scispace - formally typeset
K

Kee-Young Yoo

Researcher at Kyungpook National University

Publications -  345
Citations -  4525

Kee-Young Yoo is an academic researcher from Kyungpook National University. The author has contributed to research in topics: Authentication & Password. The author has an hindex of 35, co-authored 345 publications receiving 4165 citations. Previous affiliations of Kee-Young Yoo include New Generation University College.

Papers
More filters
Journal Article

Patient Authentication System for Medical Information Security using RFID

TL;DR: This paper proposes a secure and efficient RFID authentication system to not only authenticate patients' authenticity but also protect patients' personal medical informations on the high technology medical environments such as u-Hospital and u-Healthcare.
Journal ArticleDOI

A novel Reversible Data Hiding Scheme based on Modulo Operation and Histogram Shifting

TL;DR: This paper proposes a novel reversible data hiding scheme based on modulo operation and histogram shifting that was increased by 28% and the additional communication data was decreased by 71%.
Proceedings ArticleDOI

Improved Data Hiding Method by Exploiting Modification Direction

TL;DR: An improved method for EMD is proposed which can hide more secret data while maintaining a high PSNR value and could embed on every pixel for cover data.
Journal ArticleDOI

AOP arithmetic architectures over GF(2m)

TL;DR: This paper presents bit-serial arithmetic architectures for GF(2^m) based on an irreducible all one polynomial that can be used as kernel architecture for modular exponentiations, which is very important operation in the most of public key cryptosystem.
Proceedings ArticleDOI

More Robust Anonymous Authentication with Link-Layer Privacy

TL;DR: This paper demonstrates that how the attack can be launched and also provides an enhanced construction in order to solve the problem of protecting privacy at link-layer privacy and has almost the same performance as that of Lu et al. in terms of both computation and communication cost, while it provides much better security results.