K
Kee-Young Yoo
Researcher at Kyungpook National University
Publications - 345
Citations - 4525
Kee-Young Yoo is an academic researcher from Kyungpook National University. The author has contributed to research in topics: Authentication & Password. The author has an hindex of 35, co-authored 345 publications receiving 4165 citations. Previous affiliations of Kee-Young Yoo include New Generation University College.
Papers
More filters
Proceedings ArticleDOI
Image Data Hiding Method Based on Multi-Pixel Differencing and LSB Substitution Methods
TL;DR: A novel data hiding method based on the least significant bit (LSB) substitution and the multi-pixel differencing (MPD) method is presented to improve the capacity of hidden secret data and to provide an imperceptible visual quality.
Proceedings ArticleDOI
More Efficient and Secure Remote User Authentication Scheme using Smart Cards
Eun-Jun Yoon,Kee-Young Yoo +1 more
TL;DR: A more efficient and secure scheme is presented in that it not only resolves such problems but also involves less computations and communications than Lee et al.'s scheme.
Journal ArticleDOI
Efficient nonce-based remote user authentication scheme using smart cards
TL;DR: An efficient remote user authentication scheme using smart cards, which does not require password verification tables and uses random nonces in place of timestamps, which is very efficient in computation cost.
Journal ArticleDOI
Improvement of Fan et al.'s deniable authentication protocol based on Diffie-Hellman algorithm
TL;DR: An authentication flaw similar to that developed by Lowe to Intruder masquerades as other principals and inquisitor INQ can identify the source of the message unlike their claims is pointed out.
Journal ArticleDOI
An Enhanced Biometric Based Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Elliptic Curve Cryptography.
TL;DR: An enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography using smartcards is proposed and it is proved that the proposed protocol achieves mutual authentication using Burrows-Abadi-Needham (BAN) logic.