Pascal and Francis Bibliographic Databases

Help

Search results

Your search

au.\*:("YOO, Kee-Young")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 106

  • Page / 5
Export

Selection :

  • and

Data hiding using edge detector for scalable imagesJUNG, Ki-Hyun; YOO, Kee-Young.Multimedia tools and applications. 2014, Vol 71, Num 3, pp 1455-1468, issn 1380-7501, 14 p.Article

Programmable cellular automata based Montgomery hardware architectureJEON, Jun-Cheol; YOO, Kee-Young.Applied mathematics and computation. 2007, Vol 186, Num 1, pp 915-922, issn 0096-3003, 8 p.Article

A secure password-authenticated key exchange between clients with different passwordsYOON, Eun-Jun; YOO, Kee-Young.Lecture notes in computer science. 2006, pp 659-663, issn 0302-9743, isbn 3-540-31158-0, 1Vol, 5 p.Conference Paper

Weakness and solution of Yang et al.'s protected password changing schemeYOON, Eun-Jun; YOO, Kee-Young.Applied mathematics and computation. 2005, Vol 169, Num 1, pp 295-304, issn 0096-3003, 10 p.Article

An efficient password authentication schemes without using the server public key for grid computingYOON, Eun-Jun; YOO, Kee-Young.Lecture notes in computer science. 2005, pp 149-154, issn 0302-9743, isbn 3-540-30510-6, 1Vol, 6 p.Conference Paper

Group-oriented channel protection for mobile devices in digital multimedia broadcastingKIM, Woo-Hun; YOO, Kee-Young.Lecture notes in computer science. 2005, pp 103-112, issn 0302-9743, isbn 3-540-29414-7, 1Vol, 10 p.Conference Paper

Systolic multiplier for Montgomery's algorithmLEE, Keon-Jik; YOO, Kee-Young.Integration (Amsterdam). 2002, Vol 32, Num 1-2, pp 99-109, issn 0167-9260, 11 p.Article

Linear systolic multiplier/squarer for fast exponentiationLEE, Keon-Jik; YOO, Kee-Young.Information processing letters. 2000, Vol 76, Num 3, pp 105-111, issn 0020-0190Article

On the Security of an Efficient and Secure Dynamic ID-Based Remote User Authentication SchemeYOON, Eun-Jun; YOO, Kee-Young.IEICE transactions on information and systems. 2012, Vol 95, Num 6, pp 1684-1686, issn 0916-8532, 3 p.Article

Characteristics of MSW and heat energy recovery between residential and commercial areas in SeoulYI, Sora; YOO, Kee-Young; HANAKI, Keisuke et al.Waste management (Elmsford). 2011, Vol 31, Num 3, pp 595-602, issn 0956-053X, 8 p.Article

Comments on modified user friendly remote authentication scheme with smart cardsYOON, Eun-Jun; YOO, Kee-Young.IEICE transactions on communications. 2007, Vol 90, Num 2, pp 331-333, issn 0916-8516, 3 p.Article

A new simple authenticated key agreement and protected password change protocolYOON, Eun-Jun; YOO, Kee-Young.Lecture notes in computer science. 2005, pp 955-964, issn 0302-9743, isbn 3-540-30803-2, 1Vol, 10 p.Conference Paper

Secure fingerprint-based remote user authentication scheme using smartcardsYOON, Eun-Jun; YOO, Kee-Young.Lecture notes in computer science. 2005, pp 405-413, issn 0302-9743, isbn 3-540-30900-4, 1Vol, 9 p.Conference Paper

Cryptanalysis of Group Key Agreement Protocol Based on Chaotic Hash Function : Information and Communication System SecurityYOON, Eun-Jun; YOO, Kee-Young.IEICE transactions on information and systems. 2011, Vol 94, Num 11, pp 2167-2170, issn 0916-8532, 4 p.Article

Various Types of Attacks and Solutions Regarding Secure Remote User Access over Insecure NetworksYOON, Eun-Jun; YOO, Kee-Young.Lecture notes in computer science. 2006, pp 1156-1165, issn 0302-9743, isbn 3-540-34070-X, 10 p.Conference Paper

Cryptanalysis of Zhang-Xiao's multisignature scheme for specified group of verifiersYOON, Eun-Jun; YOO, Kee-Young.Applied mathematics and computation. 2005, Vol 170, Num 1, pp 226-229, issn 0096-3003, 4 p.Article

Robust secret key based authentication scheme using smart cardsYOON, Eun-Jun; YOO, Kee-Young.Lecture notes in computer science. 2005, issn 0302-9743, isbn 3-540-30027-9, 2Vol, Part II, 723-734Conference Paper

Systolic architectures for inversion/division using AB2 circuits in GF(2m)KIM, Nam-Yeun; YOO, Kee-Young.Integration (Amsterdam). 2003, Vol 35, Num 1, pp 11-24, issn 0167-9260, 14 p.Article

Area efficient exponentiation using modular multiplier/squarer in GF(2m)KIM, Hyun-Sung; YOO, Kee-Young.Lecture notes in computer science. 2001, pp 262-267, issn 0302-9743, isbn 3-540-42494-6Conference Paper

Three-Directional Data Hiding Method for Digital ImagesJUNG, Ki-Hyun; YOO, Kee-Young.Cryptologia. 2014, Vol 38, Num 2, pp 178-191, issn 0161-1194, 14 p.Article

Cryptanalysis of an Improved User Authentication Scheme with User Anonymity for Wireless CommunicationsYOON, Eun-Jun; YOO, Kee-Young.IEICE transactions on information and systems. 2012, Vol 95, Num 6, pp 1687-1689, issn 0916-8532, 3 p.Article

Cryptanalysis of a modulo image encryption scheme with fractal keysYOON, Eun-Jun; YOO, Kee-Young.Optics and lasers in engineering. 2010, Vol 48, Num 7-8, pp 821-826, issn 0143-8166, 6 p.Article

An improved digital signature with message recovery using self-certified public keys without trustworthy system authorityYOON, Eun-Jun; YOO, Kee-Young.Lecture notes in computer science. 2006, pp 548-555, issn 0302-9743, isbn 3-540-31198-X, 1Vol, 8 p.Conference Paper

Improving the Dynamic ID-Based Remote Mutual Authentication SchemeYOON, Eun-Jun; YOO, Kee-Young.Lecture notes in computer science. 2006, pp 499-507, issn 0302-9743, isbn 3-540-48269-5, 9 p.Conference Paper

Cryptanalysis of password authenticated key exchange based on RSA for imbalanced wireless networksYOON, Eun-Jun; YOO, Kee-Young.IEICE transactions on communications. 2005, Vol 88, Num 6, pp 2627-2628, issn 0916-8516, 2 p.Article

  • Page / 5