Search

Your search keyword '"Yoo, Kee-Young"' showing total 544 results

Search Constraints

Start Over You searched for: Author "Yoo, Kee-Young" Remove constraint Author: "Yoo, Kee-Young"
544 results on '"Yoo, Kee-Young"'

Search Results

1. Reversible Data Hiding Scheme Using the Difference Between the Maximum and Minimum Values

5. A Reversible Data Hiding Scheme Using Even-Odd Embedding Method

9. Enhanced Three-Round Smart Card-Based Key Exchange Protocol

10. Efficient Authentication and Authorization Infrastructure for Mobile Users

11. An Efficient Authentication and Key Agreement Protocol in RFID System

16. An Efficient ID-Based Authenticated Key Agreement Protocol with Pairings

17. Improving the Single-Assumption Authenticated Diffie-Hellman Key Agreement Protocols

18. A Secret-Key Exponential Key Agreement Protocol with Smart Cards

19. A Secure Chaotic Hash-Based Biometric Remote User Authentication Scheme Using Mobile Devices

22. Secure Remote User Authentication Scheme Using Bilinear Pairings

23. Token-Based Authenticated Key Establishment Protocols for Three-Party Communication

24. An Improvement of Remote User Authentication Scheme Using Smart Cards

25. Further Improvement of Manik et al.’s Remote User Authentication Scheme Using Smart Cards

26. Improving the Dynamic ID-Based Remote Mutual Authentication Scheme

27. An Optimizing Authenticated Key Exchange Protocol for Self-organizing Sensor Networks

28. Evolutionary Algorithms for Group/Non-group Decision in Periodic Boundary CA

29. Cellular Automata Based Role-Delegation in RBAC

30. Authentication Based on Singular Cellular Automata

31. Decision Algorithms for Cellular Automata States Based on Periodic Boundary Condition

32. Non-group Cellular Automata Based One Time Password Authentication Scheme in Wireless Networks

33. Conflict Detection in Role-Based Access Control Using Multiple-Attractor Cellular Automata

34. Improving the ID-Based Key Exchange Protocol in Wireless Mobile Ad Hoc Networks

35. Efficient Mutual Authentication Scheme with Smart Card

36. Agent-Based Real Time Intrusion Detection System Against Malformed Packet Attacks

37. Biometrics Authenticated Key Agreement Scheme

38. Enhanced Forward-Secure User Authentication Scheme with Smart Cards

39. An Improved Lu-Cao’s Remote User Authentication Scheme Using Smart Card

40. Modular Divider for Elliptic Curve Cryptographic Hardware Based on Programmable CA

41. Cellular Automata Architecture for Elliptic Curve Cryptographic Hardware

42. An Optimized Two Factor Authenticated Key Exchange Protocol in PWLANs

43. One-Time Password Authentication Scheme Using Smart Cards Providing User Anonymity

44. An Improved Popescu’s Authenticated Key Agreement Protocol

45. Various Types of Attacks and Solutions Regarding Secure Remote User Access over Insecure Networks

46. A Secure Password-Authenticated Key Exchange Between Clients with Different Passwords

47. An Improved Digital Signature with Message Recovery Using Self-certified Public Keys Without Trustworthy System Authority

48. New Anonymous User Identification and Key Establishment Protocol in Distributed Networks

49. New Authentication Scheme Based on a One-Way Hash Function and Diffie-Hellman Key Exchange

Catalog

Books, media, physical & digital resources