K
Kee-Young Yoo
Researcher at Kyungpook National University
Publications - 345
Citations - 4525
Kee-Young Yoo is an academic researcher from Kyungpook National University. The author has contributed to research in topics: Authentication & Password. The author has an hindex of 35, co-authored 345 publications receiving 4165 citations. Previous affiliations of Kee-Young Yoo include New Generation University College.
Papers
More filters
Journal Article
Patient Authentication System for Medical Information Security using RFID
Eun-Jun Yoon,Kee-Young Yoo +1 more
TL;DR: This paper proposes a secure and efficient RFID authentication system to not only authenticate patients' authenticity but also protect patients' personal medical informations on the high technology medical environments such as u-Hospital and u-Healthcare.
Journal ArticleDOI
A novel Reversible Data Hiding Scheme based on Modulo Operation and Histogram Shifting
Dae-Soo Kim,Kee-Young Yoo +1 more
TL;DR: This paper proposes a novel reversible data hiding scheme based on modulo operation and histogram shifting that was increased by 28% and the additional communication data was decreased by 71%.
Proceedings ArticleDOI
Improved Data Hiding Method by Exploiting Modification Direction
TL;DR: An improved method for EMD is proposed which can hide more secret data while maintaining a high PSNR value and could embed on every pixel for cover data.
Journal ArticleDOI
AOP arithmetic architectures over GF(2m)
Hyunsung Kim,Kee-Young Yoo +1 more
TL;DR: This paper presents bit-serial arithmetic architectures for GF(2^m) based on an irreducible all one polynomial that can be used as kernel architecture for modular exponentiations, which is very important operation in the most of public key cryptosystem.
Proceedings ArticleDOI
More Robust Anonymous Authentication with Link-Layer Privacy
TL;DR: This paper demonstrates that how the attack can be launched and also provides an enhanced construction in order to solve the problem of protecting privacy at link-layer privacy and has almost the same performance as that of Lu et al. in terms of both computation and communication cost, while it provides much better security results.