Zobrazeno 1 - 10
of 443
pro vyhledávání: '"Kee-Young Yoo"'
Publikováno v:
IEEE Access, Vol 5, Pp 3622-3639 (2017)
Three-factor mutually authenticated key agreement protocols for multi-server environments have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Several authors have put forward various authentic
Externí odkaz:
https://doaj.org/article/6dde947b8b864cbcbd904fa79101b8ba
Autor:
Sravani Challa, Mohammad Wazid, Ashok Kumar Das, Neeraj Kumar, Alavalapati Goutham Reddy, Eun-Jun Yoon, Kee-Young Yoo
Publikováno v:
IEEE Access, Vol 5, Pp 3028-3043 (2017)
Internet of Things (IoT) is a network of all devices that can be accessed through the Internet. These devices can be remotely accessed and controlled using existing network infrastructure, thus allowing a direct integration of computing systems with
Externí odkaz:
https://doaj.org/article/8d6eb158d18c4b29a0aa682a1dac6f1b
Publikováno v:
IEEE Access, Vol 4, Pp 4394-4407 (2016)
Mobile user authentication is an essential topic to consider in the current communications technology due to greater deployment of handheld devices and advanced technologies. Memon et al. recently proposed an efficient and secure two-factor authentic
Externí odkaz:
https://doaj.org/article/f1d2e0fe785642d89c31ebc40e12e708
Publikováno v:
PLoS ONE, Vol 11, Iss 5, p e0154308 (2016)
Biometric based authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Lu et al. recently proposed a robust biometric based authentication
Externí odkaz:
https://doaj.org/article/405f2d1f0ec14c8687fbd76311c3e453
Publikováno v:
The Scientific World Journal, Vol 2014 (2014)
Over the past decade, most of secret image sharing schemes have been proposed by using Shamir's technique. It is based on a linear combination polynomial arithmetic. Although Shamir's technique based secret image sharing schemes are efficient and sca
Externí odkaz:
https://doaj.org/article/a4c04b1b95724ceda49d2174c1c73235
Publikováno v:
Journal of Computers. :194-203
Publikováno v:
Journal of Korea Multimedia Society. 20:629-639
Publikováno v:
Journal of Korea Multimedia Society. 20:261-270
Publikováno v:
IEEE Access, Vol 5, Pp 3622-3639 (2017)
Three-factor mutually authenticated key agreement protocols for multi-server environments have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Several authors have put forward various authentic
Autor:
Kee-Young Yoo
Publikováno v:
Journal of the Korea Organic Resource Recycling Association. 24:21-29