544 results on '"Yoo, Kee-Young"'
Search Results
2. Efficient and Secure User Identification Scheme based on ID-based Cryptosystem 1
3. An in-depth analysis of strong t-consistency on secret image sharing
4. A 2-Dimensional Cellular Automata Pseudorandom Number Generator with Non-linear Neighborhood Relationship
5. A Reversible Data Hiding Scheme Using Even-Odd Embedding Method
6. Data hiding method in binary images based on block masking for key authentication
7. Replay Attacks on Han et al.’s Chaotic Map Based Key Agreement Protocol Using Nonce
8. Improving the Host Authentication Mechanism for POD Copy Protection System
9. Enhanced Three-Round Smart Card-Based Key Exchange Protocol
10. Efficient Authentication and Authorization Infrastructure for Mobile Users
11. An Efficient Authentication and Key Agreement Protocol in RFID System
12. A Virtual Three-Dimension Cellular Automata Pseudorandom Number Generator Based on the Moore Neighborhood Method
13. A New Key Agreement Protocol Based on Chaotic Maps
14. Improving the Sun-Cao’s Public Key Authentication Scheme for Non-repudiation
15. Secure PAP-Based RADIUS Protocol in Wireless Networks
16. An Efficient ID-Based Authenticated Key Agreement Protocol with Pairings
17. Improving the Single-Assumption Authenticated Diffie-Hellman Key Agreement Protocols
18. A Secret-Key Exponential Key Agreement Protocol with Smart Cards
19. A Secure Chaotic Hash-Based Biometric Remote User Authentication Scheme Using Mobile Devices
20. The Hiding of Secret Data Using the Run Length Matching Method
21. An Efficient Authentication Protocol for Low-Cost RFID Systems
22. Secure Remote User Authentication Scheme Using Bilinear Pairings
23. Token-Based Authenticated Key Establishment Protocols for Three-Party Communication
24. An Improvement of Remote User Authentication Scheme Using Smart Cards
25. Further Improvement of Manik et al.’s Remote User Authentication Scheme Using Smart Cards
26. Improving the Dynamic ID-Based Remote Mutual Authentication Scheme
27. An Optimizing Authenticated Key Exchange Protocol for Self-organizing Sensor Networks
28. Evolutionary Algorithms for Group/Non-group Decision in Periodic Boundary CA
29. Cellular Automata Based Role-Delegation in RBAC
30. Authentication Based on Singular Cellular Automata
31. Decision Algorithms for Cellular Automata States Based on Periodic Boundary Condition
32. Non-group Cellular Automata Based One Time Password Authentication Scheme in Wireless Networks
33. Conflict Detection in Role-Based Access Control Using Multiple-Attractor Cellular Automata
34. Improving the ID-Based Key Exchange Protocol in Wireless Mobile Ad Hoc Networks
35. Efficient Mutual Authentication Scheme with Smart Card
36. Agent-Based Real Time Intrusion Detection System Against Malformed Packet Attacks
37. Biometrics Authenticated Key Agreement Scheme
38. Enhanced Forward-Secure User Authentication Scheme with Smart Cards
39. An Improved Lu-Cao’s Remote User Authentication Scheme Using Smart Card
40. Modular Divider for Elliptic Curve Cryptographic Hardware Based on Programmable CA
41. Cellular Automata Architecture for Elliptic Curve Cryptographic Hardware
42. An Optimized Two Factor Authenticated Key Exchange Protocol in PWLANs
43. One-Time Password Authentication Scheme Using Smart Cards Providing User Anonymity
44. An Improved Popescu’s Authenticated Key Agreement Protocol
45. Various Types of Attacks and Solutions Regarding Secure Remote User Access over Insecure Networks
46. A Secure Password-Authenticated Key Exchange Between Clients with Different Passwords
47. An Improved Digital Signature with Message Recovery Using Self-certified Public Keys Without Trustworthy System Authority
48. New Anonymous User Identification and Key Establishment Protocol in Distributed Networks
49. New Authentication Scheme Based on a One-Way Hash Function and Diffie-Hellman Key Exchange
50. A New Simple Authenticated Key Agreement and Protected Password Change Protocol
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.