Folgen
Yoonjeong Kim
Yoonjeong Kim
DuDu Information Technology, Inc.
Bestätigte E-Mail-Adresse bei swu.ac.kr
Titel
Zitiert von
Zitiert von
Jahr
Privacy-aware role based access control model: Revisited for multi-policy conflict detection
Y Kim, E Song
2010 International Conference on Information Science and Applications, 1-7, 2010
162010
Preventing Bitcoin Selfish Mining Using Transaction Creation Time
YK Jihye Lee
2018 International Conference on Software Security and Assurance (ICSSA), 2018
112018
Robust lightweight fingerprint encryption using random block feedback
Y Kim, J Yoon, JH Joo, K Yi
Electronics letters 50 (4), 267-268, 2014
82014
Efficient parallel exponentiation in GF (qn) using normal basis representations
MK Lee, Y Kim, K Park, Y Cho
Journal of Algorithms 54 (2), 205-221, 2005
82005
Modified hierarchical privacy-aware role based access control model
S Arora, E Song, Y Kim
Proceedings of the 2012 ACM Research in Applied Computation Symposium, 344-347, 2012
62012
Safety comparison analysis against known/chosen plaintext attack of RBF (random block feedback) mode to other block cipher modes of operation
Y Kim, K Yi
The Journal of Korean Institute of Communications and Information Sciences …, 2014
32014
Privacy-Preserving RFID Authentication Using Public Exponent Three RSA Algorithm
Y Kim, SY Ohm, K Yi
IEICE transactions on information and systems 92 (3), 545-547, 2009
32009
The random-block feedback mode for block ciphers
Y Kim, Y Cho
IEICE transactions on fundamentals of electronics, communications and …, 2000
32000
Efficient parallel exponentiation in GF(2n) using normal basis representations
MK Lee, Y Kim, K Park, Y Cho
Proceedings of the thirteenth annual ACM symposium on Parallel algorithms …, 2001
22001
Storage efficient algorithm for hermite normal form using lll
GH Cho, HS Lee, S Lim, Y Kim
Linear Algebra and its Applications 613, 183-200, 2021
12021
HNF Implementation Strategy Analysis for Lattice Cryptography (Lightning Talk)
Y Kim, H Yun, S Lim
2018 International Conference on Software Security and Assurance (ICSSA), 38-38, 2018
2018
블록 암호 연산 모드 RBF (Random Block Feedback) 의알려진/선택 평문 공격에 대한 안전성 비교 분석
김윤정, 이강
한국통신학회논문지 39 (5), 317-322, 2014
2014
웹서버를 위한, 서비스 거부 공격에 강한 침입탐지시스템 구성
김윤정
정보보증논문지 추가정보 표시 8 (3), 1-8, 2008
2008
Aspnes, James, 127
R Beigel, DJ Bernstein, JM Boyer, Y Cho, D Eppstein, F Fich, B Gum, ...
Journal of Algorithms 54, 223, 2005
2005
Kenneth Weber, Vilmar Trevisan, Luiz Felipe Martins. A modular integer GCD al
R Beigel, D Eppstein, MK Lee, Y Kim, K Park, Y Cho, P Šparl, J Žerovnik, ...
Journal of Algorithms 54, 126, 2005
2005
ISO/IEC 의 IDS 기술 표준 동향
김윤정, 이기한
정보보호학회지 14 (2), 6-11, 2004
2004
병렬 지수승에서 라운드 수 축소를 위한 알고리즘
김윤정
정보보호학회논문지 14 (1), 113-119, 2004
2004
All-or-nothing encryption^ f\h p/p ^ fx/j, UW
Y Kim, Y Cho
ICSSA 2018
YB Choi, I Echizen, A Holzinger, P Kieseberg, DK Kim, DS Kim, JM Kim, ...
Hangul Encryption Algorithm Based on DES
YKKPY Cho
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20