Youngsook Lee

Orcid: 0000-0003-3400-3958

According to our database1, Youngsook Lee authored at least 53 papers between 2006 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
An Improved Lightweight User Authentication Scheme for the Internet of Medical Things.
Sensors, February, 2023

2022
Factors affecting continuous purchase intention of fashion products on social E-commerce: SOR model and the mediating effect.
Entertain. Comput., 2022

SMASG: Secure Mobile Authentication Scheme for Global Mobility Network.
IEEE Access, 2022

A Study of Split Learning Model.
Proceedings of the 16th International Conference on Ubiquitous Information Management and Communication, 2022

2021
Secure Three-Factor Anonymous User Authentication Scheme for Cloud Computing Environment.
Wirel. Commun. Mob. Comput., 2021

Security Analysis of Blockchain-based User Authentication for Smart Grid Edge Computing Infrastructure.
Proceedings of the 15th International Conference on Ubiquitous Information Management and Communication, 2021

2020
A three-factor anonymous user authentication scheme for Internet of Things environments.
J. Inf. Secur. Appl., 2020

Cryptanalysis of Protocol for Heterogeneous Wireless Sensor Networks for the Internet of Things Environment.
Proceedings of the 14th International Conference on Ubiquitous Information Management and Communication, 2020

Cryptanalysis and Improvement of User Authentication Scheme Based on Rabin Cryptosystem.
Proceedings of the 14th International Conference on Ubiquitous Information Management and Communication, 2020

Quantum-resistant Lattice-based Authentication for V2X Communication in C-ITS.
Proceedings of the 14th International Conference on Ubiquitous Information Management and Communication, 2020

2018
Efficient and Secure Biometric-Based User Authenticated Key Agreement Scheme with Anonymity.
Secur. Commun. Networks, 2018

Cryptanalysis of a privacy-preserving and provable user authentication scheme for wireless sensor networks based on Internet of Things security.
Proceedings of the 2018 International Conference on Information Networking, 2018

Improvement on a Biometric-Based Key Agreement and Authentication Scheme for the Multi-server Environments.
Proceedings of the Computational Science and Its Applications - ICCSA 2018, 2018

2017
Improving Biometric-Based Authentication Schemes with Smart Card Revocation/Reissue for Wireless Sensor Networks.
Sensors, 2017

Improving an Anonymous and Provably Secure Authentication Protocol for a Mobile User.
Secur. Commun. Networks, 2017

Improvement of user authentication scheme preserving uniqueness and anonymity for connected health care.
Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, 2017

An enhanced unlinkable anonymous payment scheme based on near field commnication.
Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, 2017

Cryptanalysis of Chaos-Based 2-Party Key Agreement Protocol with Provable Security.
Proceedings of the Advances in Human Factors in Cybersecurity, 2017

2016
An Enhanced Lightweight Anonymous Authentication Scheme for a Scalable Localization Roaming Service in Wireless Sensor Networks.
Sensors, 2016

Security Improvement on Biometric Based Authentication Scheme for Wireless Sensor Networks Using Fuzzy Extraction.
Int. J. Distributed Sens. Networks, 2016

Cryptanalysis and Improvement of Efficient Password-Based User Authentication Scheme using Hash Function.
Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication, 2016

2015
Security Improvement of Portable Key Management Using a Mobile Phone.
Proceedings of the Computational Science and Its Applications - ICCSA 2015, 2015

Secure Deletion for Flash-Based Self-Encrypting Drives.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2015

Cryptanalysis on Symmetric Key Techniques Based Authentication Scheme for Wireless Sensor Networks.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2015

2014
A Provably-Secure ECC-Based Authentication Scheme for Wireless Sensor Networks.
Sensors, 2014

Security Analysis and Improvements of Two-Factor Mutual Authentication with Key Agreement in Wireless Sensor Networks.
Sensors, 2014

2013
Protection Profile for PoS (Point of Sale) System.
Proceedings of the Mobile, Ubiquitous, and Intelligent Computing, 2013

Security Enhanced Unlinkable Authentication Scheme with Anonymity for Global Mobility Networks.
Proceedings of the Mobile, Ubiquitous, and Intelligent Computing, 2013

On the Use of a Hash Function in a 3-Party Password-Based Authenticated Key Exchange Protocol.
Proceedings of the Grid and Pervasive Computing - 8th International Conference, 2013

Security Requirement of End Point Security Software.
Proceedings of the Grid and Pervasive Computing - 8th International Conference, 2013

Collecting and Filtering Out Phishing Suspicious URLs Using SpamTrap System.
Proceedings of the Grid and Pervasive Computing - 8th International Conference, 2013

Improved Authentication Scheme with Anonymity for Roaming Service in Global Mobility Networks.
Proceedings of the Grid and Pervasive Computing - 8th International Conference, 2013

2012
An Enhanced Secure Authentication Scheme with Anonymity for Wireless Environments.
IEICE Trans. Commun., 2012

Design of a Simple User Authentication Scheme Using QR-Code for Mobile Device.
Proceedings of the Information Technology Convergence, Secure and Trust Computing, and Data Management, 2012

Security Analysis of Authentication Scheme for Wireless Communications with User Anonymity.
Proceedings of the Information Technology Convergence, Secure and Trust Computing, and Data Management, 2012

2011
Server-Aided Password-Authenticated Key Exchange: From 3-Party to Group.
Proceedings of the Human Interface and the Management of Information. Interacting with Information, 2011

Cryptanalysis to a Remote User Authentication Scheme Using Smart Cards for Multi-server Environment.
Proceedings of the Human Interface and the Management of Information. Interacting with Information, 2011

Analysis of Content Filtering Software.
Proceedings of the Human Interface and the Management of Information. Interacting with Information, 2011

A Practical Analysis of Smartphone Security.
Proceedings of the Human Interface and the Management of Information. Interacting with Information, 2011

Security Analysis on Digital Signature Function Implemented in PDF Software.
Proceedings of the Future Generation Information Technology, 2011

Cryptanalysis of the User Authentication Scheme with Anonymity.
Proceedings of the Future Generation Information Technology, 2011

2010
Attacking and Improving on Lee and Chiu's Authentication Scheme Using Smart Cards.
Proceedings of the Information Security, 2010

2009
Enhancing of a Password-Based Authentication Scheme Using Smart Cards.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2009, 2009

Security Vulnerabilities of a Remote User Authentication Scheme Using Smart Cards Suited for a Multi-server Environment.
Proceedings of the Computational Science and Its Applications, 2009

2008
Vulnerabilities in a Remote Agent Authentication Scheme Using Smart Cards.
Proceedings of the Agent and Multi-Agent Systems: Technologies and Applications, 2008

Security Weaknesses in Chang and Wu's Key Agreement Protocol for a Multi-Server Environment.
Proceedings of the 2008 IEEE International Conference on e-Business Engineering, 2008

2007
Security weakness in a three-party pairing-based protocol for password authenticated key exchange.
Inf. Sci., 2007

Password-Only Authenticated Key Exchange Between Two Agents in the Four-Party Setting.
Proceedings of the Agent and Multi-Agent Systems: Technologies and Applications, 2007

Infringing Key Authentication of an ID-Based Group Key Exchange Protocol Using Binary Key Trees.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007

2006
Constant Round Group Key Exchange with Logarithmic Computational Complexity.
IACR Cryptol. ePrint Arch., 2006

Security Enhancement of a Remote User Authentication Scheme Using Smart Cards.
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006

An Inter-domain Key Agreement Protocol Using Weak Passwords.
Proceedings of the Computational Science and Its Applications, 2006

Two Efficient and Secure Authentication Schemes Using Smart Cards.
Proceedings of the Computational Science and Its Applications, 2006


  Loading...