Youngsook Lee
Orcid: 0000-0003-3400-3958
According to our database1,
Youngsook Lee
authored at least 54 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
2006
2008
2010
2012
2014
2016
2018
2020
2022
2024
0
1
2
3
4
5
6
7
1
1
2
1
1
1
2
2
2
1
1
1
1
1
3
2
3
1
3
6
2
6
1
2
2
2
3
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
2023
An Improved Lightweight User Authentication Scheme for the Internet of Medical Things.
Sensors, February, 2023
2022
Factors affecting continuous purchase intention of fashion products on social E-commerce: SOR model and the mediating effect.
Entertain. Comput., 2022
IEEE Access, 2022
Proceedings of the 16th International Conference on Ubiquitous Information Management and Communication, 2022
2021
Secure Three-Factor Anonymous User Authentication Scheme for Cloud Computing Environment.
Wirel. Commun. Mob. Comput., 2021
Security Analysis of Blockchain-based User Authentication for Smart Grid Edge Computing Infrastructure.
Proceedings of the 15th International Conference on Ubiquitous Information Management and Communication, 2021
2020
A three-factor anonymous user authentication scheme for Internet of Things environments.
J. Inf. Secur. Appl., 2020
Cryptanalysis of Protocol for Heterogeneous Wireless Sensor Networks for the Internet of Things Environment.
Proceedings of the 14th International Conference on Ubiquitous Information Management and Communication, 2020
Cryptanalysis and Improvement of User Authentication Scheme Based on Rabin Cryptosystem.
Proceedings of the 14th International Conference on Ubiquitous Information Management and Communication, 2020
Proceedings of the 14th International Conference on Ubiquitous Information Management and Communication, 2020
2018
Efficient and Secure Biometric-Based User Authenticated Key Agreement Scheme with Anonymity.
Secur. Commun. Networks, 2018
Cryptanalysis of a privacy-preserving and provable user authentication scheme for wireless sensor networks based on Internet of Things security.
Proceedings of the 2018 International Conference on Information Networking, 2018
Improvement on a Biometric-Based Key Agreement and Authentication Scheme for the Multi-server Environments.
Proceedings of the Computational Science and Its Applications - ICCSA 2018, 2018
2017
Improving Biometric-Based Authentication Schemes with Smart Card Revocation/Reissue for Wireless Sensor Networks.
Sensors, 2017
Improving an Anonymous and Provably Secure Authentication Protocol for a Mobile User.
Secur. Commun. Networks, 2017
Improvement of user authentication scheme preserving uniqueness and anonymity for connected health care.
Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, 2017
Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, 2017
Proceedings of the Advances in Human Factors in Cybersecurity, 2017
2016
An Enhanced Lightweight Anonymous Authentication Scheme for a Scalable Localization Roaming Service in Wireless Sensor Networks.
Sensors, 2016
Security Improvement on Biometric Based Authentication Scheme for Wireless Sensor Networks Using Fuzzy Extraction.
Int. J. Distributed Sens. Networks, 2016
Cryptanalysis and Improvement of Efficient Password-Based User Authentication Scheme using Hash Function.
Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication, 2016
2015
Proceedings of the Computational Science and Its Applications - ICCSA 2015, 2015
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2015
Cryptanalysis on Symmetric Key Techniques Based Authentication Scheme for Wireless Sensor Networks.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2015
2014
Sensors, 2014
Security Analysis and Improvements of Two-Factor Mutual Authentication with Key Agreement in Wireless Sensor Networks.
Sensors, 2014
2013
Proceedings of the Mobile, Ubiquitous, and Intelligent Computing, 2013
Security Enhanced Unlinkable Authentication Scheme with Anonymity for Global Mobility Networks.
Proceedings of the Mobile, Ubiquitous, and Intelligent Computing, 2013
On the Use of a Hash Function in a 3-Party Password-Based Authenticated Key Exchange Protocol.
Proceedings of the Grid and Pervasive Computing - 8th International Conference, 2013
Proceedings of the Grid and Pervasive Computing - 8th International Conference, 2013
Proceedings of the Grid and Pervasive Computing - 8th International Conference, 2013
Improved Authentication Scheme with Anonymity for Roaming Service in Global Mobility Networks.
Proceedings of the Grid and Pervasive Computing - 8th International Conference, 2013
2012
IEICE Trans. Commun., 2012
Proceedings of the Information Technology Convergence, Secure and Trust Computing, and Data Management, 2012
Security Analysis of Authentication Scheme for Wireless Communications with User Anonymity.
Proceedings of the Information Technology Convergence, Secure and Trust Computing, and Data Management, 2012
2011
Proceedings of the Human Interface and the Management of Information. Interacting with Information, 2011
Cryptanalysis to a Remote User Authentication Scheme Using Smart Cards for Multi-server Environment.
Proceedings of the Human Interface and the Management of Information. Interacting with Information, 2011
Proceedings of the Human Interface and the Management of Information. Interacting with Information, 2011
Proceedings of the Human Interface and the Management of Information. Interacting with Information, 2011
Proceedings of the Future Generation Information Technology, 2011
Proceedings of the Future Generation Information Technology, 2011
2010
Proceedings of the Information Security, 2010
2009
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2009, 2009
Security Vulnerabilities of a Remote User Authentication Scheme Using Smart Cards Suited for a Multi-server Environment.
Proceedings of the Computational Science and Its Applications, 2009
2008
Proceedings of the Agent and Multi-Agent Systems: Technologies and Applications, 2008
Security Weaknesses in Chang and Wu's Key Agreement Protocol for a Multi-Server Environment.
Proceedings of the 2008 IEEE International Conference on e-Business Engineering, 2008
2007
Security weakness in a three-party pairing-based protocol for password authenticated key exchange.
Inf. Sci., 2007
Password-Only Authenticated Key Exchange Between Two Agents in the Four-Party Setting.
Proceedings of the Agent and Multi-Agent Systems: Technologies and Applications, 2007
Infringing Key Authentication of an ID-Based Group Key Exchange Protocol Using Binary Key Trees.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007
2006
IACR Cryptol. ePrint Arch., 2006
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006
Proceedings of the Computational Science and Its Applications, 2006
Proceedings of the Computational Science and Its Applications, 2006