|
Journal
|
2025 |
A Machine Learning Attack-Resistant PUF-Based Robust and Efficient Mutual Authentication Scheme in Fog-Enabled IoT Environments
Yusungjin IEEE Internet of Things Journal, v.12, no.12, pp.20652-20669 |
10 |
원문
|
|
Journal
|
2023 |
Robust and Efficient Authentication and Group–Proof Scheme Using Physical Unclonable Functions for Wearable Computing
Yusungjin Sensors, v.23, no.12, pp.1-26 |
5 |
원문
|
|
Journal
|
2022 |
A Robust Authentication Protocol for Wireless Medical Sensor Networks Using Blockchain and Physically Unclonable Functions
Yusungjin IEEE Internet of Things Journal, v.9, no.20, pp.20214-20228 |
108 |
원문
|
|
Journal
|
2022 |
SALS-TMIS: Secure, Anonymous, and Lightweight Privacy-Preserving Scheme for IoMT-Enabled TMIS Environments
Yusungjin IEEE Access, v.10, pp.60534-60549 |
20 |
원문
|
|
Journal
|
2020 |
LAKS-NVT: Provably Secure and Lightweight Authentication and Key Agreement Scheme Without Verification Table in Medical Internet of Things
Park Kisung IEEE Access, v.8, pp.119387-119404 |
64 |
원문
|
|
Journal
|
2018 |
Bi-directional and Concurrent Proof of Ownership for Stronger Storage Services with De-duplication
Taek-Young Youn Science China - Information Sciences, v.61, no.3, pp.1-12 |
8 |
원문
|
|
Journal
|
2015 |
Short Dynamic Group Signature Scheme Supporting Controllable Linkability
Jung Yeon Hwang IEEE Transactions on Information Forensics and Security, v.10, no.6, pp.1109-1124 |
60 |
원문
|
|
Journal
|
2013 |
Group Signatures with Controllable Linkability for Dynamic Membership
Jung Yeon Hwang Information Sciences, v.222, pp.761-778 |
51 |
원문
|
|
Journal
|
2012 |
Signcryption with Fast Online Signing and Short Signcryptext for Secure and Private Mobile Communication
Youn Taek Young Science China - Information Science, v.55, no.11, pp.2530-2541 |
8 |
원문
|
|
Journal
|
2012 |
Efficient Certificateless Proxy Signature Scheme with Provable Security
서승현 Information Sciences, v.188, pp.322-337 |
39 |
원문
|
|
Journal
|
2007 |
Key Agreement for Key Hypergraph
Jeong Ik Rae Computers & Security, v.26, no.7-8, pp.452-458 |
|
|
|
Conference
|
2006 |
A Diffie-Hellman Key Exchange Protocol Without Random Oracles
Jeong Ik Rae International Conference on Cryptology and Network Security (CANS) 2006 (LNCS 4301), v.4301, pp.37-54 |
18 |
원문
|
|
Conference
|
2006 |
Provably-Secure Two-Round Password-Authenticated Group Key Exchange in the Standard Model
권정옥 International Workshop on Security (IWSEC) 2006 (LNCS 4266), v.4266, pp.322-336 |
9 |
원문
|