default search action
Okyeon Yi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j8]N. Kannaiya Raja, E. Laxmi Lydia, Thumpala Archana Acharya, K. Radhika, Eunmok Yang, Okyeon Yi:
Rider Optimization With Deep Learning Based Image Encryption for Secure Drone Communication. IEEE Access 11: 121646-121655 (2023) - 2022
- [j7]Myungseo Park, Sehoon Lee, Okyeon Yi, Jongsung Kim:
A study on data acquisition based on the Huawei smartphone backup protocol. Digit. Investig. 41: 301393 (2022) - [c21]Taewan Kim, Seyoon Lee, Seunghwan Yun, Jongbum Kim, Okyeon Yi:
Analysis of Radioactive Decay Based Entropy Generator in the IoT Environments. WISA 2022: 277-288 - 2020
- [j6]Myungseo Park, Okyeon Yi, Jongsung Kim:
A methodology for the decryption of encrypted smartphone backup data on android platform: A case study on the latest samsung smartphone backup system. Digit. Investig. 35: 301026 (2020)
2010 – 2019
- 2019
- [j5]Hangi Kim, Do-Won Kim, Okyeon Yi, Jongsung Kim:
Cryptanalysis of hash functions based on blockciphers suitable for IoT service platform security. Multim. Tools Appl. 78(3): 3107-3130 (2019) - [c20]Hyunki Kim, Jinhyeok Oh, Changuk Jang, Okyeon Yi, Juhong Han, Hansaem Wi, Chanil Park:
Analysis of the Noise Source Entropy Used in OpenSSL's Random Number Generation Mechanism. ICTC 2019: 59-62 - 2017
- [c19]Hyunki Kim, Jae-Hoon Lee, Okyeon Yi:
Key Managements of Underwater Acoustic Communication Environments. WISA 2017: 274-282 - 2016
- [j4]Mukhridinkhon Ibragimov, Jae-Hoon Lee, Muppalla Kalyani, Jung-Il Namgung, Soo-Hyun Park, Okyeon Yi, Changhwa Kim, Yong-Kon Lim:
CCM-UW Security Modes for Low-band Underwater Acoustic Sensor Networks. Wirel. Pers. Commun. 89(2): 479-499 (2016) - [c18]Chae-Won Yun, Jae-Hoon Lee, Okyeon Yi, Soo-Hyun Park:
Ticket-based authentication protocol for Underwater Wireless Sensor Network. ICUFN 2016: 215-217 - 2014
- [j3]Jong-Yeon Park, Dong-Guk Han, Okyeon Yi, Jeong-Nyeo Kim:
An improved side channel attack using event information of subtraction. J. Netw. Comput. Appl. 38: 99-105 (2014) - [c17]Ju-Sung Kang, Nayoung Kim, Wangho Ju, Okyeon Yi:
A Security Analysis of Key Expansion Functions Using Pseudorandom Permutations. WISTP 2014: 10-23 - [c16]Mukhridinkhon Ibragimov, Jae-Hoon Lee, Muppalla Kalyani, Jung-Il Namgung, Soo-Hyun Park, Ok Yeon Yi, Changhwa Kim:
An Energy efficient CCM-UW security mechanism for Underwater Acoustic Networks. WUWNet 2014: 41:1-41:2 - 2012
- [c15]Ji-Eon Kim, Nam-Yeol Yun, Sardorbek Muminov, Soo-Hyun Park, Ok Yeon Yi:
Security in Underwater Acoustic Sensor Network: Focus on Suitable Encryption Mechanisms. AsiaSim (2) 2012: 160-168 - [c14]Ju-Sung Kang, Okyeon Yi, Min-Ku Kim, Ku-Young Chang:
Practical Multi-party Versions of Private Set Intersection Protocols with Hardware Tokens. FGIT-FGCN/DCA 2012: 72-79 - [c13]Min-Ku Kim, Dong-Guk Han, Jeong Choon Ryoo, Okyeon Yi:
CPA performance enhancement based on spectrogram. ICCST 2012: 195-200 - 2011
- [c12]Jong-Yeon Park, Okyeon Yi, Dong-Guk Han, Dooho Choi:
Ghost key patterns with Equidistant Chosen Message attack on RSA-CRT. ICCST 2011: 1-5 - 2010
- [c11]Ju-Sung Kang, Okyeon Yi:
On Distinguished Points Method to Implement a Parallel Collision Search Attack on ECDLP. FGIT-SecTech/DRBC 2010: 39-46 - [c10]Jong-Yeon Park, Ji-Sun Choi, Okyeon Yi:
Methods for practical whitebox cryptography. ICTC 2010: 474-479
2000 – 2009
- 2009
- [j2]Sun-Hee Lim, Seunghwan Yun, Jongin Lim, Okyeon Yi:
Formalizing the design, evaluation, and analysis of quality of protection in wireless networks. J. Commun. Networks 11(6): 634-644 (2009) - 2007
- [c9]Sun-Hee Lim, Okyeon Yi, Chang-Hoon Jung, Ki-Seok Bang:
A Fast and Efficient Authentication Protocol for a Seamless Handover between a WLAN and WiBro. COMSWARE 2007 - [c8]Daesung Moon, Sungju Lee, Seunghwan Jung, Yongwha Chung, Miae Park, Okyeon Yi:
Fingerprint Template Protection Using Fuzzy Vault. ICCSA (3) 2007: 1141-1151 - [c7]Sun-Hee Lim, Ki-Seok Bang, Okyeon Yi, Jongin Lim:
A Secure Handover Protocol Design in Wireless Networks with Formal Verification. WWIC 2007: 67-78 - [e1]Jae-Kwang Lee, Okyeon Yi, Moti Yung:
Information Security Applications, 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers. Lecture Notes in Computer Science 4298, Springer 2007, ISBN 978-3-540-71092-9 [contents] - 2006
- [j1]Deukjo Hong, Seokhie Hong, Wonil Lee, Sangjin Lee, Jongin Lim, Jaechul Sung, Okyeon Yi:
Known-IV, Known-in-Advance-IV, and Replayed-and-Known-IV Attacks on Multiple Modes of Operation of Block Ciphers. J. Cryptol. 19(4): 441-462 (2006) - [c6]Daesung Moon, Sungju Lee, Seunghwan Jung, Yongwha Chung, Okyeon Yi, Namil Lee, Kiyoung Moon:
Privacy-Enhancing Fingerprint Authentication Using Cancelable Templates with Passwords. WISA 2006: 100-109 - 2001
- [c5]Ju-Sung Kang, Okyeon Yi, Dowon Hong, Hyun Sook Cho:
Pseudorandomness of MISTY-Type Transformations and the Block Cipher KASUMI. ACISP 2001: 60-73 - [c4]Deukjo Hong, Jaechul Sung, Seokhie Hong, Wonil Lee, Sangjin Lee, Jongin Lim, Okyeon Yi:
Known-IV Attacks on Triple Modes of Operation of Block Ciphers. ASIACRYPT 2001: 208-221 - [c3]Ju-Sung Kang, Sang-Uk Shin, Dowon Hong, Okyeon Yi:
Provable Security of KASUMI and 3GPP Encryption Mode f8. ASIACRYPT 2001: 255-271 - [c2]Jaechul Sung, Sangjin Lee, Jong In Lim, Wonil Lee, Okyeon Yi:
Concrete Security Analysis of CTR-OFB and CTR-CFB Modes of Operation. ICISC 2001: 103-113 - 2000
- [c1]Heajoung Yoo, Seokhie Hong, Sangjin Lee, Jong In Lim, Okyeon Yi, Maenghee Sung:
A Proposal of a New Public Key Cryptosystem Using Matrices over a Ring. ACISP 2000: 41-48
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 20:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint