Eun-Kyung Ryu

According to our database1, Eun-Kyung Ryu authored at least 37 papers between 2002 and 2017.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2017
Delegation Based User Authentication Framework over Cognitive Radio Networks.
J. Sens. Actuator Networks, 2017

2015
On Elliptic Curve Based Untraceable RFID Authentication Protocols.
Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, 2015

2013
Certificateless broadcast authentication for vehicular ad hoc networks.
Secur. Commun. Networks, 2013

Unlinkable authentication for roaming user in heterogeneous wireless networks.
Proceedings of the International Conference on Connected Vehicles and Expo, 2013

2012
KCI-resilient anonymous wireless link-layer authentication protocols.
Math. Comput. Model., 2012

2010
More Robust Anonymous Authentication with Link-Layer Privacy.
Proceedings of the 5th IEEE Asia-Pacific Services Computing Conference, 2010

2009
A hybrid approach for privacy-preserving RFID tags.
Comput. Stand. Interfaces, 2009

2007
Efficient Conjunctive Keyword-Searchable Encryption.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2005
Attacks and Solutions of Yang et al.'s Protected Password Changing Scheme.
Informatica, 2005

Attacks on the Shen et al.'s Timestamp-Based Password Authentication Scheme Using Smart Cards.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005

New conference key agreement protocol with user anonymity.
Comput. Stand. Interfaces, 2005

An improvement of Hwang-Lee-Tang's simple remote user authentication scheme.
Comput. Secur., 2005

Cryptanalysis and further improvement of Peinado's improved LHL-key authentication scheme.
Appl. Math. Comput., 2005

Improvement of Chien-Jan's authenticated multiple-key agreement protocol without using conventional one-way function.
Appl. Math. Comput., 2005

Improvement of Fan et al.'s deniable authentication protocol based on Diffie-Hellman algorithm.
Appl. Math. Comput., 2005

Fixing problems in Lin et al.'s OSPA protocol.
Appl. Math. Comput., 2005

On the security of efficient user identification scheme.
Appl. Math. Comput., 2005

Security of Tseng-Jan's conference key distribution system.
Appl. Math. Comput., 2005

Cryptanalysis of Lee-Lee authenticated key agreement scheme.
Appl. Math. Comput., 2005

Secure Protected Password Change Scheme.
Proceedings of the Computer Network Security, 2005

Optimized Initiation Phases for Anonymous Auction Protocols.
Proceedings of the Web and Communication Technologies and Internet-Related Social Issues, 2005

Cryptanalysis of A Key Authentication Scheme Based on Discrete Logarithms.
Proceedings of The 2005 International Conference on Security and Management, 2005

2004
Further improvement of an efficient password based remote user authentication scheme using smart cards.
IEEE Trans. Consumer Electron., 2004

Efficient remote user authentication scheme based on generalized ElGamal signature scheme.
IEEE Trans. Consumer Electron., 2004

A secure user authentication scheme using hash functions.
ACM SIGOPS Oper. Syst. Rev., 2004

An Efficient ID-Based Authenticated Key Agreement Protocol from Pairings.
Proceedings of the NETWORKING 2004, 2004

Robust Remote User Authentication Scheme.
Proceedings of the Information Networking, 2004

Security of Shen et al.'s Timestamp-Based Password Authentication Scheme.
Proceedings of the Computational Science and Its Applications, 2004

Multiparty Key Agreement Protocol with Cheater Identification Based on Shamir Secret Sharing.
Proceedings of the Computational Science and Its Applications, 2004

An Authenticated Key Agreement Protocol Resistant to a Dictionary Attack.
Proceedings of the Computational Science and Its Applications, 2004

ID-Based Authenticated Multiple-Key Agreement Protocol from Pairings.
Proceedings of the Computational Science and Its Applications, 2004

2003
A Promising Key Agreement Protocol.
Proceedings of the Algorithms and Computation, 14th International Symposium, 2003

A Robust Authenticated Key Agreement Protocol.
Proceedings of the ISCA 18th International Conference Computers and Their Applications, 2003

A New Authenticated Key Agreement Protocol.
Proceedings of the 16th International Conference on Computer Applications in Industry and Engineering, 2003

2002
A Practical Method for On-the-Fly Data Race Detection.
Proceedings of the Applied Parallel Computing Advanced Scientific Computing, 2002

Space-Efficient First Race Detection in Shared Memory Programs with Nested Parallelism.
Proceedings of the Applied Parallel Computing Advanced Scientific Computing, 2002

A Promising Labeling Scheme for On-the-fly Data Race Detection.
Proceedings of the ISCA 17th International Conference Computers and Their Applications, 2002


  Loading...