Showing results 2 to 6 of 6
Efficient Approach for Mitigating Mobile Phishing Attacks Lee, Hyungkyu; Lee, Younho; Seo, Changho; Yoon, Hyunsoo, IEICE TRANSACTIONS ON COMMUNICATIONS, v.E101B, no.9, pp.1982 - 1996, 2018-09 |
Rogue public key registration attack and the importance of proof of possession in the PKI environment Lee, Younho; Park, Yongsu; Kim, Heeyoul; Hong, Seong-Min; Yoon, Hyunsoo, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E89D, no.8, pp.2452 - 2455, 2006-08 |
Sensor Node Localization by Three Mobile Anchors in the Wireless Sensor Networks Lee, Seunghak; Kim, Namgi; Kim, Heeyoul; Lee, Younho; Yoon, Hyunsoo, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E94D, no.10, pp.1981 - 1988, 2011-10 |
Sorting Method for Fully Homomorphic Encrypted Data Using the Cryptographic Single-Instruction Multiple-Data Operation Kim, Pyung; Lee, Younho; Yoon, Hyunsoo, IEICE TRANSACTIONS ON COMMUNICATIONS, v.E99B, no.5, pp.1070 - 1086, 2016-05 |
Trust management for resilient wireless sensor networks Hur, Junbeom; Lee, Younho; Hong, Seong-Min; Yoon, Hyunsoo, INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2005 BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.3935, pp.56 - 68, 2006 |
Discover