Taek-Young Youn
Taek-Young Youn
Verified email at
Cited by
Cited by
Smart contract-based review system for an IoT data marketplace
JS Park, TY Youn, HB Kim, KH Rhee, SU Shin
Sensors 18 (10), 3577, 2018
Weaknesses in an anonymous authentication scheme for roaming service in global mobility networks
TY Youn, YH Park, J Lim
IEEE Communications Letters 13 (7), 471-473, 2009
Public key encryption with equality test in the standard model
HT Lee, S Ling, JH Seo, H Wang, TY Youn
Information Sciences 516, 89-108, 2020
Can id shuffling technique (cist): Moving target defense strategy for protecting in-vehicle can
S Woo, D Moon, TY Youn, Y Lee, Y Kim
IEEE Access 7, 15521-15536, 2019
Efficient client-side deduplication of encrypted data with public auditing in cloud storage
TY Youn, KY Chang, KH Rhee, SU Shin
IEEE Access 6, 26578-26587, 2018
Method and device to assist in the execution of tasks of parallel jobs
QA Tran, M Xu
US Patent 7,111,299, 2006
Blockchain-based data sharing and trading model for the connected car
BG Jeong, TY Youn, NS Jho, SU Shin
Sensors 20 (11), 3141, 2020
Improved delegation-based authentication protocol for secure roaming service with unlinkability
TY Youn, J Lim
IEEE Communications Letters 14 (9), 791-793, 2010
Client‐Side Deduplication to Enhance Security and Reduce Communication Costs
K Kim, TY Youn, NS Jho, KY Chang
Etri Journal 39 (1), 116-123, 2017
Semi-generic transformation of revocable hierarchical identity-based encryption and its DBDH instantiation
K Emura, JH Seo, TY Youn
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2016
Efficient three-party key exchange protocols with round efficiency
TY Youn, ES Kang, C Lee
Telecommunication Systems 52, 1367-1376, 2013
System and method for providing compressed encryption and decryption in homomorphic encryption based on integers
TY Youn, NS Jho, JY Hwang, KY Chang
US Patent 9,374,220, 2016
An efficient public key cryptosystem with a privacy enhanced double decryption mechanism
TY Youn, YH Park, CH Kim, J Lim
International Workshop on Selected Areas in Cryptography, 144-158, 2005
Practical sender authentication scheme for in-vehicle CAN with efficient key management
TY Youn, Y Lee, S Woo
IEEE Access 8, 86836-86849, 2020
Method and system for additive homomorphic encryption scheme with operation error detection functionality
TY Youn, N Jho, KY Chang
US Patent 10,270,588, 2019
An efficient non-interactive deniable authentication scheme based on trapdoor commitment schemes
TY Youn, C Lee, YH Park
Computer Communications 34 (3), 353-357, 2011
Security analysis of an unlinkable secret handshakes scheme
TY Youn, YH Park
IEEE communications letters 14 (1), 4-5, 2009
Authorized client-side deduplication using CP-ABE in cloud storage
TY Youn, NS Jho, KH Rhee, SU Shin
Wireless Communications and Mobile Computing 2019, 2019
Signcryption with fast online signing and short signcryptext for secure and private mobile communication
TY Youn, D Hong
Science China Information Sciences 55, 2530-2541, 2012
Weakness in a RSA-based password authenticated key exchange protocol
TY Youn, YH Park, C Kim, J Lim
Information processing letters 108 (6), 339-342, 2008
The system can't perform the operation now. Try again later.
Articles 1–20