) (2021)
2010 – 2019
- 2019
- [j59]Pyung-Han Kim
, Eun-Jun Yoon, Kwan-Woo Ryu
, Ki-Hyun Jung
:
Data-Hiding Scheme Using Multidirectional Pixel-Value Differencing on Colour Images. Secur. Commun. Networks 2019: 9038650:1-9038650:11 (2019) - 2018
- [j58]Goutham Reddy Alavalapati, Eun-Jun Yoon, Young-Ju Kim, Kee-Young Yoo:
Design of a Secure Mutually Authenticated Key-Agreement Protocol for Multi-server Architecture. J. Comput. 13(2): 194-203 (2018) - [j57]Gil-Je Lee, Eun-Jun Yoon, Cheonshik Kim
, Kee-Young Yoo:
A real-time secret image sharing with fairness. J. Real Time Image Process. 14(1): 5-12 (2018) - [j56]Dae-Soo Kim, Eun-Jun Yoon, Cheonshik Kim
, Kee-Young Yoo:
Reversible data hiding scheme with edge-direction predictor and modulo operation. J. Real Time Image Process. 14(1): 137-145 (2018) - 2017
- [j55]Sravani Challa, Mohammad Wazid
, Ashok Kumar Das, Neeraj Kumar
, Goutham Reddy Alavalapati
, Eun-Jun Yoon, Kee-Young Yoo:
Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications. IEEE Access 5: 3028-3043 (2017) - [j54]Goutham Reddy Alavalapati
, Eun-Jun Yoon, Ashok Kumar Das, Vanga Odelu, Kee-Young Yoo:
Design of Mutually Authenticated Key Agreement Protocol Resistant to Impersonation Attacks for Multi-Server Environment. IEEE Access 5: 3622-3639 (2017) - [j53]Goutham Reddy Alavalapati
, Eun-Jun Yoon, Kee-Young Yoo:
Comment on 'Efficient and secure dynamic ID-based remote user authentication scheme for distributed systems using smart cards'. IET Inf. Secur. 11(4): 220-221 (2017) - 2016
- [j52]Goutham Reddy Alavalapati
, Ashok Kumar Das, Eun-Jun Yoon, Kee-Young Yoo:
A Secure Anonymous Authentication Protocol for Mobile Services on Elliptic Curve Cryptography. IEEE Access 4: 4394-4407 (2016) - [j51]Goutham Reddy Alavalapati
, Eun-Jun Yoon, Ashok Kumar Das, Kee-Young Yoo:
Lightweight authentication with key-agreement protocol for mobile network environment using smart cards. IET Inf. Secur. 10(5): 272-282 (2016) - [j50]Anneke Soraya Hidayat, Gil-Je Lee, Eun-Jun Yoon, Kee-Young Yoo:
An in-depth analysis of strong t-consistency on secret image sharing. Int. J. Pervasive Comput. Commun. 12(1): 107-126 (2016) - [j49]Goutham Reddy Alavalapati
, Ashok Kumar Das, Eun-Jun Yoon, Kee-Young Yoo:
An Anonymous Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Biometrics and Smartcards. KSII Trans. Internet Inf. Syst. 10(7): 3371-3396 (2016) - [c75]Goutham Reddy Alavalapati
, Eun-Jun Yoon, Ashok Kumar Das, Kee-Young Yoo:
An Enhanced Anonymous Two-factor Mutual Authentication with Key-agreement Scheme for Session Initiation Protocol. SIN 2016: 145-149 - 2015
- [c74]Anneke Soraya Hidayat, Gil-Je Lee, Eun-Jun Yoon, Kee-Young Yoo:
Consistency Analysis for Secure Reconstruction in Secret Image Sharing. MoMM 2015: 357-364 - 2014
- [j48]YouSik Hong, Eun-Jun Yoon, Nojeong Heo, Eunju Kim, Youngchul Bae:
Development of a Smart Oriental Medical System Using Security Functions. Int. J. Fuzzy Log. Intell. Syst. 14(4): 268-275 (2014) - [c73]Eun-Jun Yoon, Kee-Young Yoo:
A biometric-based authenticated key agreement scheme using ECC for wireless sensor networks. SAC 2014: 699-705 - 2013
- [j47]Eun-Jun Yoon:
Verifier-based computation-and communication-efficient 3EKE protocols. Math. Comput. Model. 58(1-2): 165-171 (2013) - [j46]Eun-Jun Yoon, Kee-Young Yoo:
Robust biometrics-based multi-server authentication with key agreement scheme for smart cards on elliptic curve cryptosystem. J. Supercomput. 63(1): 235-255 (2013) - [c72]Eun-Jun Yoon, Yong Soo Choi, Cheonshik Kim
:
New ID-Based Proxy Signature Scheme with Message Recovery. GPC 2013: 945-951 - 2012
- [j45]Eun-Jun Yoon:
Improvement of the securing RFID systems conforming to EPC Class 1 Generation 2 standard. Expert Syst. Appl. 39(1): 1589-1594 (2012) - [j44]Eun-Jun Yoon, Kee-Young Yoo:
On the Security of an Efficient and Secure Dynamic ID-Based Remote User Authentication Scheme. IEICE Trans. Inf. Syst. 95-D(6): 1684-1686 (2012) - [j43]Eun-Jun Yoon, Kee-Young Yoo:
Cryptanalysis of an Improved User Authentication Scheme with User Anonymity for Wireless Communications. IEICE Trans. Inf. Syst. 95-D(6): 1687-1689 (2012) - [j42]Eun-Jun Yoon, Kee-Young Yoo:
An Improvement of the User Identification and Key Agreement Protocol with User Anonymity. Informatica 23(1): 155-172 (2012) - [c71]Eun-Jun Yoon:
On the Security of Lv et al.'s Three-Party Authenticated Key Exchange Protocol Using One-Time Key. ICAIT 2012: 191-198 - [c70]Eun-Jun Yoon:
Cryptanalysis of an RFID Tag Search Protocol Preserving Privacy of Mobile Reader. NPC 2012: 575-580 - [c69]Hae-Jung Kim, Eun-Jun Yoon:
Cryptanalysis of Goriparthi et al.'s Bilinear Pairing Based Remote User Authentication Scheme. NPC 2012: 581-588 - 2011
- [j41]Eun-Jun Yoon, Kee-Young Yoo, Keum-Sook Ha:
A user friendly authentication scheme with anonymity for wireless communications. Comput. Electr. Eng. 37(3): 356-364 (2011) - [j40]Eun-Jun Yoon, Jeong-Woo Hong, Sang-Yoon Yoon, Dong-In Park, Myung-Jin Choi:
Cryptanalysis of an Enhanced Spatiotemporal Chaotic Image/Video Cryptosystem. EURASIP J. Adv. Signal Process. 2011 (2011) - [j39]Eun-Jun Yoon, Kee-Young Yoo, Jeong-Woo Hong, Sang-Yoon Yoon, Dong-In Park, Myung-Jin Choi:
An efficient and secure anonymous authentication scheme for mobile satellite communication systems. EURASIP J. Wirel. Commun. Netw. 2011: 86 (2011) - [j38]Eun-Jun Yoon, Kee-Young Yoo:
A secure broadcasting cryptosystem and its application to grid computing. Future Gener. Comput. Syst. 27(5): 620-626 (2011) - [j37]Eun-Jun Yoon, Il-Soo Jeon, Kee-Young Yoo:
Robust Authentication Scheme between User and Remote Autonomous Object in Telecommunications System. IEICE Trans. Inf. Syst. 94-D(5): 1113-1116 (2011) - [j36]Eun-Jun Yoon, Kee-Young Yoo:
Cryptanalysis of Group Key Agreement Protocol Based on Chaotic Hash Function. IEICE Trans. Inf. Syst. 94-D(11): 2167-2170 (2011) - [j35]Eun-Jun Yoon, Kee-Young Yoo:
Robust biometric-based three-party authenticated key establishment protocols. Int. J. Comput. Math. 88(6): 1144-1157 (2011) - [j34]Eun-Jun Yoon, Kee-Young Yoo:
Cryptanalysis of a simple three-party password-based key exchange protocol. Int. J. Commun. Syst. 24(4): 532-542 (2011) - [j33]Jeong-Woo Hong, Sang-Yoon Yoon, Dong-In Park, Myung-Jin Choi, Eun-Jun Yoon, Kee-Young Yoo:
A New Efficient Key Agreement Scheme for VSAT Satellite Communications Based on Elliptic Curve Cryptosystem. Inf. Technol. Control. 40(3): 252-259 (2011) - [j32]Eun-Jun Yoon:
An Efficient and Secure Identity-Based Strong Designated Verifier Signature Scheme. Inf. Technol. Control. 40(4): 323-329 (2011) - [c68]Eun-Jun Yoon, Kee-Young Yoo:
Cryptanalysis of robust mutual authentication protocol for wireless sensor networks. IEEE ICCI*CC 2011: 392-396 - [c67]Eun-Jun Yoon, Kee-Young Yoo:
A Practical Convertible Authenticated Encryption Scheme with Message Linkages and Forward Secrecy. CSE 2011: 339-342 - [c66]Eun-Jun Yoon, Kee-Young Yoo:
Simple Authenticated Multiple Key Exchange Protocol for Ubiquitous Computing. CSE 2011: 532-536 - [c65]Hae-Jung Kim, Eun-Jun Yoon:
Cryptanalysis of an Enhanced Simple Three-Party Key Exchange Protocol. FGIT-SecTech 2011: 167-176 - [c64]Eun-Jun Yoon, Kee-Young Yoo:
A New Biometric-based User Authentication Scheme without Using Password for Wireless Sensor Networks. WETICE 2011: 279-284 - 2010
- [j31]Eun-Jun Yoon, Kee-Young Yoo, Cheonshik Kim
, YouSik Hong, Minho Jo
, Hsiao-Hwa Chen:
A secure and efficient SIP authentication scheme for converged VoIP networks. Comput. Commun. 33(14): 1674-1681 (2010) - [j30]Eun-Jun Yoon, Kee-Young Yoo:
A New Fingerprint Biometric Remote User Authentication Scheme Using Chaotic Hash Function On Mobile Devices. Intell. Autom. Soft Comput. 16(3): 471-487 (2010) - [j29]Eun-Jun Yoon, Kee-Young Yoo:
An Optimized Gateway-Oriented Password-Based Authenticated Key Exchange Protocol. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(4): 850-853 (2010) - [j28]Eun-Jun Yoon, Kee-Young Yoo:
Off-Line Keyword Guessing Attacks on Searchable Encryption with Keyword-Recoverability. IEICE Trans. Inf. Syst. 93-D(7): 1995-1996 (2010) - [j27]Eun-Jun Yoon, Kee-Young Yoo:
A Biometric Authenticated Key Agreement Protocol for Secure Token. IEICE Trans. Inf. Syst. 93-D(8): 2311-2315 (2010) - [j26]Eun-Jun Yoon, Kee-Young Yoo:
A Robust Security Mechanism for Mobile Commerce Transactions. IEICE Trans. Inf. Syst. 93-D(11): 2898-2906 (2010) - [j25]Eun-Jun Yoon, Muhammad Khurram Khan, Kee-Young Yoo:
Improvement of the Efficient Secret Broadcast Scheme. IEICE Trans. Inf. Syst. 93-D(12): 3396-3399 (2010) - [j24]Eun-Jun Yoon, Muhammad Khurram Khan, Kee-Young Yoo:
Cryptanalysis of a Handover Authentication Scheme Using Credentials Based on Chameleon Hashing. IEICE Trans. Inf. Syst. 93-D(12): 3400-3402 (2010) - [j23]Eun-Jun Yoon, Kee-Young Yoo:
An Entire Chaos-Based Biometric Remote User Authentication Scheme on Tokens Without Using Password. Informatica 21(4): 627-637 (2010) - [j22]Eun-Jun Yoon, Kee-Young Yoo, Sang-Soo Yeo
, Changhoon Lee:
Robust Deniable Authentication Protocol. Wirel. Pers. Commun. 55(1): 81-90 (2010) - [c63]Eun-Kyung Ryu, Eun-Jun Yoon, Kee-Young Yoo:
More Robust Anonymous Authentication with Link-Layer Privacy. APSCC 2010: 441-446 - [c62]Eun-Jun Yoon, Kee-Young Yoo:
A Three-Factor Authenticated Key Agreement Scheme for SIP on Elliptic Curves. NSS 2010: 334-339
2000 – 2009
- 2009
- [j21]Eun-Jun Yoon:
Robust Key Exchange Protocol between Set-Top Box and Smart Card in DTV Broadcasting. Informatica 20(1): 139-150 (2009) - [c61]Eun-Jun Yoon, Kee-Young Yoo:
A New Authentication Scheme for Session Initiation Protocol. CISIS 2009: 549-554 - [c60]Eun-Jun Yoon, Kee-Young Yoo:
Robust ID-Based Remote Mutual Authentication with Key Agreement Scheme for Mobile Devices on ECC. CSE (2) 2009: 633-640 - [c59]Eun-Jun Yoon, Kee-Young Yoo:
Robust Broadcasting Cryptosystem in Computer Networks. GPC Workshops 2009: 153-159 - [c58]YouSik Hong, Sun-Jin Oh, Cheonshik Kim
, Yong Soon Im, Gyoo-Seok Choi, Eun-Jun Yoon, Yu Cheol Jeon, Chanwoo Moon, Myeon-Koo Kang, Jeongsook Kim:
A study on intelligent cyber university. ICHIT 2009: 525-529 - [c57]Eun-Jun Yoon, Kee-Young Yoo:
Robust Multi-Server Authentication Scheme. NPC 2009: 197-203 - 2008
- [j20]Eun-Jun Yoon, Kee-Young Yoo:
Improving the novel three-party encrypted key exchange protocol. Comput. Stand. Interfaces 30(5): 309-314 (2008) - [j19]Eun-Jun Yoon, Kee-Young Yoo:
Robust User Password Change Scheme based on the Elliptic Curve Cryptosystem. Fundam. Informaticae 87(3-4): 483-492 (2008) - [c56]Eun-Jun Yoon, Kee-Young Yoo:
Enhanced Three-Round Smart Card-Based Key Exchange Protocol. ATC 2008: 507-515 - [c55]Eun-Jun Yoon, Kee-Young Yoo:
Improving the Generalized Password-Based Authenticated Key Agreement Protocol. GPC Workshops 2008: 341-346 - [c54]Eun-Jun Yoon, Kee-Young Yoo:
Replay Attacks on Han et al.'s Chaotic Map Based Key Agreement Protocol Using Nonce. ICIC (3) 2008: 533-540 - [c53]Eun-Jun Yoon, Eun-Jung Lee, Kee-Young Yoo:
Cryptanalysis of Wang et al.'s Remote User Authentication Scheme Using Smart Cards. ITNG 2008: 575-580 - [c52]Eun-Jun Yoon, Kee-Young Yoo:
A New Key Agreement Protocol Based on Chaotic Maps. KES-AMSTA 2008: 897-906 - [c51]Eun-Jun Yoon, Kee-Young Yoo:
An Improvement of Password-Only Authenticated Key Establishment Protocol without Public Key Cryptography. MUE 2008: 87-91 - [c50]Eun-Jun Yoon, Kee-Young Yoo:
Two Security Problems of RFID Security Method with Ownership Transfer. NPC Workshops 2008: 68-73 - [c49]Eun-Jun Yoon, Kee-Young Yoo:
An Efficient Authentication and Key Agreement Protocol in RFID System. NPC 2008: 320-326 - [p1]Eun-Jun Yoon, Kee-Young Yoo:
Improving the Host Authentication Mechanism for POD Copy Protection System. New Directions in Intelligent Interactive Multimedia 2008: 373-383 - 2007
- [j18]Eun-Jun Yoon, Kee-Young Yoo:
Cryptanalysis of Robust E-Mail Protocols with Perfect Forward Secrecy. IEEE Commun. Lett. 11(5): 372-374 (2007) - [j17]Eun-Jun Yoon, Kee-Young Yoo:
Comments on Modified User Friendly Remote Authentication Scheme with Smart Cards. IEICE Trans. Commun. 90-B(2): 331-333 (2007) - [c48]Eun-Jun Yoon, Kee-Young Yoo:
A Secure Chaotic Hash-Based Biometric Remote User Authentication Scheme Using Mobile Devices. APWeb/WAIM Workshops 2007: 612-623 - [c47]Eun-Jun Yoon, Kee-Young Yoo:
A Secret-Key Exponential Key Agreement Protocol with Smart Cards. ATC 2007: 430-440 - [c46]Nu-El Choi, Eun-Jun Yoon, Hyun-Jin Park, Kee-Young Yoo:
Visual Multi-Secret Sharing Scheme with Cheater Identification. Security and Management 2007: 90-96 - [c45]Hyun-Jin Park, Eun-Jun Yoon, Kee-Young Yoo:
A New Steganography Scheme using a Frame. Security and Management 2007: 118-122 - [c44]Eun-Jun Yoon, Kee-Young Yoo:
Token-Based Authenticated Key Establishment Protocols for Three-Party Communication. EUC Workshops 2007: 758-769 - [c43]Eun-Jun Yoon, Kee-Young Yoo:
Two Security Problems of Efficient Remote Mutual Authentication and Key Agreement. FGCN (2) 2007: 66-70 - [c42]Eun-Jun Yoon, Kee-Young Yoo:
Vulnerability of User Identification and Key Agreement Protocol with User Anonymity. FGCN (1) 2007: 516-521 - [c41]Eun-Jun Yoon, Wan-Soo Lee, Kee-Young Yoo:
Improving the Single-Assumption Authenticated Diffie-Hellman Key Agreement Protocols. ICCSA (1) 2007: 926-936 - [c40]Eun-Jun Yoon, Wan-Soo Lee, Kee-Young Yoo:
Secure PAP-Based RADIUS Protocol in Wireless Networks. ICIC (3) 2007: 689-694 - [c39]Eun-Jun Yoon, Kee-Young Yoo:
Improving the Sun-Cao's Public Key Authentication Scheme for Non-repudiation. ICIC (3) 2007: 1103-1109 - [c38]Jai-Boo Oh, Eun-Jun Yoon, Kee-Young Yoo:
An Efficient ID-Based Authenticated Key Agreement Protocol with Pairings. ISPA 2007: 446-456 - [c37]Eun-Jun Yoon, Wan-Soo Lee, Kee-Young Yoo:
Secure Remote User Authentication Scheme Using Bilinear Pairings. WISTP 2007: 102-114 - 2006
- [j16]Eun-Jun Yoon, Kee-Young Yoo:
A Forgery Attack on A Low Computation Cost User Authentication Scheme. Int. J. Netw. Secur. 3(1): 51-53 (2006) - [j15]Eun-Jun Yoon, Kee-Young Yoo:
On the Security of Signature Scheme with Message Recovery and Its Application. Int. J. Netw. Secur. 3(2): 151-154 (2006) - [c36]Eun-Jun Yoon, Kee-Young Yoo:
Improving the ID-Based Key Exchange Protocol in Wireless Mobile Ad Hoc Networks. ADHOC-NOW 2006: 349-354 - [c35]Eun-Jun Yoon, Kee-Young Yoo:
A Secure Password-Authenticated Key Exchange Between Clients with Different Passwords. APWeb Workshops 2006: 659-663 - [c34]Eun-Jun Yoon, Kee-Young Yoo:
An Improved Lu-Cao's Remote User Authentication Scheme Using Smart Card. EuroPKI 2006: 45-53 - [c33]Eun-Jun Yoon, Kee-Young Yoo:
Enhanced Forward-Secure User Authentication Scheme with Smart Cards. EuroPKI 2006: 197-206 - [c32]Eun-Jun Yoon, Kee-Young Yoo:
An Optimized Two Factor Authenticated Key Exchange Protocol in PWLANs. International Conference on Computational Science (2) 2006: 1000-1007 - [c31]Eun-Jun Yoon, Kee-Young Yoo:
An Improved Popescu's Authenticated Key Agreement Protocol. ICCSA (5) 2006: 276-283 - [c30]Eun-Jun Yoon, Kee-Young Yoo:
One-Time Password Authentication Scheme Using Smart Cards Providing User Anonymity. ICCSA (5) 2006: 303-311 - [c29]Eun-Jun Yoon, Kee-Young Yoo:
Various Types of Attacks and Solutions Regarding Secure Remote User Access over Insecure Networks. ICCSA (1) 2006: 1156-1165 - [c28]Eun-Jun Yoon, Kee-Young Yoo:
Biometrics Authenticated Key Agreement Scheme. NGITS 2006: 345-349 - [c27]Eun-Jun Yoon, Kee-Young Yoo:
Improving the Dynamic ID-Based Remote Mutual Authentication Scheme. OTM Workshops (1) 2006: 499-507 - [c26]Eun-Jun Yoon, Kee-Young Yoo:
Efficient Mutual Authentication Scheme with Smart Card. PRIMA 2006: 813-818 - [c25]Eun-Jun Yoon, Kee-Young Yoo:
An Improved Digital Signature with Message Recovery Using Self-certified Public Keys Without Trustworthy System Authority. SOFSEM 2006: 548-555 - [c24]Eun-Jun Yoon, Kee-Young Yoo:
An Optimizing Authenticated Key Exchange Protocol for Self-organizing Sensor Networks. UCS 2006: 537-546 - [c23]Eun-Jun Yoon, Kee-Young Yoo:
A New Secure Key Exchange Protocol Between STB and Smart Card in DTV Broadcasting. WISI 2006: 165-166 - 2005
- [j14]Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo:
Fixing problems in Lin et al.'s OSPA protocol. Appl. Math. Comput. 166(1): 46-57 (2005) - [j13]Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo:
Improvement of Fan et al.'s deniable authentication protocol based on Diffie-Hellman algorithm. Appl. Math. Comput. 167(1): 274-280 (2005) - [j12]Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo:
Improvement of Chien-Jan's authenticated multiple-key agreement protocol without using conventional one-way function. Appl. Math. Comput. 167(1): 711-715 (2005) - [j11]Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo:
Cryptanalysis and further improvement of Peinado's improved LHL-key authentication scheme. Appl. Math. Comput. 168(2): 788-794 (2005) - [j10]Eun-Jun Yoon, Kee-Young Yoo:
On the security of Wu-Lin's robust key authentication scheme. Appl. Math. Comput. 169(1): 1-7 (2005) - [j9]Eun-Jun Yoon, Kee-Young Yoo:
Weakness and solution of Yang et al.'s protected password changing scheme. Appl. Math. Comput. 169(1): 295-304 (2005) - [j8]Eun-Jun Yoon, Kee-Young Yoo:
Cryptanalysis of Zhang-Xiao's multisignature scheme for specified group of verifiers. Appl. Math. Comput. 170(1): 226-229 (2005) - [j7]Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo:
An improvement of Hwang-Lee-Tang's simple remote user authentication scheme. Comput. Secur. 24(1): 50-56 (2005) - [j6]Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo:
Attacks on the Shen et al.'s Timestamp-Based Password Authentication Scheme Using Smart Cards. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88-A(1): 319-321 (2005) - [j5]Eun-Jun Yoon, Kee-Young Yoo:
Cryptanalysis of Password Authenticated Key Exchange Based on RSA for Imbalanced Wireless Networks. IEICE Trans. Commun. 88-B(6): 2627-2628 (2005) - [j4]Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo:
Attacks and Solutions of Yang et al.'s Protected Password Changing Scheme. Informatica 16(2): 285-294 (2005) - [c22]Eun-Jun Yoon, Kee-Young Yoo:
New Authentication Scheme Based on a One-Way Hash Function and Diffie-Hellman Key Exchange. CANS 2005: 147-160 - [c21]Eun-Jun Yoon, Kee-Young Yoo:
New Efficient Simple Authenticated Key Agreement Protocol. COCOON 2005: 945-954 - [c20]Eun-Jun Yoon, Jae-Hyung Jung, Woo-Hun Kim, Kee-Young Yoo:
A Secret Key Based Authentication Scheme Using Smart Cards. Security and Management 2005: 65-71 - [c19]Eun-Jun Yoon, Eun-Kyung Ryu, Woo-Hun Kim, Kee-Young Yoo:
Cryptanalysis of A Key Authentication Scheme Based on Discrete Logarithms. Security and Management 2005: 72-78 - [c18]Eun-Jun Yoon, Kee-Young Yoo:
Improvement of an Efficient User Identification Scheme Based on ID-Based Cryptosystem. EUC Workshops 2005: 586-591 - [c17]Eun-Jun Yoon, Kee-Young Yoo:
A New Simple Authenticated Key Agreement and Protected Password Change Protocol. EUC Workshops 2005: 955-964 - [c16]Eun-Jun Yoon, Kee-Young Yoo:
An Efficient Password Authentication Schemes Without Using the Server Public Key for Grid Computing. GCC 2005: 149-154 - [c15]