Pascal and Francis Bibliographic Databases

Help

Search results

Your search

au.\*:("JEON, Jun-Cheol")

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 21 of 21

  • Page / 1
Export

Selection :

  • and

Non-linear and non-group cellular automata chaining technique for cryptographic applicationsJEON, Jun-Cheol.Mathematical and computer modelling. 2010, Vol 51, Num 7-8, pp 995-999, issn 0895-7177, 5 p.Article

Role delegation on multiple-attractor cellular automata based on pseudo-exhaustive bit patternsJEON, Jun-Cheol; KEE YOUNG YOO.Applied mathematics and computation. 2007, Vol 186, Num 2, pp 1423-1428, issn 0096-3003, 6 p.Article

Programmable cellular automata based Montgomery hardware architectureJEON, Jun-Cheol; YOO, Kee-Young.Applied mathematics and computation. 2007, Vol 186, Num 1, pp 915-922, issn 0096-3003, 8 p.Article

Low-complexity authentication scheme based on cellular automata in wireless networkJEON, Jun-Cheol; KIM, Kee-Won; YOO, Kee-Young et al.Lecture notes in computer science. 2005, pp 413-421, issn 0302-9743, isbn 3-540-30856-3, 1Vol, 9 p.Conference Paper

A security scheme for protecting security policies in firewallLEE, Jung-Seuk; JEON, Jun-Cheol; YOO, Kee-Young et al.Operating systems review. 2004, Vol 38, Num 2, pp 69-72, issn 0163-5980, 4 p.Article

Evolutionary Algorithms for Group/Non-group Decision in Periodic Boundary CAKANG, Byung-Heon; JEON, Jun-Cheol; YOO, Kee-Young et al.Lecture notes in computer science. 2006, issn 0302-9743, isbn 3-540-45901-4, Vol1, 629-632Conference Paper

An improvement on Yang et al.'s password authentication schemesKIM, Kee-Won; JEON, Jun-Cheol; YOO, Kee-Young et al.Applied mathematics and computation. 2005, Vol 170, Num 1, pp 207-215, issn 0096-3003, 9 p.Article

Further improvement of manik et al.'s remote user authentication scheme using smart cardsOH, Jai-Boo; JEON, Jun-Cheol; YOO, Kee-Young et al.Lecture notes in computer science. 2006, pp 57-64, issn 0302-9743, isbn 3-540-49860-5, 1Vol, 8 p.Conference Paper

Cellular Automata Based Cryptographic Hash FunctionJEON, Jun-Cheol.Scientific computing. International conferenceWorldComp'2011. 2011, pp 186-190, isbn 1-60132-175-9, 5 p.Conference Paper

Efficient and secure password authentication schemes for low-power devicesKIM, Kee-Won; JEON, Jun-Cheol; YOO, Kee-Young et al.Lecture notes in computer science. 2005, pp 73-82, issn 0302-9743, isbn 3-540-30856-3, 1Vol, 10 p.Conference Paper

Non-group cellular automata based one time password authentication scheme in wireless networksJEON, Jun-Cheol; KIM, Kee-Won; YOO, Kee-Young et al.Lecture notes in computer science. 2006, pp 110-116, issn 0302-9743, isbn 3-540-36646-6, 1Vol, 7 p.Conference Paper

An evolutionary approach to the design of cellular automata architecture for multiplication in Elliptic Curve Cryptography over finite fieldsJEON, Jun-Cheol; YOO, Kee-Young.Lecture notes in computer science. 2004, pp 241-250, issn 0302-9743, isbn 3-540-22817-9, 10 p.Conference Paper

Agent-based real time intrusion detection system against malformed packet attacksJEON, Jun-Cheol; CHOI, Eun-Yeung; YOO, Kee-Young et al.Lecture notes in computer science. 2006, pp 807-812, issn 0302-9743, isbn 3-540-36707-1, 1Vol, 6 p.Conference Paper

Authentication based on singular cellular automataJEON, Jun-Cheol; YOO, Kee-Young.Lecture notes in computer science. 2006, pp 605-610, issn 0302-9743, isbn 3-540-40929-7, 1Vol, 6 p.Conference Paper

Cellular Automata Architecture for Elliptic Curve Cryptographic HardwareJEON, Jun-Cheol; KIM, Kee-Won; KANG, Byung-Heon et al.Lecture notes in computer science. 2006, pp 329-336, issn 0302-9743, isbn 3-540-34379-2, 8 p.Conference Paper

Cellular automata based role-delegation in RBACJEON, Jun-Cheol; YOO, Kee-Young.Lecture notes in computer science. 2006, pp 588-594, issn 0302-9743, isbn 3-540-40929-7, 1Vol, 7 p.Conference Paper

Modular Divider for Elliptic Curve Cryptographic Hardware Based on Programmable CAJEON, Jun-Cheol; KIM, Kee-Won; OH, Jai-Boo et al.Lecture notes in computer science. 2006, pp 661-668, issn 0302-9743, isbn 3-540-34379-2, 8 p.Conference Paper

Conflict detection in role-based access control using multiple-attractor cellular automataJEON, Jun-Cheol; YOO, Kee-Young.Lecture notes in computer science. 2006, pp 533-541, issn 0302-9743, isbn 3-540-37271-7, 9 p.Conference Paper

An improvement of remote user authentication scheme using smart cardsJEON, Jun-Cheol; KANG, Byung-Heon; KIM, Se-Min et al.Lecture notes in computer science. 2006, pp 416-423, issn 0302-9743, isbn 3-540-49932-6, 1Vol, 8 p.Conference Paper

Decision algorithms for cellular automata states based on periodic boundary conditionKANG, Byung-Heon; JEON, Jun-Cheol; YOO, Kee-Young et al.Lecture notes in computer science. 2006, pp 104-111, issn 0302-9743, isbn 3-540-40929-7, 1Vol, 8 p.Conference Paper

Evolutionary hardware architecture for division in elliptic curve cryptosystems over GF(2n)JEON, Jun-Cheol; KIM, Kee-Won; YOO, Kee-Young et al.Lecture notes in computer science. 2005, issn 0302-9743, isbn 3-540-28323-4, 3Vol, Part 3, 348-355Conference Paper

  • Page / 1