Eun-Jun Yoon
According to our database1,
Eun-Jun Yoon
authored at least 136 papers
between 2004 and 2021.
Collaborative distances:
Collaborative distances:
Timeline
2004
2006
2008
2010
2012
2014
2016
2018
2020
0
5
10
15
20
25
30
3
3
4
2
4
10
10
2
2
2
11
3
1
1
1
3
5
2
5
8
12
14
19
3
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2021
Publicly verifiable threshold secret sharing based on three-dimensional-cellular automata.
Concurr. Comput. Pract. Exp., 2021
2019
Secur. Commun. Networks, 2019
2018
J. Real Time Image Process., 2018
Design of a Secure Mutually Authenticated Key-Agreement Protocol for Multi-server Architecture.
J. Comput., 2018
2017
Comment on 'Efficient and secure dynamic ID-based remote user authentication scheme for distributed systems using smart cards'.
IET Inf. Secur., 2017
Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications.
IEEE Access, 2017
Design of Mutually Authenticated Key Agreement Protocol Resistant to Impersonation Attacks for Multi-Server Environment.
IEEE Access, 2017
2016
An Anonymous Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Biometrics and Smartcards.
KSII Trans. Internet Inf. Syst., 2016
Int. J. Pervasive Comput. Commun., 2016
Lightweight authentication with key-agreement protocol for mobile network environment using smart cards.
IET Inf. Secur., 2016
A Secure Anonymous Authentication Protocol for Mobile Services on Elliptic Curve Cryptography.
IEEE Access, 2016
An Enhanced Anonymous Two-factor Mutual Authentication with Key-agreement Scheme for Session Initiation Protocol.
Proceedings of the 9th International Conference on Security of Information and Networks, 2016
2015
Proceedings of the 13th International Conference on Advances in Mobile Computing and Multimedia, 2015
2014
Int. J. Fuzzy Log. Intell. Syst., 2014
A biometric-based authenticated key agreement scheme using ECC for wireless sensor networks.
Proceedings of the Symposium on Applied Computing, 2014
2013
Robust biometrics-based multi-server authentication with key agreement scheme for smart cards on elliptic curve cryptosystem.
J. Supercomput., 2013
Math. Comput. Model., 2013
Proceedings of the Grid and Pervasive Computing - 8th International Conference, 2013
2012
An Improvement of the User Identification and Key Agreement Protocol with User Anonymity.
Informatica, 2012
Cryptanalysis of an Improved User Authentication Scheme with User Anonymity for Wireless Communications.
IEICE Trans. Inf. Syst., 2012
On the Security of an Efficient and Secure Dynamic ID-Based Remote User Authentication Scheme.
IEICE Trans. Inf. Syst., 2012
Improvement of the securing RFID systems conforming to EPC Class 1 Generation 2 standard.
Expert Syst. Appl., 2012
Proceedings of the Network and Parallel Computing, 9th IFIP International Conference, 2012
Cryptanalysis of Goriparthi et al.'s Bilinear Pairing Based Remote User Authentication Scheme.
Proceedings of the Network and Parallel Computing, 9th IFIP International Conference, 2012
On the Security of Lv et al.'s Three-Party Authenticated Key Exchange Protocol Using One-Time Key.
Proceedings of the Advanced Infocomm Technology - 5th IEEE International Conference, 2012
2011
Inf. Technol. Control., 2011
A New Efficient Key Agreement Scheme for VSAT Satellite Communications Based on Elliptic Curve Cryptosystem.
Inf. Technol. Control., 2011
Int. J. Commun. Syst., 2011
Int. J. Comput. Math., 2011
IEICE Trans. Inf. Syst., 2011
Robust Authentication Scheme between User and Remote Autonomous Object in Telecommunications System.
IEICE Trans. Inf. Syst., 2011
Future Gener. Comput. Syst., 2011
An efficient and secure anonymous authentication scheme for mobile satellite communication systems.
EURASIP J. Wirel. Commun. Netw., 2011
EURASIP J. Adv. Signal Process., 2011
Comput. Electr. Eng., 2011
A New Biometric-based User Authentication Scheme without Using Password for Wireless Sensor Networks.
Proceedings of the 20th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises, 2011
Proceedings of the Security Technology, 2011
Proceedings of the 14th IEEE International Conference on Computational Science and Engineering, 2011
A Practical Convertible Authenticated Encryption Scheme with Message Linkages and Forward Secrecy.
Proceedings of the 14th IEEE International Conference on Computational Science and Engineering, 2011
Proceedings of the 10th IEEE International Conference on Cognitive Informatics and Cognitive Computing, 2011
2010
An Entire Chaos-Based Biometric Remote User Authentication Scheme on Tokens Without Using Password.
Informatica, 2010
IEICE Trans. Inf. Syst., 2010
IEICE Trans. Inf. Syst., 2010
Off-Line Keyword Guessing Attacks on Searchable Encryption with Keyword-Recoverability.
IEICE Trans. Inf. Syst., 2010
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010
Cryptanalysis of a Handover Authentication Scheme Using Credentials Based on Chameleon Hashing.
IEICE Trans. Inf. Syst., 2010
A New Fingerprint Biometric Remote User Authentication Scheme Using Chaotic Hash Function On Mobile Devices.
Intell. Autom. Soft Comput., 2010
Comput. Commun., 2010
Proceedings of the Fourth International Conference on Network and System Security, 2010
Proceedings of the 5th IEEE Asia-Pacific Services Computing Conference, 2010
2009
Informatica, 2009
Proceedings of the 2009 International Conference on Hybrid Information Technology, 2009
Proceedings of the Workshops at the Grid and Pervasive Computing Conference, 2009
Robust ID-Based Remote Mutual Authentication with Key Agreement Scheme for Mobile Devices on ECC.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
Proceedings of the 2009 International Conference on Complex, 2009
2008
Proceedings of the New Directions in Intelligent Interactive Multimedia, 2008
Fundam. Informaticae, 2008
Comput. Stand. Interfaces, 2008
Proceedings of the IFIP International Conference on Network and Parallel Computing, 2008
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2008
An Improvement of Password-Only Authenticated Key Establishment Protocol without Public Key Cryptography.
Proceedings of the 2008 International Conference on Multimedia and Ubiquitous Engineering (MUE 2008), 2008
Proceedings of the Agent and Multi-Agent Systems: Technologies and Applications, 2008
Proceedings of the Fifth International Conference on Information Technology: New Generations (ITNG 2008), 2008
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Contemporary Intelligent Computing Techniques, 2008
Proceedings of the Workshops at the Grid and Pervasive Computing Conference, 2008
Proceedings of the Autonomic and Trusted Computing, 5th International Conference, 2008
2007
IEICE Trans. Commun., 2007
IEEE Commun. Lett., 2007
Proceedings of the Information Security Theory and Practices. Smart Cards, 2007
Proceedings of the Parallel and Distributed Processing and Applications, 2007
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Contemporary Intelligent Computing Techniques, 2007
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Contemporary Intelligent Computing Techniques, 2007
Improving the Single-Assumption Authenticated Diffie-Hellman Key Agreement Protocols.
Proceedings of the Computational Science and Its Applications, 2007
Proceedings of the Future Generation Communication and Networking, 2007
Proceedings of the Future Generation Communication and Networking, 2007
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007
A New Steganography Scheme using a Frame.
Proceedings of the 2007 International Conference on Security & Management, 2007
Visual Multi-Secret Sharing Scheme with Cheater Identification.
Proceedings of the 2007 International Conference on Security & Management, 2007
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007
A Secure Chaotic Hash-Based Biometric Remote User Authentication Scheme Using Mobile Devices.
Proceedings of the Advances in Web and Network Technologies, and Information Management, 2007
2006
Int. J. Netw. Secur., 2006
Int. J. Netw. Secur., 2006
Proceedings of the Intelligence and Security Informatics, International Workshop, 2006
An Optimizing Authenticated Key Exchange Protocol for Self-organizing Sensor Networks.
Proceedings of the Ubiquitous Computing Systems, Third International Symposium, 2006
An Improved Digital Signature with Message Recovery Using Self-certified Public Keys Without Trustworthy System Authority.
Proceedings of the SOFSEM 2006: Theory and Practice of Computer Science, 2006
Proceedings of the Agent Computing and Multi-Agent Systems, 2006
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006
Proceedings of the Next Generation Information Technologies and Systems, 2006
Proceedings of the Computational Science and Its Applications, 2006
Proceedings of the Computational Science and Its Applications, 2006
Various Types of Attacks and Solutions Regarding Secure Remote User Access over Insecure Networks.
Proceedings of the Computational Science and Its Applications, 2006
Proceedings of the Computational Science, 2006
Proceedings of the Public Key Infrastructure, 2006
Proceedings of the Public Key Infrastructure, 2006
A Secure Password-Authenticated Key Exchange Between Clients with Different Passwords.
Proceedings of the Advanced Web and Network Technologies, and Applications, 2006
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks, 5th International Conference, 2006
2005
Informatica, 2005
Cryptanalysis of Password Authenticated Key Exchange Based on RSA for Imbalanced Wireless Networks.
IEICE Trans. Commun., 2005
Attacks on the Shen et al.'s Timestamp-Based Password Authentication Scheme Using Smart Cards.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005
Comput. Secur., 2005
Cryptanalysis of Zhang-Xiao's multisignature scheme for specified group of verifiers.
Appl. Math. Comput., 2005
Appl. Math. Comput., 2005
Appl. Math. Comput., 2005
Cryptanalysis and further improvement of Peinado's improved LHL-key authentication scheme.
Appl. Math. Comput., 2005
Improvement of Chien-Jan's authenticated multiple-key agreement protocol without using conventional one-way function.
Appl. Math. Comput., 2005
Improvement of Fan et al.'s deniable authentication protocol based on Diffie-Hellman algorithm.
Appl. Math. Comput., 2005
Proceedings of the Internet and Network Economics, First International Workshop, 2005
Proceedings of the Internet and Network Economics, First International Workshop, 2005
Proceedings of the Trust, 2005
Proceedings of the Advances in Multimedia Information Processing, 2005
Proceedings of the Computer Network Security, 2005
A New Efficient Fingerprint-Based Remote User Authentication Scheme for Multimedia Systems.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005
Proceedings of the Web Engineering, 5th International Conference, 2005
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005
Proceedings of the Advances in Natural Computation, First International Conference, 2005
Cryptanalysis of Two User Identification Schemes with Key Distribution Preserving Anonymity.
Proceedings of the Information and Communications Security, 7th International Conference, 2005
Proceedings of the Web and Communication Technologies and Internet-Related Social Issues, 2005
An Efficient Password Authentication Schemes Without Using the Server Public Key for Grid Computing.
Proceedings of the Grid and Cooperative Computing - GCC 2005, 4th International Conference, Beijing, China, November 30, 2005
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005
Improvement of an Efficient User Identification Scheme Based on ID-Based Cryptosystem.
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005
Cryptanalysis of A Key Authentication Scheme Based on Discrete Logarithms.
Proceedings of The 2005 International Conference on Security and Management, 2005
A Secret Key Based Authentication Scheme Using Smart Cards.
Proceedings of The 2005 International Conference on Security and Management, 2005
Proceedings of the Computing and Combinatorics, 11th Annual International Conference, 2005
New Authentication Scheme Based on a One-Way Hash Function and Diffie-Hellman Key Exchange.
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005
2004
Further improvement of an efficient password based remote user authentication scheme using smart cards.
IEEE Trans. Consumer Electron., 2004
Efficient remote user authentication scheme based on generalized ElGamal signature scheme.
IEEE Trans. Consumer Electron., 2004
ACM SIGOPS Oper. Syst. Rev., 2004
Proceedings of the NETWORKING 2004, 2004
Proceedings of the Information Networking, 2004
Proceedings of the Computational Science and Its Applications, 2004