Skip to main content

previous disabled Page of 4
and
  1. No Access

    Chapter and Conference Paper

    RLP-Net: A Recursive Light Propagation Network for 3-D Virtual Refocusing

    High-speed optical 3-D fluorescence microscopy is an essential tool for capturing the rapid dynamics of biological systems such as cellular signaling and complex movements. Designing such an optical system is ...

    Changyeop Shin, Hyun Ryu, Eun-Seo Cho in Medical Image Computing and Computer Assis… (2021)

  2. No Access

    Chapter and Conference Paper

    Efficient Neural Network Approximation of Robust PCA for Automated Analysis of Calcium Imaging Data

    Calcium imaging is an essential tool to study the activity of neuronal populations. However, the high level of background fluorescence in images hinders the accurate identification of neurons and the extractio...

    Seungjae Han, Eun-Seo Cho, Inkyu Park in Medical Image Computing and Computer Assis… (2021)

  3. No Access

    Article

    Thermal energy harvesting circuit with maximum power point tracking control for self-powered sensor node applications

    We present a simple implementation of a thermal energy harvesting circuit with the maximum power point tracking (MPPT) control for self-powered miniature-sized sensor nodes. Complex start-up circuitry and dire...

    Eun-Jung Yoon, Jong-Tae Park, Chong-Gun Yu in Frontiers of Information Technology & Elec… (2018)

  4. No Access

    Article

    Reversible data hiding scheme with edge-direction predictor and modulo operation

    Since the first histogram shifting technique was proposed by Ni et al., many histogram based data hiding methods were proposed to improve their scheme. One of the methods is using difference value between cove...

    Dae-Soo Kim, Eun-Jun Yoon, Cheonshik Kim in Journal of Real-Time Image Processing (2018)

  5. No Access

    Article

    A real-time secret image sharing with fairness

    When traditional secret image sharing techniques reconstructed the secret, they input the shares over t. While less than t shares can know nothing about the secret, the problem arises when there are more than t s...

    Gil-Je Lee, Eun-Jun Yoon, Cheonshik Kim in Journal of Real-Time Image Processing (2018)

  6. No Access

    Chapter and Conference Paper

    A Pairing Based Authentication and Key Establishment Scheme for Remote Patient Monitoring Systems

    With the evolution of Wireless Medical Sensor Networks (WMSNs), real-time remote patient monitoring has become more feasible than ever before. Different sensors can be used e.g. at home to monitor patient’s vi...

    Kambombo Mtonga, Eun-Jun Yoon, Hyunsung Kim in e-Infrastructure and e-Services for Develo… (2014)

  7. No Access

    Article

    An Efficient and Spam-Robust Proximity Measure Between Communication Entities

    Electronic communication service providers are obliged to retain communication data for a certain amount of time by their local laws. The retained communication data or the communication logs are used in vario...

    Joo Hyuk Jeon, Jihwan Song, Jeong Eun Kwon in Journal of Computer Science and Technology (2013)

  8. No Access

    Chapter and Conference Paper

    On the Security of Lv et al.’s Three-Party Authenticated Key Exchange Protocol Using One-Time Key

    In 2012, Lv et al. proposed a new three-party authenticated key exchange (3PAKE) protocol using one-time key which aims to achieve more efficiency with the same security level of other existing 3PAKE protocols...

    Eun-Jun Yoon in Advanced Infocomm Technology (2013)

  9. No Access

    Chapter and Conference Paper

    New ID-Based Proxy Signature Scheme with Message Recovery

    In 2012, Singh-Verma proposed an ID-based proxy signature scheme with message recovery. Unfortunately, by giving two concrete attacks, Tian et al. showed that Singh-Verma’s scheme is not secure. This paper pro...

    Eun-Jun Yoon, YongSoo Choi, Cheonshik Kim in Grid and Pervasive Computing (2013)

  10. No Access

    Article

    Robust biometrics-based multi-server authentication with key agreement scheme for smart cards on elliptic curve cryptosystem

    Conventional single-server authentication schemes suffer a significant shortcoming. If a remote user wishes to use numerous network services, he/she must register his/her identity and password at these servers...

    Eun-Jun Yoon, Kee-Young Yoo in The Journal of Supercomputing (2013)

  11. Chapter and Conference Paper

    Cryptanalysis of an RFID Tag Search Protocol Preserving Privacy of Mobile Reader

    RFID tag search system can be used to find a particular tag among numerous tags. In 2011, Chun et al. proposed an RFID tag search protocol preserving privacy of mobile reader holders. Chun et al. claimed that ...

    Eun-Jun Yoon in Network and Parallel Computing (2012)

  12. Chapter and Conference Paper

    Cryptanalysis of Goriparthi et al.’s Bilinear Pairing Based Remote User Authentication Scheme

    Recently, many user authentication schemes with bilinear pairings have been proposed for client-server environment. In 2009, Goriparthi et al. proposed an improved bilinear pairing based remote user authentica...

    Hae-Jung Kim, Eun-Jun Yoon in Network and Parallel Computing (2012)

  13. No Access

    Chapter and Conference Paper

    Cryptanalysis of an Enhanced Simple Three-Party Key Exchange Protocol

    A simple three-party password-based authenticated key exchange (S-3PAKE) protocols are extremely important to secure communications and are now extensively adopted in network communications. In 2009, Nam et al...

    Hae-Jung Kim, Eun-Jun Yoon in Security Technology (2011)

  14. No Access

    Chapter and Conference Paper

    Replay Attacks on Han et al.’s Chaotic Map Based Key Agreement Protocol Using Nonce

    In 2008, Han et al. proposed two key agreement protocols based on chaotic maps; timestamp based protocol and nonce based protocol. The current paper, however, demonstrates the vulnerability of Han et al.’s non...

    Eun-Jun Yoon, Kee-Young Yoo in Advanced Intelligent Computing Theories an… (2008)

  15. No Access

    Chapter and Conference Paper

    A New Key Agreement Protocol Based on Chaotic Maps

    In 2007, **ao et al.’s proposed a novel key agreement protocol based on chaotic maps. Recently, Han et al., however, pointed out that **ao et al.’s protocol is not secure against their developed new attacks wh...

    Eun-Jun Yoon, Kee-Young Yoo in Agent and Multi-Agent Systems: Technologies and Applications (2008)

  16. Chapter and Conference Paper

    An Efficient Authentication and Key Agreement Protocol in RFID System

    Due to the very limited computing resource, storing space and electric power supply of tag, it is a great challenge for us to design a practical RFID protocol which is security, efficient and can be used in th...

    Eun-Jun Yoon, Kee-Young Yoo in Network and Parallel Computing (2008)

  17. No Access

    Chapter and Conference Paper

    Enhanced Three-Round Smart Card-Based Key Exchange Protocol

    In 2007, Kwon et al. proposed a three-round protocol, SKE, for smart card-based key exchange in the three-party setting which provides both key independence and forward secrecy. This paper demonstrates the vul...

    Eun-Jun Yoon, Kee-Young Yoo in Autonomic and Trusted Computing (2008)

  18. No Access

    Chapter and Conference Paper

    A Generic Network Interface Architecture for a Networked Processor Array (NePA)

    Recently Network-on-Chip (NoC) technique has been proposed as a promising solution for on-chip interconnection network. However, different interface specification of integrated components raises a considerable...

    Seung Eun Lee, Jun Ho Bahn, Yoon Seok Yang in Architecture of Computing Systems – ARCS 2… (2008)

  19. No Access

    Chapter and Conference Paper

    Improving the Sun-Cao’s Public Key Authentication Scheme for Non-repudiation

    In 2005, Sun-Cao pointed out that Peinado’s key authentication scheme does not achieve non-repudiation of the user’s public key, like its previous versions. Then, they proposed an improved public key authentic...

    Eun-Jun Yoon, Kee-Young Yoo in Advanced Intelligent Computing Theories an… (2007)

  20. No Access

    Chapter and Conference Paper

    Traffic Speed Prediction Under Weekday, Time, and Neighboring Links’ Speed: Back Propagation Neural Network Approach

    The ATIS (Advanced Traveler Information System) provides travelers with real-time and precise information about the shortest path to the destination, the traffic condition, travel time estimation, and so on. T...

    Eun-Mi Lee, Jai-Hoon Kim, Won-Sik Yoon in Advanced Intelligent Computing Theories an… (2007)

previous disabled Page of 4