Eun-Jun Yoon

According to our database1, Eun-Jun Yoon authored at least 136 papers between 2004 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Publicly verifiable threshold secret sharing based on three-dimensional-cellular automata.
Concurr. Comput. Pract. Exp., 2021

2019
Data-Hiding Scheme Using Multidirectional Pixel-Value Differencing on Colour Images.
Secur. Commun. Networks, 2019

2018
A real-time secret image sharing with fairness.
J. Real Time Image Process., 2018

Reversible data hiding scheme with edge-direction predictor and modulo operation.
J. Real Time Image Process., 2018

Design of a Secure Mutually Authenticated Key-Agreement Protocol for Multi-server Architecture.
J. Comput., 2018

2017
Comment on 'Efficient and secure dynamic ID-based remote user authentication scheme for distributed systems using smart cards'.
IET Inf. Secur., 2017

Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications.
IEEE Access, 2017

Design of Mutually Authenticated Key Agreement Protocol Resistant to Impersonation Attacks for Multi-Server Environment.
IEEE Access, 2017

2016
An Anonymous Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Biometrics and Smartcards.
KSII Trans. Internet Inf. Syst., 2016

An in-depth analysis of strong t-consistency on secret image sharing.
Int. J. Pervasive Comput. Commun., 2016

Lightweight authentication with key-agreement protocol for mobile network environment using smart cards.
IET Inf. Secur., 2016

A Secure Anonymous Authentication Protocol for Mobile Services on Elliptic Curve Cryptography.
IEEE Access, 2016

An Enhanced Anonymous Two-factor Mutual Authentication with Key-agreement Scheme for Session Initiation Protocol.
Proceedings of the 9th International Conference on Security of Information and Networks, 2016

2015
Consistency Analysis for Secure Reconstruction in Secret Image Sharing.
Proceedings of the 13th International Conference on Advances in Mobile Computing and Multimedia, 2015

2014
Development of a Smart Oriental Medical System Using Security Functions.
Int. J. Fuzzy Log. Intell. Syst., 2014

A biometric-based authenticated key agreement scheme using ECC for wireless sensor networks.
Proceedings of the Symposium on Applied Computing, 2014

2013
Robust biometrics-based multi-server authentication with key agreement scheme for smart cards on elliptic curve cryptosystem.
J. Supercomput., 2013

Verifier-based computation-and communication-efficient 3EKE protocols.
Math. Comput. Model., 2013

New ID-Based Proxy Signature Scheme with Message Recovery.
Proceedings of the Grid and Pervasive Computing - 8th International Conference, 2013

2012
An Improvement of the User Identification and Key Agreement Protocol with User Anonymity.
Informatica, 2012

Cryptanalysis of an Improved User Authentication Scheme with User Anonymity for Wireless Communications.
IEICE Trans. Inf. Syst., 2012

On the Security of an Efficient and Secure Dynamic ID-Based Remote User Authentication Scheme.
IEICE Trans. Inf. Syst., 2012

Improvement of the securing RFID systems conforming to EPC Class 1 Generation 2 standard.
Expert Syst. Appl., 2012

Cryptanalysis of an RFID Tag Search Protocol Preserving Privacy of Mobile Reader.
Proceedings of the Network and Parallel Computing, 9th IFIP International Conference, 2012

Cryptanalysis of Goriparthi et al.'s Bilinear Pairing Based Remote User Authentication Scheme.
Proceedings of the Network and Parallel Computing, 9th IFIP International Conference, 2012

On the Security of Lv et al.'s Three-Party Authenticated Key Exchange Protocol Using One-Time Key.
Proceedings of the Advanced Infocomm Technology - 5th IEEE International Conference, 2012

2011
An Efficient and Secure Identity-Based Strong Designated Verifier Signature Scheme.
Inf. Technol. Control., 2011

A New Efficient Key Agreement Scheme for VSAT Satellite Communications Based on Elliptic Curve Cryptosystem.
Inf. Technol. Control., 2011

Cryptanalysis of a simple three-party password-based key exchange protocol.
Int. J. Commun. Syst., 2011

Robust biometric-based three-party authenticated key establishment protocols.
Int. J. Comput. Math., 2011

Cryptanalysis of Group Key Agreement Protocol Based on Chaotic Hash Function.
IEICE Trans. Inf. Syst., 2011

Robust Authentication Scheme between User and Remote Autonomous Object in Telecommunications System.
IEICE Trans. Inf. Syst., 2011

A secure broadcasting cryptosystem and its application to grid computing.
Future Gener. Comput. Syst., 2011

An efficient and secure anonymous authentication scheme for mobile satellite communication systems.
EURASIP J. Wirel. Commun. Netw., 2011

Cryptanalysis of an Enhanced Spatiotemporal Chaotic Image/Video Cryptosystem.
EURASIP J. Adv. Signal Process., 2011

A user friendly authentication scheme with anonymity for wireless communications.
Comput. Electr. Eng., 2011

A New Biometric-based User Authentication Scheme without Using Password for Wireless Sensor Networks.
Proceedings of the 20th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises, 2011

Cryptanalysis of an Enhanced Simple Three-Party Key Exchange Protocol.
Proceedings of the Security Technology, 2011

Simple Authenticated Multiple Key Exchange Protocol for Ubiquitous Computing.
Proceedings of the 14th IEEE International Conference on Computational Science and Engineering, 2011

A Practical Convertible Authenticated Encryption Scheme with Message Linkages and Forward Secrecy.
Proceedings of the 14th IEEE International Conference on Computational Science and Engineering, 2011

Cryptanalysis of robust mutual authentication protocol for wireless sensor networks.
Proceedings of the 10th IEEE International Conference on Cognitive Informatics and Cognitive Computing, 2011

2010
Robust Deniable Authentication Protocol.
Wirel. Pers. Commun., 2010

An Entire Chaos-Based Biometric Remote User Authentication Scheme on Tokens Without Using Password.
Informatica, 2010

A Robust Security Mechanism for Mobile Commerce Transactions.
IEICE Trans. Inf. Syst., 2010

A Biometric Authenticated Key Agreement Protocol for Secure Token.
IEICE Trans. Inf. Syst., 2010

Off-Line Keyword Guessing Attacks on Searchable Encryption with Keyword-Recoverability.
IEICE Trans. Inf. Syst., 2010

An Optimized Gateway-Oriented Password-Based Authenticated Key Exchange Protocol.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010

Cryptanalysis of a Handover Authentication Scheme Using Credentials Based on Chameleon Hashing.
IEICE Trans. Inf. Syst., 2010

Improvement of the Efficient Secret Broadcast Scheme.
IEICE Trans. Inf. Syst., 2010

A New Fingerprint Biometric Remote User Authentication Scheme Using Chaotic Hash Function On Mobile Devices.
Intell. Autom. Soft Comput., 2010

A secure and efficient SIP authentication scheme for converged VoIP networks.
Comput. Commun., 2010

A Three-Factor Authenticated Key Agreement Scheme for SIP on Elliptic Curves.
Proceedings of the Fourth International Conference on Network and System Security, 2010

More Robust Anonymous Authentication with Link-Layer Privacy.
Proceedings of the 5th IEEE Asia-Pacific Services Computing Conference, 2010

2009
Robust Key Exchange Protocol between Set-Top Box and Smart Card in DTV Broadcasting.
Informatica, 2009

Robust Multi-Server Authentication Scheme.
Proceedings of the NPC 2009, 2009

A study on intelligent cyber university.
Proceedings of the 2009 International Conference on Hybrid Information Technology, 2009

Robust Broadcasting Cryptosystem in Computer Networks.
Proceedings of the Workshops at the Grid and Pervasive Computing Conference, 2009

Robust ID-Based Remote Mutual Authentication with Key Agreement Scheme for Mobile Devices on ECC.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

A New Authentication Scheme for Session Initiation Protocol.
Proceedings of the 2009 International Conference on Complex, 2009

2008
Improving the Host Authentication Mechanism for POD Copy Protection System.
Proceedings of the New Directions in Intelligent Interactive Multimedia, 2008

Robust User Password Change Scheme based on the Elliptic Curve Cryptosystem.
Fundam. Informaticae, 2008

Improving the novel three-party encrypted key exchange protocol.
Comput. Stand. Interfaces, 2008

Two Security Problems of RFID Security Method with Ownership Transfer.
Proceedings of the IFIP International Conference on Network and Parallel Computing, 2008

An Efficient Authentication and Key Agreement Protocol in RFID System.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2008

An Improvement of Password-Only Authenticated Key Establishment Protocol without Public Key Cryptography.
Proceedings of the 2008 International Conference on Multimedia and Ubiquitous Engineering (MUE 2008), 2008

A New Key Agreement Protocol Based on Chaotic Maps.
Proceedings of the Agent and Multi-Agent Systems: Technologies and Applications, 2008

Cryptanalysis of Wang et al.'s Remote User Authentication Scheme Using Smart Cards.
Proceedings of the Fifth International Conference on Information Technology: New Generations (ITNG 2008), 2008

Replay Attacks on Han et al.'s Chaotic Map Based Key Agreement Protocol Using Nonce.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Contemporary Intelligent Computing Techniques, 2008

Improving the Generalized Password-Based Authenticated Key Agreement Protocol.
Proceedings of the Workshops at the Grid and Pervasive Computing Conference, 2008

Enhanced Three-Round Smart Card-Based Key Exchange Protocol.
Proceedings of the Autonomic and Trusted Computing, 5th International Conference, 2008

2007
Comments on Modified User Friendly Remote Authentication Scheme with Smart Cards.
IEICE Trans. Commun., 2007

Cryptanalysis of Robust E-Mail Protocols with Perfect Forward Secrecy.
IEEE Commun. Lett., 2007

Secure Remote User Authentication Scheme Using Bilinear Pairings.
Proceedings of the Information Security Theory and Practices. Smart Cards, 2007

An Efficient ID-Based Authenticated Key Agreement Protocol with Pairings.
Proceedings of the Parallel and Distributed Processing and Applications, 2007

Improving the Sun-Cao's Public Key Authentication Scheme for Non-repudiation.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Contemporary Intelligent Computing Techniques, 2007

Secure PAP-Based RADIUS Protocol in Wireless Networks.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Contemporary Intelligent Computing Techniques, 2007

Improving the Single-Assumption Authenticated Diffie-Hellman Key Agreement Protocols.
Proceedings of the Computational Science and Its Applications, 2007

Two Security Problems of Efficient Remote Mutual Authentication and Key Agreement.
Proceedings of the Future Generation Communication and Networking, 2007

Vulnerability of User Identification and Key Agreement Protocol with User Anonymity.
Proceedings of the Future Generation Communication and Networking, 2007

Token-Based Authenticated Key Establishment Protocols for Three-Party Communication.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007

A New Steganography Scheme using a Frame.
Proceedings of the 2007 International Conference on Security & Management, 2007

Visual Multi-Secret Sharing Scheme with Cheater Identification.
Proceedings of the 2007 International Conference on Security & Management, 2007

A Secret-Key Exponential Key Agreement Protocol with Smart Cards.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007

A Secure Chaotic Hash-Based Biometric Remote User Authentication Scheme Using Mobile Devices.
Proceedings of the Advances in Web and Network Technologies, and Information Management, 2007

2006
On the Security of Signature Scheme with Message Recovery and Its Application.
Int. J. Netw. Secur., 2006

A Forgery Attack on A Low Computation Cost User Authentication Scheme.
Int. J. Netw. Secur., 2006

A New Secure Key Exchange Protocol Between STB and Smart Card in DTV Broadcasting.
Proceedings of the Intelligence and Security Informatics, International Workshop, 2006

An Optimizing Authenticated Key Exchange Protocol for Self-organizing Sensor Networks.
Proceedings of the Ubiquitous Computing Systems, Third International Symposium, 2006

An Improved Digital Signature with Message Recovery Using Self-certified Public Keys Without Trustworthy System Authority.
Proceedings of the SOFSEM 2006: Theory and Practice of Computer Science, 2006

Efficient Mutual Authentication Scheme with Smart Card.
Proceedings of the Agent Computing and Multi-Agent Systems, 2006

Improving the Dynamic ID-Based Remote Mutual Authentication Scheme.
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006

Biometrics Authenticated Key Agreement Scheme.
Proceedings of the Next Generation Information Technologies and Systems, 2006

One-Time Password Authentication Scheme Using Smart Cards Providing User Anonymity.
Proceedings of the Computational Science and Its Applications, 2006

An Improved Popescu's Authenticated Key Agreement Protocol.
Proceedings of the Computational Science and Its Applications, 2006

Various Types of Attacks and Solutions Regarding Secure Remote User Access over Insecure Networks.
Proceedings of the Computational Science and Its Applications, 2006

An Optimized Two Factor Authenticated Key Exchange Protocol in PWLANs.
Proceedings of the Computational Science, 2006

Enhanced Forward-Secure User Authentication Scheme with Smart Cards.
Proceedings of the Public Key Infrastructure, 2006

An Improved Lu-Cao's Remote User Authentication Scheme Using Smart Card.
Proceedings of the Public Key Infrastructure, 2006

A Secure Password-Authenticated Key Exchange Between Clients with Different Passwords.
Proceedings of the Advanced Web and Network Technologies, and Applications, 2006

Improving the ID-Based Key Exchange Protocol in Wireless Mobile Ad Hoc Networks.
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks, 5th International Conference, 2006

2005
Attacks and Solutions of Yang et al.'s Protected Password Changing Scheme.
Informatica, 2005

Cryptanalysis of Password Authenticated Key Exchange Based on RSA for Imbalanced Wireless Networks.
IEICE Trans. Commun., 2005

Attacks on the Shen et al.'s Timestamp-Based Password Authentication Scheme Using Smart Cards.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005

An improvement of Hwang-Lee-Tang's simple remote user authentication scheme.
Comput. Secur., 2005

Cryptanalysis of Zhang-Xiao's multisignature scheme for specified group of verifiers.
Appl. Math. Comput., 2005

Weakness and solution of Yang et al.'s protected password changing scheme.
Appl. Math. Comput., 2005

On the security of Wu-Lin's robust key authentication scheme.
Appl. Math. Comput., 2005

Cryptanalysis and further improvement of Peinado's improved LHL-key authentication scheme.
Appl. Math. Comput., 2005

Improvement of Chien-Jan's authenticated multiple-key agreement protocol without using conventional one-way function.
Appl. Math. Comput., 2005

Improvement of Fan et al.'s deniable authentication protocol based on Diffie-Hellman algorithm.
Appl. Math. Comput., 2005

Fixing problems in Lin et al.'s OSPA protocol.
Appl. Math. Comput., 2005

Secure Fingerprint-Based Remote User Authentication Scheme Using Smartcards.
Proceedings of the Internet and Network Economics, First International Workshop, 2005

New Authentication Protocol Providing User Anonymity in Open Network.
Proceedings of the Internet and Network Economics, First International Workshop, 2005

Security Enhancement for Password Authentication Schemes with Smart Cards.
Proceedings of the Trust, 2005

Robust Secret Key Based Authentication Scheme Using Smart Cards.
Proceedings of the Advances in Multimedia Information Processing, 2005

Secure Protected Password Change Scheme.
Proceedings of the Computer Network Security, 2005

A New Efficient Fingerprint-Based Remote User Authentication Scheme for Multimedia Systems.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

Robust Authenticated Encryption Scheme with Message Linkages.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

Robust and Simple Authentication Protocol for Secure Communication on the Web.
Proceedings of the Web Engineering, 5th International Conference, 2005

More Efficient and Secure Remote User Authentication Scheme using Smart Cards.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005

New Multi-server Password Authentication Scheme Using Neural Networks.
Proceedings of the Advances in Natural Computation, First International Conference, 2005

Cryptanalysis of Two User Identification Schemes with Key Distribution Preserving Anonymity.
Proceedings of the Information and Communications Security, 7th International Conference, 2005

Optimized Initiation Phases for Anonymous Auction Protocols.
Proceedings of the Web and Communication Technologies and Internet-Related Social Issues, 2005

An Efficient Password Authentication Schemes Without Using the Server Public Key for Grid Computing.
Proceedings of the Grid and Cooperative Computing - GCC 2005, 4th International Conference, Beijing, China, November 30, 2005

A New Simple Authenticated Key Agreement and Protected Password Change Protocol.
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005

Improvement of an Efficient User Identification Scheme Based on ID-Based Cryptosystem.
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005

Cryptanalysis of A Key Authentication Scheme Based on Discrete Logarithms.
Proceedings of The 2005 International Conference on Security and Management, 2005

A Secret Key Based Authentication Scheme Using Smart Cards.
Proceedings of The 2005 International Conference on Security and Management, 2005

New Efficient Simple Authenticated Key Agreement Protocol.
Proceedings of the Computing and Combinatorics, 11th Annual International Conference, 2005

New Authentication Scheme Based on a One-Way Hash Function and Diffie-Hellman Key Exchange.
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005

2004
Further improvement of an efficient password based remote user authentication scheme using smart cards.
IEEE Trans. Consumer Electron., 2004

Efficient remote user authentication scheme based on generalized ElGamal signature scheme.
IEEE Trans. Consumer Electron., 2004

A secure user authentication scheme using hash functions.
ACM SIGOPS Oper. Syst. Rev., 2004

An Efficient ID-Based Authenticated Key Agreement Protocol from Pairings.
Proceedings of the NETWORKING 2004, 2004

Robust Remote User Authentication Scheme.
Proceedings of the Information Networking, 2004

Security of Shen et al.'s Timestamp-Based Password Authentication Scheme.
Proceedings of the Computational Science and Its Applications, 2004


  Loading...