37 results on '"Yoo, Kee-Young"'
Search Results
2. Efficient and Secure User Identification Scheme based on ID-based Cryptosystem 1
3. An in-depth analysis of strong t-consistency on secret image sharing
4. Evaluation and development of solid waste management plan: a case of Seoul for past and future 10 years
5. An improved double image digital watermarking scheme using the position property
6. Steganographic method based on interpolation and LSB substitution of digital images
7. High-capacity index based data hiding method
8. Comment on ‘Efficient and secure dynamic ID‐based remote user authentication scheme for distributed systems using smart cards’
9. Information Hiding Method based on Interpolation using Max Difference of RGB Pixel for Color Images
10. A Reversible Data Hiding Scheme Using 7×7 Sudoku Based on Secret Sharing
11. Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications
12. Design of Mutually Authenticated Key Agreement Protocol Resistant to Impersonation Attacks for Multi-Server Environment
13. Review and Suggestion for Waste Transfer Stations in Seoul
14. Hybrid Information Hiding Method Based on the Characteristics of Military Images on Naval Combat System
15. Lightweight authentication with key‐agreement protocol for mobile network environment using smart cards
16. An Enhanced Anonymous Two-factor Mutual Authentication with Key-agreement Scheme for Session Initiation Protocol
17. An Enhanced Biometric Based Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Elliptic Curve Cryptography
18. A real-time secret image sharing with fairness
19. A Secure Anonymous Authentication Protocol for Mobile Services on Elliptic Curve Cryptography
20. Consistency Analysis for Secure Reconstruction in Secret Image Sharing
21. Reversible data hiding scheme with edge-direction predictor and modulo operation
22. Study of Information Hiding Methods for SONAR Images in the Naval Combat System
23. A real-time secret image sharing with fairness.
24. Reversible data hiding scheme with edge-direction predictor and modulo operation.
25. Reversible Secret Sharing Scheme Using Symmetric Key Encryption Algorithm in Encrypted Images
26. Comparison of Solid Waste Management System between Beijing and Seoul
27. On Elliptic Curve Based Untraceable RFID Authentication Protocols
28. Data Hiding Using Pixel-Value Modular Operation
29. Steganography on Android Smart Devices
30. An anonymous ID-based remote mutual authentication with key agreement protocol on ECC using smart cards
31. Improved Histogram-Shifting-Imitated Reversible Data Hiding Scheme
32. Design of Exclusive-OR Logic Gate on Quantum-Dot Cellular Automata
33. A New (n, n)-threshold Reversible Secret Image Sharing Using Histogram Shifting
34. Quantum-Dot Cellular Automata 3-input XOR logic gate
35. Reversible Secret Image Sharing without Polynomial
36. An Enhanced Anonymous Two-factor Mutual Authentication with Key-agreement Scheme for Session Initiation Protocol.
37. An Anonymous Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Biometrics and Smartcards.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.