Showing results 1 to 9 of 9
A Fragile Watermakring Scheme For Binary Image Authentication using Hamming Code Lee, Y; Kim, H; Park, Y; Chung, B; Yoon, Hyunsoo, 6th Asia Pacific International Symposium on Information Technology, pp.445 - 448, IEEE, 2007-01 |
A new binary image authentication scheme with small distortion and low false negative rates Lee, Y; Hur, J; Kim, H; Park, Y; Yoon, Hyunsoo, IEICE TRANSACTIONS ON COMMUNICATIONS, v.E90B, pp.3259 - 3262, 2007-11 |
A new proxy signature scheme providing self-delegation Lee, Y; Kim, H; Park, Y; Yoon, Hyunsoo, ICISC 2006: 9th International Conference on Information Security and Cryptology, pp.328 - 342, Springer Verlag (Germany), 2006-11-30 |
An Efficient Proactive Key Distribution Scheme for Fast Handoff in IEEE 802.11 Wireless Networks Yoon, Hyunsoo; Lee, Y; Kim, H; Chung, B; Park, Y, The International Conference on Information Networking 2007, pp.445 - 448, 2007-01-23 |
Design and Implementation of UPnP-to-Jini Service Han, S; Eun, S; Yoon, Hyunsoo; Kim, J; Park, Y, 3rd Asia Pacific International Symposium on Information Technology, pp.48 - 55, 2004 |
Hardware Stack Design Towards an Effective Defense Against From Pointer Overwriting Attacks Yoon, Hyunsoo; Park, Y; Lee, Y; Kim, H; Lee, GJ; Kim, IH, The 1th International Workshop on Security (IWSEC'06) - LNCS, pp.268 - 277, 2006-09-23 |
On the construction of a powerful distributed authentication server without additional key management Hong, SM; Lee, S; Park, Y; Cho, Y; Yoon, Hyunsoo, COMPUTER COMMUNICATIONS, v.23, no.17, pp.1638 - 1644, 2000-11 |
Reactive key management scheme for access control in group communications Kim, H; Lee, Y; Park, Y; Yoon, Hyunsoo, IEICE TRANSACTIONS ON COMMUNICATIONS, v.E90B, pp.982 - 986, 2007-04 |
Weakness of the Synchro-Difference LKH scheme for secure multicast Kim, H; Chung, B; Lee, Y; Park, Y; Yoon, Hyunsoo, IEEE COMMUNICATIONS LETTERS, v.11, no.9, pp.765 - 767, 2007-09 |
Discover