default search action
Eun-Kyung Ryu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2017
- [j18]Hyunsung Kim, Eun-Kyung Ryu:
Delegation Based User Authentication Framework over Cognitive Radio Networks. J. Sens. Actuator Networks 6(4): 29 (2017) - 2015
- [c19]Eun-Kyung Ryu, Dae-Soo Kim, Kee-Young Yoo:
On Elliptic Curve Based Untraceable RFID Authentication Protocols. IH&MMSec 2015: 147-153 - 2013
- [j17]Eun-Kyung Ryu, Kee-Young Yoo:
Certificateless broadcast authentication for vehicular ad hoc networks. Secur. Commun. Networks 6(5): 602-611 (2013) - [c18]Eun-Kyung Ryu, Gil-Je Lee, Kee-Young Yoo:
Unlinkable authentication for roaming user in heterogeneous wireless networks. ICCVE 2013: 629-634 - 2012
- [j16]Eun-Kyung Ryu, Hyunsung Kim, Kee-Young Yoo:
KCI-resilient anonymous wireless link-layer authentication protocols. Math. Comput. Model. 55(11-12): 2107-2116 (2012) - 2010
- [c17]Eun-Kyung Ryu, Eun-Jun Yoon, Kee-Young Yoo:
More Robust Anonymous Authentication with Link-Layer Privacy. APSCC 2010: 441-446
2000 – 2009
- 2009
- [j15]Eun-Kyung Ryu, Tsuyoshi Takagi:
A hybrid approach for privacy-preserving RFID tags. Comput. Stand. Interfaces 31(4): 812-815 (2009) - 2007
- [c16]Eun-Kyung Ryu, Tsuyoshi Takagi:
Efficient Conjunctive Keyword-Searchable Encryption. AINA Workshops (1) 2007: 409-414 - 2005
- [j14]Kee-Won Kim, Eun-Kyung Ryu, Kee-Young Yoo:
Cryptanalysis of Lee-Lee authenticated key agreement scheme. Appl. Math. Comput. 163(1): 193-198 (2005) - [j13]Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo:
Fixing problems in Lin et al.'s OSPA protocol. Appl. Math. Comput. 166(1): 46-57 (2005) - [j12]Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo:
Improvement of Fan et al.'s deniable authentication protocol based on Diffie-Hellman algorithm. Appl. Math. Comput. 167(1): 274-280 (2005) - [j11]Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo:
Improvement of Chien-Jan's authenticated multiple-key agreement protocol without using conventional one-way function. Appl. Math. Comput. 167(1): 711-715 (2005) - [j10]Eun-Kyung Ryu, Jae-Yuel Im, Kee-Young Yoo:
Security of Tseng-Jan's conference key distribution system. Appl. Math. Comput. 167(2): 833-839 (2005) - [j9]Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo:
Cryptanalysis and further improvement of Peinado's improved LHL-key authentication scheme. Appl. Math. Comput. 168(2): 788-794 (2005) - [j8]Eun-Kyung Ryu, Kee-Young Yoo:
On the security of efficient user identification scheme. Appl. Math. Comput. 171(2): 1201-1205 (2005) - [j7]Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo:
An improvement of Hwang-Lee-Tang's simple remote user authentication scheme. Comput. Secur. 24(1): 50-56 (2005) - [j6]Woo-Hun Kim, Eun-Kyung Ryu, Jae-Yuel Im, Kee-Young Yoo:
New conference key agreement protocol with user anonymity. Comput. Stand. Interfaces 27(2): 185-190 (2005) - [j5]Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo:
Attacks on the Shen et al.'s Timestamp-Based Password Authentication Scheme Using Smart Cards. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88-A(1): 319-321 (2005) - [j4]Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo:
Attacks and Solutions of Yang et al.'s Protected Password Changing Scheme. Informatica 16(2): 285-294 (2005) - [c15]Eun-Jun Yoon, Eun-Kyung Ryu, Woo-Hun Kim, Kee-Young Yoo:
Cryptanalysis of A Key Authentication Scheme Based on Discrete Logarithms. Security and Management 2005: 72-78 - [c14]Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo:
Optimized Initiation Phases for Anonymous Auction Protocols. Human.Society@Internet 2005: 19-27 - [c13]Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo:
Secure Protected Password Change Scheme. MMM-ACNS 2005: 472-477 - 2004
- [j3]Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo:
A secure user authentication scheme using hash functions. ACM SIGOPS Oper. Syst. Rev. 38(2): 62-68 (2004) - [j2]Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo:
Efficient remote user authentication scheme based on generalized ElGamal signature scheme. IEEE Trans. Consumer Electron. 50(2): 568-570 (2004) - [j1]Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo:
Further improvement of an efficient password based remote user authentication scheme using smart cards. IEEE Trans. Consumer Electron. 50(2): 612-614 (2004) - [c12]Eun-Kyung Ryu, Kee-Won Kim, Kee-Young Yoo:
An Authenticated Key Agreement Protocol Resistant to a Dictionary Attack. ICCSA (4) 2004: 603-610 - [c11]Kee-Young Yoo, Eun-Kyung Ryu, Jae-Yuel Im:
Multiparty Key Agreement Protocol with Cheater Identification Based on Shamir Secret Sharing. ICCSA (4) 2004: 655-664 - [c10]Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo:
Security of Shen et al.'s Timestamp-Based Password Authentication Scheme. ICCSA (4) 2004: 665-671 - [c9]Kee-Won Kim, Eun-Kyung Ryu, Kee-Young Yoo:
ID-Based Authenticated Multiple-Key Agreement Protocol from Pairings. ICCSA (4) 2004: 672-680 - [c8]Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo:
Robust Remote User Authentication Scheme. ICOIN 2004: 935-942 - [c7]Eun-Kyung Ryu, Eun-Jun Yoon, Kee-Young Yoo:
An Efficient ID-Based Authenticated Key Agreement Protocol from Pairings. NETWORKING 2004: 1458-1463 - 2003
- [c6]Kee-Won Kim, Eun-Kyung Ryu, Hyung-Mok Lee, Kee-Young Yoo:
A New Authenticated Key Agreement Protocol. CAINE 2003: 91-94 - [c5]Hyoung-Mok Lee, Eun-Kyung Ryu, Kee-Won Kim, Jae-Min Lee, Kee-Young Yoo:
A Robust Authenticated Key Agreement Protocol. CATA 2003: 76-79 - [c4]Eun-Kyung Ryu, Kee-Won Kim, Kee-Young Yoo:
A Promising Key Agreement Protocol. ISAAC 2003: 655-662 - 2002
- [c3]Keum-Sook Ha, Eun-Kyung Ryu, Kee-Young Yoo:
A Promising Labeling Scheme for On-the-fly Data Race Detection. CATA 2002: 475-478 - [c2]Keum-Sook Ha, Eun-Kyung Ryu, Kee-Young Yoo:
Space-Efficient First Race Detection in Shared Memory Programs with Nested Parallelism. PARA 2002: 253-263 - [c1]Eun-Kyung Ryu, Keum-Sook Ha, Kee-Young Yoo:
A Practical Method for On-the-Fly Data Race Detection. PARA 2002: 264-273
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:53 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint