Okyeon Yi
According to our database1,
Okyeon Yi
authored at least 29 papers
between 2000 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
Rider Optimization With Deep Learning Based Image Encryption for Secure Drone Communication.
IEEE Access, 2023
2022
Digit. Investig., 2022
Proceedings of the Information Security Applications - 23rd International Conference, 2022
2020
A methodology for the decryption of encrypted smartphone backup data on android platform: A case study on the latest samsung smartphone backup system.
Digit. Investig., 2020
2019
Cryptanalysis of hash functions based on blockciphers suitable for IoT service platform security.
Multim. Tools Appl., 2019
Analysis of the Noise Source Entropy Used in OpenSSL's Random Number Generation Mechanism.
Proceedings of the 2019 International Conference on Information and Communication Technology Convergence, 2019
2017
Proceedings of the Information Security Applications - 18th International Conference, 2017
2016
Wirel. Pers. Commun., 2016
Proceedings of the Eighth International Conference on Ubiquitous and Future Networks, 2016
2014
J. Netw. Comput. Appl., 2014
Proceedings of the International Conference on Underwater Networks & Systems, Rome, Italy, November 12, 2014
Proceedings of the Information Security Theory and Practice. Securing the Internet of Things, 2014
2012
Proceedings of the IEEE International Carnahan Conference on Security Technology, 2012
Practical Multi-party Versions of Private Set Intersection Protocols with Hardware Tokens.
Proceedings of the Computer Applications for Communication, Networking, and Digital Contents, 2012
Security in Underwater Acoustic Sensor Network: Focus on Suitable Encryption Mechanisms.
Proceedings of the AsiaSim 2012, 2012
2011
Proceedings of the International Carnahan Conference on Security Technology, 2011
2010
Proceedings of the International Conference on Information and Communication Technology Convergence, 2010
On Distinguished Points Method to Implement a Parallel Collision Search Attack on ECDLP.
Proceedings of the Security Technology, Disaster Recovery and Business Continuity, 2010
2009
Formalizing the design, evaluation, and analysis of quality of protection in wireless networks.
J. Commun. Networks, 2009
2007
Proceedings of the Wired/Wireless Internet Communications, 5th International Conference, 2007
Proceedings of the Computational Science and Its Applications, 2007
A Fast and Efficient Authentication Protocol for a Seamless Handover between a WLAN and WiBro.
Proceedings of the Second International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2007), 2007
2006
Known-IV, Known-in-Advance-IV, and Replayed-and-Known-IV Attacks on Multiple Modes of Operation of Block Ciphers.
J. Cryptol., 2006
Privacy-Enhancing Fingerprint Authentication Using Cancelable Templates with Passwords.
Proceedings of the Information Security Applications, 7th International Workshop, 2006
2001
Proceedings of the Information Security and Cryptology, 2001
Proceedings of the Advances in Cryptology, 2001
Proceedings of the Advances in Cryptology, 2001
Proceedings of the Information Security and Privacy, 6th Australasian Conference, 2001
2000
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000