Yong Ki Lee

According to our database1, Yong Ki Lee authored at least 15 papers between 2006 and 2012.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2012
Extending ECC-based RFID authentication protocols to privacy-preserving multi-party grouping proofs.
Personal and Ubiquitous Computing, 2012

2011
Online Video Recommendation through Tag-Cloud Aggregation.
IEEE MultiMedia, 2011

2010
Anti-counterfeiting, Untraceability and Other Security Challenges for RFID Systems: Public-Key-Based Protocols and Hardware.
Proceedings of the Towards Hardware-Intrinsic Security - Foundations and Practice, 2010

Low-cost untraceable authentication protocols for RFID.
Proceedings of the Third ACM Conference on Wireless Network Security, 2010

Wide-Weak Privacy-Preserving RFID Authentication Protocols.
Proceedings of the Mobile Lightweight Wireless Systems, 2010

Privacy-Preserving ECC-Based Grouping Proofs for RFID.
Proceedings of the Information Security - 13th International Conference, 2010

Hardware design for Hash functions.
Proceedings of the Secure Integrated Circuits and Systems, 2010

Signal Processing for Cryptography and Security Applications.
Proceedings of the Handbook of Signal Processing Systems, 2010

2009
Tag-based object similarity computation using term space dimension reduction.
Proceedings of the 32nd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, 2009

2008
Design Methodology for Throughput Optimum Architectures of Hash Algorithms of the MD4-class.
Signal Processing Systems, 2008

Elliptic-Curve-Based Security Processor for RFID.
IEEE Trans. Computers, 2008

On the high-throughput implementation of RIPEMD-160 hash algorithm.
Proceedings of the 19th IEEE International Conference on Application-Specific Systems, 2008

2007
A Compact Architecture for Montgomery Elliptic Curve Scalar Multiplication Processor.
Proceedings of the Information Security Applications, 8th International Workshop, 2007

Iteration Bound Analysis and Throughput Optimum Architecture of SHA-256 (384, 512) for Hardware Implementations.
Proceedings of the Information Security Applications, 8th International Workshop, 2007

2006
Throughput Optimized SHA-1 Architecture Using Unfolding Transformation.
Proceedings of the 2006 IEEE International Conference on Application-Specific Systems, 2006


  Loading...