Okyeon Yi

According to our database1, Okyeon Yi authored at least 29 papers between 2000 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Rider Optimization With Deep Learning Based Image Encryption for Secure Drone Communication.
IEEE Access, 2023

2022
A study on data acquisition based on the Huawei smartphone backup protocol.
Digit. Investig., 2022

Analysis of Radioactive Decay Based Entropy Generator in the IoT Environments.
Proceedings of the Information Security Applications - 23rd International Conference, 2022

2020
A methodology for the decryption of encrypted smartphone backup data on android platform: A case study on the latest samsung smartphone backup system.
Digit. Investig., 2020

2019
Cryptanalysis of hash functions based on blockciphers suitable for IoT service platform security.
Multim. Tools Appl., 2019

Analysis of the Noise Source Entropy Used in OpenSSL's Random Number Generation Mechanism.
Proceedings of the 2019 International Conference on Information and Communication Technology Convergence, 2019

2017
Key Managements of Underwater Acoustic Communication Environments.
Proceedings of the Information Security Applications - 18th International Conference, 2017

2016
CCM-UW Security Modes for Low-band Underwater Acoustic Sensor Networks.
Wirel. Pers. Commun., 2016

Ticket-based authentication protocol for Underwater Wireless Sensor Network.
Proceedings of the Eighth International Conference on Ubiquitous and Future Networks, 2016

2014
An improved side channel attack using event information of subtraction.
J. Netw. Comput. Appl., 2014

An Energy efficient CCM-UW security mechanism for Underwater Acoustic Networks.
Proceedings of the International Conference on Underwater Networks & Systems, Rome, Italy, November 12, 2014

A Security Analysis of Key Expansion Functions Using Pseudorandom Permutations.
Proceedings of the Information Security Theory and Practice. Securing the Internet of Things, 2014

2012
CPA performance enhancement based on spectrogram.
Proceedings of the IEEE International Carnahan Conference on Security Technology, 2012

Practical Multi-party Versions of Private Set Intersection Protocols with Hardware Tokens.
Proceedings of the Computer Applications for Communication, Networking, and Digital Contents, 2012

Security in Underwater Acoustic Sensor Network: Focus on Suitable Encryption Mechanisms.
Proceedings of the AsiaSim 2012, 2012

2011
Ghost key patterns with Equidistant Chosen Message attack on RSA-CRT.
Proceedings of the International Carnahan Conference on Security Technology, 2011

2010
Methods for practical whitebox cryptography.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2010

On Distinguished Points Method to Implement a Parallel Collision Search Attack on ECDLP.
Proceedings of the Security Technology, Disaster Recovery and Business Continuity, 2010

2009
Formalizing the design, evaluation, and analysis of quality of protection in wireless networks.
J. Commun. Networks, 2009

2007
A Secure Handover Protocol Design in Wireless Networks with Formal Verification.
Proceedings of the Wired/Wireless Internet Communications, 5th International Conference, 2007

Fingerprint Template Protection Using Fuzzy Vault.
Proceedings of the Computational Science and Its Applications, 2007

A Fast and Efficient Authentication Protocol for a Seamless Handover between a WLAN and WiBro.
Proceedings of the Second International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2007), 2007

2006
Known-IV, Known-in-Advance-IV, and Replayed-and-Known-IV Attacks on Multiple Modes of Operation of Block Ciphers.
J. Cryptol., 2006

Privacy-Enhancing Fingerprint Authentication Using Cancelable Templates with Passwords.
Proceedings of the Information Security Applications, 7th International Workshop, 2006

2001
Concrete Security Analysis of CTR-OFB and CTR-CFB Modes of Operation.
Proceedings of the Information Security and Cryptology, 2001

Provable Security of KASUMI and 3GPP Encryption Mode f8.
Proceedings of the Advances in Cryptology, 2001

Known-IV Attacks on Triple Modes of Operation of Block Ciphers.
Proceedings of the Advances in Cryptology, 2001

Pseudorandomness of MISTY-Type Transformations and the Block Cipher KASUMI.
Proceedings of the Information Security and Privacy, 6th Australasian Conference, 2001

2000
A Proposal of a New Public Key Cryptosystem Using Matrices over a Ring.
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000


  Loading...