Jeeyeon Kim

According to our database1, Jeeyeon Kim authored at least 18 papers between 2001 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A New Resource Management Technique in 3D Wireless Networks.
Proceedings of the 97th IEEE Vehicular Technology Conference, 2023

2022
User Perception on Personalized Explanation by Science Museum Docent Robot.
Proceedings of the ACM/IEEE International Conference on Human-Robot Interaction, 2022

2021
A New Non-Orthogonal Transceiver for Asynchronous Grant-Free Transmission Systems.
IEEE Trans. Wirel. Commun., 2021

2012
An Enhanced Secure Authentication Scheme with Anonymity for Wireless Environments.
IEICE Trans. Commun., 2012

Design of a Simple User Authentication Scheme Using QR-Code for Mobile Device.
Proceedings of the Information Technology Convergence, Secure and Trust Computing, and Data Management, 2012

Security Analysis of Authentication Scheme for Wireless Communications with User Anonymity.
Proceedings of the Information Technology Convergence, Secure and Trust Computing, and Data Management, 2012

2011
Server-Aided Password-Authenticated Key Exchange: From 3-Party to Group.
Proceedings of the Human Interface and the Management of Information. Interacting with Information, 2011

Cryptanalysis to a Remote User Authentication Scheme Using Smart Cards for Multi-server Environment.
Proceedings of the Human Interface and the Management of Information. Interacting with Information, 2011

A Practical Analysis of Smartphone Security.
Proceedings of the Human Interface and the Management of Information. Interacting with Information, 2011

Security Analysis on Digital Signature Function Implemented in PDF Software.
Proceedings of the Future Generation Information Technology, 2011

Cryptanalysis of the User Authentication Scheme with Anonymity.
Proceedings of the Future Generation Information Technology, 2011

2006
Group Key Agreement Protocol Among Mobile Devices in Different Cells.
Proceedings of the Frontiers of High Performance Computing and Networking, 2006

Privacy threats and issues in mobile RFID.
Proceedings of the The First International Conference on Availability, 2006

2005
Use of the SEED Encryption Algorithm in Cryptographic Message Syntax (CMS).
RFC, February, 2005

The SEED Encryption Algorithm.
RFC, February, 2005

2004
Cryptanalysis and Improvement of Password Authenticated Key Exchange Scheme between Clients with Different Passwords.
Proceedings of the Computational Science and Its Applications, 2004

2003
An Improvement of VeriSign's Key Roaming Service Protocol.
Proceedings of the Web Engineering, International Conference, 2003

2001
Forward-Secure Commercial Key Escrow Systems.
Proceedings of the 10th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2001), 2001


  Loading...