scispace - formally typeset
Search or ask a question
Author

Kee-Young Yoo

Bio: Kee-Young Yoo is an academic researcher from Kyungpook National University. The author has contributed to research in topics: Authentication & Password. The author has an hindex of 35, co-authored 345 publications receiving 4165 citations. Previous affiliations of Kee-Young Yoo include New Generation University College.


Papers
More filters
Journal ArticleDOI
TL;DR: A new signature-based authenticated key establishment scheme for the IoT environment that provides more functionality features, and its computational and communication costs are also comparable with other existing approaches.
Abstract: Internet of Things (IoT) is a network of all devices that can be accessed through the Internet. These devices can be remotely accessed and controlled using existing network infrastructure, thus allowing a direct integration of computing systems with the physical world. This also reduces human involvement along with improving accuracy and efficiency, resulting in economic benefit. The devices in IoT facilitate the day-to-day life of people. However, the IoT has an enormous threat to security and privacy due to its heterogeneous and dynamic nature. Authentication is one of the most challenging security requirements in the IoT environment, where a user (external party) can directly access information from the devices, provided the mutual authentication between user and devices happens. In this paper, we present a new signature-based authenticated key establishment scheme for the IoT environment. The proposed scheme is tested for security with the help of the widely used Burrows-Abadi–Needham logic, informal security analysis, and also the formal security verification using the broadly accepted automated validation of Internet security protocols and applications tool. The proposed scheme is also implemented using the widely accepted NS2 simulator, and the simulation results demonstrate the practicability of the scheme. Finally, the proposed scheme provides more functionality features, and its computational and communication costs are also comparable with other existing approaches.

320 citations

Journal ArticleDOI
TL;DR: The proposed scaling-up neighbor mean interpolation method has a low-time complexity and high-calculation speed, and the proposed data hiding method is based on interpolation, which can embed a large amount of secret data while keeping a very high visual quality.

213 citations

Journal ArticleDOI
TL;DR: An enhancement to Chien et al.'s scheme enables users to change their passwords freely and securely without the help of a remote server, while also providing secure mutual authentication.
Abstract: Recently, Ku-Chen proposed an improvement to Chien et al.'s scheme to prevent from some weaknesses. However, the improved scheme is not only still susceptible to parallel session attack, but also insecure for changing the user's password in password change phase. Accordingly, the current paper presents an enhancement to resolve such problems. As a result, the proposed scheme enables users to change their passwords freely and securely without the help of a remote server, while also providing secure mutual authentication.

175 citations

Journal ArticleDOI
TL;DR: This paper proposes a new efficient and secure biometrics-based multi- server authentication with key agreement scheme for smart cards on elliptic curve cryptosystem (ECC) without verification table to minimize the complexity of hash operation among all users and fit multi-server communication environments.
Abstract: Conventional single-server authentication schemes suffer a significant shortcoming. If a remote user wishes to use numerous network services, he/she must register his/her identity and password at these servers. It is extremely tedious for users to register numerous servers. In order to resolve this problem, various multi-server authentication schemes recently have been proposed. However, these schemes are insecure against some cryptographic attacks or inefficiently designed because of high computation costs. Moreover, these schemes do not provide strong key agreement function which can provide perfect forward secrecy. Based on these motivations, this paper proposes a new efficient and secure biometrics-based multi-server authentication with key agreement scheme for smart cards on elliptic curve cryptosystem (ECC) without verification table to minimize the complexity of hash operation among all users and fit multi-server communication environments. By adopting the biometrics technique, the proposed scheme can provide more strong user authentication function. By adopting the ECC technique, the proposed scheme can provide strong key agreement function with the property of perfect forward secrecy to reduce the computation loads for smart cards. As a result, compared with related multi-serve authentication schemes, the proposed scheme has strong security and enhanced computational efficiency. Thus, the proposed scheme is extremely suitable for use in distributed multi-server network environments such as the Internet and in limited computations and communication resource environments to access remote information systems since it provides security, reliability, and efficiency.

169 citations

Journal ArticleDOI
TL;DR: An improved scheme is proposed to overcome the weakness while maintaining the advantages of Chien et al.'s scheme to solve the problems of remote user authentication.

100 citations


Cited by
More filters
Book
10 Mar 2005
TL;DR: This unique reference work is an absolutely essential resource for all biometric security professionals, researchers, and systems administrators.
Abstract: A major new professional reference work on fingerprint security systems and technology from leading international researchers in the field Handbook provides authoritative and comprehensive coverage of all major topics, concepts, and methods for fingerprint security systems This unique reference work is an absolutely essential resource for all biometric security professionals, researchers, and systems administrators

3,821 citations

Journal ArticleDOI
TL;DR: This systematic review and meta-analyses confirmed the findings of a previous study published in “Rhinitis and Asthma: Causes and Prevention, 2nd Ed.” (2015) as well as new findings of “Mechanisms of Respiratory Disease and Allergology,” which confirmed the role of EMTs in the development of these diseases.
Abstract: Authors Jan L. Brozek, MD, PhD – Department of Clinical Epidemiology & Biostatistics and Medicine, McMaster University, Hamilton, Canada Jean Bousquet, MD, PhD – Service des Maladies Respiratoires, Hopital Arnaud de Villeneuve, Montpellier, France, INSERM, CESP U1018, Respiratory and Environmental Epidemiology Team, France, and WHO Collaborating Center for Rhinitis and Asthma Carlos E. Baena-Cagnani, MD – Faculty of Medicine, Catholic University of Cordoba, Cordoba, Argentina Sergio Bonini, MD – Institute of Neurobiology and Molecular Medicine – CNR, Rome, Italy and Department of Medicine, Second University of Naples, Naples, Italy G. Walter Canonica, MD – Allergy & Respiratory Diseases, DIMI, Department of Internal Medicine, University of Genoa, Genoa, Italy Thomas B. Casale, MD – Division of Allergy and Immunology, Department of Medicine, Creighton University, Omaha, Nebraska, USA Roy Gerth van Wijk, MD, PhD – Section of Allergology, Department of Internal Medicine, Erasmus Medical Centre, Rotterdam, the Netherlands Ken Ohta, MD, PhD – Division of Respiratory Medicine and Allergology, Department of Medicine, Teikyo University School of Medicine, Tokyo, Japan Torsten Zuberbier, MD – Department of Dermatology and Allergy, Charite Universitatsmedizin Berlin, Berlin, Germany Holger J. Schunemann, MD, PhD, MSc – Department of Clinical Epidemiology & Biostatistics and Medicine, McMaster University, Hamilton, Canada

3,368 citations

Journal ArticleDOI
TL;DR: The European Position Paper on Rhinosinusitis and Nasal Polyps 2020 is the update of similar evidence based position papers published in 2005 and 2007 and 2012 and addresses areas not extensively covered in EPOS2012 such as paediatric CRS and sinus surgery.
Abstract: The European Position Paper on Rhinosinusitis and Nasal Polyps 2020 is the update of similar evidence based position papers published in 2005 and 2007 and 2012. The core objective of the EPOS2020 guideline is to provide revised, up-to-date and clear evidence-based recommendations and integrated care pathways in ARS and CRS. EPOS2020 provides an update on the literature published and studies undertaken in the eight years since the EPOS2012 position paper was published and addresses areas not extensively covered in EPOS2012 such as paediatric CRS and sinus surgery. EPOS2020 also involves new stakeholders, including pharmacists and patients, and addresses new target users who have become more involved in the management and treatment of rhinosinusitis since the publication of the last EPOS document, including pharmacists, nurses, specialised care givers and indeed patients themselves, who employ increasing self-management of their condition using over the counter treatments. The document provides suggestions for future research in this area and offers updated guidance for definitions and outcome measurements in research in different settings. EPOS2020 contains chapters on definitions and classification where we have defined a large number of terms and indicated preferred terms. A new classification of CRS into primary and secondary CRS and further division into localized and diffuse disease, based on anatomic distribution is proposed. There are extensive chapters on epidemiology and predisposing factors, inflammatory mechanisms, (differential) diagnosis of facial pain, allergic rhinitis, genetics, cystic fibrosis, aspirin exacerbated respiratory disease, immunodeficiencies, allergic fungal rhinosinusitis and the relationship between upper and lower airways. The chapters on paediatric acute and chronic rhinosinusitis are totally rewritten. All available evidence for the management of acute rhinosinusitis and chronic rhinosinusitis with or without nasal polyps in adults and children is systematically reviewed and integrated care pathways based on the evidence are proposed. Despite considerable increases in the amount of quality publications in recent years, a large number of practical clinical questions remain. It was agreed that the best way to address these was to conduct a Delphi exercise . The results have been integrated into the respective sections. Last but not least, advice for patients and pharmacists and a new list of research needs are included. The full document can be downloaded for free on the website of this journal: http://www.rhinologyjournal.com.

2,853 citations

01 Apr 1997
TL;DR: The objective of this paper is to give a comprehensive introduction to applied cryptography with an engineer or computer scientist in mind on the knowledge needed to create practical systems which supports integrity, confidentiality, or authenticity.
Abstract: The objective of this paper is to give a comprehensive introduction to applied cryptography with an engineer or computer scientist in mind. The emphasis is on the knowledge needed to create practical systems which supports integrity, confidentiality, or authenticity. Topics covered includes an introduction to the concepts in cryptography, attacks against cryptographic systems, key use and handling, random bit generation, encryption modes, and message authentication codes. Recommendations on algorithms and further reading is given in the end of the paper. This paper should make the reader able to build, understand and evaluate system descriptions and designs based on the cryptographic components described in the paper.

2,188 citations